ACRONIS Backup & Recovery 11 Betriebsanweisung Seite 5

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 379
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 4
5 Copyright © Acronis, Inc., 2000-2011
5.1.5 When to recover ................................................................................................................................... 133
5.1.6 Task credentials .................................................................................................................................... 133
5.2 Acronis Universal Restore ................................................................................................. 134
5.2.1 Getting Universal Restore ..................................................................................................................... 134
5.2.2 Using Universal Restore ........................................................................................................................ 134
5.3 Recovering BIOS-based systems to UEFI-based and vice versa........................................... 137
5.3.1 Recovering volumes.............................................................................................................................. 138
5.3.2 Recovering disks ................................................................................................................................... 139
5.4 Acronis Active Restore ...................................................................................................... 141
5.5 How to convert a disk backup to a virtual machine ........................................................... 143
5.5.1 Virtual machine type / virtualization server selection .......................................................................... 145
5.5.2 Virtual machine settings ....................................................................................................................... 145
5.6 Bootability troubleshooting .............................................................................................. 146
5.6.1 How to reactivate GRUB and change its configuration ........................................................................ 147
5.6.2 About Windows loaders ....................................................................................................................... 149
5.7 Default recovery options ................................................................................................... 149
5.7.1 Additional settings ................................................................................................................................ 151
5.7.2 Error handling ....................................................................................................................................... 152
5.7.3 Event tracing ......................................................................................................................................... 152
5.7.4 File-level security .................................................................................................................................. 153
5.7.5 Mount points ........................................................................................................................................ 154
5.7.6 Notifications.......................................................................................................................................... 154
5.7.7 Pre/Post commands ............................................................................................................................. 155
5.7.8 Recovery priority .................................................................................................................................. 157
6 Storing the backed up data..................................................................................................... 158
6.1 Vaults ............................................................................................................................... 158
6.1.1 Working with vaults .............................................................................................................................. 159
6.1.2 Centralized vaults ................................................................................................................................. 160
6.1.3 Personal vaults ...................................................................................................................................... 167
6.2 Acronis Secure Zone ......................................................................................................... 170
6.2.1 Creating Acronis Secure Zone ............................................................................................................... 170
6.2.2 Managing Acronis Secure Zone ............................................................................................................ 172
6.3 Tape devices ..................................................................................................................... 173
6.3.1 What is a tape device? .......................................................................................................................... 173
6.3.2 Overview of tape support ..................................................................................................................... 174
6.3.3 Getting started with a tape device ....................................................................................................... 177
6.3.4 Tape management................................................................................................................................ 181
6.3.5 Vaults on tapes ..................................................................................................................................... 189
6.3.6 Usage examples .................................................................................................................................... 190
6.4 Storage nodes ................................................................................................................... 193
6.4.1 What is a storage node? ....................................................................................................................... 193
6.4.2 Supported types of storage .................................................................................................................. 194
6.4.3 Operations performed by storage nodes ............................................................................................. 194
6.4.4 Getting started with a storage node ..................................................................................................... 194
6.4.5 User privileges on a storage node ........................................................................................................ 196
6.4.6 Operations with storage nodes ............................................................................................................ 197
6.4.7 Deduplication........................................................................................................................................ 204
7 Operations with archives and backups ................................................................................... 211
7.1 Validating archives and backups........................................................................................ 211
Seitenansicht 4
1 2 3 4 5 6 7 8 9 10 ... 378 379

Kommentare zu diesen Handbüchern

Keine Kommentare