ACRONIS Backup & Recovery 10 Adv Workstation, AAS, RNW Std MNT, 50-499u, ENG Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Backup-Wiederherstellungssoftware ACRONIS Backup & Recovery 10 Adv Workstation, AAS, RNW Std MNT, 50-499u, ENG herunter. Acronis Backup & Recovery 10 Adv Workstation, NFR, UnRest, DEU Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 402
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Advanced Workstation

Update 3 Acronis® Backup & Recovery ™ 10 Advanced Workstation User's Guide

Seite 2

10 Copyright © Acronis, Inc., 2000-2010 To recover the entire machine or the operating system that fails to start, use the bootable media (p. 391).

Seite 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010  Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You may

Seite 4

101 Copyright © Acronis, Inc., 2000-2010  Click Writing speed stated in kilobytes per second, and then enter the writing speed in kilobytes per s

Seite 5

102 Copyright © Acronis, Inc., 2000-2010 4. For the e-mail message to include the log entries related to the backup, select the Add full log to th

Seite 6

103 Copyright © Acronis, Inc., 2000-2010 The When user interaction is required check box – to send notification during the operation when user inte

Seite 7

104 Copyright © Acronis, Inc., 2000-2010  Use the setting set in the Machine options – to use the setting specified for the machine. For more inf

Seite 8

105 Copyright © Acronis, Inc., 2000-2010 If the destination disk runs out of free space while creating the backup, the task enters the Need interac

Seite 9 - 1.2 Getting started

106 Copyright © Acronis, Inc., 2000-2010 3.4.1.15 Media components This option is effective for both Windows and Linux operating systems, when the

Seite 10

107 Copyright © Acronis, Inc., 2000-2010 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up

Seite 11

108 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior in case a backup task is about to start (the scheduled time co

Seite 12 - Navigation tree

109 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior when any of the backup plan's tasks fails. The preset is

Seite 13 - Shortcuts bar

11 Copyright © Acronis, Inc., 2000-2010 1.2.1 Using the management console As soon as the console connects to a managed machine (p. 397) or to a m

Seite 14 - How to expand/minimize panes

110 Copyright © Acronis, Inc., 2000-2010 When this option is enabled, the backups, belonging to the policy or plan being created, will be located o

Seite 15 - "Tasks" view

111 Copyright © Acronis, Inc., 2000-2010 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you

Seite 16 - Action pages

112 Copyright © Acronis, Inc., 2000-2010 For example, if the machine boots from a hard disk drive by default and you select this check box, the mac

Seite 17 - Console

113 Copyright © Acronis, Inc., 2000-2010 You can also customize a default option itself by changing its value against the pre-defined one. The new

Seite 18 - 1.3.1 Agent for Windows

114 Copyright © Acronis, Inc., 2000-2010 Change SID after recovery Windows recovery - Windows recovery - Notifications: E-mail (p. 116) + + - - Win

Seite 19 - 1.3.2.1 Management Server

115 Copyright © Acronis, Inc., 2000-2010 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not

Seite 20 - 1.3.2.2 Storage Node

116 Copyright © Acronis, Inc., 2000-2010  Low – to minimize resources taken by the recovery process, leaving more resources to other processes ru

Seite 21 - 1.3.3 Management Console

117 Copyright © Acronis, Inc., 2000-2010  Some Internet service providers require authentication on the incoming mail server before being allowed

Seite 22 - 1.4 Supported file systems

118 Copyright © Acronis, Inc., 2000-2010 Windows event log This option is effective only in Windows operating systems. This option is not availabl

Seite 23 - 10 Storage Node

119 Copyright © Acronis, Inc., 2000-2010  Community – type the name of SNMP community to which both the host running SNMP management application

Seite 24 - 1.6 System requirements

12 Copyright © Acronis, Inc., 2000-2010 1.2.1.1 "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar

Seite 25 - 1.7 Technical Support

120 Copyright © Acronis, Inc., 2000-2010 Check file system after recovery This option is effective only when recovering disks or volumes. When oper

Seite 26 - 2.1 Basic concepts

121 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i

Seite 27

122 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau

Seite 28 - Backup using bootable media

123 Copyright © Acronis, Inc., 2000-2010 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.

Seite 29

124 Copyright © Acronis, Inc., 2000-2010 Related sections: Operations with archives stored in a vault (p. 155) Operations with backups (p. 156) Fil

Seite 30 - Full backup

125 Copyright © Acronis, Inc., 2000-2010 Delete a vault 1. Select the vault. 2. Click Delete. You'll be asked whether to keep the archives

Seite 31 - Differential backup

126 Copyright © Acronis, Inc., 2000-2010 Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may

Seite 32 - 2.4 Owners and credentials

127 Copyright © Acronis, Inc., 2000-2010 Vault database path To specify the path where the vault's database will be created 1. In the Local f

Seite 33 - 2.5 GFS backup scheme

128 Copyright © Acronis, Inc., 2000-2010 4.1.2.2 Creating an unmanaged centralized vault To create an unmanaged centralized vault, perform the fol

Seite 34 - GFS by Acronis

129 Copyright © Acronis, Inc., 2000-2010 To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the A

Seite 35 - The resulting archive: ideal

13 Copyright © Acronis, Inc., 2000-2010  Log. Use this view to examine the history of centralized management operations, such as creating a mana

Seite 36 - The resulting archive: real

130 Copyright © Acronis, Inc., 2000-2010 by different components of other versions of the product by means of Acronis Backup & Recovery 10, see

Seite 37 - Tower of Hanoi overview

131 Copyright © Acronis, Inc., 2000-2010 4. A tape with backups written by the storage node cannot be read on a tape device, locally attached to a

Seite 38 - Tower of Hanoi by Acronis

132 Copyright © Acronis, Inc., 2000-2010 4.1.3.5 Getting started with a tape library If you have a tape library device attached to a machine with

Seite 39 - 2.7 Retention rules

133 Copyright © Acronis, Inc., 2000-2010 If the tape barcode cannot be read, another Tasks Need Interaction window asks you to label a tape. Actio

Seite 40 - 1. Delete backups older than

134 Copyright © Acronis, Inc., 2000-2010 To change the settings of the backup policy/plan to be created click Change… in the Backup options section

Seite 41 - Combination of rules 1 and 2

135 Copyright © Acronis, Inc., 2000-2010 Any user with access to a managed vault on a tape library is able to perform these operations. However two

Seite 42 - Backing up dynamic volumes

136 Copyright © Acronis, Inc., 2000-2010 Labeling When a tape required for data recovery is not found, the Task Need Interaction window will ask th

Seite 43 - Recovering dynamic volumes

137 Copyright © Acronis, Inc., 2000-2010 If you leave this option unchanged, then the backups, belonging to the policy or plan being created, might

Seite 44 - 2.9 Tape support

138 Copyright © Acronis, Inc., 2000-2010 cycle. The same tape rotation enables you to get by with the minimum number of cartridges and not to be bu

Seite 45

139 Copyright © Acronis, Inc., 2000-2010  capability of the tape library (number of drives, loaders, slots and available tapes; capacity of tapes

Seite 46 - 2.10 Support for SNMP

14 Copyright © Acronis, Inc., 2000-2010 Actions Contains a list of common operations that can be performed on a managed machine or on a management

Seite 47 - 2.11.1 Acronis Secure Zone

140 Copyright © Acronis, Inc., 2000-2010 backup policy/plan starts on Wednesday and full backups should be created on every fourth Friday, on Wedne

Seite 48 - Limitation

141 Copyright © Acronis, Inc., 2000-2010 The next figure demonstrates the data backup archive at the moment. The differential backup is drawn as a

Seite 49 - Restore)

142 Copyright © Acronis, Inc., 2000-2010 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f

Seite 50 - Supported operating systems

143 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and

Seite 51 - How to use

144 Copyright © Acronis, Inc., 2000-2010 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup

Seite 52 - 2.12.1 Basic concepts

145 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF

Seite 53

146 Copyright © Acronis, Inc., 2000-2010  backup deletion frees a tape so it can be reused. The main drawback is the large number of required tap

Seite 54

147 Copyright © Acronis, Inc., 2000-2010 ToH Example 1 Suppose, the backup plan has the following tape options:  the Use a separate tape set opti

Seite 55 - Setting up the storage node

148 Copyright © Acronis, Inc., 2000-2010  five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has

Seite 56

149 Copyright © Acronis, Inc., 2000-2010 ToH Example 3 Imagine the backup plan has the following tape options:  the Use a separate tape set opti

Seite 57

15 Copyright © Acronis, Inc., 2000-2010 The management console "remembers" the way the panes' borders are set. When you run the mana

Seite 58 - Policy on a group

150 Copyright © Acronis, Inc., 2000-2010 To simplify the tape planning lets discard the possibility that the calculated tapes might contain backups

Seite 59

151 Copyright © Acronis, Inc., 2000-2010 Total number of required tapes = round up ((2*F_GB + 12*I_GB + 11*D_GB) * CL / T_GB) + 1 = round up ( (2*3

Seite 60

152 Copyright © Acronis, Inc., 2000-2010 node database has all the required information about the content of the moved tapes. So all you need to do

Seite 61

153 Copyright © Acronis, Inc., 2000-2010 Metadata The .meta folder is created during backup in every personal vault. This folder contains additiona

Seite 62 - Backup policy state diagram

154 Copyright © Acronis, Inc., 2000-2010  [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicate

Seite 63

155 Copyright © Acronis, Inc., 2000-2010 4.2.2.1 Creating a personal vault To create a personal vault 1. In the Name field, type a name for the v

Seite 64 - 2.12.6 Deduplication

156 Copyright © Acronis, Inc., 2000-2010 To Do Validate an archive Click Validate. The Validation (p. 233) page will be opened with the pre-selec

Seite 65 - Deduplication at source

157 Copyright © Acronis, Inc., 2000-2010 Validate a backup Click Validate. The Validation (p. 233) page will be opened with the pre-selected back

Seite 66 - Compacting

158 Copyright © Acronis, Inc., 2000-2010 4.3.4 Filtering and sorting archives The following is a guideline for you to filter and sort archives in

Seite 67 - What ratio to expect

159 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Seite 68

16 Copyright © Acronis, Inc., 2000-2010  By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane);  By se

Seite 69 - Remote connection

160 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,

Seite 70 - On a domain controller

161 Copyright © Acronis, Inc., 2000-2010 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a

Seite 71

162 Copyright © Acronis, Inc., 2000-2010 task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the

Seite 72

163 Copyright © Acronis, Inc., 2000-2010 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certa

Seite 73

164 Copyright © Acronis, Inc., 2000-2010  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)

Seite 74

165 Copyright © Acronis, Inc., 2000-2010 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during

Seite 75 - Client Encryption options

166 Copyright © Acronis, Inc., 2000-2010 To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we jus

Seite 76 - Server Encryption options

167 Copyright © Acronis, Inc., 2000-2010 Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use

Seite 77 -  The currently used port

168 Copyright © Acronis, Inc., 2000-2010 Then the time of the task's first run on each machine may be any time between 09:00:00 AM and 09:59:5

Seite 78 - 2.12.8.5 SSL certificates

169 Copyright © Acronis, Inc., 2000-2010 Examples "Bad block" emergency backup One or more bad blocks that have suddenly appeared on a ha

Seite 79 - Non-self-signed certificates

17 Copyright © Acronis, Inc., 2000-2010 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages

Seite 80 - 3 Options

170 Copyright © Acronis, Inc., 2000-2010 2. In the list of events in the right pane, double-click the name of an event whose properties you want t

Seite 81 - 3.1.5 Fonts

171 Copyright © Acronis, Inc., 2000-2010 Example: It is required to run the backup task after free space on the managed machine is changed by at le

Seite 82 - 3.2.2 Log cleanup rules

172 Copyright © Acronis, Inc., 2000-2010  Task start conditions: Skip the task execution. As a result, (1) If 9:00 PM comes and the location&apos

Seite 83 - 3.2.3 Event tracing

173 Copyright © Acronis, Inc., 2000-2010  If the task start conditions are Wait until the conditions are met and the Run the task anyway after ch

Seite 84 - 3.2.6 VM protection options

174 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by

Seite 85 - 3.2.7 Online backup proxy

175 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license

Seite 86 - 3.3 Machine options

176 Copyright © Acronis, Inc., 2000-2010 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared in

Seite 87 - 3.3.2 Event tracing

177 Copyright © Acronis, Inc., 2000-2010  In the backup table, select the backup plan (task).  Use the toolbar's buttons to take an action

Seite 88

178 Copyright © Acronis, Inc., 2000-2010 A backup plan status is derived from the results of the last run of the plans' tasks. Status How it

Seite 89 - 3.3.4 Online backup proxy

179 Copyright © Acronis, Inc., 2000-2010 Need interaction Any running task can put itself into the Need interaction state when it needs human inter

Seite 90

18 Copyright © Acronis, Inc., 2000-2010 Bootable media builder With bootable media builder, you can create bootable media in order to use the agent

Seite 91

180 Copyright © Acronis, Inc., 2000-2010 centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to re

Seite 92 - 3.4.1.1 Archive protection

181 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 184) window, select the task you need

Seite 93

182 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p

Seite 94 - 3.4.1.3 Pre/Post commands

183 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos

Seite 95 - Post-backup command

184 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Seite 96 - Pre-data capture command

185 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery o

Seite 97 - Post-data capture command

186 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Seite 98 -  Do not create a snapshot

187 Copyright © Acronis, Inc., 2000-2010  Validation (if selected) - events before or after which the validation is performed, and validation sch

Seite 99 - 3.4.1.8 Compression level

188 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. Th

Seite 100 - HDD writing speed

189 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I

Seite 101 - 3.4.1.10 Notifications

19 Copyright © Acronis, Inc., 2000-2010 1.3.2 Components for centralized management This section lists the components included in the Acronis Back

Seite 102 - Messenger service (WinPopup)

190 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for

Seite 103 - Windows event log

191 Copyright © Acronis, Inc., 2000-2010 Access credentials (p. 201) [Optional] Provide credentials for the location if the plan account does not h

Seite 104 - 3.4.1.13 Backup splitting

192 Copyright © Acronis, Inc., 2000-2010 Virtualization server (p. 212) Here you select the resulting virtual machine type and location. Available

Seite 105 - Fixed size

193 Copyright © Acronis, Inc., 2000-2010 Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Sel

Seite 106 - 3.4.1.16 Error handling

194 Copyright © Acronis, Inc., 2000-2010 Windows The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hi

Seite 107 - 3.4.1.17 Dual destination

195 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl

Seite 108 - Skip the task execution

196 Copyright © Acronis, Inc., 2000-2010 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance

Seite 109 - 3.4.1.20 Tape support

197 Copyright © Acronis, Inc., 2000-2010  To back up data to a locally attached tape device, expand the Tape drives group, then click the require

Seite 110 - Always use a free tape

198 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 201) to the archive name. If you do not

Seite 111 - Reset archive bit

199 Copyright © Acronis, Inc., 2000-2010  Your script can move older backups based on the date stamp. See also “The *Date+ variable” (p. 201). E

Seite 112 - Use FTP in Active mode

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Seite 113

20 Copyright © Acronis, Inc., 2000-2010 This feature also enables automatic deployment and configuration of Agent for ESX/ESXi to any ESX/ESXi serv

Seite 114 - Pre-recovery command

200 Copyright © Acronis, Inc., 2000-2010  You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday

Seite 115 - 3.4.2.2 Recovery priority

201 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each

Seite 116 - 3.4.2.4 Notifications

202 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the

Seite 117 - 3.4.2.5 Event tracing

203 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.

Seite 118

204 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W

Seite 119 - 3.4.2.7 Additional settings

205 Copyright © Acronis, Inc., 2000-2010  Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows.  Start bac

Seite 120

206 Copyright © Acronis, Inc., 2000-2010  Have a weekly summary of file changes since last month (Friday weekly differential backup).  Have a m

Seite 121 - 4 Vaults

207 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p.

Seite 122 - 4.1 Centralized vaults

208 Copyright © Acronis, Inc., 2000-2010 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 to 2 days 1

Seite 123 - Vault content

209 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the

Seite 124

21 Copyright © Acronis, Inc., 2000-2010 Encryption A managed vault can be configured so that anything written to it is encrypted and anything read

Seite 125

210 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b

Seite 126 - Vault path

211 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six

Seite 127 - Vault encryption

212 Copyright © Acronis, Inc., 2000-2010 6.2.11 Archive validation Set up the validation task to check if the backed up data is recoverable. If th

Seite 128

213 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent

Seite 129 - 4.1.3 Tape libraries

214 Copyright © Acronis, Inc., 2000-2010 If the managed machine's operating system fails to start or you need to recover data to bare metal, b

Seite 130 - 4.1.3.3 Limitations

215 Copyright © Acronis, Inc., 2000-2010 Access credentials (p. 218) [Optional] Provide credentials for the archive location if the task account do

Seite 131 - 4.1.3.4 RSM Media Pools

216 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val

Seite 132 - Prerequisites

217 Copyright © Acronis, Inc., 2000-2010 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis

Seite 133 - Backing up to tape library

218 Copyright © Acronis, Inc., 2000-2010 6.3.4.1 Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the su

Seite 134 - Recovering from tape library

219 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun

Seite 135 - Inventory

22 Copyright © Acronis, Inc., 2000-2010 The Deduplication (p. 18) add-on enables you to create bootable media with the back up to a deduplicating v

Seite 136 - 4.1.3.7 Tape support

220 Copyright © Acronis, Inc., 2000-2010 Disk #: Disk # (MODEL) (p. 222) Select the destination disk for each of the source disks. NT signature (p.

Seite 137 - 4.1.3.8 Tape rotation

221 Copyright © Acronis, Inc., 2000-2010 6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to:

Seite 138 - Criteria of the choice

222 Copyright © Acronis, Inc., 2000-2010 MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. V

Seite 139 - Case to analyze

223 Copyright © Acronis, Inc., 2000-2010 set as active. If you recover a system volume to another hard disk with its own volumes and operating syst

Seite 140 - GFS Example 1

224 Copyright © Acronis, Inc., 2000-2010 Storage Initial setting: the default storage of the virtualization server if the new machine is created on

Seite 141

225 Copyright © Acronis, Inc., 2000-2010 Recovery exclusions Set up exclusions for the specific files you do not wish to recover. Use the Add, Edi

Seite 142

226 Copyright © Acronis, Inc., 2000-2010  Do not overwrite existing file - this will give the file on the hard disk priority over the file in the

Seite 143 - GFS Example 2

227 Copyright © Acronis, Inc., 2000-2010 DVD supplied by the hardware vendor or download the drivers from the vendor’s Web site. The driver files s

Seite 144

228 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec

Seite 145 - GFS Example 3

229 Copyright © Acronis, Inc., 2000-2010 8. [Optionally] Review the Virtual machine settings (p. 223) and make changes if necessary. Here you can

Seite 146

23 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can back up and recover corrupted or non-supported file systems using the

Seite 147 - ToH Example 1

230 Copyright © Acronis, Inc., 2000-2010  Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,

Seite 148 - ToH Example 2

231 Copyright © Acronis, Inc., 2000-2010 6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot load

Seite 149 - Tape planning

232 Copyright © Acronis, Inc., 2000-2010 root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first d

Seite 150 - Tape planning: Example 1

233 Copyright © Acronis, Inc., 2000-2010 Before using the recovered storage node, follow these steps:  If you have recovered the storage node on

Seite 151 - 4.1.3.9 What if

234 Copyright © Acronis, Inc., 2000-2010 [Optional] The validation task will run on behalf of the user who is creating the task. You can change the

Seite 152 - 4.2 Personal vaults

235 Copyright © Acronis, Inc., 2000-2010  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to

Seite 153 - Metadata

236 Copyright © Acronis, Inc., 2000-2010 The bottom part of the window displays the selected backup content, assisting you to find the right backup

Seite 154

237 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 155 - 4.3 Common operations

238 Copyright © Acronis, Inc., 2000-2010 Backup (p. 239) Select the backup. Access credentials (p. 239) [Optional] Provide credentials for the arch

Seite 156

239 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on a locally attached tape device, expand the Tape drives group, then click th

Seite 157

24 Copyright © Acronis, Inc., 2000-2010 * Acronis Backup & Recovery 10 Storage Node handles tape libraries and autoloaders by using Removable

Seite 158 - To show or hide columns

240 Copyright © Acronis, Inc., 2000-2010 2. Click on the selected volume to set its mounting parameters.  Access mode - choose the mode you want

Seite 159 - 5 Scheduling

241 Copyright © Acronis, Inc., 2000-2010  an entire vault that can be exported by using the command line interface. For more information, please

Seite 160 - 5.1 Daily schedule

242 Copyright © Acronis, Inc., 2000-2010  export from a managed vault. The export is performed by the storage node that manages the vault. The de

Seite 161 - Examples

243 Copyright © Acronis, Inc., 2000-2010 Where to export Archive (p. 245) Enter the path to the location where the new archive will be created. Be

Seite 162 - 5.2 Weekly schedule

244 Copyright © Acronis, Inc., 2000-2010  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Seite 163

245 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Use the task credentials The program will acces

Seite 164 - 5.3 Monthly schedule

246 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 165

247 Copyright © Acronis, Inc., 2000-2010  User name. When entering the name of an Active Directory user account, be sure to also specify the doma

Seite 166

248 Copyright © Acronis, Inc., 2000-2010 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.

Seite 167 - Use Wake-On-LAN

249 Copyright © Acronis, Inc., 2000-2010  If there is no or not enough unallocated space at the end of the disk, but there is unallocated space b

Seite 168 - Parameters

25 Copyright © Acronis, Inc., 2000-2010 Bootable media Media type Memory ISO image size Additional Based on Windows PE 512 MB 300 MB Linux-based

Seite 169

250 Copyright © Acronis, Inc., 2000-2010  If there is not enough unallocated space, the program will take free space from the selected volumes, p

Seite 170 - 5.7 Conditions

251 Copyright © Acronis, Inc., 2000-2010 Under Linux, when using a boot loader other than GRUB (such as LILO), consider installing it to a Linux ro

Seite 171 - 5.7.1 User is idle

252 Copyright © Acronis, Inc., 2000-2010 Advantages:  Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more

Seite 172 - 5.7.3 Fits time interval

253 Copyright © Acronis, Inc., 2000-2010 1. Download and install Windows Automated Installation Kit (WAIK). Automated Installation Kit (AIK) for W

Seite 173 - 5.7.4 User logged off

254 Copyright © Acronis, Inc., 2000-2010  user name and password to be entered on the console side at connection to the agent. If you leave these

Seite 174 - 6 Direct management

255 Copyright © Acronis, Inc., 2000-2010 quiet Disables displaying of startup messages when the Linux kernel is loading, and starts the management

Seite 175 - Activities

256 Copyright © Acronis, Inc., 2000-2010  IP address  Subnet mask  Gateway  DNS server  WINS server. Once the bootable agent starts on

Seite 176 - Way of working

257 Copyright © Acronis, Inc., 2000-2010 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to

Seite 177 - Backup plan statuses

258 Copyright © Acronis, Inc., 2000-2010 4. Specify path to the folder where the WinPE files are located. 5. Specify network settings (p. 255) fo

Seite 178 - Task states

259 Copyright © Acronis, Inc., 2000-2010 controller, network adapter, tape drive or other device. You will have to repeat this procedure for each d

Seite 179 - Task statuses

26 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Seite 180 -  Validation task (p. 233)

260 Copyright © Acronis, Inc., 2000-2010 Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -

Seite 181

261 Copyright © Acronis, Inc., 2000-2010 6.10.3.1 Setting up a display mode For a machine booted from media, a display video mode is detected auto

Seite 182

262 Copyright © Acronis, Inc., 2000-2010 6.10.4 List of commands and utilities available in Linux-based bootable media Linux-based bootable media

Seite 183

263 Copyright © Acronis, Inc., 2000-2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdu

Seite 184 - Task details

264 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using a script 1. Boot the machine from a Linux-based bootable media. 2

Seite 185 - Settings

265 Copyright © Acronis, Inc., 2000-2010 Example Suppose that you previously performed a disk backup of a machine with the following disk configura

Seite 186 - Backup plan details

266 Copyright © Acronis, Inc., 2000-2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size

Seite 187 - 6.1.3 Log

267 Copyright © Acronis, Inc., 2000-2010 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimag

Seite 188

268 Copyright © Acronis, Inc., 2000-2010 On a machine that has an operating system on the hard disk, the BIOS must be configured so that the networ

Seite 189 - 6.2 Creating a backup plan

269 Copyright © Acronis, Inc., 2000-2010 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c

Seite 190 - Where to back up

27 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Seite 191 - Convert to VM

270 Copyright © Acronis, Inc., 2000-2010 6.11.3 Choosing the operating system for disk management On a machine with two or more operating systems,

Seite 192 - 6.2.3 Source type

271 Copyright © Acronis, Inc., 2000-2010 6.11.5 Disk operations Acronis Disk Director Lite includes the following operations that can be performed

Seite 193 - 6.2.4 Items to back up

272 Copyright © Acronis, Inc., 2000-2010 6.11.5.2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It c

Seite 194

273 Copyright © Acronis, Inc., 2000-2010 volumes, then the Clone basic disk operation will be impossible and the user will not be able to continue.

Seite 195 - 6.2.6 Exclusions

274 Copyright © Acronis, Inc., 2000-2010 6.11.5.3 Disk conversion: MBR to GPT You would want to convert an MBR basic disk to a GPT basic disk in t

Seite 196 - 6.2.7 Archive

275 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 283) it. Exiting the program without committing

Seite 197

276 Copyright © Acronis, Inc., 2000-2010 dynamic disks (all volume types except Simple volumes), then you will be warned here about the possible da

Seite 198 - 6.2.8.1 Usage examples

277 Copyright © Acronis, Inc., 2000-2010 6.11.6 Volume operations Acronis Disk Director Lite includes the following operations that can be perform

Seite 199

278 Copyright © Acronis, Inc., 2000-2010 space available on each disk that you want to include in the volume and the size of the volume will depend

Seite 200

279 Copyright © Acronis, Inc., 2000-2010  RAID-5 You will obtain a brief description of every type of volume for better understanding of the adv

Seite 201 - 6.2.8.2 The [DATE] variable

28 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Seite 202 - 6.2.10 Backup schemes

280 Copyright © Acronis, Inc., 2000-2010 The maximum value normally includes the most possible unallocated space. But in some cases the possible un

Seite 203 - 6.2.10.3 Simple scheme

281 Copyright © Acronis, Inc., 2000-2010 6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is

Seite 204

282 Copyright © Acronis, Inc., 2000-2010 6.11.6.4 Change volume letter Windows operating systems assign letters (C:, D:, etc) to hard disk volumes

Seite 205

283 Copyright © Acronis, Inc., 2000-2010  to save additional space which is being lost due to the cluster size on the FAT16 or FAT32 file systems

Seite 206 - At a glance

284 Copyright © Acronis, Inc., 2000-2010 Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so

Seite 207 - Roll-back period

285 Copyright © Acronis, Inc., 2000-2010 7 Centralized management This section covers operations that can be performed centrally by using the comp

Seite 208

286 Copyright © Acronis, Inc., 2000-2010 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has le

Seite 209

287 Copyright © Acronis, Inc., 2000-2010 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in

Seite 210

288 Copyright © Acronis, Inc., 2000-2010 7.1.2.1 Backup policy deployment states A backup policy deployment state is a combination of the policy d

Seite 211 - 6.2.10.7 Initial seeding

289 Copyright © Acronis, Inc., 2000-2010 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e

Seite 212 - 6.2.11 Archive validation

29 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Seite 213 - 6.3 Recovering data

290 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 346). Once the p

Seite 214 - What to recover

291 Copyright © Acronis, Inc., 2000-2010 To Do Sort backup policies by any column Click the column's header to sort the backup policies in asc

Seite 215 - Recovery options

292 Copyright © Acronis, Inc., 2000-2010 Actions To Do View details of the machine (group). Click View details. In the Machine details (p. 299)/G

Seite 216 - 6.3.2 Archive selection

293 Copyright © Acronis, Inc., 2000-2010 Custom groups - groups created manually by the management server administrator.  Static groups Static g

Seite 217 - 6.3.4 Content selection

294 Copyright © Acronis, Inc., 2000-2010 To Do Add a new machine to the management server Click Add a machine to AMS. In the Add machine (p. 296)

Seite 218 - 6.3.4.2 Files selection

295 Copyright © Acronis, Inc., 2000-2010 The backup policies applied to the group the machine is now a member of will be deployed to the machine. R

Seite 219 - 6.3.6 Destination selection

296 Copyright © Acronis, Inc., 2000-2010 Refresh a list of machines Click Refresh. The management console will update the list of machines from t

Seite 220 - NT signature

297 Copyright © Acronis, Inc., 2000-2010 3. In the Search for field, type the machine's (or the organizational unit) name, then click Searc

Seite 221 - 6.3.6.2 Volumes

298 Copyright © Acronis, Inc., 2000-2010 2. Click Synchronize machines with text file on the toolbar. 3. In the Path field, enter the path to a

Seite 222 - Volume properties

299 Copyright © Acronis, Inc., 2000-2010 The machine being added becomes a member of more than one group. As a result, the backup policies applied

Seite 223

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...8 1.1 A

Seite 224 - 6.3.6.5 File destination

30 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Seite 225 - Overwriting

300 Copyright © Acronis, Inc., 2000-2010  Offline - the machine is unavailable for the management server: it is turned off, or its network cable

Seite 226 - 6.3.9 Universal Restore

301 Copyright © Acronis, Inc., 2000-2010 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Seite 227 - Universal Restore settings

302 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all

Seite 228

303 Copyright © Acronis, Inc., 2000-2010 Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing

Seite 229 - Post-conversion operations

304 Copyright © Acronis, Inc., 2000-2010 Refresh table Click Refresh. The management console will update the list of backup plans and tasks exist

Seite 230

305 Copyright © Acronis, Inc., 2000-2010 Group1 in the root contains Group2 to which the policy is applied directly. Group2, in turn, contains chil

Seite 231

306 Copyright © Acronis, Inc., 2000-2010 View detailed information on a group Click View details. In the Group details (p. 309) window, examine i

Seite 232 - Windows Vista/2008

307 Copyright © Acronis, Inc., 2000-2010 All the machines that are listed in the specified .txt or .csv file will be members of the dynamic group.

Seite 233

308 Copyright © Acronis, Inc., 2000-2010 Listed in txt/csv file criterion When you use this criterion, the dynamic group will include machines from

Seite 234 - 6.4.2 Archive selection

309 Copyright © Acronis, Inc., 2000-2010 Group details Aggregates in two tabs all information on the selected group. Allows performing operations w

Seite 235 - 6.4.3 Backup selection

31 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Seite 236 - 6.4.4 Location selection

310 Copyright © Acronis, Inc., 2000-2010 The policy that is directly applied to the group is displayed as follows: Group name The following examp

Seite 237 - 6.5 Mounting an image

311 Copyright © Acronis, Inc., 2000-2010 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of

Seite 238 - 6.5.1 Archive selection

312 Copyright © Acronis, Inc., 2000-2010 You can create both static and dynamic groups of virtual machines. Any virtual machine that is currently a

Seite 239 - 6.5.4 Volume selection

313 Copyright © Acronis, Inc., 2000-2010 management server and you will be able to apply backup policies to the virtual machines or back up each ma

Seite 240 - 6.6 Managing mounted images

314 Copyright © Acronis, Inc., 2000-2010 By default, the software will use the account that you have already specified, either when configuring int

Seite 241

315 Copyright © Acronis, Inc., 2000-2010  Server 3 uses storages B, C, D The VA can be deployed to either C or D. If there is no storage shared b

Seite 242 - What to export

316 Copyright © Acronis, Inc., 2000-2010 2. Create a user account for each user whom you want to allow to access the storage node. Note: You can s

Seite 243 - 6.7.2 Archive selection

317 Copyright © Acronis, Inc., 2000-2010 Change the compacting task schedule After deleting backups from deduplicating vaults, either manually or

Seite 244 - 6.7.3 Backup selection

318 Copyright © Acronis, Inc., 2000-2010 Storage node properties The tab displays the following information about the selected storage node:  Nam

Seite 245 - 6.7.5 Location selection

319 Copyright © Acronis, Inc., 2000-2010 7.1.6.1 Actions on tasks The following is a guideline for you to perform operations with tasks. To Do Cre

Seite 246 - 3. Naming the new archive

32 Copyright © Acronis, Inc., 2000-2010 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation

Seite 247 - 6.8 Acronis Secure Zone

320 Copyright © Acronis, Inc., 2000-2010 tasks owned by other users Delete a task Click Delete. Why can't I delete the task?  Task belongs

Seite 248 - 6.8.1.4 Result confirmation

321 Copyright © Acronis, Inc., 2000-2010 Filter tasks by type, execution state, status, type, origin, last result, schedule. In a field below the c

Seite 249

322 Copyright © Acronis, Inc., 2000-2010  Use the Information panel to review the detailed information on the selected log entry. The panel is co

Seite 250 - Activate

323 Copyright © Acronis, Inc., 2000-2010 Save all the filtered log entries to a file 1. Set filters to get a list of the log entries that satisfy

Seite 251 - 6.10 Bootable media

324 Copyright © Acronis, Inc., 2000-2010 7.1.7.3 Centralized log entry details Displays detailed information on the log entry you have selected an

Seite 252 - PE-based bootable media

325 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines 

Seite 253 - Using Bart PE

326 Copyright © Acronis, Inc., 2000-2010  Availability (physical machines only): The types of the machines' availability—Online or Offline.

Seite 254 - Kernel parameters

327 Copyright © Acronis, Inc., 2000-2010  Execution state: The execution states of the backup plans—for example, Running.  Status: The statuses

Seite 255 - Network settings

328 Copyright © Acronis, Inc., 2000-2010 7.1.8.5 Report about the archives and backups In this view, you can generate a report about the archives

Seite 256 - Network port

329 Copyright © Acronis, Inc., 2000-2010 Report view Under Report view, choose how the report will look:  Specify which table columns to show, an

Seite 257

33 Copyright © Acronis, Inc., 2000-2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task

Seite 258

330 Copyright © Acronis, Inc., 2000-2010 Explorer, click the Information bar that appears at the top of the webpage by default, and then click Allo

Seite 259

331 Copyright © Acronis, Inc., 2000-2010 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32

Seite 260

332 Copyright © Acronis, Inc., 2000-2010 Default value: 10 Acronis Backup & Recovery 10 agents connect to the storage node to access its manage

Seite 261 - To add an NDAS device

333 Copyright © Acronis, Inc., 2000-2010 If the volume has 5 GB of free space, then the total size of Vault A is 20 GB + 5 GB = 25 GB, and that of

Seite 262 - Linux commands and utilities

334 Copyright © Acronis, Inc., 2000-2010 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Ba

Seite 263

335 Copyright © Acronis, Inc., 2000-2010 Trace Level Description: Specifies the minimum level of severity of events to be recorded into the event l

Seite 264

336 Copyright © Acronis, Inc., 2000-2010 Otherwise, it connects to a number of registered machines depending on the allotted number of simultaneous

Seite 265

337 Copyright © Acronis, Inc., 2000-2010 If Real Time Monitoring is set to True, the management server instead sends requests to machines to provid

Seite 266 - Mounting backup volumes

338 Copyright © Acronis, Inc., 2000-2010 You may want to increase the initial size of the snapshot storage—or to place it on a different volume—whe

Seite 267 - 6.10.6 Acronis PXE Server

339 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Agent periodically checks whether its license key is present on the licen

Seite 268 - 6.11 Disk management

34 Copyright © Acronis, Inc., 2000-2010 “sons”; weekly backups are referred to as “fathers”; the longest lived monthly backups are called “grandfat

Seite 269 - 6.11.1 Basic precautions

340 Copyright © Acronis, Inc., 2000-2010 For details on how the agent log is cleaned up, see Log cleanup rules (p. 89). Windows Event Log Specifies

Seite 270 - Displaying operation results

341 Copyright © Acronis, Inc., 2000-2010 With the default settings, the snapshot storage is created in a Windows' temporary files folder and i

Seite 271 - 6.11.5 Disk operations

342 Copyright © Acronis, Inc., 2000-2010 Connection parameters Remote Agent ports Specifies the port that the component will use for incoming and o

Seite 272 - 6.11.5.2 Basic disk cloning

343 Copyright © Acronis, Inc., 2000-2010 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Seite 273 - Using advanced options

344 Copyright © Acronis, Inc., 2000-2010 Level Name Description 0 Unknown Event whose level of severity is unknown or not applicable 1 Debug Event

Seite 274

345 Copyright © Acronis, Inc., 2000-2010 regular basis. The end results are intended to provide software improvements and enhanced functionality to

Seite 275 - System disk conversion

346 Copyright © Acronis, Inc., 2000-2010 Parameters related to vault databases The following two parameters determine paths to Acronis Backup &

Seite 276

347 Copyright © Acronis, Inc., 2000-2010 Policy credentials (p. 349) [Optional] You can change the policy account credentials if necessary. To acce

Seite 277 - 6.11.6 Volume operations

348 Copyright © Acronis, Inc., 2000-2010 Backup options Settings [Optional] Configure parameters of the backup operation, such as pre/post backup c

Seite 278 - Create volume wizard

349 Copyright © Acronis, Inc., 2000-2010 After you have performed all the required steps, click OK to create the backup policy. 7.3.1 Policy cred

Seite 279 - Set the volume size

35 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Seite 280 - Set the volume options

350 Copyright © Acronis, Inc., 2000-2010 To include In the Volumes column: Comments Windows and Linux volumes All volumes Type or select: [All Volu

Seite 281 - 6.11.6.3 Set active volume

351 Copyright © Acronis, Inc., 2000-2010 The names of templates are case-sensitive. What does a disk or volume backup store? For supported file sys

Seite 282 - 6.11.6.6 Format volume

352 Copyright © Acronis, Inc., 2000-2010 For example, let a Linux machine contain a hard disk which is split into three volumes, or partitions: the

Seite 283 - 6.11.7 Pending operations

353 Copyright © Acronis, Inc., 2000-2010 --- Logical volume --- LV Name /dev/vg_mymachine/lv_root VG Name vg_mymachine … --- Log

Seite 284

354 Copyright © Acronis, Inc., 2000-2010 C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment v

Seite 285 - 7 Centralized management

355 Copyright © Acronis, Inc., 2000-2010  Password. The password for the account. 2. Click OK. 7.3.4 Exclusions Set up exclusions for the spec

Seite 286

356 Copyright © Acronis, Inc., 2000-2010 Windows By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\

Seite 287 - 7.1.2 Backup policies

357 Copyright © Acronis, Inc., 2000-2010 The program generates a common name for the new archives and displays it in the Name field. The name looks

Seite 288

358 Copyright © Acronis, Inc., 2000-2010  Back up now – to create a backup task for manual start and run the task immediately after its creation.

Seite 289

359 Copyright © Acronis, Inc., 2000-2010 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup

Seite 290 - Machines selection

36 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M

Seite 291 - 7.1.2.4 Policy details

360 Copyright © Acronis, Inc., 2000-2010 Weekly/Monthly: Specifies which of the days selected in the Back up on field you want to reserve for weekl

Seite 292 - 7.1.3 Physical machines

361 Copyright © Acronis, Inc., 2000-2010 As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be avail

Seite 293 - 7.1.3.1 Actions on machines

362 Copyright © Acronis, Inc., 2000-2010  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Here, daily incremental backups will be created

Seite 294 - Grouping actions

363 Copyright © Acronis, Inc., 2000-2010 levels you select. See the example below for details. Example Schedule parameters are set as follows  Re

Seite 295 - Other actions

364 Copyright © Acronis, Inc., 2000-2010 Here are the backups we have on day 12 (numbers in gray denote deleted backups). 1 2 3 4 5 6 7 8 9 10 11 1

Seite 296 - To add a machine

365 Copyright © Acronis, Inc., 2000-2010 This setting is recommended for backup destinations such as shared folders or centralized vaults. When the

Seite 297 - Text file requirements

366 Copyright © Acronis, Inc., 2000-2010 Incremental: Schedule: Weekly, every workday, at 9:00 PM Also, let all backups older than one year be dele

Seite 298

367 Copyright © Acronis, Inc., 2000-2010 Resulting tasks Any custom scheme always produces three backup tasks and—in case the retention rules are s

Seite 299 - Machine details

368 Copyright © Acronis, Inc., 2000-2010 3. Validation schedule (appears only if you have selected the on schedule in step 1) - set the schedule o

Seite 300

369 Copyright © Acronis, Inc., 2000-2010 8 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online ser

Seite 301 - Plans and tasks

37 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b

Seite 302

370 Copyright © Acronis, Inc., 2000-2010 8.1.2 What data can I back up and recover? You can back up files, volumes, disks, or the entire physical

Seite 303

371 Copyright © Acronis, Inc., 2000-2010 Host-based backup is available only for paid licenses of VMware ESXi. Choose the below approach if your ES

Seite 304 - Inheritance order

372 Copyright © Acronis, Inc., 2000-2010 8.1.6.4 What if a network connection is lost during online backup or recovery? The software will try to r

Seite 305 - 7.1.3.2 Actions on groups

373 Copyright © Acronis, Inc., 2000-2010 The hard disk drive is sent back to you but it is not possible to recover from it. However, recovery from

Seite 306 -  IP address range

374 Copyright © Acronis, Inc., 2000-2010 8.1.7.8 How to perform initial seeding? 1. Decide on the media (p. 373) that you will send. 2. Attach

Seite 307 - Adding multiple criteria

375 Copyright © Acronis, Inc., 2000-2010 Step 1 Delicately remove your hard disk drive from the machine. Step 2 Place the hard drive into an anti-

Seite 308 - Editing custom groups

376 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, prepa

Seite 309 - Group details

377 Copyright © Acronis, Inc., 2000-2010  An order was created – The first backup is about to start and the license cannot be used for any other

Seite 310 - 7.1.4 Virtual machines

378 Copyright © Acronis, Inc., 2000-2010 Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with

Seite 311 - Grouping of virtual machines

379 Copyright © Acronis, Inc., 2000-2010 can cancel the order if something goes wrong. This will return the license to the pool of available licens

Seite 312 -  Host/VA

38 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Seite 313

380 Copyright © Acronis, Inc., 2000-2010 If you purchased your subscriptions online using the Acronis Web site, they are available immediately on y

Seite 314

381 Copyright © Acronis, Inc., 2000-2010 What does "Auto-renew" mean? Auto-renewal means that when the current subscription expires, the

Seite 315 - 7.1.5 Storage nodes

382 Copyright © Acronis, Inc., 2000-2010  Windows Server 2008 R2 - the Standard, Enterprise, Small Business Server, Datacenter, Foundation editio

Seite 316

383 Copyright © Acronis, Inc., 2000-2010  As soon as a subscription is activated, its subscription period starts. To avoid losing subscription ti

Seite 317 - Adding a storage node

384 Copyright © Acronis, Inc., 2000-2010 Depending on your settings, this backup will be either full or incremental. But its size is not likely to

Seite 318 - 7.1.6 Tasks

385 Copyright © Acronis, Inc., 2000-2010 To configure proxy settings for an agent 1. Connect the console to the machine for which you want to conf

Seite 319 - 7.1.6.1 Actions on tasks

386 Copyright © Acronis, Inc., 2000-2010  Dual destination (p. 107) By using the Backup performance > Network connection speed option, you can

Seite 320

387 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat

Seite 321 - 7.1.7 Log

388 Copyright © Acronis, Inc., 2000-2010 9 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Seite 322

389 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup

Seite 323 - Configuring the log table

39 Copyright © Acronis, Inc., 2000-2010  the pattern starts with a full backup since the very first backup cannot be incremental  the scheme fo

Seite 324 - 7.1.8 Reporting

390 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 389), such as pre/post backup commands,

Seite 325 - Filters

391 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 389) installed on the machine finds data items using the selection rule

Seite 326 - Report view

392 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre

Seite 327

393 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 389) from a backup archive (p. 389) in order to get rid of outdated backups o

Seite 328 - Report coverage

394 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 397) using the direc

Seite 329 - 7.1.8.9 Report view

395 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Seite 330

396 Copyright © Acronis, Inc., 2000-2010  the administrator changes the criteria so that the machine does not meet them anymore. There is no way

Seite 331

397 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 389) containing all data chosen for backup. You do not need acc

Seite 332

398 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 392) managed by a storage node (p. 399). Archives (p. 389) in a mana

Seite 333

399 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 390). Policy See Backup policy (p. 390). R Recovery point Date and time to whic

Seite 334

3.1.1 Startup page ...

Seite 335

40 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules

Seite 336

400 Copyright © Acronis, Inc., 2000-2010  prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Seite 337

401 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog

Seite 338

402 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 397) is considered vi

Seite 339

41 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Seite 340

42 Copyright © Acronis, Inc., 2000-2010 What you need to know about consolidation Please be aware that consolidation is just a method of deletion b

Seite 341

43 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Seite 342 - Connection parameters

44 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v

Seite 343 - Event tracing parameters

45 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - -

Seite 344

46 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 388) is not available when recovering from a tape. Recovery from a locally a

Seite 345

47 Copyright © Acronis, Inc., 2000-2010 OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown"  Text description of the event OID: 1.3.6.1

Seite 346

48 Copyright © Acronis, Inc., 2000-2010  list archives located in the zone and backups contained in each archive  examine a backup's conte

Seite 347 - What to back up

49 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover

Seite 348

6 Direct management ... 174 6.1 Administer

Seite 349 - 7.3.2 Items to back up

50 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i

Seite 350

51 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A

Seite 351

52 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res

Seite 352 - Names for logical volumes

53 Copyright © Acronis, Inc., 2000-2010 Using the management server, you can create one or more centralized archive storages (centralized vaults (p

Seite 353 - Windows

54 Copyright © Acronis, Inc., 2000-2010 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi

Seite 354 - To specify credentials

55 Copyright © Acronis, Inc., 2000-2010 When installing the storage node, register it on the management server in the same way as you register the

Seite 355 - 7.3.4 Exclusions

56 Copyright © Acronis, Inc., 2000-2010 When you need and have the opportunity to back up any of the servers, navigate to the backup plan as descri

Seite 356 - 7.3.5 Archive

57 Copyright © Acronis, Inc., 2000-2010  Install Agent for Windows or Agent for Linux on each virtual machine. Register the machines on the manag

Seite 357

58 Copyright © Acronis, Inc., 2000-2010 2.12.4.1 A policy on a machine or a group In the diagrams below, each numbered scheme illustrates the resu

Seite 358 - 7.3.7.3 Simple scheme

59 Copyright © Acronis, Inc., 2000-2010 In the diagram below, the container stands for a group; the one-color circle stands for a machine with one

Seite 359 - Description

6.8.2 Managing Acronis Secure Zone ...

Seite 360

60 Copyright © Acronis, Inc., 2000-2010 In the diagram below, the container stands for a group; the two-color circle stands for a machine with two

Seite 361

61 Copyright © Acronis, Inc., 2000-2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited

Seite 362

62 Copyright © Acronis, Inc., 2000-2010 another policy. In this case, the first policy's state on the machine will be Revoking and the second

Seite 363

63 Copyright © Acronis, Inc., 2000-2010 The policy gets the Warning status on Windows machines that have either a D: or F: volume, unless an event

Seite 364

64 Copyright © Acronis, Inc., 2000-2010 This status is defined as the most severe status of the policy on the machines included in the group and it

Seite 365

65 Copyright © Acronis, Inc., 2000-2010 Deduplication at source Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agen

Seite 366

66 Copyright © Acronis, Inc., 2000-2010 Deduplication at target After backup to a deduplicating vault is completed, the storage node runs the index

Seite 367 - 7.3.8 Archive validation

67 Copyright © Acronis, Inc., 2000-2010  The deduplicated items that have changed are not identical anymore and therefore will not be deduplicate

Seite 368

68 Copyright © Acronis, Inc., 2000-2010 Similarly, in case of three machines, the ratio becomes 1.5:1; for four machines, it is 1.6:1. It approache

Seite 369 - 8 Online backup

69 Copyright © Acronis, Inc., 2000-2010 2.12.7 Privileges for centralized management This section describes the users' privileges that are re

Seite 370

8.2 Where do I start? ...381 8.3 C

Seite 371 - Server uses a free license

70 Copyright © Acronis, Inc., 2000-2010 For information about Acronis security groups and their default members, see Acronis security groups (p. 70

Seite 372 - 8.1.7 Initial Seeding FAQ

71 Copyright © Acronis, Inc., 2000-2010 DCNAME stands for the NetBIOS name of the domain controller. Each dollar sign is surrounded by a single spa

Seite 373

72 Copyright © Acronis, Inc., 2000-2010 Example Suppose that two users on a machine, UserA and UserB, perform backups from this machine to a centra

Seite 374 - Packaging

73 Copyright © Acronis, Inc., 2000-2010 The setup program will assign the above listed user rights to any existing account you specify for a corres

Seite 375

74 Copyright © Acronis, Inc., 2000-2010 For instructions on how to manage SSL certificates used for secure authentication, see SSL certificates (p.

Seite 376

75 Copyright © Acronis, Inc., 2000-2010 3. In the Acronis pane to the right, double-click a communication option that you want to configure. The A

Seite 377

76 Copyright © Acronis, Inc., 2000-2010 Required Data transfer will be performed only if encryption is enabled on the server application (see "

Seite 378

77 Copyright © Acronis, Inc., 2000-2010 Do not use The use of SSL certificates is disabled. Any connection to a client application which requires t

Seite 379

78 Copyright © Acronis, Inc., 2000-2010 2.12.8.5 SSL certificates Acronis Backup & Recovery 10 components use Secure Sockets Layer (SSL) certi

Seite 380 - To renew a subscription

79 Copyright © Acronis, Inc., 2000-2010 To generate a new self-signed certificate 1. Log on as a member of the Administrators group. 2. In the St

Seite 381 - 8.3 Choosing a subscription

8 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Seite 382 - Trial subscriptions

80 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Seite 383

81 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Seite 384

82 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Seite 385 - Backup and recovery options

83 Copyright © Acronis, Inc., 2000-2010 This parameter can also be set by using Acronis Administrative Template (p. 334). 3.2.3 Event tracing You

Seite 386 - 8.7 Terminology reference

84 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser

Seite 387

85 Copyright © Acronis, Inc., 2000-2010 3.2.6.1 VMware vCenter integration This option defines whether to show virtual machines managed by a VMwar

Seite 388 - 9 Glossary

86 Copyright © Acronis, Inc., 2000-2010 Note: Acronis Backup & Recovery 10 Online supports only HTTP and HTTPS proxy servers. Proxy settings fo

Seite 389

87 Copyright © Acronis, Inc., 2000-2010 3.3.2 Event tracing It is possible to duplicate log events generated by the agent(s), operating on the man

Seite 390 - Backup policy (Policy)

88 Copyright © Acronis, Inc., 2000-2010 You can override the settings set here, exclusively for the events that occur during backup or during recov

Seite 391 - Built-in group

89 Copyright © Acronis, Inc., 2000-2010  /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent  /etc/snmp/snmptrapd.conf - conf

Seite 392 - Centralized vault

9 Copyright © Acronis, Inc., 2000-2010 Running services with minimal user rights Restricted remote access to a backup agent Secure communication be

Seite 393

90 Copyright © Acronis, Inc., 2000-2010 If you choose Yes, I want to participate in the ACEP, information about the hardware configuration, the mos

Seite 394 - Disk group

91 Copyright © Acronis, Inc., 2000-2010 (p. 94) Pre/Post data capture commands (p. 96) + + - - Multi-volume snapshot (p. 98) + + - - File-level bac

Seite 395 - Dynamic group

92 Copyright © Acronis, Inc., 2000-2010 Overwrite data on a tape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tap

Seite 396 - Encrypted vault

93 Copyright © Acronis, Inc., 2000-2010 The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly genera

Seite 397

94 Copyright © Acronis, Inc., 2000-2010 Exclusion examples Criterion Example Description Windows and Linux By name F.log F Excludes all files named

Seite 398 - Physical machine

95 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  E

Seite 399

96 Copyright © Acronis, Inc., 2000-2010 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i

Seite 400 - Tower of Hanoi

97 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table be

Seite 401 - Validation rules

98 Copyright © Acronis, Inc., 2000-2010 fails. 3.4.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows

Seite 402 - Virtual machine

99 Copyright © Acronis, Inc., 2000-2010 transactions, at the moment of taking the data snapshot by Acronis Backup & Recovery 10. Data consisten

Kommentare zu diesen Handbüchern

Keine Kommentare