Table of contents
1 Introducing Acronis® Backup & Recovery™ 10 ........................................................................ 7
1.1 Acronis Backup & Recovery 10 overview............................................................................ 7
1.2 Getting started ................................................................................................................. 8
1.2.1 Usi ng the ma nagement console.....................................................................................................................10
1.3 Acronis Backup & Recovery 10 components..................................................................... 16
1.3.1 Agent for Windows ..........................................................................................................................................16
1.3.2 Components for centralized management ...................................................................................................17
1.3.3 Ma na gement Cons ol e .....................................................................................................................................20
1.3.4 Boota bl e Media Builder...................................................................................................................................20
1.3.5 Acronis WOL Proxy ..........................................................................................................................................20
1.4 Supported file systems ................................................................................................... 21
1.5 Supported operating systems.......................................................................................... 21
1.6 System requirements...................................................................................................... 22
1.7 Technical support ........................................................................................................... 23
2 Understanding Acronis Backup & Recovery 10 ...................................................................... 24
2.1 Basic concepts................................................................................................................ 24
2.2 Full, incremental and differential backups........................................................................ 28
2.3 User privileges on a managed machine ............................................................................ 30
2.4 Owners and credentials .................................................................................................. 30
2.5 GFS backup scheme ........................................................................................................ 31
2.6 Tower of Hanoi backup scheme....................................................................................... 35
2.7 Rete ntion rules............................................................................................................... 37
2.8 Backing up dynamic volumes (Windows) ......................................................................... 40
2.9 Tape support.................................................................................................................. 42
2.9.1 Tape compatibility table..................................................................................................................................42
2.9.2 Using a single tape drive..................................................................................................................................43
2.10 Proprietary Acronis technologies..................................................................................... 44
2.10.1 Ac ronis Sec ur e Zone ........................................................................................................................................44
2.10.2 Ac ronis Startup Rec over y Ma nager ...............................................................................................................45
2.10.3 Un i v ersal Res to r e ( Ac ro ni s Bac k up & R eco v er y 10 Uni v ers al Res to r e) ......................................................45
2.10.4 Acronis Acti ve Res tore.....................................................................................................................................47
2.11 Understanding centralized management ......................................................................... 49
2.11.1 Basic concepts ..................................................................................................................................................49
2.11.2 Setting up centralized data protection in a heterogeneous network.........................................................50
2.11.3 Grouping the regis tered machi nes.................................................................................................................53
2.11.4 Polici es on mac hi nes a nd groups ...................................................................................................................53
2.11.5 Backup policy's state and statuses .................................................................................................................58
2.11.6 Deduplication ...................................................................................................................................................61
2.11.7 Pri vil eges for centralized ma nagement .........................................................................................................65
2.11.8 Communication between Acronis Backup & Recovery 10 components....................................................70
3 Options ............................................................................................................................... 76
3.1 Console options ............................................................................................................. 76
3.1.1 Sta rtup pa ge .....................................................................................................................................................76
3.1.2 Pop-up messages .............................................................................................................................................76
Kommentare zu diesen Handbüchern