Acronis Backup & Recovery 11 Update 0 User Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS
10 Copyright © Acronis, Inc., 2000-2011 Using bootable media, you can apply Acronis Universal Restore to an operating system without performing the
100 Copyright © Acronis, Inc., 2000-2011 4.7.4 Backup performance Use this group of options to specify the amount of network and system resources
101 Copyright © Acronis, Inc., 2000-2011 4.7.4.3 Network connection speed This option is effective for Windows and Linux operating systems and boo
102 Copyright © Acronis, Inc., 2000-2011 Fixed size Enter the desired file size or select it from the drop-down list. The backup will then be split
103 Copyright © Acronis, Inc., 2000-2011 Adding information to a DRP template You can append additional information to a DRP template if you are we
104 Copyright © Acronis, Inc., 2000-2011 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up
105 Copyright © Acronis, Inc., 2000-2011 This option is not available when operating under the bootable media. This option defines whether the agen
106 Copyright © Acronis, Inc., 2000-2011 plan has to run under the account with the Administrator or Backup Operator privileges. If a snapshot cann
107 Copyright © Acronis, Inc., 2000-2011 This option defines how to take and to work with a snapshot of a logical volume. Use of snapshots ensures
108 Copyright © Acronis, Inc., 2000-2011 4.7.15 Mount points This option is effective only in Windows for a file-level backup of a data source tha
109 Copyright © Acronis, Inc., 2000-2011 When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a re
11 Copyright © Acronis, Inc., 2000-2011 When installing an agent, you can enter the license key instead of specifying the license server. As soon a
110 Copyright © Acronis, Inc., 2000-2011 Password enter the password. d. Click OK. 11. Click Send test e-mail message to check if the setting
111 Copyright © Acronis, Inc., 2000-2011 The program does not support interactive commands, i.e. commands that require user input (for example, &qu
112 Copyright © Acronis, Inc., 2000-2011 3. In the Arguments field, specify the command execution arguments, if required. 4. Select the Fail the
113 Copyright © Acronis, Inc., 2000-2011 2. In the Working directory field, specify a path to a directory where the command/batch file will be exe
114 Copyright © Acronis, Inc., 2000-2011 successfully executed. Delete the TIB file and temporary files and fail the task if the command execution
115 Copyright © Acronis, Inc., 2000-2011 The option applies to backing up to a storage node. Eject tape The preset is: Disabled. When this check bo
116 Copyright © Acronis, Inc., 2000-2011 The program will try to execute the failed task again if you select the Restart a failed task check box an
117 Copyright © Acronis, Inc., 2000-2011 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be unacceptab
118 Copyright © Acronis, Inc., 2000-2011 Software - Acronis VSS Provider VSS will use Acronis VSS Provider for taking snapshots. Software -
119 Copyright © Acronis, Inc., 2000-2011 5 Recovery When it comes to data recovery, first consider the most functional method: connect the console
12 Copyright © Acronis, Inc., 2000-2011 Console The console provides Graphical User Interface and remote connection to the agents and other Acronis
120 Copyright © Acronis, Inc., 2000-2011 Select data to recover. Access credentials (p. 125) [Optional] Provide credentials for the archive locatio
121 Copyright © Acronis, Inc., 2000-2011 [Optional] Universal Restore for Windows/Linux Applies to: system disk or volume recovery. Using Acronis U
122 Copyright © Acronis, Inc., 2000-2011 You are recovering custom or non-Windows boot loaders (such as LILO and GRUB). The disk geometry is
123 Copyright © Acronis, Inc., 2000-2011 Location Details FTP, SFTP If the archive is stored on an FTP or SFTP server, type the server name or ad
124 Copyright © Acronis, Inc., 2000-2011 In the search string, type the information that helps to identify the required data items (this can be
125 Copyright © Acronis, Inc., 2000-2011 Solution: To be able to browse such data, connect directly to a machine, select the required personal vaul
126 Copyright © Acronis, Inc., 2000-2011 5.1.4.1 Selecting target disks Available disk or volume destinations depend on the agents operating on th
127 Copyright © Acronis, Inc., 2000-2011 Disk destination To specify a destination disk: 1. Select a disk where you want the selected disk to reco
128 Copyright © Acronis, Inc., 2000-2011 Also, you have to map the volumes manually if they are Linux logical volumes, or Linux software RAID (MD d
129 Copyright © Acronis, Inc., 2000-2011 Available when the Acronis Backup & Recovery 11 Agent for Hyper-V or Agent for ESX(i) is installed. On
13 Copyright © Acronis, Inc., 2000-2011 1.2.1.1 Universal Restore The Universal Restore add-on enables you to use the restore to dissimilar hardwa
130 Copyright © Acronis, Inc., 2000-2011 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-sty
131 Copyright © Acronis, Inc., 2000-2011 Volume (partition) alignment Acronis Backup & Recovery 11 automatically eliminates volume misalignment
132 Copyright © Acronis, Inc., 2000-2011 Files and folders will be recovered to the same path(s) as they are in the backup. For example, if you hav
133 Copyright © Acronis, Inc., 2000-2011 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders with names
134 Copyright © Acronis, Inc., 2000-2011 To learn more about using credentials in Acronis Backup & Recovery 11, see the Owners and credentials
135 Copyright © Acronis, Inc., 2000-2011 Sometimes Universal Restore is applied in the background because the software knows what drivers or module
136 Copyright © Acronis, Inc., 2000-2011 Universal Restore settings Automatic driver search Specify where the program will search for the Hardware
137 Copyright © Acronis, Inc., 2000-2011 5.2.2.2 Universal Restore in Linux When Universal Restore is applied to a Linux operating system, it upda
138 Copyright © Acronis, Inc., 2000-2011 5.3.1 Recovering volumes Let's assume you backed up the system and boot volumes (or the entire machi
139 Copyright © Acronis, Inc., 2000-2011 Original system Target hardware BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: non-
14 Copyright © Acronis, Inc., 2000-2011 For off-loaded backup, Agent for VMware vSphere ESX(i) (Windows) can be installed on a machine running W
140 Copyright © Acronis, Inc., 2000-2011 The plus (+) sign on a green background means that the source disk will be recovered without any limita
141 Copyright © Acronis, Inc., 2000-2011 Original system Target hardware Platform: BIOS Target disk <2 TB Platform: BIOS Target disk >2 TB Pl
142 Copyright © Acronis, Inc., 2000-2011 Customers familiar with Acronis Recovery for Microsoft Exchange can note that this product uses Active Res
143 Copyright © Acronis, Inc., 2000-2011 If your operating system and its loader reside on different volumes, always include both volumes in the ba
144 Copyright © Acronis, Inc., 2000-2011 Tip. Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to creat
145 Copyright © Acronis, Inc., 2000-2011 5.5.1 Virtual machine type / virtualization server selection The new virtual machine can be created eithe
146 Copyright © Acronis, Inc., 2000-2011 When adding a new virtual disk, along with interface and capacity, you can specify its format. Thin f
147 Copyright © Acronis, Inc., 2000-2011 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompts wh
148 Copyright © Acronis, Inc., 2000-2011 2. Mount the system you are recovering: mkdir /mnt/system/ mount -t ext3 /dev/sda2 /mnt/system/ # root pa
149 Copyright © Acronis, Inc., 2000-2011 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. R
15 Copyright © Acronis, Inc., 2000-2011 The storage nodes enable creating highly scalable and flexible, in terms of the hardware support, storage i
150 Copyright © Acronis, Inc., 2000-2011 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery File recovery (
151 Copyright © Acronis, Inc., 2000-2011 5.7.1 Additional settings Specify the additional settings for the recovery operation by selecting or clea
152 Copyright © Acronis, Inc., 2000-2011 Set current date and time for recovered files This option is effective only when recovering files. The pre
153 Copyright © Acronis, Inc., 2000-2011 To select whether to send the recovery operations events to the SNMP managers: Choose one of the following
154 Copyright © Acronis, Inc., 2000-2011 If the file NTFS permissions were preserved during backup (p. 106), you can choose whether to recover the
155 Copyright © Acronis, Inc., 2000-2011 8. In the Password field, enter the password. 9. Click Additional e-mail parameters... to configure the
156 Copyright © Acronis, Inc., 2000-2011 The option enables you to define the commands to be automatically executed before and after the data recov
157 Copyright © Acronis, Inc., 2000-2011 * A command is considered failed if its exit code is not equal to zero. 5.7.7.2 Post-recovery command To
158 Copyright © Acronis, Inc., 2000-2011 6 Storing the backed up data 6.1 Vaults A vault is a location for storing backup archives. For ease of u
159 Copyright © Acronis, Inc., 2000-2011 'Vaults' view Vaults (on the navigation pane) - top item of the vaults tree. Click this item
16 Copyright © Acronis, Inc., 2000-2011 The console has two distributions: for installation on Windows and installation on Linux. While both distri
160 Copyright © Acronis, Inc., 2000-2011 6.1.2 Centralized vaults A centralized vault is a networked location allotted by the management server ad
161 Copyright © Acronis, Inc., 2000-2011 All the operations described here are performed by clicking the corresponding buttons on the vaults toolba
162 Copyright © Acronis, Inc., 2000-2011 To Do Delete a vault 1. Select the vault. 2. Click Delete. The vault will be deleted along with all t
163 Copyright © Acronis, Inc., 2000-2011 The deduplication database stores the hash values of all items stored in the vaultexcept for those that c
164 Copyright © Acronis, Inc., 2000-2011 Vault path To specify the path where the managed vault will be created 1. Enter the full path to the fold
165 Copyright © Acronis, Inc., 2000-2011 The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly gener
166 Copyright © Acronis, Inc., 2000-2011 If no objects were found, delete the name and enter another one. If several objects for the entered name w
167 Copyright © Acronis, Inc., 2000-2011 Attaching a managed vault A vault managed by a storage node can be attached to another storage node. You m
168 Copyright © Acronis, Inc., 2000-2011 Zone is considered as a personal vault available to all users that can log on the system. Personal vaults
169 Copyright © Acronis, Inc., 2000-2011 Validate a vault Click Validate. You will be taken to the Validation (p. 211) page, where this vault is
17 Copyright © Acronis, Inc., 2000-2011 1.4 Technical Support Maintenance and Support Program If you need assistance with your Acronis product, pl
170 Copyright © Acronis, Inc., 2000-2011 1. Make sure that none of the backup plans uses vault A while merging, or disable the given plans. See Ac
171 Copyright © Acronis, Inc., 2000-2011 After you configure the required settings, click OK. In the Result confirmation (p. 172) window, review th
172 Copyright © Acronis, Inc., 2000-2011 6.2.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi
173 Copyright © Acronis, Inc., 2000-2011 If there is not enough unallocated space, the program will take free space from the selected volumes, p
174 Copyright © Acronis, Inc., 2000-2011 An autoloader is a particular case of tape libraries. It contains one drive, several slots, a changer and
175 Copyright © Acronis, Inc., 2000-2011 3. Add the registry key described below. Specify the new location path in the registry value TapesDatabas
176 Copyright © Acronis, Inc., 2000-2011 6.3.2.5 Parallel operations Acronis Backup & Recovery 11 can simultaneously perform operations with v
177 Copyright © Acronis, Inc., 2000-2011 ABR11 Bootable Media ABR11 Agent for Windows ABR11 Agent for Linux ABR11 Storage Node Tape written on a lo
178 Copyright © Acronis, Inc., 2000-2011 Backing up On the Actions menu, click Back up now or Create backup plan. Configure (p. 45) the backup sett
179 Copyright © Acronis, Inc., 2000-2011 6. In the Navigation tree, click Storage nodes. Select the storage node to which your tape device is atta
18 Copyright © Acronis, Inc., 2000-2011 2 Getting started Step 1. Installation These brief installation instructions enable you to start using
180 Copyright © Acronis, Inc., 2000-2011 5. If any of the detected backups continue on other tapes that have not been rescanned yet, load these ta
181 Copyright © Acronis, Inc., 2000-2011 15. Click OK to start the recovery. 16. If any of the required tapes are not loaded for some reason, the s
182 Copyright © Acronis, Inc., 2000-2011 6.3.4.2 Tape pools Acronis Backup & Recovery 11 uses tape pools that are logical groups of tapes. The
183 Copyright © Acronis, Inc., 2000-2011 6.3.4.3 Operations with pools Creating a pool To create a pool: 1. In the Navigation tree, click Tape ma
184 Copyright © Acronis, Inc., 2000-2011 2. Select the required pool and click Remove. 3. Select the pool to which the tapes of the pool being de
185 Copyright © Acronis, Inc., 2000-2011 You need to take several tapes out of a tape device simultaneously. Your tape device does not have a
186 Copyright © Acronis, Inc., 2000-2011 4. Click OK to start the operation. Rescanning The information about the contents of tapes is stored in
187 Copyright © Acronis, Inc., 2000-2011 Result. The selected tapes are moved to the pool associated with the selected vault. The backups stored on
188 Copyright © Acronis, Inc., 2000-2011 Combination of fast and full inventorying Full inventorying of an entire tape device may take a long time.
189 Copyright © Acronis, Inc., 2000-2011 What to do if I removed a tape by mistake? Unlike an erased (p. 185) tape, the data from a removed tape is
19 Copyright © Acronis, Inc., 2000-2011 a. Run the setup program and click Install Acronis Backup & Recovery 11. b. After accepting the terms
190 Copyright © Acronis, Inc., 2000-2011 Tip. If you back up multiple machines to a tape library with multiple drives, associate the vault with the
191 Copyright © Acronis, Inc., 2000-2011 6.3.6.2 Example 2. Backing up to tapes on a weekly rotational basis Consider the following scenario: Y
192 Copyright © Acronis, Inc., 2000-2011 6.3.6.3 Example 3. Disk-to-disk-to tape with sending tapes to an off-site storage Consider the following
193 Copyright © Acronis, Inc., 2000-2011 2. Perform the fast inventorying (p. 187) with the Move newly detected tapes from the 'Unrecognized
194 Copyright © Acronis, Inc., 2000-2011 Up to 50 storage nodes can be set up. 6.4.2 Supported types of storage A managed vault can be organize
195 Copyright © Acronis, Inc., 2000-2011 The machine where the storage node is planned to be installed meets the system requirements described i
196 Copyright © Acronis, Inc., 2000-2011 3. Select the storage node; then, perform the required operations as described in "Actions on storag
197 Copyright © Acronis, Inc., 2000-2011 However, if UserA is a member of the Administrators group on the machine, this user can additionally acces
198 Copyright © Acronis, Inc., 2000-2011 Refresh the list of storage nodes Click Refresh. The management console will update the list of storage
199 Copyright © Acronis, Inc., 2000-2011 Withdrawn - the storage node was registered on another management server. As a result, it is not possib
2 Copyright © Acronis, Inc., 2000-2011 Copyright © Acronis, Inc., 2000-2011. All rights reserved.
20 Copyright © Acronis, Inc., 2000-2011 To save your machine to a file: Under Where to back up, click Location, and select the location where the b
200 Copyright © Acronis, Inc., 2000-2011 Parameters related to compacting As backups are deleted from a deduplicating vault, its deduplication data
201 Copyright © Acronis, Inc., 2000-2011 The Compacting Trigger Threshold parameter enables you to set up a balance between the extra space require
202 Copyright © Acronis, Inc., 2000-2011 Fast Operation Connection Limit Description: Specifies the maximum number of simultaneous connections to t
203 Copyright © Acronis, Inc., 2000-2011 The Check Hash Value On Server Side parameter determines whether the storage node must ensure that the has
204 Copyright © Acronis, Inc., 2000-2011 Description: Specifies the amount of free space in a managed vault, in megabytes, below which an error is
205 Copyright © Acronis, Inc., 2000-2011 deduplicating vault. The Deduplication add-on to the agent must be installed on any machine that backs up
206 Copyright © Acronis, Inc., 2000-2011 Once the backup process is completed, the vault contains the resulting backup and the temporary file with
207 Copyright © Acronis, Inc., 2000-2011 Compacting After one or more backups or archives have been deleted from the vaulteither manually or durin
208 Copyright © Acronis, Inc., 2000-2011 To increase deduplication performance, follow the recommendations below. Place the deduplication database
209 Copyright © Acronis, Inc., 2000-2011 64-bit operating system For optimal deduplication performance, install the storage node in a 64-bit operat
21 Copyright © Acronis, Inc., 2000-2011 Administering the management server Use the Machines with agents view to manage machines registered o
210 Copyright © Acronis, Inc., 2000-2011 Tip: The allocation unit size on most NTFS and ext3 volumes is 4 KB. This allows for block-level deduplica
211 Copyright © Acronis, Inc., 2000-2011 7 Operations with archives and backups 7.1 Validating archives and backups Validation is an operation th
212 Copyright © Acronis, Inc., 2000-2011 [Optional] Provide credentials for accessing the source if the task account does not have enough privilege
213 Copyright © Acronis, Inc., 2000-2011 To select a centralized vault, expand the Centralized group and click the appropriate vault. To sele
214 Copyright © Acronis, Inc., 2000-2011 Choose one of the following: Now - to start the validation task right after its creation, that is, afte
215 Copyright © Acronis, Inc., 2000-2011 Your choice of backups belonging to the same archive - the resulting archive will contain only the spec
216 Copyright © Acronis, Inc., 2000-2011 personal vaults, locally attached tape devices, removable media and, in the advanced product versions, man
217 Copyright © Acronis, Inc., 2000-2011 Backups - you need to specify the archive first, and then select the desired backup(s) in this archive. Br
218 Copyright © Acronis, Inc., 2000-2011 To specify credentials 1. Select one of the following: Use the current user credentials The software w
219 Copyright © Acronis, Inc., 2000-2011 To export data to a locally attached tape device, expand the Tape drives group, then click the required
22 Copyright © Acronis, Inc., 2000-2011 Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and t
220 Copyright © Acronis, Inc., 2000-2011 Password. The password for the account. 2. Click OK. According to the original FTP specification, cred
221 Copyright © Acronis, Inc., 2000-2011 7.3.1 Archive selection Selecting the archive 1. Enter the full path to the location in the Path field,
222 Copyright © Acronis, Inc., 2000-2011 7.3.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. T
223 Copyright © Acronis, Inc., 2000-2011 7.3.5 Managing mounted images Once a volume is mounted, you can browse files and folders contained in the
224 Copyright © Acronis, Inc., 2000-2011 source. Validation of an archive will check all the archive's backups. Export an archive Click Exp
225 Copyright © Acronis, Inc., 2000-2011 data block saved in the backup. Export a backup Click Export. The Export (p. 214) page will be opened w
226 Copyright © Acronis, Inc., 2000-2011 7.4.4 Deleting archives and backups The Backups deletion window displays the same tab as for the vaults v
227 Copyright © Acronis, Inc., 2000-2011 8 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media suppo
228 Copyright © Acronis, Inc., 2000-2011 PE-based bootable media does not support UEFI. 8.1 How to create bootable media To enable creating physi
229 Copyright © Acronis, Inc., 2000-2011 http://www.microsoft.com/downloads/details.aspx?familyid=696DD665-9F76-4177-A811-39C26D3B3B34&displayl
23 Copyright © Acronis, Inc., 2000-2011 Mounted images. This node is displayed if at least one volume is mounted. Use this view to manage moun
230 Copyright © Acronis, Inc., 2000-2011 build an ISO image of a bootable disc to burn it later on a blank disc upload the selected component
231 Copyright © Acronis, Inc., 2000-2011 nousb2 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you
232 Copyright © Acronis, Inc., 2000-2011 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i
233 Copyright © Acronis, Inc., 2000-2011 to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the
234 Copyright © Acronis, Inc., 2000-2011 8.1.3 Adding the Acronis Plug-in to WinPE 2.x or 3.0 Bootable Media Builder provides three methods of in
235 Copyright © Acronis, Inc., 2000-2011 Once a machine boots into WinPE, Acronis Backup & Recovery 11 starts automatically. To create a PE ima
236 Copyright © Acronis, Inc., 2000-2011 Remote connection To connect to the machine remotely, select Connect -> Manage a remote machine in the
237 Copyright © Acronis, Inc., 2000-2011 3. From the list of supported video modes, choose the appropriate one by typing its number (for example,
238 Copyright © Acronis, Inc., 2000-2011 acronis asamba lash Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insm
239 Copyright © Acronis, Inc., 2000-2011 8.5 Acronis Startup Recovery Manager Acronis Startup Recovery Manager is a modification of the bootable a
24 Copyright © Acronis, Inc., 2000-2011 Operations with pane How to expand/minimize panes By default, the Navigation pane appears expanded. You mig
240 Copyright © Acronis, Inc., 2000-2011 Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder. To upload boo
241 Copyright © Acronis, Inc., 2000-2011 If the hardware has multiple network interface cards, make sure that the card supported by the BIOS has th
242 Copyright © Acronis, Inc., 2000-2011 9 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configuration
243 Copyright © Acronis, Inc., 2000-2011 1. Back up the disk on which volumes will be created or managed. Having your most important data backed u
244 Copyright © Acronis, Inc., 2000-2011 The top part of the view contains a disks and volumes table enabling data sorting and columns customizatio
245 Copyright © Acronis, Inc., 2000-2011 Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be initialized
246 Copyright © Acronis, Inc., 2000-2011 The sel
247 Copyright © Acronis, Inc., 2000-2011 If you need to copy the NT signature: 1. Select the Copy NT signature
248 Copyright © Acronis, Inc., 2000-2011 1. MBR disk conversion: dynamic to basic (p. 249) using the Convert to basic operation. 2. Basic disk
249 Copyright © Acronis, Inc., 2000-2011 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic
25 Copyright © Acronis, Inc., 2000-2011 In the information panel (collapsed by default), view the item's details. To expand the panel, clic
250 Copyright © Acronis, Inc., 2000-2011 safe conversion of a dynamic disk to basic when it contains volumes with data for simple and mirrored v
251 Copyright © Acronis, Inc., 2000-2011 Store collections of similar files separately for example, an MP3 collection or video files on a sepa
252 Copyright © Acronis, Inc., 2000-2011 data itself. If a physical disk fails, the portion of the RAID-5 volume that was on that failed disk can b
253 Copyright © Acronis, Inc., 2000-2011 To create a Striped volume: Select two or more destination disks to create the volume on. To create a R
254 Copyright © Acronis, Inc., 2000-2011 In setting the cluster size you can choose between any number in the preset amount for each file system
255 Copyright © Acronis, Inc., 2000-2011 9.7.3 Set active volume If you have several primary volumes, you must specify one to be the boot volume.
256 Copyright © Acronis, Inc., 2000-2011 9.7.5 Change volume label The volume label is an optional attribute. It is a name assigned to a volume fo
257 Copyright © Acronis, Inc., 2000-2011 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the
258 Copyright © Acronis, Inc., 2000-2011 10 Administering a managed machine This section describes the views that are available through the navigat
259 Copyright © Acronis, Inc., 2000-2011 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 267) or Task Detail
26 Copyright © Acronis, Inc., 2000-2011 Action page - Create backup plan Using controls and specifying settings Use active controls to specify a b
260 Copyright © Acronis, Inc., 2000-2011 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as creation (p. 45)
261 Copyright © Acronis, Inc., 2000-2011 1 Need interaction At least one task needs user interaction. Otherwise, see 2. Identify the tasks that nee
262 Copyright © Acronis, Inc., 2000-2011 10.1.2.3 Task states A task can be in one of the following states: Idle; Waiting; Running; Need interacti
263 Copyright © Acronis, Inc., 2000-2011 10.1.3 Export and import of backup plans The export operation creates a file with complete configuration
264 Copyright © Acronis, Inc., 2000-2011 10.1.3.1 Editing the export file The export file is an .xml file and can be edited with a text editor.
265 Copyright © Acronis, Inc., 2000-2011 </login> <password encrypted="true"> XXXYYYZZZ888 </password> How to change it
266 Copyright © Acronis, Inc., 2000-2011 <specific> <backup_type> disks </backup_type> <disk_level_options />
267 Copyright © Acronis, Inc., 2000-2011 The default path to the dedicated folder is %ALLUSERSPROFILE%\Acronis\BackupAndRecovery\import. The path i
268 Copyright © Acronis, Inc., 2000-2011 Last finish time - how much time has passed since the last plan or task end. Last result - the resul
269 Copyright © Acronis, Inc., 2000-2011 10.2 Log The local event log stores the history of operations performed by Acronis Backup & Recovery
27 Copyright © Acronis, Inc., 2000-2011 Navigation buttons 2.1.3 Console options The console options define the way information is represented i
270 Copyright © Acronis, Inc., 2000-2011 Save all the filtered log entries to a file 1. Set filters to get a list of the log entries that satisfy
271 Copyright © Acronis, Inc., 2000-2011 Fixing issues that caused alerts To find and fix the issue that caused the alert, click Fix the issue. You
272 Copyright © Acronis, Inc., 2000-2011 10.5.1 Customer Experience Program This option defines whether the machine will participate in the Acroni
273 Copyright © Acronis, Inc., 2000-2011 The alert is displayed in the Alerts view of the Navigation pane. When the console is connected to the man
274 Copyright © Acronis, Inc., 2000-2011 This option enables you to specify when and how often to receive notifications about the certain types of
275 Copyright © Acronis, Inc., 2000-2011 You can override the settings set here, exclusively for the events that occur during backup or during reco
276 Copyright © Acronis, Inc., 2000-2011 /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd.conf - con
277 Copyright © Acronis, Inc., 2000-2011 To be able to use this option, you must be logged on as a member of the Administrators group on the machin
278 Copyright © Acronis, Inc., 2000-2011 Google Chrome. In Options, click Under the Hood. Under Network, click Change proxy settings.
279 Copyright © Acronis, Inc., 2000-2011 11 Centralized management This section covers operations that can be performed centrally by using the comp
28 Copyright © Acronis, Inc., 2000-2011 To make a selection, choose the font from the respective combo-box and set the font's properties. You
280 Copyright © Acronis, Inc., 2000-2011 Organizing a managed archive storage What should the capacity of your centralized vault be? What if transf
281 Copyright © Acronis, Inc., 2000-2011 3. To specify credentials for connection, click Options and then type the user name and password in the U
282 Copyright © Acronis, Inc., 2000-2011 For information about Acronis security groups and their default members, see Acronis security groups (p. 2
283 Copyright © Acronis, Inc., 2000-2011 Example 2 The above authentication policy might not work on Linux distributions with kernel version 2.4
284 Copyright © Acronis, Inc., 2000-2011 To be able to connect to the management server remotely, an administrator of the management server must al
285 Copyright © Acronis, Inc., 2000-2011 New accounts If you choose to create dedicated user accounts for the services, the setup program will crea
286 Copyright © Acronis, Inc., 2000-2011 In addition, there are two Acronis services which run under a system account: The Acronis Scheduler2 Se
287 Copyright © Acronis, Inc., 2000-2011 Component name Can be client Can be server Acronis Backup & Recovery 11 Management Console Yes No Acro
288 Copyright © Acronis, Inc., 2000-2011 the Acronis client. During component installation you might be asked to confirm the port opening or to ope
289 Copyright © Acronis, Inc., 2000-2011 For self-signed certificates, the certificate thumbprint (also known as fingerprint or hash) is used for f
29 Copyright © Acronis, Inc., 2000-2011 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
290 Copyright © Acronis, Inc., 2000-2011 When selecting what data to back up, you can either select items on the registered machines directly or
291 Copyright © Acronis, Inc., 2000-2011 Selecting a check box for a machine means backing up all the machine's disks. To select individual di
292 Copyright © Acronis, Inc., 2000-2011 Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, th
293 Copyright © Acronis, Inc., 2000-2011 The root user's home directory /root Directory for all user-related programs /usr Directory for syste
294 Copyright © Acronis, Inc., 2000-2011 Boot volume Type or select: [BOOT] Refers to the registered machine's boot volume. The boot volume co
295 Copyright © Acronis, Inc., 2000-2011 Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized back
296 Copyright © Acronis, Inc., 2000-2011 /dev/vg_mymachine/lv_root /dev/vg_mymachine/lv_bin To see the list of logical volumes on a machine, run th
297 Copyright © Acronis, Inc., 2000-2011 You need to create Acronis Secure Zone in advance on each machine the centralized plan is created for. For
298 Copyright © Acronis, Inc., 2000-2011 11.2.6 What if a machine does not have data meeting the selection rules A centralized backup plan can be
299 Copyright © Acronis, Inc., 2000-2011 from the registered machines and from the management server. The chart shows the number of log entries of
3 Copyright © Acronis, Inc., 2000-2011 Table of contents 1 Introducing Acronis Backup & Recovery 11 ...
30 Copyright © Acronis, Inc., 2000-2011 3 Understanding Acronis Backup & Recovery 11 This section attempts to give its readers a clear underst
300 Copyright © Acronis, Inc., 2000-2011 Select a machine (or group) to perform actions on it. See "Actions on machines" (p. 301) and
301 Copyright © Acronis, Inc., 2000-2011 Example: The accounting department forms a separate Active Directory organizational unit (OU). You simply
302 Copyright © Acronis, Inc., 2000-2011 deleted from the machine. If the machine is not available at the moment, these actions will be performed o
303 Copyright © Acronis, Inc., 2000-2011 Other actions To Do View detailed information on a machine Click Details. In the Machine details (p. 30
304 Copyright © Acronis, Inc., 2000-2011 Select the Save password check box to store the password for future connections. 5. Click Next, and then
305 Copyright © Acronis, Inc., 2000-2011 3. In the Path field, enter a path to the .txt or .csv file, or click Browse and select the file in the B
306 Copyright © Acronis, Inc., 2000-2011 4. Click OK to add machines. Once the machines appear in the group, the centralized backup plans created
307 Copyright © Acronis, Inc., 2000-2011 Installed agents - full name of Acronis agents, installed on the machine. Processor - the type of CP
308 Copyright © Acronis, Inc., 2000-2011 11.3.2.3 Actions on groups Actions are available when you select the Machines with agents view in the
309 Copyright © Acronis, Inc., 2000-2011 To Do Move one custom group to another Click Move to. In the Move to group (p. 311) window, specify a g
31 Copyright © Acronis, Inc., 2000-2011 1. In the Plan parameters (or Task parameters) section, click Show plan's credentials, comments, labe
310 Copyright © Acronis, Inc., 2000-2011 Operating system: Windows Server 2008 Operating system: Windows Server 2003 will add to the same group a
311 Copyright © Acronis, Inc., 2000-2011 A registered machine has to be specified by its registration address, that is, you need to provide exactly
312 Copyright © Acronis, Inc., 2000-2011 To Do View details of a backup plan Click Details. In the Backup plans and tasks window, examine all in
313 Copyright © Acronis, Inc., 2000-2011 Adding a virtual machine as a virtual machine On Acronis Backup & Recovery 11 Management Server, a mac
314 Copyright © Acronis, Inc., 2000-2011 To review detailed information on the selected plan (task), use the information panel at the bottom of
315 Copyright © Acronis, Inc., 2000-2011 To Do Edit a plan/task Click Edit. Centralized backup plan The editing of centralized backup plans is p
316 Copyright © Acronis, Inc., 2000-2011 11.3.6 Licenses The Licenses view enables you to manage licenses stored on Acronis License Server. The li
317 Copyright © Acronis, Inc., 2000-2011 3. In the Actions menu, select Change license server. 4. Specify the name or IP address of the machine w
318 Copyright © Acronis, Inc., 2000-2011 LicenseServerCmdLine.exe supports the following parameters: --status <IP-address or hostname> Displa
319 Copyright © Acronis, Inc., 2000-2011 A predefined report template is preset so that you can generate a report with one click. To start generati
32 Copyright © Acronis, Inc., 2000-2011 3.3 Full, incremental and differential backups Acronis Backup & Recovery 11 provides the capability t
320 Copyright © Acronis, Inc., 2000-2011 Origin: The types of origin of the backup plansLocal and/or Centralized. Machines: The list of mach
321 Copyright © Acronis, Inc., 2000-2011 Select whether to show all items in a single table or to group them by a particular column. Specify
322 Copyright © Acronis, Inc., 2000-2011 With the default filter settings, the report includes information about all centralized managed vaults plu
323 Copyright © Acronis, Inc., 2000-2011 11.3.7.8 Report view In order for your web browser to correctly display dates and other information in ge
324 Copyright © Acronis, Inc., 2000-2011 To export entire table contents to a *.txt or *.csv file, click Save all to file. Alerts view on the manag
325 Copyright © Acronis, Inc., 2000-2011 To Do Select a single activity Select Activities in the Display drop-down list and click an activity. The
326 Copyright © Acronis, Inc., 2000-2011 To copy the details, click the Copy to clipboard button. Log entry data fields A log entry contains the fo
327 Copyright © Acronis, Inc., 2000-2011 You also have the ability to delete proxies from the list. Please keep in mind that any change to this opt
328 Copyright © Acronis, Inc., 2000-2011 The alert is displayed in the Alerts section of the Dashboard. When the console is connected to the manage
329 Copyright © Acronis, Inc., 2000-2011 This option enables you to specify when and how often to receive notifications about the certain types of
33 Copyright © Acronis, Inc., 2000-2011 Differential backup A differential backup stores changes to the data against the latest full backup. You ne
330 Copyright © Acronis, Inc., 2000-2011 To disable this option, clear the Log events check box. SNMP notifications This option defines whether th
331 Copyright © Acronis, Inc., 2000-2011 The preset is: Maximum log size: 1 GB. On cleanup, keep 95% of the maximum log size. When the option is en
332 Copyright © Acronis, Inc., 2000-2011 11.4.1 Parameters set through administrative template The following are the parameters of Acronis Backup
333 Copyright © Acronis, Inc., 2000-2011 http://msdn2.microsoft.com/en-us/library/aa374177.aspx 11.4.1.2 Acronis Backup & Recovery 11 Agen
334 Copyright © Acronis, Inc., 2000-2011 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 11 will continue
335 Copyright © Acronis, Inc., 2000-2011 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), o
336 Copyright © Acronis, Inc., 2000-2011 An empty string means the folder %AllUsersProfile%\Application Data\Acronis\BackupAndRecovery\MMS\Temp. Yo
337 Copyright © Acronis, Inc., 2000-2011 Description: Specifies the password for authentication with the proxy server Possible values: Any string 0
338 Copyright © Acronis, Inc., 2000-2011 Description: Specifies whether to record Acronis Backup & Recovery 11 Management Server's events
339 Copyright © Acronis, Inc., 2000-2011 Default value: 200 If the total number of online registered machines does not exceed the value in Maximum
34 Copyright © Acronis, Inc., 2000-2011 Linux A volume backup stores all files and folders of the selected volume independent of their attributes;
340 Copyright © Acronis, Inc., 2000-2011 Possible values: True or False Default value: False By default, Acronis Backup & Recovery 11 Managemen
341 Copyright © Acronis, Inc., 2000-2011 Specifies the location and initial size of the snapshot storagea temporary file that is used when backing
342 Copyright © Acronis, Inc., 2000-2011 Description: Specifies the name or IP address of the proxy server Possible values: Any string 0 to 32765 c
343 Copyright © Acronis, Inc., 2000-2011 The component will use the default settings, which is to use encryption if possible and to trust self-sign
344 Copyright © Acronis, Inc., 2000-2011 Disabled Encryption is disabled; any connection to a client application which requires encryption will not
345 Copyright © Acronis, Inc., 2000-2011 Description: Specifies the minimum severity level of events to be recorded in the file. Only events of lev
346 Copyright © Acronis, Inc., 2000-2011 12 Online backup This section provides details about using the Acronis Backup & Recovery Online servic
347 Copyright © Acronis, Inc., 2000-2011 directly from the online storage. Files can be recovered from disk-level backups as well as from file-leve
348 Copyright © Acronis, Inc., 2000-2011 Install Acronis software into the guest system The machine will be treated as a physical one. You will nee
349 Copyright © Acronis, Inc., 2000-2011 12.1.6.5 What happens if I run out of space? When a machine's backups are about to exceed the storag
35 Copyright © Acronis, Inc., 2000-2011 When recovering a dynamic volume to disk group unallocated space, the software preserves the volume's
350 Copyright © Acronis, Inc., 2000-2011 12.1.7.3 Is Initial Seeding a paid service? Yes, you need to buy one Initial Seeding license per machine.
351 Copyright © Acronis, Inc., 2000-2011 In Backup scheme, select Initial seeding. Specify the said media as the backup destination. [Optio
352 Copyright © Acronis, Inc., 2000-2011 Step 1 Delicately remove your hard disk drive from the machine. Step 2 Place the hard drive into an anti-
353 Copyright © Acronis, Inc., 2000-2011 Step 4 Choose the transport company that you will use for shipping. On that company's web site, prepa
354 Copyright © Acronis, Inc., 2000-2011 An order was created The backup is about to start and the license cannot be used for the same or any
355 Copyright © Acronis, Inc., 2000-2011 Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with
356 Copyright © Acronis, Inc., 2000-2011 can cancel the order if something goes wrong. This will return the license to the pool of available licens
357 Copyright © Acronis, Inc., 2000-2011 If you purchased your subscriptions online using the Acronis Web site, they are available immediately on y
358 Copyright © Acronis, Inc., 2000-2011 What does "Auto-renew" mean? Auto-renewal means that when the current subscription expires, the
359 Copyright © Acronis, Inc., 2000-2011 12.1.9.8 Can I revoke a subscription from a machine? You cannot return an activated subscription to the l
36 Copyright © Acronis, Inc., 2000-2011 3.5.2 Backup and recovery of logical volumes and MD devices (Linux) This section explains how you would b
360 Copyright © Acronis, Inc., 2000-2011 Windows Server 2008/2008 R2 (x64) with Hyper-V. Microsoft Hyper-V Server 2008/2008 R2. If your backu
361 Copyright © Acronis, Inc., 2000-2011 To activate subscriptions 1. Connect the console to the management server. 2. In the Actions pane, click
362 Copyright © Acronis, Inc., 2000-2011 Depending on your settings, this backup will be either full or incremental. But its size is not likely to
363 Copyright © Acronis, Inc., 2000-2011 To configure proxy settings for an agent 1. Connect the console to the machine for which you want to conf
364 Copyright © Acronis, Inc., 2000-2011 Backup and recovery options Some backup and recovery options are not supported by online backups. For exam
365 Copyright © Acronis, Inc., 2000-2011 Permission for a machine to use an extra service of Acronis Backup & Recovery Online. You can buy Init
366 Copyright © Acronis, Inc., 2000-2011 13 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
367 Copyright © Acronis, Inc., 2000-2011 Acronis Universal Restore The Acronis proprietary technology that helps boot up Windows or Linux on dissim
368 Copyright © Acronis, Inc., 2000-2011 Backup options Configuration parameters of a backup operation (p. 367), such as pre/post backup commands,
369 Copyright © Acronis, Inc., 2000-2011 Bootable media A physical media (CD, DVD, USB flash drive or other media supported by a machine (p. 375) a
37 Copyright © Acronis, Inc., 2000-2011 For detailed instructions on how to recover logical volumes, see Recovering MD devices and logical volumes
370 Copyright © Acronis, Inc., 2000-2011 creating and managing centralized vaults (p. 370) for storing archives managing storage nodes (p. 37
371 Copyright © Acronis, Inc., 2000-2011 Consolidation might be needed when deleting backups, either manually or during cleanup (p. 370). For examp
372 Copyright © Acronis, Inc., 2000-2011 viewing the state, progress and properties of the centralized tasks (p. 370) existing on the machine
373 Copyright © Acronis, Inc., 2000-2011 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
374 Copyright © Acronis, Inc., 2000-2011 Dynamic volume Any volume located on dynamic disks (p. 372), or more precisely, on a disk group (p. 372).
375 Copyright © Acronis, Inc., 2000-2011 I Image The same as Disk backup (p. 372). Incremental backup A backup (p. 367) that stores changes to the
376 Copyright © Acronis, Inc., 2000-2011 M Machine A physical or virtual computer uniquely identified by an operating system installation. Machines
377 Copyright © Acronis, Inc., 2000-2011 P Personal vault A local or networked vault (p. 379) created using direct management (p. 371). Once a pers
378 Copyright © Acronis, Inc., 2000-2011 S Static group A group of machines which a management server (p. 376) administrator populates by manually
379 Copyright © Acronis, Inc., 2000-2011 Validation of a file backup imitates recovery of all files from the backup to a dummy destination. Validat
38 Copyright © Acronis, Inc., 2000-2011 automatically assembled following the reboot. To view or change the partition type, use a disk partitioning
39 Copyright © Acronis, Inc., 2000-2011 To create the volume structure manually 1. Boot the machine from a Linux-based bootable media. 2. Click A
4 Copyright © Acronis, Inc., 2000-2011 4.3.2 The [DATE] variable ...
40 Copyright © Acronis, Inc., 2000-2011 The following picture illustrates this configuration. Do the following to recover data from this archive.
41 Copyright © Acronis, Inc., 2000-2011 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and then
42 Copyright © Acronis, Inc., 2000-2011 3.6 Compatibility with encryption software Acronis Backup & Recovery 11 fully retains its functionalit
43 Copyright © Acronis, Inc., 2000-2011 You can recover an encrypted system partition by using bootable media only. If the recovered system fails t
44 Copyright © Acronis, Inc., 2000-2011 OID: 1.3.6.1.4.1.24769.100.200.2.0 Value: "?00000000"
45 Copyright © Acronis, Inc., 2000-2011 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup in a few simp
46 Copyright © Acronis, Inc., 2000-2011 To access these settings, click Show backup file naming, access credentials, archive comments. File naming
47 Copyright © Acronis, Inc., 2000-2011 [Optional] Configure parameters of the backup operation, such as pre/post backup commands, maximum network
48 Copyright © Acronis, Inc., 2000-2011 In order to recover your operating system along with all the settings and applications, you have to perform
49 Copyright © Acronis, Inc., 2000-2011 Use the following credentials The program will access the source data using the credentials you specify.
5 Copyright © Acronis, Inc., 2000-2011 5.1.5 When to recover ...
50 Copyright © Acronis, Inc., 2000-2011 Criterion Example Description Windows and Linux By name F.log F Excludes all files named "F.log"
51 Copyright © Acronis, Inc., 2000-2011 2. Click OK. Warning: According to the original FTP specification, credentials required for access to FTP
52 Copyright © Acronis, Inc., 2000-2011 To access this setting, click Show backup type, 2nd location, validation, convert to virtual machine. Selec
53 Copyright © Acronis, Inc., 2000-2011 Start backup at Specifies when to start a backup. The default value is 12:00 PM. Back up on Specifies the d
54 Copyright © Acronis, Inc., 2000-2011 Keep backups: Daily: 1 week Weekly: 1 month Monthly: indefinitely As a result, an archive of da
55 Copyright © Acronis, Inc., 2000-2011 Start backup at: 11:30 PM Back up on: Tuesday, Thursday, Friday Weekly/monthly: Friday Keep bac
56 Copyright © Acronis, Inc., 2000-2011 Differential backup schedule Specifies on what schedule and under which conditions to perform a different
57 Copyright © Acronis, Inc., 2000-2011 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full ba
58 Copyright © Acronis, Inc., 2000-2011 Finally, we create retention rules for the archive: let us retain only backups that are no older than six m
59 Copyright © Acronis, Inc., 2000-2011 Recur: Every 1 day Frequency: Once at 6 PM Number of levels: 4 Backup type: Full/Differential/Increme
6 Copyright © Acronis, Inc., 2000-2011 7.1.1 Archive selection...
60 Copyright © Acronis, Inc., 2000-2011 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sinc
61 Copyright © Acronis, Inc., 2000-2011 1. Selecting the destination In the Path field, enter the full path to the destination, or select the desir
62 Copyright © Acronis, Inc., 2000-2011 Destination Details Online backup storage To back up data to Acronis Online Backup Storage, click Log in
63 Copyright © Acronis, Inc., 2000-2011 Destination Details Storage nodes When you need to back up data to a storage node that is not registered
64 Copyright © Acronis, Inc., 2000-2011 2. Click OK. To learn more about operations available depending on the user privileges, see the Users&apos
65 Copyright © Acronis, Inc., 2000-2011 Windows XP All Editions winXPProGuest Windows XP All Editions (64 bit) winXPPro64Guest Windows Server 2003,
66 Copyright © Acronis, Inc., 2000-2011 This behavior is useful when you rotate USB hard drives and want each drive to keep a single full backup (p
67 Copyright © Acronis, Inc., 2000-2011 Result: The backups of January 1, 2011, January 2, 2011, and so on, are stored respectively as MyMachine
68 Copyright © Acronis, Inc., 2000-2011 You want to back up to the archive MyMachine on an external hard disk drive. You have two such drives
69 Copyright © Acronis, Inc., 2000-2011 4.3.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each ba
7 Copyright © Acronis, Inc., 2000-2011 9.6.3 Disk conversion: MBR to GPT ...
70 Copyright © Acronis, Inc., 2000-2011 The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure
71 Copyright © Acronis, Inc., 2000-2011 What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not c
72 Copyright © Acronis, Inc., 2000-2011 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P
73 Copyright © Acronis, Inc., 2000-2011 To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:0
74 Copyright © Acronis, Inc., 2000-2011 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009. T
75 Copyright © Acronis, Inc., 2000-2011 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second
76 Copyright © Acronis, Inc., 2000-2011 Advanced scheduling settings (p. 79) are available only for machines registered on Acronis Backup & Rec
77 Copyright © Acronis, Inc., 2000-2011 During northern spring and autumn, the task runs every 12 hours on all workdays. During northern summ
78 Copyright © Acronis, Inc., 2000-2011 Event type Specifies the event type: Error, Warning, Information, Audit success, or Audit failure. Event ID
79 Copyright © Acronis, Inc., 2000-2011 How to view events in Event viewer To open a log in Event Viewer 1. On the Desktop or in the Start menu, r
8 Copyright © Acronis, Inc., 2000-2011 11.3.4 Backup plans and tasks ...
80 Copyright © Acronis, Inc., 2000-2011 Distribute start time within the time window When this setting is enabled, the backup task on each register
81 Copyright © Acronis, Inc., 2000-2011 To specify advanced settings 1. Connect to the management server or to a machine registered on it, and the
82 Copyright © Acronis, Inc., 2000-2011 4.4.7.1 User is idle Applies to: Windows "User is idle" means that a screen saver is running on
83 Copyright © Acronis, Inc., 2000-2011 Example A company uses different locations on the same network-attached storage for backing up users data a
84 Copyright © Acronis, Inc., 2000-2011 Task start conditions: Wait until the conditions are met, Run the task anyway after 3 hour(s). As a resu
85 Copyright © Acronis, Inc., 2000-2011 The following picture illustrates this example. Usage scenarios Reliable disaster recovery (p. 90) Stor
86 Copyright © Acronis, Inc., 2000-2011 A local folder on a fixed or removable drive A network folder An FTP or SFTP server Acronis Bac
87 Copyright © Acronis, Inc., 2000-2011 If allowed by the backup scheme, you can also specify when to automatically delete the backups from each of
88 Copyright © Acronis, Inc., 2000-2011 You can choose to apply the retention rules before creating a backup, after creating a backup, on a schedul
89 Copyright © Acronis, Inc., 2000-2011 The outdated backup will be kept until all backups that depend on it also become outdated. Then, all the ch
9 Copyright © Acronis, Inc., 2000-2011 1 Introducing Acronis Backup & Recovery 11 1.1 What's new in Acronis Backup & Recovery 11 Acr
90 Copyright © Acronis, Inc., 2000-2011 4.5.6.1 Example 1. Replicating backups to a network folder Consider the following scenario: You want to
91 Copyright © Acronis, Inc., 2000-2011 the Path field. Under Retention rules, select Move backups older than 1 week. Then, specify the tape device
92 Copyright © Acronis, Inc., 2000-2011 Restrictions Conversion is not available on machines running Linux. Conversion of a backup from the f
93 Copyright © Acronis, Inc., 2000-2011 or Hyper-V virtual machine is backed up at a hypervisor level), the task will be created on the machine whe
94 Copyright © Acronis, Inc., 2000-2011 Storage space Disks of the resulting virtual machine will use as much storage space as the original data oc
95 Copyright © Acronis, Inc., 2000-2011 4.7 Default backup options Each Acronis agent has its own default backup options. Once an agent is install
96 Copyright © Acronis, Inc., 2000-2011 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk b
97 Copyright © Acronis, Inc., 2000-2011 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk b
98 Copyright © Acronis, Inc., 2000-2011 When the Reset archive bit check box is selected, Acronis Backup & Recovery 11 will reset the archive b
99 Copyright © Acronis, Inc., 2000-2011 When you specify an already existing archive as the destination of the backup plan. When you edit a b
Kommentare zu diesen Handbüchern