ACRONIS Backup & Recovery 10 Advanced Server Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Backup-Wiederherstellungssoftware ACRONIS Backup & Recovery 10 Advanced Server herunter. Acronis Backup & Recovery 10 Advanced Server Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 381
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Advanced Server

User's Guide Acronis® Backup & Recovery ™ 10 Advanced Server

Seite 2

10 Copyright © Acronis, Inc., 2000-2010 Set up a centralized backup policy and apply it to the All machines group. This way you will deploy backup

Seite 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 Perform the backup only after the command is successfully executed. Fail the task if the command execution

Seite 4

Copyright © Acronis, Inc., 2000-2010 101  Execute after the data capture 2. Do any of the following:  Click Edit to specify a new command or a

Seite 5

102 Copyright © Acronis, Inc., 2000-2010 Do not back up until the command execution is complete Selected Selected Cleared Cleared Result Preset

Seite 6

Copyright © Acronis, Inc., 2000-2010 103 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously

Seite 7

104 Copyright © Acronis, Inc., 2000-2010 compressed files, such as .jpg, .pdf or .mp3. However, formats such as .doc or .xls will be compressed wel

Seite 8 - 1.2 Getting started

Copyright © Acronis, Inc., 2000-2010 105 Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operatin

Seite 9

106 Copyright © Acronis, Inc., 2000-2010 2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can en

Seite 10

Copyright © Acronis, Inc., 2000-2010 107 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple

Seite 11 - "Navigation" pane

108 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects

Seite 12 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2010 109 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a

Seite 13 - Actions

Copyright © Acronis, Inc., 2000-2010 11 Actions and Tools pane (p. 12) section). Main area The main place of working, where you create, edit and

Seite 14 - Operations with panes

110 Copyright © Acronis, Inc., 2000-2010 To completely eliminate this kind of problem, disable preserving file security settings in archives. The r

Seite 15 - Action pages

Copyright © Acronis, Inc., 2000-2010 111 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se

Seite 16 - Navigation buttons

112 Copyright © Acronis, Inc., 2000-2010 You might have to provide the access credentials for the secondary destination. Enter the credentials on p

Seite 17 - 1.3.1 Agent for Windows

Copyright © Acronis, Inc., 2000-2010 113 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up dat

Seite 18 - 1.3.2 Agent for Linux

114 Copyright © Acronis, Inc., 2000-2010 Separate tape set is a tape set which contains only backups of the specific protected data. Other backups

Seite 19 - Storage Node

Copyright © Acronis, Inc., 2000-2010 115 Additional settings Specify the additional settings for the backup operation by selecting or clearing the

Seite 20 - License Server

116 Copyright © Acronis, Inc., 2000-2010 Restart the machine automatically after backup is finished This option is available only when operating un

Seite 21 - 1.4 Supported file systems

Copyright © Acronis, Inc., 2000-2010 117 3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is

Seite 22 - 10 Storage Node

118 Copyright © Acronis, Inc., 2000-2010 Check file system after recovery + - + - + - Reboot machine automatically if it is required for recov

Seite 23 - 1.6 System requirements

Copyright © Acronis, Inc., 2000-2010 119 4. Depending on the result you want to obtain, select the appropriate options as described in the table b

Seite 24 - 1.7 Technical support

12 Copyright © Acronis, Inc., 2000-2010  Physical machines. Use this view to manage machines registered on the management server.  Virtual ma

Seite 25

120 Copyright © Acronis, Inc., 2000-2010 To specify the recovery process priority Select one of the following:  Low – to minimize resources taken

Seite 26 - 2.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 121  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types

Seite 27

122 Copyright © Acronis, Inc., 2000-2010 Windows event log This option is effective only in Windows operating systems. This option is not availab

Seite 28 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2010 123  Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Er

Seite 29

124 Copyright © Acronis, Inc., 2000-2010 This option defines whether to validate a backup to ensure that the backup is not corrupted, before data i

Seite 30 - Windows

Copyright © Acronis, Inc., 2000-2010 125 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i

Seite 31 - 2.3 Owners and credentials

126 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau

Seite 32 - Full backup

Copyright © Acronis, Inc., 2000-2010 127 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.

Seite 33 - Differential backup

128 Copyright © Acronis, Inc., 2000-2010 Operations with backups (p. 159) Filtering and sorting archives (p. 160) Bars of the "Actions and too

Seite 34 - 2.5 GFS backup scheme

Copyright © Acronis, Inc., 2000-2010 129 another storage node. Explore an unmanaged vault 1. Select the unmanaged vault. 2. Click Explore. The

Seite 35

Copyright © Acronis, Inc., 2000-2010 13 Examples of "'Item name' actions" bars Actions Contains a list of common operatio

Seite 36 - The resulting archive: real

130 Copyright © Acronis, Inc., 2000-2010 Path (p. 130) Specify where the vault will be created. Managed centralized vaults can reside on a network

Seite 37

Copyright © Acronis, Inc., 2000-2010 131 To create a new folder for the database, click Create folder. 2. Click OK. When choosing a folder for th

Seite 38 - Tower of Hanoi by Acronis

132 Copyright © Acronis, Inc., 2000-2010 Enter the distinctive description of the vault. Type Select the Unmanaged type. Path (p. 132) Specify whe

Seite 39 - 2.7 Retention rules

Copyright © Acronis, Inc., 2000-2010 133 For the vault that was encrypted, provide the encryption password. After you have performed all the requir

Seite 40 - 1. Delete backups older than

134 Copyright © Acronis, Inc., 2000-2010 Hardware A tape library (robotic library) is a high-capacity storage device that contains the following: 

Seite 41 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2010 135 System media pools include Free pool, Import pool and Unrecognized pool. The System pools hold media that

Seite 42 - Backing up dynamic volumes

136 Copyright © Acronis, Inc., 2000-2010 1. Click Administrative Tools > Server Manager > Features > Add Feature. 2. Select the Removabl

Seite 43 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2010 137 It should be noted, these functions have some specific features for a tape library. So the Edit operation

Seite 44

138 Copyright © Acronis, Inc., 2000-2010 When recovering, you start creating a recovery task, select the tape device vault, and select the archive

Seite 45

Copyright © Acronis, Inc., 2000-2010 139 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage

Seite 46 - Software RAID arrays

14 Copyright © Acronis, Inc., 2000-2010 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the

Seite 47 - 2.11 Tape support

140 Copyright © Acronis, Inc., 2000-2010 To define your own label for a tape, select a related data field, type in a new label, click Eject tape, w

Seite 48

Copyright © Acronis, Inc., 2000-2010 141 Always use a free tape If you leave the options below unchanged, then each backup will be written onto the

Seite 49 - 2.12.1 Acronis Secure Zone

142 Copyright © Acronis, Inc., 2000-2010 If your backup archive must provide recovery with daily resolution for the last several days, weekly resol

Seite 50 - Limitation

Copyright © Acronis, Inc., 2000-2010 143 Weekly/differential backups (40 GB) are displayed as a blue rectangle: . Any full monthly backup (320 GB)

Seite 51 - Universal Restore)

144 Copyright © Acronis, Inc., 2000-2010 loaded especially for backing up the data. The tape is marked with number 01 in the figure below. In accor

Seite 52

Copyright © Acronis, Inc., 2000-2010 145 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f

Seite 53 - How to use

146 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and

Seite 54 - 2.13.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 147 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup

Seite 55

148 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF

Seite 56

Copyright © Acronis, Inc., 2000-2010 149 The main drawback is the large number of required tapes that is used 5-10%. If we have to keep a daily bac

Seite 57 - Protecting the servers

Copyright © Acronis, Inc., 2000-2010 15 Common way of working with views Generally, every view contains a table of items, a table toolbar with butt

Seite 58 - Protecting the workstations

150 Copyright © Acronis, Inc., 2000-2010  the Use a separate tape set option is selected  the Always use a free tape: For each full backup opti

Seite 59 - Using custom groups

Copyright © Acronis, Inc., 2000-2010 151  the Use a separate tape set option is selected  the Always use a free tape: For each full backup opti

Seite 60

152 Copyright © Acronis, Inc., 2000-2010  the Always use a free tape: For each full backup option is selected  the Always use a free tape: For

Seite 61

Copyright © Acronis, Inc., 2000-2010 153  compression level specified for backing up the data  tape rotation scheme ( frequency of backups, ret

Seite 62 - Policy on a group

154 Copyright © Acronis, Inc., 2000-2010  compression level provides CL average reduction coefficient  selected tape rotation scheme is Custom

Seite 63 - Operations with a machine

Copyright © Acronis, Inc., 2000-2010 155 node cannot be read by an agent in a locally attached tape device. However the storage node can read tapes

Seite 64 - Inheritance of policies

156 Copyright © Acronis, Inc., 2000-2010 Vault toolbar The toolbar contains operational buttons that let you perform operations with the selected p

Seite 65

Copyright © Acronis, Inc., 2000-2010 157 The following is a guideline for you to perform operations with personal vaults. To Do Create a personal

Seite 66

158 Copyright © Acronis, Inc., 2000-2010 Merging and moving personal vaults What if I need to move the existing vault from a one place to another?

Seite 67 - Policy status on a machine

Copyright © Acronis, Inc., 2000-2010 159 or multiple archives 2. Click Delete. The program duplicates your selection in the Backups deletion (p.

Seite 68 - Policy status on a group

16 Copyright © Acronis, Inc., 2000-2010 the available fields are displayed. You can switch between the views by selecting the Advanced view check b

Seite 69 - 2.13.6 Deduplication

160 Copyright © Acronis, Inc., 2000-2010 if need be (select the check boxes for the desired backups), then confirm the deletion. Delete all archive

Seite 70 - How deduplication works

Copyright © Acronis, Inc., 2000-2010 161 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar

Seite 71 - Deduplication best practices

Copyright © Acronis, Inc., 2000-2010 162 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Seite 72 - Deduplication restrictions

Copyright © Acronis, Inc., 2000-2010 163 The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not

Seite 73 - Local connection

164 Copyright © Acronis, Inc., 2000-2010 1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on t

Seite 74 - Remote connection

Copyright © Acronis, Inc., 2000-2010 165 From: 09/20/2009. To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:0

Seite 75 - Example 1

166 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009.

Seite 76 - Acronis security groups

Copyright © Acronis, Inc., 2000-2010 167 From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1. Every

Seite 77 - On a domain controller

168 Copyright © Acronis, Inc., 2000-2010 Advanced scheduling settings (p. 171) are available only for machines registered on Acronis Backup & R

Seite 78

Copyright © Acronis, Inc., 2000-2010 169  During northern summer, the task runs every first and fifteenth of every month at 10 PM. Thus, the foll

Seite 79 - Rights for Acronis services

Copyright © Acronis, Inc., 2000-2010 17 Console The console provides Graphical User Interface and remote connection to the agents and other Acronis

Seite 80 - Secure communication

170 Copyright © Acronis, Inc., 2000-2010 Specifies the event type: Error, Warning, Information, Audit success, or Audit failure. Event ID Specifies

Seite 81 - Remote Agent ports

Copyright © Acronis, Inc., 2000-2010 171 2. In the Computer Management console, expand System Tools, and then expand Event Viewer. 3. In Event Vi

Seite 82 - Server Encryption options

172 Copyright © Acronis, Inc., 2000-2010 Run the task: Daily Once at: 09:00:00 AM Distribute start time within the time window Maximum delay: 1 Hou

Seite 83 - Network port configuration

Copyright © Acronis, Inc., 2000-2010 173 task anyway. With this setting, the program will automatically handle the situation when the conditions ar

Seite 84 - SSL certificates

174 Copyright © Acronis, Inc., 2000-2010 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&ap

Seite 85 - Non-self-signed certificates

Copyright © Acronis, Inc., 2000-2010 175 In this case, whether and when the task will run depends on the task start conditions:  If the task star

Seite 86 - 3 Options

176 Copyright © Acronis, Inc., 2000-2010 (2) if the free space changes by more than 1GB after 12 hours pass since the last backup successful comple

Seite 87 - 3.1.5 Fonts

Copyright © Acronis, Inc., 2000-2010 177 6 Direct management This section covers operations that can be performed directly on a managed machine by

Seite 88 - 3.2.2 Log cleanup rules

178 Copyright © Acronis, Inc., 2000-2010 Please make sure you have a valid license on Acronis License Server. working. Trial version of product ex

Seite 89 - 3.2.3 Event tracing

Copyright © Acronis, Inc., 2000-2010 179 Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "War

Seite 90 - 3.2.6 VM protection options

18 Copyright © Acronis, Inc., 2000-2010 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Back

Seite 91 - 3.3 Machine options

180 Copyright © Acronis, Inc., 2000-2010  Use the Information panel to review detailed information on the selected plan (task). The panel is coll

Seite 92 - 3.3.2 Event tracing

Copyright © Acronis, Inc., 2000-2010 181 Otherwise, see 2 following:  Remove the reason of the failure -> [optionally] Start the failed task m

Seite 93

182 Copyright © Acronis, Inc., 2000-2010 The user can stop a running task or a task that needs interaction. The task changes to the Stopping state

Seite 94 - 3.3.3 Log cleanup rules

Copyright © Acronis, Inc., 2000-2010 183 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you

Seite 95

184 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Seite 96

Copyright © Acronis, Inc., 2000-2010 185 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Seite 97 - Archive protection

186 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Seite 98 - Source files exclusion

Copyright © Acronis, Inc., 2000-2010 187 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Seite 99 - Pre-backup command

188 Copyright © Acronis, Inc., 2000-2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove

Seite 100 - Post-backup command

Copyright © Acronis, Inc., 2000-2010 189 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Seite 101 - Post-data capture command

Copyright © Acronis, Inc., 2000-2010 19  The configuration database that stores the list of registered machines and other configuration informati

Seite 102 - Multi-volume snapshot

190 Copyright © Acronis, Inc., 2000-2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m

Seite 103 - Compression level

Copyright © Acronis, Inc., 2000-2010 191 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click

Seite 104 - Backup performance

192 Copyright © Acronis, Inc., 2000-2010 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d

Seite 105 - Notifications

Copyright © Acronis, Inc., 2000-2010 193 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo

Seite 106 - Messenger service (WinPopup)

194 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val

Seite 107 - SNMP notifications

Copyright © Acronis, Inc., 2000-2010 195 To specify credentials 1. Select one of the following:  Run under the current user The tasks will run u

Seite 108 - Backup splitting

196 Copyright © Acronis, Inc., 2000-2010 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a

Seite 109 - File-level security

Copyright © Acronis, Inc., 2000-2010 197 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going

Seite 110 - Error handling

198 Copyright © Acronis, Inc., 2000-2010 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na

Seite 111 - Dual destination

Copyright © Acronis, Inc., 2000-2010 199 unique within the selected location. If you are satisfied with the automatically generated name, click OK.

Seite 112 - Task start conditions

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Seite 113 - Tape support

20 Copyright © Acronis, Inc., 2000-2010  on a network share  on a Storage Area Network (SAN)  on a Network Attached Storage (NAS)  on a tap

Seite 114 - Always use a free tape

200 Copyright © Acronis, Inc., 2000-2010 6.2.9 Backup schemes Choose one of the available backup schemes:  Back up now – to create a backup task

Seite 115 - Additional settings

Copyright © Acronis, Inc., 2000-2010 201 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup

Seite 116 - Use FTP in Active mode

202 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Seite 117

Copyright © Acronis, Inc., 2000-2010 203  Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r

Seite 118 - Pre-recovery command

204 Copyright © Acronis, Inc., 2000-2010  Start backup at: 12:00 PM  Back up on: Friday  Weekly/monthly: Friday  Keep backups:  Daily: 1

Seite 119 - Recovery priority

Copyright © Acronis, Inc., 2000-2010 205 Backups of different levels have different types:  Last-level (in this case, level 4) backups are full;

Seite 120

206 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio

Seite 121

Copyright © Acronis, Inc., 2000-2010 207 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm

Seite 122

208 Copyright © Acronis, Inc., 2000-2010 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai

Seite 123

Copyright © Acronis, Inc., 2000-2010 209 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Seite 124

Copyright © Acronis, Inc., 2000-2010 21 1.3.4 Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for

Seite 125 - 4 Vaults

210 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent

Seite 126 - 4.1 Centralized vaults

Copyright © Acronis, Inc., 2000-2010 211 If the managed machine's operating system fails to start or you need to recover data to bare metal, b

Seite 127 - Vault content

212 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc

Seite 128

Copyright © Acronis, Inc., 2000-2010 213 default one. When the default value is set, the line disappears and so you always see only the settings th

Seite 129

214 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Seite 130 - Vault database path

Copyright © Acronis, Inc., 2000-2010 215 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh

Seite 131 - Vault encryption

216 Copyright © Acronis, Inc., 2000-2010 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical mach

Seite 132 - Attaching a managed vault

Copyright © Acronis, Inc., 2000-2010 217 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot

Seite 133 - 4.1.3 Tape libraries

218 Copyright © Acronis, Inc., 2000-2010 The new virtual machine will be configured automatically, the source machine configuration being copied wh

Seite 134 - RSM Media Pools

Copyright © Acronis, Inc., 2000-2010 219 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and

Seite 135 - Prerequisites

22 Copyright © Acronis, Inc., 2000-2010  JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10

Seite 136

220 Copyright © Acronis, Inc., 2000-2010 Virtual machine type / virtualization server selection The new virtual machine can be created either on a

Seite 137 - Recovering from tape library

Copyright © Acronis, Inc., 2000-2010 221 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of

Seite 138 - Inventory

222 Copyright © Acronis, Inc., 2000-2010 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th

Seite 139 - Labeling

Copyright © Acronis, Inc., 2000-2010 223  you have chosen to use Acronis Active Restore (p. 358) because these features are primarily meant for i

Seite 140

224 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec

Seite 141 - Choosing a backup scheme

Copyright © Acronis, Inc., 2000-2010 225 The same type of machines with the same name cannot be created in the same folder. Change either the VM na

Seite 142 - Case to analyze

226 Copyright © Acronis, Inc., 2000-2010 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too

Seite 143 - GFS Example 1

Copyright © Acronis, Inc., 2000-2010 227 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub

Seite 144

228 Copyright © Acronis, Inc., 2000-2010 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t

Seite 145

Copyright © Acronis, Inc., 2000-2010 229 The most likely cause of the problem is an insufficient amount of memory allocated to the recovery process

Seite 146 - GFS Example 2

Copyright © Acronis, Inc., 2000-2010 23 Acronis Backup & Recovery 10 Agent for Linux  Linux with kernel 2.4.20 or later (including 2.6.x kern

Seite 147

230 Copyright © Acronis, Inc., 2000-2010 1. Connect to the management server and remove the storage node from it. Note: All vaults managed by the

Seite 148 - GFS Example 3

Copyright © Acronis, Inc., 2000-2010 231 Archive (p. 231) - in that case, you need to specify the archive. Backup (p. 232) - specify the archive fi

Seite 149 - ToH Example 1

232 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on a network share, expand the Network folders group, then select the required

Seite 150 - ToH Example 2

Copyright © Acronis, Inc., 2000-2010 233 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 151 - ToH Example 3

234 Copyright © Acronis, Inc., 2000-2010  On schedule - to schedule the task. To learn more about how to configure the scheduling parameters, ple

Seite 152 - Tape planning

Copyright © Acronis, Inc., 2000-2010 235  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Seite 153 - Tape planning: Example 2

236 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the current use

Seite 154 - What if

Copyright © Acronis, Inc., 2000-2010 237 To unmount an image, select it in the table and click Unmount. To unmount all the mounted volumes, click

Seite 155 - 4.2 Personal vaults

238 Copyright © Acronis, Inc., 2000-2010 The exported archive inherits the options of the original archive, including encryption and the password.

Seite 156

Copyright © Acronis, Inc., 2000-2010 239 What to export Export Select an object to export: Archive (p. 213) - in that case, you need to specify the

Seite 157 - Creating a personal vault

24 Copyright © Acronis, Inc., 2000-2010 Storage Node 100 MB 150 MB 150 MB When using a tape library, space required for tapes database: approx.

Seite 158 - 4.3 Common operations

240 Copyright © Acronis, Inc., 2000-2010  If the archive is stored in a centralized vault, expand the Centralized group and click the vault.  I

Seite 159

Copyright © Acronis, Inc., 2000-2010 241 6.7.4 Access credentials for source Specify credentials required for access to the location where the sou

Seite 160

242 Copyright © Acronis, Inc., 2000-2010 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon

Seite 161 - To show or hide columns

Copyright © Acronis, Inc., 2000-2010 243 Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify

Seite 162 - 5 Scheduling

244 Copyright © Acronis, Inc., 2000-2010 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.

Seite 163 - 5.1 Daily schedule

Copyright © Acronis, Inc., 2000-2010 245  If there is no or not enough unallocated space at the end of the disk, but there is unallocated space b

Seite 164 -  fifth at 7 PM

246 Copyright © Acronis, Inc., 2000-2010 Reducing a system volume to the minimum size might prevent the machine's operating system from bootin

Seite 165 - 5.2 Weekly schedule

Copyright © Acronis, Inc., 2000-2010 247 Under Linux, when using a boot loader other than GRUB (such as LILO), consider installing it to a Linux ro

Seite 166

248 Copyright © Acronis, Inc., 2000-2010  Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more functionali

Seite 167 - 5.3 Monthly schedule

Copyright © Acronis, Inc., 2000-2010 249 http://www.microsoft.com/Downloads/details.aspx?familyid=C7D4BC6D-15F3-4284-9123-679830D629F2&displayl

Seite 168 - Examples

Copyright © Acronis, Inc., 2000-2010 25 More information about contacting Acronis Technical Support is available at the following link: http://www

Seite 169 - Parameters

250 Copyright © Acronis, Inc., 2000-2010  the TCP port that the bootable agent listens for incoming connection. 7. The type of media to create.

Seite 170

Copyright © Acronis, Inc., 2000-2010 251 Without this parameter, all startup messages will be displayed, followed by a command prompt. To start the

Seite 171 - Use Wake-On-LAN

252 Copyright © Acronis, Inc., 2000-2010 Once the bootable agent starts on a machine, the configuration is applied to the machine’s network interfa

Seite 172 - 5.6 Conditions

Copyright © Acronis, Inc., 2000-2010 253  to search the media for the drivers that best fit the target hardware  to get the mass-storage driver

Seite 173 - 5.6.1 User is idle

254 Copyright © Acronis, Inc., 2000-2010 Adding the Acronis Plug-in to WinPE 2.x or 3.0 Bootable Media Builder provides three methods of integratin

Seite 174 - 5.6.3 Fits time interval

Copyright © Acronis, Inc., 2000-2010 255 copy c:\AcronisMedia.wim c:\winpe_x86\ISO\sources\boot.wim  use the Oscdimg tool. For the above example,

Seite 175 - 5.6.4 User logged off

256 Copyright © Acronis, Inc., 2000-2010 6.10.3 Working under bootable media Operations on a machine booted with bootable media are very similar t

Seite 176

Copyright © Acronis, Inc., 2000-2010 257 An iSCSI device is sometimes called an iSCSI target. A hardware or software component that provides intera

Seite 177 - 6 Direct management

258 Copyright © Acronis, Inc., 2000-2010 cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs

Seite 178 - Activities

Copyright © Acronis, Inc., 2000-2010 259 To recreate the volume structure in Linux-based bootable media, use either of the methods described below.

Seite 179 - Tasks need interaction

Copyright © Acronis, Inc., 2000-2010 26 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Seite 180 - Backup plan statuses

260 Copyright © Acronis, Inc., 2000-2010 5. Create the volume structure according to that in the archive, by using the mdadm utility (for MD devic

Seite 181 - Task states

Copyright © Acronis, Inc., 2000-2010 261 mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/sd[ab] mdadm --create /dev/md1 --level=1 --raid-de

Seite 182 - Task statuses

262 Copyright © Acronis, Inc., 2000-2010 Num Idx Partition Flags Start Size Type ---- --- --------- ----- ----- --------- ------ Disk 1:

Seite 183 -  Validation task (p. 230)

Copyright © Acronis, Inc., 2000-2010 263 Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supports networ

Seite 184

264 Copyright © Acronis, Inc., 2000-2010 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c

Seite 185

Copyright © Acronis, Inc., 2000-2010 265 6.11.3 Choosing the operating system for disk management On a machine with two or more operating systems,

Seite 186

266 Copyright © Acronis, Inc., 2000-2010 6.11.5 Disk operations Acronis Disk Director Lite includes the following operations that can be performed

Seite 187 - Task details

Copyright © Acronis, Inc., 2000-2010 267 case, the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the

Seite 188 - Progress

268 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 278) it. Exiting the program without committing

Seite 189 - Backup plan details

Copyright © Acronis, Inc., 2000-2010 269 2. Right-click on the selected volume, and then click Convert to GPT in the context menu. You will receiv

Seite 190 - 6.1.3 Log

Copyright © Acronis, Inc., 2000-2010 27 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Seite 191 - Configuring the log table

270 Copyright © Acronis, Inc., 2000-2010 If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right

Seite 192 - 6.2 Creating a backup plan

Copyright © Acronis, Inc., 2000-2010 271 In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when

Seite 193 - Backup options

272 Copyright © Acronis, Inc., 2000-2010 The full version of Acronis Disk Director will provide more tools and utilities for working with volumes.

Seite 194 - Convert to VM

Copyright © Acronis, Inc., 2000-2010 273 Mirrored-Striped Volume A fault-tolerant volume, also sometimes called RAID 1+0, combining the advantage o

Seite 195 - 6.2.4 Items to back up

274 Copyright © Acronis, Inc., 2000-2010 To create a basic volume:  Select a destination disk and specify the unallocated space to create the bas

Seite 196 - Selecting files and folders

Copyright © Acronis, Inc., 2000-2010 275 The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size

Seite 197 - 6.2.6 Exclusions

276 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 278) it. Exiting the program without committing

Seite 198 - 6.2.7 Archive

Copyright © Acronis, Inc., 2000-2010 277 Change volume label The volume label is an optional attribute. It is a name assigned to a volume for easie

Seite 199

278 Copyright © Acronis, Inc., 2000-2010 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the

Seite 200 - 6.2.9 Backup schemes

Copyright © Acronis, Inc., 2000-2010 279 7 Centralized management This section covers operations that can be performed centrally by using the comp

Seite 201 - Description

28 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Seite 202

280 Copyright © Acronis, Inc., 2000-2010 less than 10% free space. View vaults will take you to the Centralized vaults (p. 127) view where you can

Seite 203

Copyright © Acronis, Inc., 2000-2010 281 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in

Seite 204 - Tower of Hanoi scheme

282 Copyright © Acronis, Inc., 2000-2010 Backup policy deployment states A backup policy deployment state is a combination of the policy deployment

Seite 205 - Roll-back period

Copyright © Acronis, Inc., 2000-2010 283 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e

Seite 206 - Custom backup scheme

284 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 338). Once the po

Seite 207

Copyright © Acronis, Inc., 2000-2010 285 Filter backup policies by name/owner Type a policy's name / owner's name in the fields below the

Seite 208 - Resulting tasks

286 Copyright © Acronis, Inc., 2000-2010 machine (group). View log of the machine (group) Click View log. The Log (p. 313) view will display a lis

Seite 209 - 6.2.10 Archive validation

Copyright © Acronis, Inc., 2000-2010 287 existing machines' properties and will analyze every newly registered machine. The machine that meets

Seite 210 - 6.3 Recovering data

288 Copyright © Acronis, Inc., 2000-2010 In the Import machines from file (p. 292) window, browse for a .txt or .csv file, containing the names (or

Seite 211 - What to recover

Copyright © Acronis, Inc., 2000-2010 289 actions will be performed on the machine as soon as the machine becomes available to the management server

Seite 212 - Recovery options

Copyright © Acronis, Inc., 2000-2010 29 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Seite 213 - 6.3.2 Archive selection

290 Copyright © Acronis, Inc., 2000-2010 Note for Virtual Edition users: When adding a VMware ESX/ESXi host, enter the IP of the virtual appliance

Seite 214 - 6.3.4 Content selection

Copyright © Acronis, Inc., 2000-2010 291  Deletes and then tries again to add registered machines that are present in the list, but their current

Seite 215 - 6.3.6 Destination selection

292 Copyright © Acronis, Inc., 2000-2010  {username password} belong to a user who is a member of the Administrators group on all machines listed

Seite 216 - Disk destination

Copyright © Acronis, Inc., 2000-2010 293 Once the machines appear in the group, the policy that was applied to the group (if any), is deployed to t

Seite 217 - Volumes

294 Copyright © Acronis, Inc., 2000-2010 Backup policies Displays a list of backup policies applied to the selected machine and lets the management

Seite 218 - Volume destination

Copyright © Acronis, Inc., 2000-2010 295 You will be taken to the Log (p. 190) view containing the list of the plan-related log entries. Click Task

Seite 219 - Volume properties

296 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Seite 220 - Virtual machine settings

Copyright © Acronis, Inc., 2000-2010 297  Task belongs to a backup plan A task belonging to a backup plan cannot be deleted separately from the p

Seite 221 - Recovery exclusions

298 Copyright © Acronis, Inc., 2000-2010 You can create a dynamic group based on the list of the hosted virtual machines. To do this, click Create

Seite 222 - 6.3.9 Universal Restore

Copyright © Acronis, Inc., 2000-2010 299 Create a custom static or a dynamic group Click Create group. In the Create group (p. 299) window, specif

Seite 223 - Universal Restore settings

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...7 1.1 A

Seite 224

30 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Seite 225

300 Copyright © Acronis, Inc., 2000-2010 All the machines running the selected operating system will be members of the dynamic group.  Organizati

Seite 226

Copyright © Acronis, Inc., 2000-2010 301 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it manually. If

Seite 227

302 Copyright © Acronis, Inc., 2000-2010 Changing the type of group will result in its conversion. Any custom group can be converted to a dynamic g

Seite 228 - About Windows loaders

Copyright © Acronis, Inc., 2000-2010 303 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Seite 229

304 Copyright © Acronis, Inc., 2000-2010 3. Register (p. 289) the Hyper-V host on the management server. If the machine is already registered, ski

Seite 230 - What to validate

Copyright © Acronis, Inc., 2000-2010 305 Grouping of virtual machines The Virtual machines section of the navigation tree contains one built-in gro

Seite 231 - 6.4.2 Archive selection

306 Copyright © Acronis, Inc., 2000-2010 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an e

Seite 232 - 6.4.4 Location selection

Copyright © Acronis, Inc., 2000-2010 307 The management server will use this account to establish a trusted relationship with the agent during regi

Seite 233 - 6.4.6 When to validate

308 Copyright © Acronis, Inc., 2000-2010  Server 3 uses storages B, C, D The VA can be deployed to either C or D. If there is no storage shared b

Seite 234 - 6.5 Mounting an image

Copyright © Acronis, Inc., 2000-2010 309 For information about user rights on a storage node and in its managed vaults, see User rights on a storag

Seite 235 - 6.5.3 Access credentials

Copyright © Acronis, Inc., 2000-2010 31  View and manage backup plans and tasks owned by any user on the machine. Linux When managing a machine r

Seite 236 - 6.6 Managing mounted images

310 Copyright © Acronis, Inc., 2000-2010 View details of the storage node Click View details. In the Storage node details (p. 310) window (the con

Seite 237

Copyright © Acronis, Inc., 2000-2010 311  Online - the storage node is available for the management server. This means that the last management s

Seite 238

312 Copyright © Acronis, Inc., 2000-2010 the backup plan will run. View details of a task Click View details. In the Tasks details (p. 187) window

Seite 239 - 6.7.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 313  Each storage node has a built-in service task called a compacting task. This task cannot be deleted. Thi

Seite 240 - 6.7.3 Backup selection

314 Copyright © Acronis, Inc., 2000-2010 added to the log. When the software executes a task, it adds multiple entries saying what it is currently

Seite 241 - 6.7.5 Location selection

Copyright © Acronis, Inc., 2000-2010 315 Actions on log entries All the operations described below are performed by clicking the corresponding item

Seite 242 - 3. Naming the new archive

316 Copyright © Acronis, Inc., 2000-2010 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to

Seite 243 - 6.8 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 317  Message - The event text description. The log entry's details that you copy will have the followin

Seite 244 - Result confirmation

318 Copyright © Acronis, Inc., 2000-2010 The report will contain the information selected, grouped and sorted according to the template settings. T

Seite 245

Copyright © Acronis, Inc., 2000-2010 319  Schedule: The types of the backup policies' schedules—Manual and/or Scheduled. Manual schedule mea

Seite 246 - Deleting Acronis Secure Zone

32 Copyright © Acronis, Inc., 2000-2010 You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run unde

Seite 247 - 6.10 Bootable media

320 Copyright © Acronis, Inc., 2000-2010 Filters Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter cr

Seite 248 - PE-based bootable media

Copyright © Acronis, Inc., 2000-2010 321 Report view Under Report view, choose how the report will look:  Select whether to show all items in a s

Seite 249

322 Copyright © Acronis, Inc., 2000-2010  Backup policies (centralized tasks only): The backup policies on which the tasks are based. The default

Seite 250 - Kernel parameters

Copyright © Acronis, Inc., 2000-2010 323  By using the graphical user interface (GUI)  By modifying the Windows registry In Linux, instead of u

Seite 251 - Network settings

324 Copyright © Acronis, Inc., 2000-2010 http://msdn2.microsoft.com/en-us/library/aa374177.aspx Acronis Backup & Recovery 10 Storage Node Th

Seite 252 - Network port

Copyright © Acronis, Inc., 2000-2010 325 Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as

Seite 253

326 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the amount of free space, in megabytes, on the volume containing a managed vault&ap

Seite 254

Copyright © Acronis, Inc., 2000-2010 327 Specifies how to clean up the centralized event log stored in the management server's reporting datab

Seite 255

328 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the network name or IP address of the SNMP server. Possible values: Any string 0 to

Seite 256 - Setting up a display mode

Copyright © Acronis, Inc., 2000-2010 329 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for

Seite 257 - Linux commands and utilities

Copyright © Acronis, Inc., 2000-2010 33 Example: An Internet cafe, school or university lab where the administrator often undoes changes made by th

Seite 258

330 Copyright © Acronis, Inc., 2000-2010 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att

Seite 259

Copyright © Acronis, Inc., 2000-2010 331 If this setting is 0, the snapshot storage will not be created. The initial size will not exceed the avail

Seite 260 - Example

332 Copyright © Acronis, Inc., 2000-2010 If the value is 0, no reconnection attempts will be performed; the agent will only check for the license a

Seite 261 - Mounting backup volumes

Copyright © Acronis, Inc., 2000-2010 333 Description: Specifies the minimum level of severity of events for sending SNMP notifications about them.

Seite 262 - 6.10.6 Acronis PXE Server

334 Copyright © Acronis, Inc., 2000-2010 Possible values: Any integer number between 0 and 100 Default value: 50 If this setting is 0, the snapshot

Seite 263 - 6.11 Disk management

Copyright © Acronis, Inc., 2000-2010 335 Authentication parameters Selecting the Trust self-signed certificates check box allows the client to conn

Seite 264 - 6.11.1 Basic precautions

336 Copyright © Acronis, Inc., 2000-2010 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Seite 265 - Displaying operation results

Copyright © Acronis, Inc., 2000-2010 337 Specifies whether the machine where the Acronis Backup & Recovery 10 component is installed will parti

Seite 266 - 6.11.5 Disk operations

338 Copyright © Acronis, Inc., 2000-2010 This database contains a list of vaults that are managed by the storage node, other than tape vaults (see

Seite 267

Copyright © Acronis, Inc., 2000-2010 339 Where to back up Archive (p. 346) Specify the path to the location, where the backup archive will be store

Seite 268 - Disk conversion: MBR to GPT

34 Copyright © Acronis, Inc., 2000-2010 2.5 GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme

Seite 269 - Disk conversion: GPT to MBR

340 Copyright © Acronis, Inc., 2000-2010 When to convert (p. 209) [Optional] Specify whether to convert every full, every incremental or every diff

Seite 270 - System disk conversion

Copyright © Acronis, Inc., 2000-2010 341 7.3.2 Items to back up Specify selection rules for backing up items, selected in the Source type field of

Seite 271 - 6.11.6 Volume operations

342 Copyright © Acronis, Inc., 2000-2010 All fixed volumes Type or select: [Fixed Volumes] Refers to all volumes other than removable media. Fixe

Seite 272 - Types of dynamic volumes

Copyright © Acronis, Inc., 2000-2010 343 Operating systems starting from Windows 7 and Windows Server 2008 R2 create a dedicated system volume call

Seite 273 - Select destination disks

344 Copyright © Acronis, Inc., 2000-2010 /dev/mda1 Files to back up selection rules Define file selection rules, according to which the files and

Seite 274 - Set the volume options

Copyright © Acronis, Inc., 2000-2010 345 All files on all volumes on a machine [All Files] Points to all files on all volumes of the machine. All

Seite 275 - Delete volume

346 Copyright © Acronis, Inc., 2000-2010  Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden at

Seite 276 - Change volume letter

Copyright © Acronis, Inc., 2000-2010 347 Enter the full path to the folder in the Path field. This path will be created on each machine the policy

Seite 277 - Format volume

348 Copyright © Acronis, Inc., 2000-2010  Password. The password for the account. 2. Click OK. Warning: According to the original FTP specificat

Seite 278 - 6.11.7 Pending operations

Copyright © Acronis, Inc., 2000-2010 349 The task will be started manually Select this check box, if you do not need to put the backup task on a sc

Seite 279 - 7 Centralized management

Copyright © Acronis, Inc., 2000-2010 35 created on this day of the week will be considered as a monthly backup. Backups created on the other days w

Seite 280

350 Copyright © Acronis, Inc., 2000-2010 Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies

Seite 281 - 7.1.2 Backup policies

Copyright © Acronis, Inc., 2000-2010 351  Weekly: 1 month  Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups

Seite 282 - Backup policy statuses

352 Copyright © Acronis, Inc., 2000-2010  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Here, daily incremental backup

Seite 283 - Actions on backup policies

Copyright © Acronis, Inc., 2000-2010 353 levels you select. See the example below for details. Example Schedule parameters are set as follows  Re

Seite 284 - Machines selection

354 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup

Seite 285 - Policy details

Copyright © Acronis, Inc., 2000-2010 355 When there is insufficient space while backing up The archive will be cleaned up only during backup and on

Seite 286 - 7.1.3 Physical machines

356 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y

Seite 287 - Actions on machines

Copyright © Acronis, Inc., 2000-2010 357 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil

Seite 288 - Grouping actions

Copyright © Acronis, Inc., 2000-2010 358 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Seite 289 - Other actions

Copyright © Acronis, Inc., 2000-2010 359 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e

Seite 290

36 Copyright © Acronis, Inc., 2000-2010 The resulting archive: ideal Assume you select to keep daily backups for 7 days, weekly backups for 2 weeks

Seite 291 - Text file requirements

360 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 359), such as pre/post backup commands,

Seite 292 - Adding machines to a group

Copyright © Acronis, Inc., 2000-2010 361 5. On each machine, the agent installed on the machine creates a backup plan (p. 360) using other rules s

Seite 293 - Machine details

362 Copyright © Acronis, Inc., 2000-2010 built-in group except for deleting the machine from the management server. Virtual machines are deleted as

Seite 294 - Plans and tasks

Copyright © Acronis, Inc., 2000-2010 363 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 360) that produc

Seite 295

364 Copyright © Acronis, Inc., 2000-2010 operations are configured on the management server (p. 368) and propagated by the server to the managed ma

Seite 296

Copyright © Acronis, Inc., 2000-2010 365 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with

Seite 297 - Hosted virtual machines

366 Copyright © Acronis, Inc., 2000-2010 Dynamic volume Any volume located on dynamic disks (p. 364), or more precisely, on a disk group (p. 364)

Seite 298 - Actions on groups

Copyright © Acronis, Inc., 2000-2010 367 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 361) aimed to maintain the optimal balance bet

Seite 299 -  Operating system

368 Copyright © Acronis, Inc., 2000-2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n

Seite 300 - Adding multiple criteria

Copyright © Acronis, Inc., 2000-2010 369 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi

Seite 301 - Editing custom groups

Copyright © Acronis, Inc., 2000-2010 37 When using the incremental and differential backup methods, you cannot delete a backup as soon as the schem

Seite 302 - Group details

370 Copyright © Acronis, Inc., 2000-2010 Since the cleanup schedule exists on the machine (p. 367) the agent (p. 358) resides on, and therefore use

Seite 303 - 7.1.4 Virtual machines

Copyright © Acronis, Inc., 2000-2010 371  the image being recovered is located in Acronis Secure Zone (p. 358) or  when using Acronis Active Re

Seite 304

372 Copyright © Acronis, Inc., 2000-2010  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Win

Seite 305 - VMware vCenter integration

Index A A policy on a machine or a group • 62 About Windows loaders • 233 Access credentials • 240, 241 Access credentials for archive location • 19

Seite 306

374 Copyright © Acronis, Inc., 2000-2010 Archive selection • 217, 219, 236, 237, 240, 244, 245 Archive validation • 199, 214, 369 At Windows Event

Seite 307 - Support for vCenter clusters

Copyright © Acronis, Inc., 2000-2010 375 Collecting system information • 284 Column selection • 332 Common operations • 162 Communication between A

Seite 308 - 7.1.5 Storage nodes

376 Copyright © Acronis, Inc., 2000-2010 Disk operations • 271 Disks • 217, 221 Disks/volumes selection • 220 Domain access credentials • 91, 309 D

Seite 309 - Actions on storage nodes

Copyright © Acronis, Inc., 2000-2010 377 Increasing Acronis Secure Zone • 251 Incremental backup • 372, 374, 376, 380 Inheritance of policies • 64

Seite 310 - Storage node details

378 Copyright © Acronis, Inc., 2000-2010 Operations with archives stored in a vault • 129, 130, 160, 162 Operations with backups • 129, 131, 160, 1

Seite 311 - 7.1.6 Tasks

Copyright © Acronis, Inc., 2000-2010 379 Report about the machines • 328 Report about the task activities • 331 Report about the tasks • 329 Report

Seite 312

38 Copyright © Acronis, Inc., 2000-2010 Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In th

Seite 313 - 7.1.7 Log

380 Copyright © Acronis, Inc., 2000-2010 Task details • 183, 184, 188, 192, 302, 321 Task failure handling • 97, 114 Task start conditions • 97, 11

Seite 314 - Centralized event log

Copyright © Acronis, Inc., 2000-2010 381 W Weekly schedule • 169, 210, 318, 364 What if • 158 When deduplication is most effective • 71 When to rec

Seite 315 - Actions on log entries

Copyright © Acronis, Inc., 2000-2010 39  incremental backups on first level (A) - to gain time and storage savings for the most frequent backup o

Seite 316

3 Options ... 86 3.1 C

Seite 317 - 7.1.8 Reporting

40 Copyright © Acronis, Inc., 2000-2010 The retention rules are effective if the archive contains more than one backup. This means that the last ba

Seite 318 - Report about the machines

Copyright © Acronis, Inc., 2000-2010 41 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Seite 319 - Report about the tasks

42 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Seite 320 - Report view

Copyright © Acronis, Inc., 2000-2010 43 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Seite 321

44 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing

Seite 322 - Column selection

Copyright © Acronis, Inc., 2000-2010 45 For detailed instructions on how to recover logical volumes, see Recovering MD devices and logical volumes

Seite 323

46 Copyright © Acronis, Inc., 2000-2010 2.10 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recov

Seite 324

Copyright © Acronis, Inc., 2000-2010 47 Recovery Parameters of software RAID arrays are not backed up, so they can only be recovered over a basic v

Seite 325

48 Copyright © Acronis, Inc., 2000-2010 a locally attached tape device (tape drive or tape library) by... ATIE 9.7 + + + + ABR10 + + + + Ag

Seite 326

Copyright © Acronis, Inc., 2000-2010 49 5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis U

Seite 327

6 Direct management ... 177 6.1 Administer

Seite 328

50 Copyright © Acronis, Inc., 2000-2010 With the new Acronis Secure Zone behavior, you obtain the ability to:  list archives located in the zone

Seite 329

Copyright © Acronis, Inc., 2000-2010 51 2.12.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover

Seite 330

52 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i

Seite 331

Copyright © Acronis, Inc., 2000-2010 53 If you do not enable the option, the system recovery will proceed in the usual way and the machine will bec

Seite 332

54 Copyright © Acronis, Inc., 2000-2010 If you try to log off, shut down or hibernate the machine using the Start Menu commands, the end of the cur

Seite 333

Copyright © Acronis, Inc., 2000-2010 55 Organizing a managed archive storage What should the capacity of your centralized vault be? What if transfe

Seite 334 - Connection parameters

56 Copyright © Acronis, Inc., 2000-2010 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi

Seite 335

Copyright © Acronis, Inc., 2000-2010 57 Installation tips  Both AMS and ASN can be installed on a workstation operating system as well.  There

Seite 336 - Event tracing parameters

58 Copyright © Acronis, Inc., 2000-2010 Protecting the workstations Here is how to set up the most popular schedule: weekly full backup and daily i

Seite 337 - When to modify

Copyright © Acronis, Inc., 2000-2010 59 Advanced product editions other than Virtual Edition (Acronis Backup & Recovery 10 Advanced Server, Adv

Seite 338 - What to back up

6.8.1 Creating Acronis Secure Zone ...

Seite 339

60 Copyright © Acronis, Inc., 2000-2010 Besides physical machines, you can group virtual machines (p. 304) hosted on registered virtualization serv

Seite 340 - 7.3.1 Policy credentials

Copyright © Acronis, Inc., 2000-2010 61 The policy applied to the parent group (G2) will be applied to the child group (G3), but members of G3 are

Seite 341 - 7.3.2 Items to back up

62 Copyright © Acronis, Inc., 2000-2010 Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks

Seite 342

Copyright © Acronis, Inc., 2000-2010 63 1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the secon

Seite 343

64 Copyright © Acronis, Inc., 2000-2010 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a

Seite 344

Copyright © Acronis, Inc., 2000-2010 65 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Seite 345 - 7.3.4 Exclusions

66 Copyright © Acronis, Inc., 2000-2010 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines

Seite 346 - 7.3.5 Archive

Copyright © Acronis, Inc., 2000-2010 67 Backup policy state diagram Policy status on a machine To see this parameter, select any group of machine

Seite 347 - 2. Naming the archives

68 Copyright © Acronis, Inc., 2000-2010 /dev/sda1 volume (since the [System] volume is not found). The policy will get the Error status on Linux ma

Seite 348 - Back up later scheme

Copyright © Acronis, Inc., 2000-2010 69 Cumulative state and status of a policy In addition to the deployment state and status as related to a spec

Seite 349 - Simple scheme

Copyright © Acronis, Inc., 2000-2010 7 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Seite 350

70 Copyright © Acronis, Inc., 2000-2010 Performed in the vault after a backup is completed. The storage node analyses the vault's archives and

Seite 351

Copyright © Acronis, Inc., 2000-2010 71 1. It moves the items (disk blocks or files) from the archives to a special folder within the vault, stori

Seite 352

72 Copyright © Acronis, Inc., 2000-2010  Indexing of a backup requires that the vault have free space with a minimum size of 1.1 multiplied by th

Seite 353

Copyright © Acronis, Inc., 2000-2010 73  If the volume is a compressed volume  If the volume's allocation unit size—also known as cluster

Seite 354

74 Copyright © Acronis, Inc., 2000-2010 Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Co

Seite 355

Copyright © Acronis, Inc., 2000-2010 75 Privileges for remote connection in Windows To establish a remote connection to a machine running Windows,

Seite 356

76 Copyright © Acronis, Inc., 2000-2010 2. Add the names of the non-root users, whom you want to allow to connect to the machine remotely, to the

Seite 357 - 7.3.8 Archive validation

Copyright © Acronis, Inc., 2000-2010 77 Acronis Backup & Recovery 10 Management Server When Acronis Backup & Recovery 10 Management Server

Seite 358 - Glossary

78 Copyright © Acronis, Inc., 2000-2010 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10

Seite 359

Copyright © Acronis, Inc., 2000-2010 79 Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Backup & Re

Seite 360 - Backup policy (Policy)

8 Copyright © Acronis, Inc., 2000-2010 Running services with minimal user rights Restricted remote access to a backup agent Secure communication be

Seite 361 - Built-in group

80 Copyright © Acronis, Inc., 2000-2010 This section also provides information on configuring communication settings, selecting a network port for

Seite 362 - Cleanup

Copyright © Acronis, Inc., 2000-2010 81 Acronis Backup & Recovery 10 Bootable Agent Yes Yes Configuring communication settings You can config

Seite 363

82 Copyright © Acronis, Inc., 2000-2010 Client Encryption options Specifies whether to encrypt the transferred data when the component acts as a cl

Seite 364 - Disk group

Copyright © Acronis, Inc., 2000-2010 83 The component will use the default setting, which is to use encryption if possible (see the following optio

Seite 365 - Dynamic group

84 Copyright © Acronis, Inc., 2000-2010 Linux Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the Acronis_agent daemon. Co

Seite 366 - Encrypted vault

Copyright © Acronis, Inc., 2000-2010 85 Tip: Alternatively, you can manage the list of certificates of a remote machine. To do this, click Another

Seite 367

Copyright © Acronis, Inc., 2000-2010 86 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Seite 368

Copyright © Acronis, Inc., 2000-2010 87 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Seite 369

88 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Seite 370 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2010 89 3.2.3 Event tracing You can configure the management server to log events in the Application Event Log of

Seite 371

Copyright © Acronis, Inc., 2000-2010 9 The simplified way of centralized management  Backup Using the Back up control, select the machine which y

Seite 372 -  Windows Vista (PE 2.0)

90 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser

Seite 373

Copyright © Acronis, Inc., 2000-2010 91 VMware vCenter integration This option defines whether to show virtual machines managed by a VMware vCenter

Seite 374

92 Copyright © Acronis, Inc., 2000-2010 To access the machine options, connect the console to the managed machine and then select Options > Mach

Seite 375

Copyright © Acronis, Inc., 2000-2010 93 This option defines whether the agent(s) operating on the managed machine have to log events in the Applica

Seite 376

94 Copyright © Acronis, Inc., 2000-2010  Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. 

Seite 377

Copyright © Acronis, Inc., 2000-2010 95 3.3.4 Customer Experience Program This option defines whether the machine will participate in the Acronis

Seite 378

96 Copyright © Acronis, Inc., 2000-2010 Source files exclusion (p. 98) + + + + + + Pre/Post backup commands (p. 99) + + + + PE only PE on

Seite 379

Copyright © Acronis, Inc., 2000-2010 97 Overwrite data on a tape without prompting user for confirmation Dest: Tape Dest: Tape Dest: Tape Dest:

Seite 380

98 Copyright © Acronis, Inc., 2000-2010 used for verification purposes. With this two-level security, the backup data is protected from any unautho

Seite 381

Copyright © Acronis, Inc., 2000-2010 99 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable me

Kommentare zu diesen Handbüchern

Keine Kommentare