Acronis Backup & Recovery 10 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Acronis Backup & Recovery 10 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Acronis Backup & Recovery 10, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Acronis Backup & Recovery 10 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Acronis Backup & Recovery 10. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Acronis Backup & Recovery 10 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Acronis Backup & Recovery 10
- Den Namen des Produzenten und das Produktionsjahr des Geräts Acronis Backup & Recovery 10
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Acronis Backup & Recovery 10
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Acronis Backup & Recovery 10 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Acronis Backup & Recovery 10 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Acronis finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Acronis Backup & Recovery 10 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Acronis Backup & Recovery 10, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Acronis Backup & Recovery 10 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 A d v a n c e d W o r k s t a t i o n User's Guide[...]

  • Seite 2

    Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc. Linux is a registered[...]

  • Seite 3

    Table of contents 1 Introducing A cro nis® Back up & Recover y™ 10 ........................................................................ 8 1.1 Acronis Backup & Rec overy 10 overview .................................................................................. 8 1.2 Getting started .................................................[...]

  • Seite 4

    3. 1. 1 St ar tup pa ge .................................................................................................................................................. 80 3. 1. 2 Po p- up m ess ages .......................................................................................................................................... 80 3. 1. [...]

  • Seite 5

    6 Direct mana gement ........................................................................................................... 174 6.1 Administering a managed machine ................................................................ ....................... 174 6. 1. 1 Da sh boa rd ...................................................................[...]

  • Seite 6

    6. 8. 2 Ma nag in g A cro nis Se cu re Zon e ................................................................ .................................................. 249 6.9 Acronis Startup Rec overy Manager ....................................................................................... 250 6.10 Bootable media ...................................[...]

  • Seite 7

    8.2 Where do I start ? ................................................................................................................... 381 8.3 Choosing a subscripti on ......................................................................................................... 3 81 8.4 Activating online bac kup subscriptions .......................[...]

  • Seite 8

    8 Copyright © Acronis, Inc., 2000 - 2010 1 I ntr od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba cku p & R eco ve ry 10 o ver vie w Based on Acronis’ paten ted disk imaging and bare metal restore techn o logies, Acr o nis Backup & Recovery 10 succe eds Acronis True Image Echo as th e next generation disast er re[...]

  • Seite 9

    9 Copyright © Acronis, Inc., 2000 - 2010 Running services wi th minimal user rights Restricted rem ote access t o a backup agen t Secure communica tio n bet ween the product components Using third-party c ertificates for authenticati o n of the components Data encryption opti ons for both data transmissi on and storage Backup of rem o te machin es[...]

  • Seite 10

    10 Copyright © Acronis, Inc., 2000 - 2010 To recover the entir e machine or the operating system that fails to start, use the bootable medi a (p. 391). You cannot contr ol operations under bootable media using the manage ment server, but you can disconnect th e console fro m the ser v er and c onnect it to the machine bo o ted from the media.  [...]

  • Seite 11

    11 Copyright © Acronis, Inc., 2000 - 2010 1 . 2 . 1 U s i n g t h e ma n a g em e n t c o n s ol e As soon as the cons o le conn ect s to a manag ed machine (p. 397) or to a manage ment server (p . 398), the respective i tems appear across the consol e's workspace (in the menu, in the main area with the Welcome screen, the Navigatio n pane, t[...]

  • Seite 12

    12 Copyright © Acronis, Inc., 2000 - 2010 1. 2. 1.1 "N av ig at ion " pa n e The navigation pane includes the Navigation tree and the Shortcut s bar. Navigation tree The Navigation tr ee enable s you to navigate a cro ss th e program views. Views de pend on whether the console is conne cted to a managed machine o r to the manag ement ser[...]

  • Seite 13

    13 Copyright © Acronis, Inc., 2000 - 2010  Log . Use this vie w to exa mine the history of centralized manag ement operati ons, such as creating a managed entities group, applying a po licy, m anaging a centraliz ed vault; as well as the history of opera tio ns lo gged in the local logs of the registered machines and t he storage nodes. Shortcu[...]

  • Seite 14

    14 Copyright © Acronis, Inc., 2000 - 2010 Actions Contains a list of c ommon operati ons that can be perf ormed on a managed mach ine o r on a management ser v er. Alway s t he sam e for all v iews. Cli cking the operation opens t he respective action page (see th e Action pages (p. 16 ) section.) All the actions can also be accessed in t he Actio[...]

  • Seite 15

    15 Copyright © Acronis, Inc., 2000 - 2010 The management co nsole "remembers" the way the p anes' borders are set. When y ou run the management cons o le nex t time, all th e panes' b o rders will ha ve the sa me position that wa s set previously. 1. 2. 1.4 M ai n ar ea, vi ew s a nd a cti on p ag es The main area is a basi c p[...]

  • Seite 16

    16 Copyright © Acronis, Inc., 2000 - 2010  By clicking in the i tems in the [Item's name] A c tions bar (on the Actions and Tools pane);  By selecting the it ems in the Actions menu;  By right-clicking t he ite m and selecting the operati o n in t he context m enu. A cti on p ag es An action page app ears in the main area when clicki[...]

  • Seite 17

    17 Copyright © Acronis, Inc., 2000 - 2010 Action page - Contr ols Acronis Backup & Rec overy 10 remembers the change s you made on the action p ages. Fo r exa m ple, if you started to cr eate a backup plan, and then f o r any reason switch ed to another view with out accomplishing the plan creation, you can click the Back navigati on button on[...]

  • Seite 18

    18 Copyright © Acronis, Inc., 2000 - 2010 Bootable media builde r With bootable m edia build er, you can create bootable media in order to use the agents and other rescue utilities in a rescue environment. Availabilit y of the agent add-ons in a rescue en vironment depends on wheth er an add-on is installed on the ma chine where the media buil der[...]

  • Seite 19

    19 Copyright © Acronis, Inc., 2000 - 2010 1 . 3 . 2 C o m p o n e n t s f o r c e n t r a l i z e d ma n a g em e n t This section lists th e co mponents included in the A cronis Backup & Recovery 10 editions that provid e the centralized m anage m ent capabil ity . Besides these components, A cronis Backup & Recovery 10 Agents have to be [...]

  • Seite 20

    20 Copyright © Acronis, Inc., 2000 - 2010 This feature als o enables auto m atic deplo y ment and co nfiguration o f Agent for ESX/ ESXi t o any ESX/ESXi server, that is not necessarily managed by the vCenter. 1. 3. 2.2 S tor ag e Nod e Acronis Backup & Rec overy 10 Storage N o de is a ser ver aimed to o ptimize usage of various resources (suc[...]

  • Seite 21

    21 Copyright © Acronis, Inc., 2000 - 2010 Encryption A managed vault can be configured so that anythin g written to it is encr ypted and anything read from it is decrypted transparently by the storage node, using a vault-specific enc ryptio n ke y stored on the node ser ver. In case the s to rage m edium is st o len or accessed by an un authorized[...]

  • Seite 22

    22 Copyright © Acronis, Inc., 2000 - 2010 The Deduplication (p. 18 ) add-on enables you t o creat e bootable media wi th the back up to a deduplicating vault fun ctionality. 1 . 3 . 5 A c r o n i s W O L P r o x y This option works in combination with the Use Wake- On -LA N (p. 166) advanced sched uling setting. Use this option if the management s[...]

  • Seite 23

    23 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 can back up and recover corrupt ed o r non-suppor ted file systems using the sector- by -sector approach. 1. 5 Sup po rt ed o pe rat in g s yst em s Acronis License Server  Windows XP Prof essional SP2+ (x86, x64)  Windows 2000 – all editi ons except for the Datace[...]

  • Seite 24

    24 Copyright © Acronis, Inc., 2000 - 2010 * Acronis Backup & Rec overy 10 Storage N o de handles t ape libraries and autoloade rs by using Removable Storage M anag ement (RSM). Since Windows 7, Wind ows Server 2008 R2 and Windows MultiP o int Serve r 2 010 do no t support RSM, a storage node installed i n these operating system s does not sup [...]

  • Seite 25

    25 Copyright © Acronis, Inc., 2000 - 2010 Bootable media Me dia t ype Me mo ry I SO i mage si ze A ddi tio nal Based on Windows PE 512 MB 300 MB Linux-based 256 MB 130 MB 1. 7 Tec hn ic al S upp ort Maintenance and Sup port Program If you need assistanc e with your Acronis product, plea se go to http://www.acroni s.com/support/ Product Updates You[...]

  • Seite 26

    26 Copyright © Acronis, Inc., 2 000 - 2010 2 Un de rs ta n din g Acr on is B ack up & Re co ver y 10 This section attempts to give its readers a clear un derstanding of the produc t so that the y can use the product in vari ous circumstanc es without step- by -step instructions. 2. 1 Ba sic co nc ept s Please familiariz e yo urs elf with the b[...]

  • Seite 27

    27 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates the notions discuss ed above. For more definiti ons please refer to the Glossary.[...]

  • Seite 28

    28 Copyright © Acronis, Inc., 2000 - 2010 Backup using bootable media You can boot the m achine u sing the bootable media, configure th e backup operation in the sa m e way as a simple backup plan and execute the operati on. This will help you extract files and logical volumes from a sy stem that failed to boot, take an image of the offline syste [...]

  • Seite 29

    29 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates data recovery und er the operating system (onli ne). No backup can proceed on the machin e while the recovery opera tion is taking place. If required, y ou can c o nnect the console to an o ther ma chine and configure a recover y o perati o n on that m achin e. T his abil[...]

  • Seite 30

    30 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to rec ov er dat a to bare metal, you boot th e machine using the bootable media and config ure the recovery operation in th e same wa y as the recovery task. The following diagram illustrates the recovery using the bootable media. 2. 2 Ful l, i ncr em en tal a nd [...]

  • Seite 31

    31 Copyright © Acronis, Inc., 2000 - 2010 It is widely accept ed that a full backup is the slowes t to do but the fastest to restore. With Acr o nis technologies, rec overy from an incremental bac kup may be n ot slower than recovery from a full on e. A full backup is m o st useful when:  you need to roll bac k the system to its initial st ate [...]

  • Seite 32

    32 Copyright © Acronis, Inc., 2000 - 2010 P ar ame ter Fu ll ba cku p Di ff ere nti al ba cku p I nc re ment al ba cku p Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2. 3 Us er pri vi leg es on a ma na ge d m ac hin e When managing a machine running Windows, the scope of a user&apos[...]

  • Seite 33

    33 Copyright © Acronis, Inc., 2000 - 2010 When a user opens a plan or task for editing, which is owned by another user, all passw o rds set in the task are clear ed. This prevents the "modif y settings, lea ve passw o rds" trick. T he program displays a warning each ti me you are trying to edit a plan (task) last modified by another user[...]

  • Seite 34

    34 Copyright © Acronis, Inc., 2000 - 2010 “sons”; weekly bac kups are referred to as “fathers ” ; the longes t lived m onthly backups are call ed “grandfathers”. GFS as a tape rotation schem e GFS was initially cr eated and is often referred to as a tape rotati on scheme. Tape rotation sch emes, as such, do not provide au tomation. The[...]

  • Seite 35

    35 Copyright © Acronis, Inc., 2000 - 2010 The schedule m arked out according to th e GFS scheme. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Acronis uses incre mental and differential backup s that help sa ve storage spac e and o ptimize the cleanup so that cons o lidati on is not needed. In t erms of backup methods, w eekly backup is d[...]

  • Seite 36

    36 Copyright © Acronis, Inc., 2000 - 2010 “D” stands for the backup that is considered Daily. “W ” st ands fo r the bac kup that is considered Weekly. “M” stand s for the backup that is considered Mo nthl y. An ideal archive created according to the GFS schem e. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Keep daily backups:[...]

  • Seite 37

    37 Copyright © Acronis, Inc., 2000 - 2010 The backups that outlive their nomin al lifetime be cause of dependencies are mar ked pink. The initial full backup will be deleted as soon as all differential and incremental backups ba sed on this backup are deleted. An archive create d according to the GFS sche me by Acronis Backup & Reco very 10. S[...]

  • Seite 38

    38 Copyright © Acronis, Inc., 2000 - 2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gi ves the following order o f moves: The Tower of Hanoi backup scheme is based on the same pa tt erns. It operates with Sessions ins tead of Moves and with Backup levels instead of Rings . Commonly an N-le v el sche[...]

  • Seite 39

    39 Copyright © Acronis, Inc., 2000 - 2010  the pattern starts wit h a ful l backup since the very first backup cannot be increme ntal  the scheme f o rces every backup level t o keep o nly the most recent backup, other backups from the level have to be delete d; however backup deletion is postponed in cases where the backup is a base for ano[...]

  • Seite 40

    40 Copyright © Acronis, Inc., 2000 - 2010 1. Delete backups older than This is a time inter v al count ed back from the moment when the retention rules are app lied. Every time a retention rul e is applied, the progra m c alcula tes the date and time in the p ast corresponding to this interval and del etes all backups created b efo re that moment.[...]

  • Seite 41

    41 Copyright © Acronis, Inc., 2000 - 2010 Combination of rules 1 and 2 You can limit bo th the backu ps’ lifetime and the archi ve size. The diagra m below i llustrates the resulting rule. Example Delete backups o lder than = 3 Months Keep the archive size within = 200GB Never delete bac kups younger than = 10 Days  Every time the retention r[...]

  • Seite 42

    42 Copyright © Acronis, Inc., 2000 - 2010 What you nee d to know about consolidation Please be aware t hat cons olidation is just a method of deletio n bu t not an alt ernat ive to deletion. The resulting backup w ill n o t contain da ta that was present in the del eted backup and was absent from the r et ained incremental or differential backup .[...]

  • Seite 43

    43 Copyright © Acronis, Inc., 2000 - 2010 Recovering dynamic v olumes A dynamic volu m e can be r ecovered  over any type o f existing v olume  to unallocated space o f a di sk group  to unallocated space o f a b asic disk. Recovery over an ex isting volume When a dynamic v o lume is recovered over an existing volume, either basic or d yn[...]

  • Seite 44

    44 Copyright © Acronis, Inc., 2000 - 2010 U na ll oc ate d s pa ce (b as ic GPT di sk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and re sizing volum es during recovery You can resize the r esulting basic volume, b o th MBR and GPT, during recovery, o r chan ge the volume's location o n the di sk. A resulting dynamic v olume ca[...]

  • Seite 45

    45 Copyright © Acronis, Inc., 2000 - 2010 de vi ce (ta pe dr iv e o r t ap e li br ary ) by. .. Ag ent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 + + + + ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Ta pe w ri tt en on a ta pe dev ic e th ro ugh ... Backup Server ATIE 9.1 + + + + ATIE 9[...]

  • Seite 46

    46 Copyright © Acronis, Inc., 2000 - 2010 6. Acronis Active Re store (p. 388) is n o t available when recovering fro m a tape. Recovery from a loc ally attached tape device Before creating a r ecovery task, insert or m o unt the ta pe co ntain ing the backup you need to rec over. When creating a r ecovery task, select the tape device from the list[...]

  • Seite 47

    47 Copyright © Acronis, Inc., 2000 - 2010 OID: 1.3.6.1.4.1.24 769.100.200.1.0 Value: "Unknown"  Text description o f the eve nt OID: 1.3.6.1.4.1.24 769.100.200.2.0 Value: "?000000 00 " 2. 11 Pr op rie ta ry A cro ni s t ec hno log ie s This section describes the proprietary technologies in herited by Acronis Backup & Rec[...]

  • Seite 48

    48 Copyright © Acronis, Inc., 2000 - 2010  list archives locat ed in the zone and backups con tained in each archive  examine a backup 's content  mount a disk backup to copy files fro m the backup to a physical disk  safely delete archi ves and backups from the archi ves. For more informa tion about operations avail able in Acron[...]

  • Seite 49

    49 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 1 . 3 U n i v e r s a l R e s t o r e ( A c r o n i s B a c k u p & R ec o v e r y 10 U n i v e rs a l R e s t o r e ) Acronis Backup & Rec overy 10 Universal Rest o re is the Acro nis pr oprietary techn ology that helps recover and boot up Windows on dissimilar hardware o r a virtual machine[...]

  • Seite 50

    50 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore and Micro soft Sysprep Universal Restor e is not a system preparation tool. Yo u can apply it t o any Windo ws image cr eated by Acronis product s, includin g images of systems prepared with Microsoft System Preparation Tool (Sysprep). The f o llowing is an example of using both tools on [...]

  • Seite 51

    51 Copyright © Acronis, Inc., 2000 - 2010 How it works When configurin g a recovery operation, you selec t disks or volumes to rec o ver fr o m a backup . Acronis Backup & Rec overy 10 scans the selec ted disks or volume s in the backup. If this scan finds a supported operating system, the Acronis Ac tive Restore option be comes available. If [...]

  • Seite 52

    52 Copyright © Acronis, Inc., 2000 - 2010 5. Once the system r ecovery is started, the operating system boots from the bac kup. The Acronis Active Restore ic o n appears in the s ystem tray. The machin e becomes opera tio nal and re ady to provide necessary se rvice s. The im m ediate user sees the drive tree and ic o ns and can open files or laun[...]

  • Seite 53

    53 Copyright © Acronis, Inc., 2000 - 2010 Using the manage me nt ser v er, you can cr eate one or more centrali zed archive storages (centralized vaults (p. 392)), which will be shared by the regist ered machines. A centralized v ault can be used by any backup policy as well as by any backup plan creat e d on the regis tered machines using dir ect[...]

  • Seite 54

    54 Copyright © Acronis, Inc., 2000 - 2010 You have to protect each server as a whole, the user s' data on the workstations, and the virtual machines. You want to be able to track the health of the data pr otection, be sure that th e backup archives do not sto re dupli cated information and that t he obsol ete backups are deleted from the stor[...]

  • Seite 55

    55 Copyright © Acronis, Inc., 2000 - 2010 When installing the storage node, register it o n the m anagement server in the sa me way as you register the agen ts. Installation t i ps  Both AMS and ASN can be in stalled o n a w o rkstati o n o perating system as well.  There can be multip le stora ge nodes on the network. E ach o f the n o des [...]

  • Seite 56

    56 Copyright © Acronis, Inc., 2000 - 2010 When you need and hav e the opportunity to back up any of the ser vers, nav igat e to the backup plan as described abo ve, select the plan and run it. 2. 12. 2. 2 P rot ec tin g th e wor ks tat io ns Here is how to se t up the most p opular schedule: weekly full backup and daily increm ental backup of user[...]

  • Seite 57

    57 Copyright © Acronis, Inc., 2000 - 2010  Install Agent for Wind ows or Agent for Linux on each virtual machin e. Register t he m achi nes on the management server. The machines will be c o nsid ered as ph ysical machines. You can apply a backup policy to th ese machines or create a backup plan on each machine s eparately. If any of the machin[...]

  • Seite 58

    58 Copyright © Acronis, Inc., 2000 - 2010 2. 12. 4. 1 A po li cy o n a ma chi ne or a g rou p In the diagrams bel ow, each numbered scheme illus trates the result of the respectiv ely numbered action. The container stand s for a group; the colored circle stands for a ma chine with applied policy; th e dark colored circle s tands fo r a m achine wi[...]

  • Seite 59

    59 Copyright © Acronis, Inc., 2000 - 2010 In the diagram bel o w, the contain er stands f or a group; the o ne-color circle s tands for a machine with one applied p o licy; th e two-color circl e stands for a machine with t wo applied policies; the white circle stand s for a machine with no policy applied. 1. Here is the initial state: two cust om[...]

  • Seite 60

    60 Copyright © Acronis, Inc., 2000 - 2010 In the diagram bel ow, the container stands for a gr oup; the tw o-color circle stand s fo r a machine with two applied polici es; the three-color circle s tands for a machine with thre e applied policies and so on. Besides the All ma chines group , we have the custom G1 gr oup in the root and the custom G[...]

  • Seite 61

    61 Copyright © Acronis, Inc., 2000 - 2010 #4 "green" "o range" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1 -> G2 -> #4 G2 -> #4 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines -> #5 o r #6 G1 -&g[...]

  • Seite 62

    62 Copyright © Acronis, Inc., 2000 - 2010 another policy. In this c ase, the first policy's state o n t he m achi ne will be Revoki ng and the sec o nd policy's state will b e Deplo yi ng . The p o licies can app ear in the GUI simultaneousl y o r one aft er another. Backup policy state diagram 2. 12. 5. 2 P oli cy st at us o n a ma ch i[...]

  • Seite 63

    63 Copyright © Acronis, Inc., 2000 - 2010 The policy gets th e Warnin g status on Windo ws machines that have either a D : or F: volu me, unless an event that will r esult in an error occurs. The policy that has to back up the [System] and the / dev/sda1 volumes, will get the Warning status on the Windows machines (sin ce /dev/sda is not found) an[...]

  • Seite 64

    64 Copyright © Acronis, Inc., 2000 - 2010 This status is defined as the most severe status o f the policy on the machines inc luded in the group and its child groups. If the policy is currently not appli ed to any machine, its stat us is "OK". 2. 12. 5. 5 C umu la ti ve st at e a nd st at us of a p ol ic y In addition to the depl oyment [...]

  • Seite 65

    65 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at s our ce Performed on a m anaged m achine during backup. Acronis Backup & Rec o very 1 0 Agent uses the storage node t o determine what data can be deduplicated, and d o es not transfer the data whose duplicates are alread y present in the vault. Deduplication at targ et Performed in t[...]

  • Seite 66

    66 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at target After backup to a dedu plicating vault is compl et ed, th e storage node runs the inde xing task to deduplicate data in the vault as follows: 1. It moves the items (disk blocks or files) from the archi ves to a special file within the vault, storing duplicate items there o nl y once[...]

  • Seite 67

    67 Copyright © Acronis, Inc., 2000 - 2010  The deduplicated items tha t have changed ar e not identical anymore and therefore will not be deduplicated. 2. 12. 6. 4 D edu pl ic at ion b est p ra ct ice s Follow these recom mendations when using dedupli cation:  When creating a dedu plicating vault, place the vau l t an d its dedup lication da[...]

  • Seite 68

    68 Copyright © Acronis, Inc., 2000 - 2010 Similarly, in case o f thre e machines, the ratio beco mes 1.5:1; for four machine s, it is 1.6:1. It approaches 2:1 as more su ch machines are back ed up to the same vault. This means that y ou can buy, say, a 10-TB st o rage devic e instead of a 20-TB one. The actual amount o f capa city reduction is inf[...]

  • Seite 69

    69 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 2 . 7 P r i v i l e g e s f o r c e n t r a l i z e d m a n a ge m e n t This section describes the users' privileges that are required to manage a machin e locally and remotely, to manag e a machine registered o n Acronis Backup & Recovery 10 Man agement Server, and to access and manage Acr[...]

  • Seite 70

    70 Copyright © Acronis, Inc., 2000 - 2010 For information ab out Acronis security groups and their default members, se e Acronis security groups (p. 70 ). 2. 12. 7. 4 A cro ni s s ec ur it y gr ou ps On a machine runnin g Windows, Acronis securi ty gro ups determine who can ma nage the machine remotely and act as Acronis Backup & Recovery 1 0 [...]

  • Seite 71

    71 Copyright © Acronis, Inc., 2000 - 2010 DCNAME stands for the NetBIOS name of the domain co ntroller. Each dollar sign is surrounded by a single space o n either side.  Instead of explici tly includi ng the names of all membe rs of the Administrators group, the Administrators gr o up itself is included. Tip: To ensure proper g roup names, you[...]

  • Seite 72

    72 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that two us ers on a machine, UserA and Us erB, perform backups from this machine t o a centralized vault m anaged by a storage no de. On the storage node, let thes e users have regu lar (non- administrative) acc ounts UserA_SN and UserB_SN , respectively. Normally, UserA c an access only t[...]

  • Seite 73

    73 Copyright © Acronis, Inc., 2000 - 2010 The setup progra m will assi gn the above listed user rig hts to any existing account y ou specify for a corresponding ser v ice. If you choose t o specify an existin g user acc ount for the agent service or the storage node ser vice, make sure that this account is a member of the Backup Operato rs group, [...]

  • Seite 74

    74 Copyright © Acronis, Inc., 2000 - 2010 For instructions on h ow to manage SSL certificat es used for secure authenti cation, see SSL certificates (p. 78 ). Note: The comp onents of earlier Acronis products, including those of the Acronis True Image Echo family, cannot conn ect to the Acronis Backup & Re covery 10 components, regardless of t[...]

  • Seite 75

    75 Copyright © Acronis, Inc., 2000 - 2010 3. In the Acronis pane to the right, double-click a com m unication opti on that you want to configure. The Administrati ve Template contains the f o llowing o ptio ns (each o ption is e xplained later in this topic):  Remote Agent po rts  Client Encrypt ion options  Server Encryption options 4. F[...]

  • Seite 76

    76 Copyright © Acronis, Inc., 2000 - 2010 Required Data transfer will be performed only if encr y ption is e nabled on the server applic atio n (see "Server Encryption o ptions "); it will b e encrypted. Authentication pa r ameters Selecting the Trust s elf-sig ned certificates check box allows the client to connect to the server applica[...]

  • Seite 77

    77 Copyright © Acronis, Inc., 2000 - 2010 Do not use The use of SSL certificat es is disabled. Any connection to a client application which requires the use of SSL certificat es will not be established. Use if possible The use of SSL certificat es is enabled. The server will use SSL certific ates if their use is enabled on the cli ent application,[...]

  • Seite 78

    78 Copyright © Acronis, Inc., 2000 - 2010 2. 12. 8. 5 S SL ce rt ifi ca te s Acronis Backup & Rec overy 10 components use Se cure Sockets Layer (SS L ) certific ate s for secure au thentication. SSL certificates for th e components c an be one of the two types:  Self-signed cert i ficates , such as ce rtificates auto m atically genera ted d[...]

  • Seite 79

    79 Copyright © Acronis, Inc., 2000 - 2010 To g ene ra te a ne w sel f- s ign ed ce rt if ica te 1. Log on as a me m ber of the Administrators group. 2. In the Start menu, click Run , and then type: cmd 3. Run the following c omman d (note quotation marks): "%CommonProgramFile s% Acronis Utils acroniscert" -- reinstall 4. Restart Win[...]

  • Seite 80

    80 Copyright © Acronis, Inc., 2000 - 2010 3 O p ti on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is app licable to both stand-alone and a dv anced edi tio ns of Acronis Backup & Rec overy 10. 3. 1 Co nso le op tio ns The console optio[...]

  • Seite 81

    81 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for all results. To make a settin g fo r each result (successful completion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box. 3 . 1 . 3 T i m e - b as e d al e r t s Last backup This option is effec tive whe n the console is connected to [...]

  • Seite 82

    82 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backup & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents. The preset is: Sy stem Default font f o r both the menus and the application i[...]

  • Seite 83

    83 Copyright © Acronis, Inc., 2000 - 2010 This parameter can als o be set by using Acronis Admini strative Template (p. 334 ). 3 . 2 . 3 E v en t t r a c i n g You can configure t he man agement server to log even ts in the Application Event Log of Window s, besides the manag ement server's own log. You can configure t he man agement server t[...]

  • Seite 84

    84 Copyright © Acronis, Inc., 2000 - 2010 3 . 2 . 4 D o m a i n a c c e s s c r e de n t i a l s This option deter m ines the user name and password th at the managemen t server will use to access the domain. The preset is: N o credential s The management server needs domain access creden tials when working with a dynamic group that is based on th[...]

  • Seite 85

    85 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 6.1 VM wa re v Cen te r int egr at io n This option defines wh ether to show virtual machines managed by a V M ware vCenter Server in t he management ser v er and show the backup status o f th ese machines in the vCente r. Integration is avail able in all Acronis Backup & Re covery 10 advanced ed[...]

  • Seite 86

    86 Copyright © Acronis, Inc., 2000 - 2010 Note: Acronis Backup & Recovery 10 Online supports o nly HTTP and HTTPS proxy serve rs. Proxy settings for the agent an d the manage ment ser v er are c o nfigured s eparately, even if both are installed on the s ame mach ine. To s et up pr oxy s er ver se tti ng s 1. Select the Use a pro xy serve r ch[...]

  • Seite 87

    87 Copyright © Acronis, Inc., 2000 - 2010 3 . 3 . 2 E v en t t r a c i n g It is possible to dupli cate lo g ev ents gene rated by the agent(s), opera ting on the managed machine, in the Applicati o n Event Log o f Windows; o r send the ev ents t o the specified SN MP managers. If you do not modify the event tracing options anywhere except for her[...]

  • Seite 88

    88 Copyright © Acronis, Inc., 2000 - 2010 You can override the settings set here, exclusivel y for the events that occur du ring backup or during recovery, in the D efault backup and recovery options (p. 90 ). In this ca se, the settings set here will be effective for oper atio ns o ther than backup and recovery, such as archive v alidati o n or c[...]

  • Seite 89

    89 Copyright © Acronis, Inc., 2000 - 2010  /etc/snmp/snmpd .conf - config uration file for the Ne t -SNMP SN M P agent  /etc/snmp/snmptrap d.conf - configuration file fo r the Net -SNMP trap da emon. 3 . 3 . 3 L o g c l e a n u p r u l e s This option specifies h ow to clean up the Acronis Backup & Recovery 10 agent log . This option def[...]

  • Seite 90

    90 Copyright © Acronis, Inc., 2000 - 2010 If you choose Yes, I want t o participate in the ACEP , informa tio n about the hardware configuration, the most and lea st used features and about any problems will be automatically collected fr om the machine and sent to Acronis on a regular basis. The end results are intended t o provide softwar e impro[...]

  • Seite 91

    91 Copyright © Acronis, Inc., 2000 - 2010 (p. 94 ) Pre/Post data capture commands (p. 96 ) + + - - Multi-volume snapshot (p. 98 ) + + - - File -level backup snap shot (p. 98 ) - + - - Use VSS (p. 98 ) + + - - Compression level (p. 99 ) + + + + Backup performanc e: Backup priority (p. 100 ) + + - - HDD writing speed (p. 100) Dest: HDD Dest: HDD Des[...]

  • Seite 92

    92 Copyright © Acronis, Inc., 2000 - 2010 Overwrite data on a t ape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after backu p has finished Dest: removable media Dest: removable media Dest: removable media Dest: removable media Ask for the first media whil e backing up to removable media Dest: [...]

  • Seite 93

    93 Copyright © Acronis, Inc., 2000 - 2010 The AES cryptograp hic algorithm operates in the Ciph er -block chain ing (CBC) mode and uses a randomly generated key with a user-defin ed size of 128, 192 or 256 bits. The larger the key size, the longer it will take fo r the pr ogram to encrypt the archi v e and the more secure your data will b e. The e[...]

  • Seite 94

    94 Copyright © Acronis, Inc., 2000 - 2010 Exclusion examples Cr it eri on Ex am ple D esc rip tio n Wi nd ows an d L in ux By name F.log F Excludes all files named "F.lo g" Excludes all folders nam ed "F" By mask (*) *.log F* Excludes all files with th e .log extension Excludes all files and folder s with names starting w ith &[...]

  • Seite 95

    95 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y p re/ po st co mma nds 1. Enable pre/post c o mmand s execution by checking the foll owing options:  Execute before the ba c kup  Execute after the backup 2. Do any of the f ollowing:  Click Edit to specify a new command or a batch fil e  Select the existing c ommand or the batch [...]

  • Seite 96

    96 Copyright © Acronis, Inc., 2000 - 2010 4. If successful execution of the command is critical f or your backup strategy, sel ect the Fail the task if the comman d execution fails check box. In case the command execution fa ils, the program will rem ove the resulting TIB file and temporary files if possible, and the task will fail. When the check[...]

  • Seite 97

    97 Copyright © Acronis, Inc., 2000 - 2010 4. Depending on the r esult you want to obtain, select the ap propriate options as described in t he table below. 5. Click Test command t o che ck if the command is corre ct. Ch ec k b ox S ele cti on Fail the backup task if th e command e xecution fails Selected Cleared Selected Cleared Do not perform the[...]

  • Seite 98

    98 Copyright © Acronis, Inc., 2000 - 2010 fails. 3. 4. 1.5 Fi le -le ve l b ac ku p sn ap sh ot This option is effec tive only for fil e -level bac kup in Wind ows and Linux operating systems. This option defines wh ether to back up files one by on e or by taking an instan t data snapshot. Note: Files that are stored o n network shares are al ways[...]

  • Seite 99

    99 Copyright © Acronis, Inc., 2000 - 2010 transactions, at the moment of taking the data snaps hot by Acronis Backup & Recover y 10. Data consistency, in turn, ensur es that the application will be recovered in the corr ect state and become operational im m ediately af ter recovery. The preset is: Crea te snapsh ots using VSS Acronis Backup &a[...]

  • Seite 100

    100 Copyright © Acronis, Inc., 2000 - 2010  Maximum – the da ta will be c om pressed a s much as possible. The backup duration will be maximal. You ma y w ant t o select maximum co mpression when backing up to removable m edia to reduce the numb er of blank disks required. 3. 4. 1.9 Ba cku p per fo rm an ce Use this group of options to spe ci[...]

  • Seite 101

    101 Copyright © Acronis, Inc., 2000 - 2010  Click Writing speed stated in kilobytes per se c ond , and then en ter the wri ting speed in kilobytes per second. Ne tw or k co nn ec ti on s pe ed This option is effec tive for Win do ws and Linu x operati ng systems and bootable media. This option is available when a location on the n et work (net [...]

  • Seite 102

    102 Copyright © Acronis, Inc., 2000 - 2010 4. For the e-mail message to inclu de the log entries related to the backup, select the Add full log to the notification chec k box. 5. Click Additional e-ma il parameters , to configure add itional e-mail para meters as follows, then click OK :  From - type the e-mail address of the user from who m th[...]

  • Seite 103

    103 Copyright © Acronis, Inc., 2000 - 2010 The When user intera ction is required check box – to send notific atio n du ring the operation when user interac tio n is re quired – is always selected. Click Send test W inPopup message to check if the s ettings are correct. 3. 4. 1.1 1 Ev en t tra cin g It is possible to dupli cate lo g ev ents o [...]

  • Seite 104

    104 Copyright © Acronis, Inc., 2000 - 2010  Use the setting set in the Machine options – to use the setting specified for the m achine. F o r more information refer to Machine options (p. 86 ).  Send SNMP no tifi cations individually for backup operation events – to send the ev ents of the backup operations to t he s pecified SNMP manage[...]

  • Seite 105

    105 Copyright © Acronis, Inc., 2000 - 2010 If the destination disk ru ns out of free space while cr eating the backup, the task enters the Need interaction state. Y o u have t he abilit y to free additi onal space and retry the o per ation. If you do so, the resulting backup will be split into the parts created before and after the retry.  When[...]

  • Seite 106

    106 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 1.1 5 M edi a com po ne nt s This option is effec tive for b oth Windows and Linu x operating sys tems, when the backup destinati on is removable m edia. When backing up to r emovable media, you can make this media work as regular Linux-based bootable media (p. 391) by w riting additi onal component[...]

  • Seite 107

    107 Copyright © Acronis, Inc., 2000 - 2010 Ignore bad sectors The preset is: Disab l ed . When the option is disab led , t he program will display a pop-up window each ti me it comes across a bad sector and ask f or a user decision as to whether to continue or stop the bac kup procedure. In order to back up th e valid information on a rapid ly dyi[...]

  • Seite 108

    108 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior in case a backu p task is about to start (the scheduled time comes or th e event specified in th e schedule occurs), but the c ondition (or any of multiple conditions) is not met. For mor e inf o rmation on co ndi tio ns please s ee Scheduling (p. 159) and Con[...]

  • Seite 109

    109 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior when an y of the ba ckup plan's tasks fails. The preset is no t to restart a fa i led task . The program will tr y to execute the failed task again if you select the Restart a fa iled task check b o x and specify the nu mber of attempts and the tim e inte[...]

  • Seite 110

    110 Copyright © Acronis, Inc., 2000 - 2010 When this option is enabled, the backups, bel o nging to the policy or plan bein g created, will b e located on a separa te tape set . Other bac kups will not be written to thi s t ape set. If the console is connected to the management serve r The Use a separate ta pe set option has more precise definitio[...]

  • Seite 111

    111 Copyright © Acronis, Inc., 2000 - 2010 When starting backup to a non-empty tape in a loc ally attached tape device, the program will warn that you are abou t to lose d ata o n the tap e. To disable this warning, sel ect this c heck box. Dismount media after backup has finished This option is effectiv e in Windows and Linux opera ting systems. [...]

  • Seite 112

    112 Copyright © Acronis, Inc., 2000 - 2010 For example, if the machine boots from a hard disk drive by default and y o u sele ct this check bo x, the machine will be re started a nd the operating system wi ll start as soon as the bootable agent has finished creating the backup. Deduplicate backup o nly after transferring it to the vault (do not de[...]

  • Seite 113

    113 Copyright © Acronis, Inc., 2000 - 2010 You can also cust omize a default option itself by chan ging its value against th e pre-defined one. The new value will be us ed by default in all rec overy tasks y ou will cr eate later on this machine. To view and change the default recovery options, co nnect the consol e to the managed machine and then[...]

  • Seite 114

    114 Copyright © Acronis, Inc., 2000 - 2010 Change SID after reco very Windows recovery - Windows recovery - Notifications: E-mail (p. 116 ) + + - - Win Pop- up (p. 117 ) + + - - Event tracing: Windows events log (p. 118 ) + + - - SNMP (p. 118 ) + + - - 3. 4. 2.1 P re/ Po st c om ma nd s This option is effec tive for Win do ws and Linu x operati ng[...]

  • Seite 115

    115 Copyright © Acronis, Inc., 2000 - 2010 Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails Selected Cleared Selected Cleared Do not reco ver until the command execution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery only after the command is successfully executed. Fail the task if the com[...]

  • Seite 116

    116 Copyright © Acronis, Inc., 2000 - 2010  Low – to minimize resources taken by the rec overy process, leaving mor e resources to o ther processes running o n the machin e  Normal – to run the r ecovery process with n o rmal spe ed, allocating resources on a par with other processes  High – to maximiz e the rec o very proc ess spee[...]

  • Seite 117

    117 Copyright © Acronis, Inc., 2000 - 2010  Some Internet s ervice provid ers require authentication on the incoming mail server b efo re being allowed t o send something . If this is your case, select the Log on to incoming mail server check box to enable a POP s erver and to set up its settings:  Incoming mail ser ver (POP) – enter t he [...]

  • Seite 118

    118 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ow s e ve nt lo g This option is effec tive only in Win dows operating systems. This option is not avail able when o perating under the bootable media. This option defines wh ether the agent(s) operatin g o n the m anaged m achine ha ve to log events of the recovery o perations in the Application Ev[...]

  • Seite 119

    119 Copyright © Acronis, Inc., 2000 - 2010  Community – type th e name of SNMP commun ity to which both the host run ning SNMP management app licatio n a nd the sending machine belong . The typical com m unit y is "public". Click Send test message to check if t he settings are correct.  Do not send S NMP notifica ti ons – to di[...]

  • Seite 120

    120 Copyright © Acronis, Inc., 2000 - 2010 Check file system after recovery This option is effec tive only when r ecovering disks or volum es. When operating und er bootabl e media, this option is n ot effective for the N TFS file system. The preset is Disa bled . This option defines wh ether to check the integrit y of the file s ystem after a dis[...]

  • Seite 121

    121 Copyright © Acronis, Inc., 2000 - 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ea se of use and administra tion, a vault is associated with the archives' metadata. Referring to th is metadata makes f o r fas t and convenient operations with archi ves and backups stored in the vault. A vault can be organ ized o[...]

  • Seite 122

    122 Copyright © Acronis, Inc., 2000 - 2010 Way of working with the "Vaults" view Vaults (on the na v igation p ane) - top elem ent of the vaults t ree. Click this item to display groups of centralized and pers onal vaults. Centralized . This group is available when the c o nsole is connected to a managed machine or to a management s erve[...]

  • Seite 123

    123 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out privileges depending o n the us er rights, see the User privileges on a storage node (p. 71 ) sec tio n. Unmanaged vaults An unmanaged vau lt is a centrali zed vault that is no t managed by a storag e node. To access an unmanaged vault, a us er has to have access pri v ileges for the [...]

  • Seite 124

    124 Copyright © Acronis, Inc., 2000 - 2010 Related sections: Operations with arch ives st o red in a vault (p. 1 55) Operations with ba ckups (p. 156) Filtering and sortin g archives (p. 158) Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clicki ng the vault in the v aults tr ee. Duplicates action[...]

  • Seite 125

    125 Copyright © Acronis, Inc., 2000 - 2010 Delete a vault 1. Select the vault. 2. Click Delete . You'll be asked whether to ke ep the archives stored in t he vault, or delete the vault along with all the arch ives. The plans and tasks that use this vault will fail. If you choose to keep th e archives for a managed vault, the vault will be d e[...]

  • Seite 126

    126 Copyright © Acronis, Inc., 2000 - 2010 Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vaul t. Yo u ma y need to enter ac cess crede ntials for the storage node. Path (p. 126) Specify where the v ault will be created. Managed cent ralized vaults can reside o n a network share, SAN, NAS, o r on a ha[...]

  • Seite 127

    127 Copyright © Acronis, Inc., 2000 - 2010 Va ult d at aba se pa th To s pec if y t he pa th wh ere th e va ult 's d at ab as e w ill be c re ate d 1. In the Local folder s of the s to rage node, select the desired folder o r ent er the full path to the folder in the Path fi eld. To create a new f o lder for the database, click Create f older[...]

  • Seite 128

    128 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 2.2 C rea ti ng a n u nm an age d c en tr al iz ed va ult To c re ate a n unm an age d c en tra li ze d v aul t, pe rfo rm th e fo llo win g s te ps . Vault Name Specify a unique na me for the vault. The creati o n of two centrali ze d vaults with the same name is prohibit ed. Comments Enter the dis[...]

  • Seite 129

    129 Copyright © Acronis, Inc., 2000 - 2010 To a tta ch a ma nag ed va ult to a s tor ag e no de, p erfo rm t he fo ll ow in g ste ps . Vault Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vault. Path Specify the path to the loca tio n where the archives are stored. Database pa th Specify a local fold [...]

  • Seite 130

    130 Copyright © Acronis, Inc., 2000 - 2010 by different comp o nents of o ther versi o ns of the product by means o f Acr onis Backup & Recovery 1 0, see the Tape co m patibility table (p. 44 ) section. Acronis Backup & Rec overy 10 enables you t o set up di stribution of backups by medi a. For example, a separate tape set can be used to b[...]

  • Seite 131

    131 Copyright © Acronis, Inc., 2000 - 2010 4. A tape with backups w ritte n by the storage node cannot be read on a tape device, locall y attached to a machin e, the agent is installed on, becau se of a difference in tape fo rmat. To get information about the read ability of the archiv es on tapes, written by differ ent components of other version[...]

  • Seite 132

    132 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 3.5 Ge tt in g sta rt ed wi th a ta pe li br ar y If you have a tap e library devic e attached to a machine with A cro nis Backup & Recovery 10 Storage Node installed, all yo u nee d to do to back up onto the tape librar y is to create an archive vault o n the device under storage node managemen[...]

  • Seite 133

    133 Copyright © Acronis, Inc., 2000 - 2010 If the tape barc ode cannot be read, an other T ask s Need I nteraction window as ks you to label a tape. A cti on s on a ta pe li br ary v au lt If a tape library v ault is sele cte d on the Navigation pane of t he cons o le, the Centr ali zed vau l ts page toolbar will contain t he foll owing two action[...]

  • Seite 134

    134 Copyright © Acronis, Inc., 2000 - 2010 To change the set tings of the backup policy/plan to be created click Change… in the Backup options section on the Create b ackup po li cy/plan page. It opens the Backu p options wi ndow where the Tape support page is contained with the pre-defined values. When backing up to a t ape and the end of the t[...]

  • Seite 135

    135 Copyright © Acronis, Inc., 2000 - 2010 Any user with access to a managed vault on a tape li brary is able to perform th ese opera tions. However two or more user s cannot manage a tape lib rary drive simultaneously, because some operations can tak e minutes, hours or even da ys. For example, if a user laun ches a tape library Rescan task, all [...]

  • Seite 136

    136 Copyright © Acronis, Inc., 2000 - 2010 L ab el in g When a tape requir ed for data recovery is not found , the Task Need Interaction window will ask the user to bring the tape and insert it into a tape librar y slot. S o , all the tap e cartridges need a barcode or other readable lab els. If a tape does no t get a label, y o u should define it[...]

  • Seite 137

    137 Copyright © Acronis, Inc., 2000 - 2010 If you leave this option unchan ged, then the backups, belonging to the p olicy or plan being created, might be written onto tapes containing backups writte n by different backup polici es and co m prising of data from diff erent machines. Similarl y, backups from other policies m ight be written onto the[...]

  • Seite 138

    138 Copyright © Acronis, Inc., 2000 - 2010 cycle. The same tap e rotation enables you to ge t by wi th the minimum number of c artridges and not to be buried in used tapes. Acronis Backup & Rec overy 10 enables you to achi eve full automation of tape rotation while backing up onto tape libraries. This section provid es you with useful informat[...]

  • Seite 139

    139 Copyright © Acronis, Inc., 2000 - 2010  capability of the tape library (number of driv es, loader s, slots and available tapes; capacity of tapes)  requirements for perf o rmi ng data recovery (maximal duration) You need to anal y ze every argument that is relevant for y our case and sele ct the main criteria for th e choice. Then choose[...]

  • Seite 140

    140 Copyright © Acronis, Inc., 2000 - 2010 backup policy/plan s tarts on Wednesday and full back ups should be created on ever y fo urth Frid ay, on Wednesday the firs t backup will be full instead o f an increm ental one. There are anal y zed exampl es showing how the GFS scheme can be combined with different tape options in the foll o wing sec t[...]

  • Seite 141

    141 Copyright © Acronis, Inc., 2000 - 2010 The next figure d emonstrates the data backup archive at the moment. The differ ential backup is drawn as a blue rec t angle i n the figure. Number 1 in the g reen rectangle m arks the incre mental backup created o n Monday of the 1st week of the year. Then the following bac kups are written onto tape 02 [...]

  • Seite 142

    142 Copyright © Acronis, Inc., 2000 - 2010 Below, the figure sh ows the deleted backup s as actua l, but demo nstrates tape usage during the whole year for the GFS backup scheme in combin ation with the specified tape options. A number in the green rectang le marks an incremental bac kup created on Monday of the c o rrespondin g week of the year. [...]

  • Seite 143

    143 Copyright © Acronis, Inc., 2000 - 2010 The full backup stor e d on t ape 01 is delet ed after the next full backup is created o nto both tapes 23 and 24 on Friday of t he 5 2nd week. As all backups of tape 01 have been deleted, the tap e is considered as fr ee and can be reused. Further analysis of t he exa m ple pr oves that the maxi m al nu [...]

  • Seite 144

    144 Copyright © Acronis, Inc., 2000 - 2010 If all the backups hav e to be kept during the year, the archive will require 28 tap es. As the GFS backup sche me forces automatic del etion of the outdated backup s, on the first Friday of the second year the tapes keep only the backups disp layed in the next figure.[...]

  • Seite 145

    145 Copyright © Acronis, Inc., 2000 - 2010 This figure dem o nstrates th at the GFS Example 2 tap e rotation scheme is more suitable for the case than GFS Example 1 . The a dvantages of the GFS Example 2 tape r o tation s cheme for the anal yzed case are the foll o wing:  it uses 16 tapes instead of 25  a data recovery ta sk requ ires o ne ([...]

  • Seite 146

    146 Copyright © Acronis, Inc., 2000 - 2010  backup deletion fre es a tap e so it can be reused. The main drawbac k is the l arge number of required ta pes that is used 5-10%. If we have to ke ep a daily backup fo r a wee k (4 backups) and a weekly bac kup for a month (4 backups), the total nu mber of required tapes will b e equal to 4+4+13+1 = [...]

  • Seite 147

    147 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 1 Suppose, the backup plan has the following tape opti o ns:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is cleared  the Always use a free tape : For each incremental bac kup option is cleared  the Always use a free [...]

  • Seite 148

    148 Copyright © Acronis, Inc., 2000 - 2010  five-level sche m e requires up to five tapes for this case. T oH Ex am ple 2 Suppose, the backup plan has the following tape options:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is selected  the Always use a free tape : For each [...]

  • Seite 149

    149 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 3 Imagine the backup pla n has the following tap e options:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is selected  the Always use a free tape : For each incremental bac kup op tion is select ed  the Always use a fr[...]

  • Seite 150

    150 Copyright © Acronis, Inc., 2000 - 2010 To simplify the tape pla nning lets discard the possibil ity that the calculated tapes might c o ntain backups of other data. I t is implied that the Use a sepa r ate tape set option is enab led. To calculate the nu mber of tapes you should take in to account the following c o nsid erations:  full back[...]

  • Seite 151

    151 Copyright © Acronis, Inc., 2000 - 2010 Total number of req uired tapes = r ound up ((2*F_GB + 12*I_GB + 11*D_GB) * C L / T_GB) + 1 = ro und up ( (2*320 + 12* 1 6 + 11 *40 ) * 1 / 400 ) + 1 = round up ( 3.18 ) + 1 = 5 ( tapes). T ap e p la nn in g: E xam pl e 2 Imagine the cas e with the f o llowing featur es:  full backup size is F _GB  [...]

  • Seite 152

    152 Copyright © Acronis, Inc., 2000 - 2010 node database has all the required information ab o ut the c o ntent of the moved tapes. So all you need to do is to perform th e inventory (p. 135) procedure for t he manag ed vault on the library where th e tapes w ere placed to. 2. If you move tapes t o a tape library managed by anothe r storage node, [...]

  • Seite 153

    153 Copyright © Acronis, Inc., 2000 - 2010 Metadata The .meta folder is created during backup in every personal vault. This folder con tains additional information about a rchives and backups stored in the vault, such as archive o wners or the machine name. If you acciden tally delete the .meta f older, it will be au tomatically recr eated next ti[...]

  • Seite 154

    154 Copyright © Acronis, Inc., 2000 - 2010  [Archive Name] The Actions bar is availab le when you select an arch ive in the archives tab le. Duplicates acti ons of the archi v es toolbar.  [Backup Name] The Ac tion s bar is available when you expand the archive and click o n any o f its backups. Duplicates ac tions of the archives toolbar. 4[...]

  • Seite 155

    155 Copyright © Acronis, Inc., 2000 - 2010 4. 2. 2.1 C rea ti ng a pe rs ona l v au lt To c re ate a p ers on al v au lt 1. In the Name field, ty pe a n ame for the vault being cre ated. 2. [Optional] In the Com ments field, add a description o f the v ault. 3. In the Path field, cli ck Change... In the opened Person al Vault Path window, specify [...]

  • Seite 156

    156 Copyright © Acronis, Inc., 2000 - 2010 To Do Validate an archive Click Validate . The Validation (p. 233 ) page will be opened with the pre-s elected archive as a source. Validation of an a rchive will check all the archive's backu ps. Export an a rchive Click Export . The Export (p. 240 ) page will be opened with the pre-select ed archiv[...]

  • Seite 157

    157 Copyright © Acronis, Inc., 2000 - 2010 Validate a backup Click Validate . The Validation (p. 233 ) page will be opened with the pre-s elected backup as a source. Validation of a fil e backup imitates recov ering of all files from the b ackup to a dummy destination. Valid ation of a d isk backup calculates a checksum for e very data block saved[...]

  • Seite 158

    158 Copyright © Acronis, Inc., 2000 - 2010 4 . 3 . 4 F i lt e r i n g a n d s o rt i n g a r c h i v e s The following is a guid eline for you to filter and s ort archi v es in the ar chives table. To Do Sort backup a rchives by any column Click the column's header to sort the archives in a scending order. Click it once again to sort th e arc[...]

  • Seite 159

    159 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aunched syste matically keeping t he critical data safely protected. The scheduler uses lo cal ti m e of the m achine t he ba[...]

  • Seite 160

    160 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last successful backup completed The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multiple conditions) is not met is defin ed by the Task start conditions (p. 107) backup option. What-ifs  What if an event o cc urs [...]

  • Seite 161

    161 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily s chedule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 day(s). 2. Once at: 06:00:0 0 PM . 3. Effective: From: not set . The t ask will be started on the current day, if it has been created b efo re 6PM. If you h[...]

  • Seite 162

    162 Copyright © Acronis, Inc., 2000 - 2010 task's recurrence s is 4 hours, and bet ween the third, fourth and fifth is 2 hours. In this case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM . 3. Effective: From: 09/20/2 0 09 . To: not set [...]

  • Seite 163

    163 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Friday a t 10PM, starting from a cer tain date (say 05/14/2009) and endin g after six months. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 we ek (s) on: Fr i . 2. Once at: 10:00:0 0 PM . 3. Effective: From: [...]

  • Seite 164

    164 Copyright © Acronis, Inc., 2000 - 2010  Thursday: every 3 h ours from 9 AM till 9 PM  Friday: twice at 1 2 PM and 9 PM (i.e. sa me as on Mon day)  Saturday: once at 9 PM  Sunday: once at 9 PM Combining the identical times, the following thr ee schedules can be add ed to the task: First schedule 1. Every: 1 week(s) on : Mon , Fri . [...]

  • Seite 165

    165 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run during the spec ified time interval. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be ru n 12 times from 10 AM to 10 PM during one day . In[...]

  • Seite 166

    166 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of Novemb er. By setting up this date we just define that the task must be discon tinued in 20 10, after autu m n end s in the northern hemispher e. Several monthl y schedules for one task In the case when the task needs to be run on differe[...]

  • Seite 167

    167 Copyright © Acronis, Inc., 2000 - 2010 Use Wake- On -LAN When this setting is enabled, Acronis Backup & Re covery 10 Management Ser ver will use the Wake- On -LAN (WOL) func tio nalit y to wake up t urned-off reg istered machines when a b ackup, cleanup or validation is sch eduled to start. If the backup task o n e ach machine starts with [...]

  • Seite 168

    168 Copyright © Acronis, Inc., 2000 - 2010 Then the time of th e task's first run on each machine m ay be an y time between 09:00:00 AM and 09:59:59 AM; the interval between the first and the second run is exac tly two hours — for instance: First machine: Ev ery day a t 09:30:03 AM and 11:30:03 AM Second machine : Every day at 09: 00:00 AM [...]

  • Seite 169

    169 Copyright © Acronis, Inc., 2000 - 2010 Examples "Bad block" eme r gency ba ckup One or more bad blo cks that have suddenly appeared o n a hard dis k u sually ind icate that the hard disk drive will so o n fail. Sup pose that you want to create a bac kup plan that will back up hard disk data as soon as such a situation occurs. When Wi[...]

  • Seite 170

    170 Copyright © Acronis, Inc., 2000 - 2010 2. In the list of events in the right pane, double-click the name of an event whose pr o perties you want to view. 3. In the Event Propert ies dialog box, view the event's pr operties such as the event source, shown in the Source field ; and the ev ent number, shown in th e Event ID field. When you a[...]

  • Seite 171

    171 Copyright © Acronis, Inc., 2000 - 2010 Example: It is required to run t he bac kup task after free space o n the managed machine is changed by at leas t 1 GB, but only if all users are logged off and more than 12 hours ha ve passed since the last backup . Set the schedule, conditions and the Task start cond i ti ons backup option as fo llo ws:[...]

  • Seite 172

    172 Copyright © Acronis, Inc., 2000 - 2010  Ta sk start conditi ons: Sk i p th e task executio n . As a result, (1) If 9:00 PM co mes and the loca tio n's h o st is a vailable, the backup task starts right on time. (2) If 9:00 PM co mes but the hos t is una v ailable at the moment, the backup task will start on the ne xt workday if the l o[...]

  • Seite 173

    173 Copyright © Acronis, Inc., 2000 - 2010  If the task start c onditions are Wait unt il the condition s are met and the Run the task anyway after check box is selected with, say, th e 1 Hour waiting time, the task (schedul ed to run at 3:00 PM) will star t at 4:0 0 PM — the t ime w hen the waiting period ends. 5 . 7 . 4 U s e r l o g ge d o[...]

  • Seite 174

    174 Copyright © Acronis, Inc., 2000 - 2010 6 Dir ec t ma nag em ent This section covers o perati o ns that can be performed directly on a m anag ed machin e by using the direct console-agent co nne ction. The content of this s ection is applicable to both stand-alo ne and advanced editions o f Acron is Backup & Recovery 10. 6. 1 Ad mi nist er [...]

  • Seite 175

    175 Copyright © Acronis, Inc., 2000 - 2010 licenses. Please make sure you h ave a valid license on Acroni s License Server. After a successful licen se check the agent will start working. Trial version of prod uct expires in X day (s) Please make sure you h ave a valid license on Acroni s License Server. Connect Once the trial version of the p rod[...]

  • Seite 176

    176 Copyright © Acronis, Inc., 2000 - 2010 H ow it i s d ete rmi ned Errors Highlight the date in red if at least one "Error" entry a ppeared in the log on t his date. Warnings Highlight the date in yellow if no "Error" entries appear ed and at least one "Warn ing" entry appeared in the l og on this date. Information [...]

  • Seite 177

    177 Copyright © Acronis, Inc., 2000 - 2010  In the backup tabl e, select the backup plan (task).  Use the toolbar's but to ns t o take an action on the selected plan (task ). See the Actio ns on bac kup plans and tasks (p. 1 8 0) section f or details. You can ru n, edit, stop and delete the creat ed plans and tasks.  Use the Informat[...]

  • Seite 178

    178 Copyright © Acronis, Inc., 2000 - 2010 A backup plan status is derived fr om the results of the last run of the plans' tasks. S tat us H ow it i s d ete rmi ned H ow to han dle 1 Error At least one task has failed. Otherwise, see 2 Identify the failed task s -> Check the tasks log t o find out the reason of the failure, t hen do one or[...]

  • Seite 179

    179 Copyright © Acronis, Inc., 2000 - 2010 Need interaction Any running task can put itself into the Need interact ion state when it needs human inter action such as changing m edia or ignoring a read error. The next state may be Stopping (if the us er chooses to stop the t ask) or Running ( on selecting Ig nore/Retry or an o ther actio n, such as[...]

  • Seite 180

    180 Copyright © Acronis, Inc., 2000 - 2010 centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to read th e warnings - > [optionally] Perform actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" No action is required. [...]

  • Seite 181

    181 Copyright © Acronis, Inc., 2000 - 2010 Run a plan/ta sk Backup plan Click Run . In the Run Backup Plan (p. 184 ) windo w, select the task you n eed to be run. Running the back up plan starts the selected task of th at plan immediately in spite of its schedu le and conditions. Why can't I run th e backup plan?  Do not have the appro pri[...]

  • Seite 182

    182 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 189 ), except for the following limitat ions : It is not always possible to u se all scheme options, when editing a backu p plan if the created archive is not e mpty (i.e. contains b ackups). 1. I[...]

  • Seite 183

    183 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks. Why can't I de lete the backup plan?  The backup plan is in t he "Running" state A backup plan cannot be deleted, if at least one of it s tasks is [...]

  • Seite 184

    184 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If req uired, you can hide the displayed c o lumns and show hid den ones. To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items th[...]

  • Seite 185

    185 Copyright © Acronis, Inc., 2000 - 2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Master boot record recov ery Recovery (disk to existing V M) Recovery of a disk/volum e backup to an existing virtual machine Recovery (disk to new VM) Rec[...]

  • Seite 186

    186 Copyright © Acronis, Inc., 2000 - 2010 Progress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progr ess, elapsed time and other para meters. Ba cku p pla n d et ai ls The Backup plan de tails window (also duplicated on the Information panel) aggr egat[...]

  • Seite 187

    187 Copyright © Acronis, Inc., 2000 - 2010  Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule.  Backup options - backup options changed against the default values. 6 . 1 . 3 Log The Log stores th e history of operations performed b y Acronis Bac kup & Recovery 10 on the mach[...]

  • Seite 188

    188 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry . 2. Do one of the follow ing  Click View Details . Th e log entry's details will be displayed in a separat e window.  Expand th e Information panel, by clicking the chevron. Save the selected log entries to a file 1. Select a single lo g entry[...]

  • Seite 189

    189 Copyright © Acronis, Inc., 2000 - 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context m enu. The menu items that are tic ked off [...]

  • Seite 190

    190 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g ste ps . General Plan name [Optional] Enter a uniq ue name for the backup plan. A conscious name lets y ou identify the plan among others. Plan's credentials (p. 192) [Optional] The backup plan will run on behalf of th e user who is creating [...]

  • Seite 191

    191 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 201) [Optional] Provide credentials for the location if the pl an account does not have a ccess permissions to the l ocation. To access this opti o n, sele ct the Advanced v i ew check box. Archive comments [Optional] Enter c omments on the archive. To a ccess this opti o n, select [...]

  • Seite 192

    192 Copyright © Acronis, Inc., 2000 - 2010 Virtualization server (p. 212) Here you select the resulting virtual machine type and location. Available o ptions depend o n the host you selec te d in the pre vious step. Storage (p. 212) Choose the storage o n the virtualization server or the folder to place th e virtual machine files in. Resultant VMs[...]

  • Seite 193

    193 Copyright © Acronis, Inc., 2000 - 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed. Select this option to back up specific files and folders. If you are not conc erned about recovery of the op erating system along with all the settings and applications, but pla n to keep safe only [...]

  • Seite 194

    194 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the ma c hine goes into hibernation (hiberfil.s ys) are not backed up. After rec overy, the files will be re-cre ate d in the appropriate place with the zero size. A volume backup s to res all o ther files and f olders of t[...]

  • Seite 195

    195 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 6 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, you may not want database, hidden and syste m files and folders, as well as files with specific extensions, t o be stored in the archiv e. To s pec if y w hi ch f il es a nd fol de rs [...]

  • Seite 196

    196 Copyright © Acronis, Inc., 2000 - 2010 By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes the file nam[...]

  • Seite 197

    197 Copyright © Acronis, Inc., 2000 - 2010  To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you select. While you are revi[...]

  • Seite 198

    198 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 201) to the arc hive name. If you do not select the Name ba c kup files us ing the archive name. .. check box:  Each backup will hav e a unique file name with th e exact time stamp and the backup type; for example: MyData_ 2010_03_26_1[...]

  • Seite 199

    199 Copyright © Acronis, Inc., 2000 - 2010  Your script can m o ve older backups based on the date stamp. See also “The *Dat e+ variable” (p. 201 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hi n a da y Consider the follo wing scenario:  You want to perfor m hourl y backups of your server's c ritical files every day.  You want the [...]

  • Seite 200

    200 Copyright © Acronis, Inc., 2000 - 2010  You want to swap th e drive s each Monday, so that on e drive contains backups of the curr ent week (Monda y through Sund ay), and the other dri ve those of the previous wee k. In this scenario, y ou need to create two backup plans as foll o ws: a) When creating the first bac kup plan, specify MyMachi[...]

  • Seite 201

    201 Copyright © Acronis, Inc., 2000 - 2010 6. 2. 8.2 T he [D AT E] va ri ab le If you specify the [DATE] variable in the arch ive name, the file name of each backup will include that backup’s cre ation da te. When using this variable, th e first backup o f a ne w day will b e a full backup. Before crea ting the next full backup, the sof tware de[...]

  • Seite 202

    202 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the source data usi ng the cre dentials of the backup plan account specified in the Gen eral section.  Use the followin g creden tials The program will ac cess the source data usin g the credentials you specify. U se this option if the plan account d o es not have access permis[...]

  • Seite 203

    203 Copyright © Acronis, Inc., 2000 - 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 30 ). 6. 2. 10. 2 Ba ck u p la t er s ch eme With the Back up later scheme, the backup will b e performed only once, at the date and time you specify. Specify the appropria te settings as follows B[...]

  • Seite 204

    204 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups. Monthly backups run every fourth Frida y, and weekly backups run on all other Friday[...]

  • Seite 205

    205 Copyright © Acronis, Inc., 2000 - 2010  Keep monthly ba ckups indefinitely. Backup scheme para meters can then be s et up as foll o ws.  Start backup at: 11: 00 PM  Back up on: All days  Weekly/monthly : Saturday (for example)  Keep backups:  Daily: 1 week  Weekly: 1 month  Monthly: indefinite ly As a result, an archi v[...]

  • Seite 206

    206 Copyright © Acronis, Inc., 2000 - 2010  Have a weekly su mmary of file changes since las t month (Friday weekly diff erential backup).  Have a monthly ful l backup of your files. Moreover, assu m e that yo u w ant to r etain access t o all backup s, including the daily ones, f or at least six months. The following GFS sche me suits such [...]

  • Seite 207

    207 Copyright © Acronis, Inc., 2000 - 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p. 160 ), weekly (p. 162 ), or monthly (p . 164 ) schedule. Setting u p schedule parameters allow s creating simple schedule s (example of a simple daily schedule: a backup task will be run every 1[...]

  • Seite 208

    208 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an go ba ck Ro ll- bac k pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level d oubles the full backup and roll-back peri[...]

  • Seite 209

    209 Copyright © Acronis, Inc., 2000 - 2010 Incremental Specifies on what schedule and un der which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full b ackup is created instead of the in cremental backup . Differential Specifies on what schedule an d under which cond itions to per[...]

  • Seite 210

    210 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche me yields a full backup performed every Friday night. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param et ers excep t Schedu l e in Full ba c kup a re left e mpty. All backups i n the archive are kept indefinitely (no archi ve clea[...]

  • Seite 211

    211 Copyright © Acronis, Inc., 2000 - 2010 Finally, we create r etention rules for the archiv e: let us retain only backups that are no older than six months, and let the cleanup be performed after ea ch backup task and also on th e last day of ever y month. Retention rules : Delete ba ckups o lde r than 6 months Apply the rule s : After ba cking [...]

  • Seite 212

    212 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 1 1 A r c h i v e v al i da t i o n Set up the validati o n task to check if the bac ked up data is recoverabl e. If t he bac kup could not pass the validation su ccessfully, the valida tion task fails and the bac kup plan gets the Error status. To set up validati o n, specif y the following param[...]

  • Seite 213

    213 Copyright © Acronis, Inc., 2000 - 2010 Which agent is installed on the host? The resulting virtual machine type and location depen d on the agent that resides o n the sele cte d host.  Agent for Windo ws is installed on th e host You have a choi ce of virtual machine types: VMware Workstati on, Microsoft Virtual PC, or Parallels Workstation[...]

  • Seite 214

    214 Copyright © Acronis, Inc., 2000 - 2010 If the managed machin e's operating system fails to start or you ne ed to r ecove r data to bare metal , boot the machin e from the bootable media (p. 391) or using Acronis Startup Recover y Manager (p. 48 ). Then, creat e a recovery task. Acronis Universal Re store ( p. 49 ) lets y o u recover and b[...]

  • Seite 215

    215 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 218) [Optional] Provide credentials for the archive lo cation if the task a cco unt do es not have the right to access it. To access this option, select th e Adva nced view check box. Where to recover This section appears aft er the required backup is sel ected and the type of data [...]

  • Seite 216

    216 Copyright © Acronis, Inc., 2000 - 2010 After any of the settings is cha nged against the default value, a ne w line that displays the newly set value appears. T he setting status changes from Default to Custom . Should y ou modify the settin g again, the lin e will disp lay the new value unless th e new value is the default one. When the defau[...]

  • Seite 217

    217 Copyright © Acronis, Inc., 2000 - 2010 If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first o ne when the p rogram prompts.  If the archive is st o red on a network share, expand the Net w ork folder s group, th en select the required netw o rked mach[...]

  • Seite 218

    218 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 4.1 D isk s/ vo lu m es sel ect io n To s el ect a b ac ku p an d dis ks/ vol ume s to re cov er : 1. Select one of the su cces sive backup s by its creation date and ti me. Thus, you can revert th e disk data to a certain moment in tim e. Specify the items to recover. By default, all it ems of the [...]

  • Seite 219

    219 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the location using t he creden tials you specify. Use this op tio n if the task account does no t have access permissions to the l o cation. Y o u might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault. Specify:  User name . When ent ering t[...]

  • Seite 220

    220 Copyright © Acronis, Inc., 2000 - 2010 Disk #: Disk # (MODEL ) (p. 222 ) Select the destinati on disk for each of the source disk s. NT signature (p. 22 0 ) Select the way the r ecovered disk's signature w ill be h andled. The disk signature i s used by Windows and the Lin ux kernel version 2.6 and later. D isk d es tin at ion To s pec if[...]

  • Seite 221

    221 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 6.2 Vo lu me s Available volume destinations depend on the agents operating on the machin e. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows or Agent for Linux is installed. The selected volu mes will be recovered to the physical disks of the ma[...]

  • Seite 222

    222 Copyright © Acronis, Inc., 2000 - 2010 M BR de s tin at io n To s pec if y a de s ti na tio n dis k: 1. Select the disk t o recover t he MBR to. 2. Click OK . Vo lu me de st in at ion To s pec if y a de s ti na tio n v ol um e: 1. Select a volume o r unall o cated space w here y ou want the selected volu me to be recovered to. The destination [...]

  • Seite 223

    223 Copyright © Acronis, Inc., 2000 - 2010 set as active. If you recover a sys tem volume to anoth er hard disk with its own volumes and operating system , you will most likely need only the data. In this case, you can r ecover the volume as logical to access the data only. File system Change the volu m e file syst em , if required . By default, t[...]

  • Seite 224

    224 Copyright © Acronis, Inc., 2000 - 2010 Storage Initial settin g : the default s to rage of the v irtualizati on server if the new machin e is creat ed on the virtualization ser v er. Other wise the current user's documents fo lder. This is the place wher e the new virtual machin e will be creat ed. Whether you can chan ge the storage on t[...]

  • Seite 225

    225 Copyright © Acronis, Inc., 2000 - 2010 Re co ver y ex cl u sio ns Set up exclusions fo r the sp ecific files you do not wish to recover. Use the Add , Edit , Remove and Remove All buttons t o create t he list o f file ma sks. Files whose names match any of the masks will be skipped du ring recovery. You can use one or more wildcard characters [...]

  • Seite 226

    226 Copyright © Acronis, Inc., 2000 - 2010  Do not overwrite ex isting file - this will give the fil e on the hard disk priority o ver the file in the backup. If you allow files to be overwritten, you still have an op tion to prevent over writing of specific files by excluding (p. 225) the m from the recovery o peration. 6 . 3 . 7 A c c e s s c[...]

  • Seite 227

    227 Copyright © Acronis, Inc., 2000 - 2010 DVD supplied by th e hardware vendor o r downl o ad th e drivers from the v endor’s Web site. The driver files sh ould have the *.inf, *.s ys or *.oem extensions. If you d ownload the drivers in the *. exe, *.cab or *.zip forma t, extract them using a third-party application, such as WinRA R (http://www[...]

  • Seite 228

    228 Copyright © Acronis, Inc., 2000 - 2010 Drivers for a virtual m achine When recovering a system to a new virtual machin e, the Univer sal Restore technology is appli ed in the background, becaus e the program knows what drivers are required for th e sup ported virtual machines. When recovering th e system to an existing virtual m achi ne that u[...]

  • Seite 229

    229 Copyright © Acronis, Inc., 2000 - 2010 8. [Optionally] Re view the Virtua l machine settin gs (p. 223 ) and m ake changes if necessary. Here you can change the path to the ne w virtual machine. The same type o f machines with the sam e name cannot be created in the same folder. Change either the VM name, or the path if you get an error message[...]

  • Seite 230

    230 Copyright © Acronis, Inc., 2000 - 2010  Windows was r ecovered to a dynamic volume that cannot be boota ble Solution : Reco v er Windo ws to a basic, simple or mirr ored volume.  A system volume w as rec overed to a disk t hat do es not ha v e an MBR When you configure r ecovery of a system volu me to a disk that does not have an MBR, th[...]

  • Seite 231

    231 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 11. 1 Ho w to r ea ct iva te GRU B an d ch ang e its c on f igu ra ti on Generally, you sh o uld refer t o the boot l oader manual pages for the appr opriate procedure. Ther e is also the corresp o nding Knowledge Ba se article on the Acronis Web site. The following is an e xample of how to reactiva[...]

  • Seite 232

    232 Copyright © Acronis, Inc., 2000 - 2010 root (hd0,0 ) 10. Install GRUB. For example, to install GRUB in the master boot rec o rd (MBR) of the first disk, run the following com m and: setup (hd0) 11. Exit the GRUB shell: quit 12. Unmount the mounted file systems and then reboot: umount /mnt/system/ dev/ umount /mnt/system/ p roc/ umount /mnt/sys[...]

  • Seite 233

    233 Copyright © Acronis, Inc., 2000 - 2010 Before using the re co vered storage nod e, follow these st eps:  If you have reco v ered the s to rage node o n the sa me machine and no centraliz ed vaults managed by the storage n o de have b een added or removed bet ween the backup and reco very, do nothing.  Otherwise, do th e fo llo wing: 1. C[...]

  • Seite 234

    234 Copyright © Acronis, Inc., 2000 - 2010 [Optional] The valida tion task will run on behalf o f the user who is creating the tas k. Yo u can change the task credentia ls if necessary. To acc ess this option, select the Advanced v iew check box. What to validate Validate Choose an object t o validat e: Archive (p. 234 ) - in tha t case, you need [...]

  • Seite 235

    235 Copyright © Acronis, Inc., 2000 - 2010  If the archive is st o red in A cronis Online Backup S torage, click Log in and specify the credentials to log in to the online storage. Then expan d the Online backup storag e group and select the acc o unt. Exporting and mounting are not supported for ba ckups stored in Acronis Online Ba ckup Storag[...]

  • Seite 236

    236 Copyright © Acronis, Inc., 2000 - 2010 The bottom part o f the win do w displa y s the sel ecte d backup cont ent, assisting you to find the right backup. 2. Click OK . 6 . 4 . 4 L o c a t i o n s el ec t i o n To s el ect a l oca ti on Enter the full path to the l ocation in the Path fi eld or select the desired l ocation in the folders tree [...]

  • Seite 237

    237 Copyright © Acronis, Inc., 2000 - 2010 According to t he original FTP specification , credentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that th e user name and password can be intercepted by an eavesdropper using a p acket sniffer. 6 . 4 . 6 W h e n t o v a l i d a t e As validation is [...]

  • Seite 238

    238 Copyright © Acronis, Inc., 2000 - 2010 Backup (p. 239) Select the backup. Access credentials (p. 239) [Optional] Provide credentials for the archive locati on. To access this option, sele ct the Advanced vie w check box. Mount settings Volumes (p. 239 ) Select volumes t o mount an d configure the m ount settin gs fo r every volume: assign a le[...]

  • Seite 239

    239 Copyright © Acronis, Inc., 2000 - 2010  If the archive is st o red on a lo cally at tached tape devic e, ex pand the Tape drives g ro up, then click the required d evice. When operating o n a mach ine booted with bootable media :  To access a managed vault, type the following string in the Path fi eld: bsp://node_ad dress/vault_name/ [...]

  • Seite 240

    240 Copyright © Acronis, Inc., 2000 - 2010 2. Click on the sele cted volume t o set its moun ting paramet ers.  Access mode - ch oose the mode y ou want the v olum e to be mounted in :  Read only - enables e xploring and opening files within the backup without co mmitting any changes.  Read/write - with thi s mode, the program assume s t [...]

  • Seite 241

    241 Copyright © Acronis, Inc., 2000 - 2010  an entire vault that c an be exported by using the com m and line int erface. For more infor m ation, please refer to A cro nis Bac kup & Recovery 10 Comma nd Line Reference. Usage scenarios Export enables y o u to separate a specific backup from a chain o f incremen tal backups for fast recovery,[...]

  • Seite 242

    242 Copyright © Acronis, Inc., 2000 - 2010  export from a mana ged vault . The exp o rt is perf o rme d by the st o rage node that manages the vault. The destina tio n can be a network share or a loc al fo lder of the storage nod e.  export from an unman aged centralized vault . The ex port is performed by the ag ent installed on the managed[...]

  • Seite 243

    243 Copyright © Acronis, Inc., 2000 - 2010 Where to export Archive (p. 245) Enter the path to the location where th e new archive will be creat ed. Be sure to provide a distinct name and comment f or the new archive. Access credentials (p. 246) [Optional] Provide credentials for the destination if th e task credentials do not h ave enough privileg[...]

  • Seite 244

    244 Copyright © Acronis, Inc., 2000 - 2010  If the archive is st o red in a l ocal folder on the machine, e xpand the Local folders g roup and click the required f o lder. If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first o ne wh en the program promp t[...]

  • Seite 245

    245 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the f o llowing:  Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section.  Use the followin g creden tials The program will ac cess the location using t he creden tia[...]

  • Seite 246

    246 Copyright © Acronis, Inc., 2000 - 2010 According to the original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that th e user name and password can be intercepted by an eavesdropper using a p acket sniffer.  To export data t o a locally attached tape devic e, [...]

  • Seite 247

    247 Copyright © Acronis, Inc., 2000 - 2010  User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain)  Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, crede ntials required for access to FTP ser[...]

  • Seite 248

    248 Copyright © Acronis, Inc., 2000 - 2010 To a llo ca te s pa ce for A c ron is Se cur e Zon e 1. Choose a hard disk (if several) on which to creat e the zone. The unallocated spa c e is selected by default. The progra m displays the total space a vailable for the Acronis Secure Zone. 2. If you need to all ocate mor e space for t he zone, you can[...]

  • Seite 249

    249 Copyright © Acronis, Inc., 2000 - 2010  If there is no or not e nough unallocated space at the e nd of t he disk, bu t there is unallocated space between volu mes, the volumes will be moved to add more unall ocated space t o the end.  When all unallocated space is collected but it is still not enough, the program will take free space fro[...]

  • Seite 250

    250 Copyright © Acronis, Inc., 2000 - 2010  If there is not en o ugh unall o cated space , t he progra m will take free space fr om the selected volumes, prop o rtionally r educing the volumes' size. Resizing of l o cked partiti ons requires a reboot. Reducing a system volume to the minimum size might prevent the machine 's operating [...]

  • Seite 251

    251 Copyright © Acronis, Inc., 2000 - 2010 Under Linux, when usin g a boot loader other than GR UB (such as LILO), consider installing it to a Linux root (or boot) partition boot record instead of the MBR bef o re acti v ating A SRM. Ot h erwise, reconfigure the b o ot loade r m anually afte r the activation. Do not activate Disables boot tim e pr[...]

  • Seite 252

    252 Copyright © Acronis, Inc., 2000 - 2010 Advantages:  Using Acronis Backup & Recovery 10 in Windows Prei nstallation Environment pr o vides more functionality than usin g Linux-based bo o table medi a. Having bo o ted PC-co mpatible hardware into WinPE, you can us e not only Acronis Backup & Recovery 10 Agent, but als o PE co mmands a[...]

  • Seite 253

    253 Copyright © Acronis, Inc., 2000 - 2010 1. Download and install Win dows Automated Installati on Kit (WAIK). Automated Installa tion Kit (AIK) for Windows Vista (PE 2.0): http://www.micr o soft.c o m/Downloads/d etails.aspx?familyid=C7 D4BC6D-15F3-4284-9123- 679830D629F2&disp laylang=en Automated Installa tion Kit (AIK) for Windows Vista SP[...]

  • Seite 254

    254 Copyright © Acronis, Inc., 2000 - 2010  user name and pass wo rd t o be enter ed on the cons ole side at c o nnection t o the agent. If you leave these fields empty, the connection will b e enabled on typing any sy m bols i n the prompt window. 5. [optional] Network se tting s (p. 255):  TCP/IP settings t o be assign ed to the machine ne[...]

  • Seite 255

    255 Copyright © Acronis, Inc., 2000 - 2010 quiet Disables displaying o f startu p m essages when the Linux kernel is loading, and starts the management cons o le aft er the kernel is loaded. This parameter is i mplicitly specified when cr eating the bootable media, bu t you can remove this parameter while in th e boot menu. Without this para m ete[...]

  • Seite 256

    256 Copyright © Acronis, Inc., 2000 - 2010  IP address  Subnet mask  Gateway  DNS server  WINS server. Once the bootabl e agent st arts on a machine, the configuration is applied to t he machine’s network interface card (NIC.) If the settings have n o t been pre-configu red, the agent uses DHCP auto configuration. You also have th[...]

  • Seite 257

    257 Copyright © Acronis, Inc., 2000 - 2010 D riv er s f or Un ive rs al Res to re While creating bo o table media, you have an option t o add Windows drivers to th e media. The drivers will be used by Uni versal Restore when recovering Windows on a machine w ith a dissimilar processor, different motherboard or differen t mass st orage device than [...]

  • Seite 258

    258 Copyright © Acronis, Inc., 2000 - 2010 4. Specify path to the f o lder where the WinPE files are l ocated. 5. Specify network setting s (p. 255) for the machine n etwork adapters or choos e DHCP auto configuration. 6. Specify the full path to the resulting ISO file including the file na me. 7. Check your settin gs in the summary screen and cli[...]

  • Seite 259

    259 Copyright © Acronis, Inc., 2000 - 2010 controller, network adapter, tape drive or other de vice. You will have to repea t this procedure for each driver y ou want to be inclu ded in the resulting WinPE boot media. 6. Choose whether you want to cr eate ISO or WIM image or up lo ad th e media on A cro nis PXE Server. 7. Specify the full path to [...]

  • Seite 260

    260 Copyright © Acronis, Inc., 2000 - 2010 Once the machine b oots into the Bart PE and y ou conf igure the network connection, sel ect Go - > System -> Storage - > Acron is Backup & Recovery 10 t o start. 6 . 1 0 . 2 C o n n e c t i n g t o a m ac h i n e b o o t e d f r om m e d i a Once a machine bo o ts from b o otable m edia, the[...]

  • Seite 261

    261 Copyright © Acronis, Inc., 2000 - 2010 6. 10. 3. 1 S ett in g up a di sp lay m ode For a machine bo o ted from m edia, a disp lay video mode is detect ed automatically based on th e hardware configuration (monitor and graphics card specifications). If, for some reason, th e video mode is detected inc orrectly, do the foll owing: 1. In the boot[...]

  • Seite 262

    262 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 0 . 4 L i s t o f c o m ma n d s an d u t i l i t i es a v ai l a b l e i n L i n u x - ba s e d b o o t a b l e m e d i a Linux-based bootabl e media contains the foll owing command s and command lin e utilities, which you can use when runnin g a command shell. To start the command sh ell, press CT[...]

  • Seite 263

    263 Copyright © Acronis, Inc., 2000 - 2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 . 1 0 . 5 R e c o v e r i n g M D de v i c e s a n d l o g i c a l v o l u m e s To recover MD d ev ices, known as Linux Software RAID, and/ o r devic es created by Logical [...]

  • Seite 264

    264 Copyright © Acronis, Inc., 2000 - 2010 To c re ate t he vo lu me st ruc tu re by us ing a sc ri pt 1. Boot the machine fr om a Linux-based bootable medi a. 2. Click Acronis Bo otable Agent . Then, click Run man agement c onsole . 3. On the toolbar, cli ck Ac tion s , and then click Sta r t shell . Alterna tively, you can press CTRL+ALT+F2. 4. [...]

  • Seite 265

    265 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that you pre vio usly perf ormed a disk backup of a machine with the following disk configuration:  The machine has two 1-gigabyte and tw o 2-gigab y te SCSI hard disks, mounted on /dev/sda , /dev/sdb , /dev/ sdc , and /dev/sdd , r espectively.  The first and second pairs of hard dis[...]

  • Seite 266

    266 Copyright © Acronis, Inc., 2000 - 2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk7W- yDG3 -uF1l-Q2AL-C0z0- vMeACu 5. Run the following c omman d to create the logical volu me; in the -L para meter, sp ecify the size given by VG Size : lvm lvcreate -L1.99G -- n[...]

  • Seite 267

    267 Copyright © Acronis, Inc., 2000 - 2010 2. Use the -- mount c ommand, specifying the volume's index in the -i param et er. For e xampl e: trueimagemnt -- mount / mnt -- filename smb://server/backups/linu x_machine.tib - i 4 This command mounts the logical volume DYN1, whose in dex in the backup is 4, on the mount point /mnt. To u nmo un t [...]

  • Seite 268

    268 Copyright © Acronis, Inc., 2000 - 2010 On a machine tha t has an operating sy ste m on the har d disk, the BIOS must be c onfigured so that the network interfac e card is ei ther the first boot device, or a t least pri o r to the Hard Drive device. The example below sho ws one of reasonable BIOS configu rations. If you don’t insert bootable [...]

  • Seite 269

    269 Copyright © Acronis, Inc., 2000 - 2010 Sometimes after the volume has been backed up and its image placed into a safe sto rage, the machine disk c onfiguration might chang e due to a HDD replace m ent or hard ware loss. In such case with the help of Acr onis Disk Director Lite, the us er has the possibility t o recreat e the necessar y disk co[...]

  • Seite 270

    270 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 3 C h o o s i n g t h e o p e r at i n g s y s t e m f o r d i s k ma n a g e me n t On a machine with t wo o r mo re o perating syst ems, representation o f disks and volumes depends o n which operating sy stem is currently running. A volume may ha v e a differ ent letter in different Wind ows [...]

  • Seite 271

    271 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 5 D i s k o p e r a t i o n s Acronis Disk Dire ctor L ite i ncludes the following operations that can be perf o rm ed on disks:  Disk Initialization (p. 271 ) - initializes the new hardwar e added to the system  Basic disk cloning (p. 272 ) - transfers complete da ta from the so urce basi[...]

  • Seite 272

    272 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 5. 2 Ba sic d isk c lo nin g Sometimes it is n ecessary to transfer all the disk data onto a new disk. I t can be a case of expandin g the system v olume, startin g a new system layout or disk e vacuation due to a hardware fau lt. In any case, the reason for the Clone basic disk operation can be su[...]

  • Seite 273

    273 Copyright © Acronis, Inc., 2000 - 2010 volumes, then the C lone b asic disk operation will be i m possible and the user will not be able to continue. If you are about to clone a disk co m prising o f a system vo lume , pay attention to the Advan c ed options . By clicking Finish , you'll ad d the pending op eration of the disk cloning. (T[...]

  • Seite 274

    274 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 5. 3 D isk c on v ers io n: MB R t o GP T You would want to co nvert an MBR basic disk to a GPT basic disk in the f o llowing cases:  If you need m ore than 4 primary volumes on one disk.  If you need additi o nal disk reliability against any possi ble data damage. If y ou ne ed to co nve rt [...]

  • Seite 275

    275 Copyright © Acronis, Inc., 2000 - 2010 (To finish the added o perat ion you will have to commit (p. 283) it. Exitin g the program without committing the pending operations will effec tively cancel them.) 6. 11. 5. 5 D isk c on v ers io n: ba si c t o dy nam ic You would want to co nvert a basic di sk to dynamic in the foll owing cases:  If [...]

  • Seite 276

    276 Copyright © Acronis, Inc., 2000 - 2010 dynamic disks (all volume types excep t Simple volumes), then you will be warn ed here about the possible damage to t he dat a invo lved in the conversion. Please note, t he operation is unavailable for a dynamic disk containin g Spanned, Striped, or RAID - 5 volumes. 3. If you click OK in this warning wi[...]

  • Seite 277

    277 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 6 V o l u m e o p e r a t i o n s Acronis Disk Dire ctor L ite i ncludes the following oper ations that can be perf ormed on volumes:  Create Volume (p. 2 77 ) - Creates a new volu me with the help of the Create Volume Wizard.  Delete Volume (p. 2 81 ) - Delete s t he sel ected volume. [...]

  • Seite 278

    278 Copyright © Acronis, Inc., 2000 - 2010 space available o n each dis k that you want to include i n the volume and the size of the volu me will depend on the size of the smallest space. Access to the data on a striped vol ume is usually faster than access t o the sa m e data o n a single physical disk, because the I/O is sp read across more tha[...]

  • Seite 279

    279 Copyright © Acronis, Inc., 2000 - 2010  RAID-5 You will obtain a brief description of every type o f volume for better understandin g o f the advantages and limit ations of each possible v olume ar chitecture. If the current ope rating system, installed on t his machine, does not suppo rt the selected type of volume , you will receive the a[...]

  • Seite 280

    280 Copyright © Acronis, Inc., 2000 - 2010 The maximum value normally includes the m ost possib le unallocated space. But in some cases the possible unallocat ed space and the proposed ma ximum volume size might differ (e.g. when the size of one mirror es tablishes the size of the other mirror, or the last 8Mb o f the disk space is reserved for th[...]

  • Seite 281

    281 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 2 D ele te vo lu me This version of Ac r onis Disk Director Lite has reduced functionality because it is ma inly a tool for preparing bare-metal systems for recovering p r eviousl y s aved volum e images. The features of re sizing the existing volume s and cr eating the new volumes, using fr ee [...]

  • Seite 282

    282 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 4 C han ge v olu me l ett er Windows operating systems assign letters (C:, D : , etc) to hard dis k volumes at startup. These l etters are used by applicati ons and operating systems t o locate files and fold ers in the volumes. Connecting an add itio nal di sk, as well as creating or deleting a[...]

  • Seite 283

    283 Copyright © Acronis, Inc., 2000 - 2010  to save additional space which is being lost due to the cluster size on the FA T16 or FAT32 file systems  as a quick and m ore or less reliab le way of destr oy ing data, residing in this volume If y ou wa nt to fo rm at a vo lum e: 1. Select a volume to format. 2. Right-click on the se lected volu[...]

  • Seite 284

    284 Copyright © Acronis, Inc., 2000 - 2010 Quitting Acronis Dis k Director Lite with o ut commi tt ing the pending operations effectively cancels them, so if you try to exit Disk management without committing t he pend ing operations, you will receive the appr opriate warning. 6. 12 C ol le cti ng sys tem i nfo rm ati on The system infor mation co[...]

  • Seite 285

    285 Copyright © Acronis, Inc., 2000 - 2010 7 C ent ra li zed ma na ge me nt This section covers o perati o ns that can be performed centrally by usin g the components for centralized manage ment. The content of this se ctio n i s only applicable t o advanc ed editions of Acronis Backup & Rec overy 10. 7. 1 Ad mi nist er in g Ac ro nis B ac kup[...]

  • Seite 286

    28 6 Copyright © Acronis, Inc., 2000 - 2010 Vaults with low free space : X View vaults The alert is displayed if at lea st one centralized vault has less than 10% free space. View vaults will take you to t he Centralized vaults (p . 123 ) view where you ca n examine the vault size, free space, con tent and tak e the necessary steps to increase the[...]

  • Seite 287

    287 Copyright © Acronis, Inc., 2000 - 2010 Statistics for the s elected date are displayed t o t he rig ht of the chart. All the sta tistics fields are interactive, i.e. if yo u click any field, the Log view will be open ed with the log entries pre-filt ered by this field. At the top of the char t, you can select the activi ties to display dependi[...]

  • Seite 288

    288 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 2.1 Ba cku p pol ic y dep lo ym en t sta te s A backup policy depl oyment state is a combination of t he policy depl oyment state s on all machines the policy is appli ed to. For example, if the polic y is app lied to three m achines and has the "Deploying" stat e on the 1st machine, the &[...]

  • Seite 289

    289 Copyright © Acronis, Inc., 2000 - 2010 In the Log view, apply the Error filter i f there are too many log e ntries. You can also sort the "e rror" entries by backu p plans, managed entities o r machines. 2. Once the reason o f the fail ure is clear, do one or more of t he foll owing:  Remove the reason o f the f ailure. After that[...]

  • Seite 290

    290 Copyright © Acronis, Inc., 2000 - 2010 Edit a policy Click Edit . Editing policies is perfor med in the same way a s creating (p . 346 ). Once the policy i s edited, the management s erver updates the policy on a ll machines the policy was deployed to. Delete a policy Click Delete . As a result, the policy will b e revoked from the mach ines i[...]

  • Seite 291

    291 Copyright © Acronis, Inc., 2000 - 2010 To Do Sort backup p olicies by any column Click the column's header to sort the back up policies in ascending ord er. Click it once again to sort the backup p olicies in descending order. Filter backup policies by name/owner Type a policy's name / owner 's name in the fields be low the corr[...]

  • Seite 292

    292 Copyright © Acronis, Inc., 2000 - 2010 Actions To Do View details of the machine (group). Click View details . In the Machine d etails (p . 299 )/ Group d etails (p. 309) wind ow, examine all information on the selected machine (or the selected grou p). View tasks of the machine (group). Click View tasks . The Tasks (p. 318) view will display [...]

  • Seite 293

    293 Copyright © Acronis, Inc., 2000 - 2010 Custom groups - g ro ups created ma nually by th e management server administra to r.  Static groups Static groups contain machines manually added t o the gro up by the ad ministrator. A static member re mains in the grou p until the administrator removes the member from the group or deletes the corres[...]

  • Seite 294

    294 Copyright © Acronis, Inc., 2000 - 2010 To Do Add a new machine to th e management server Click Add a m achine to AMS . In the Add m achine (p. 296 ) window, se lect the machine th at needs to be added to the man agement server. Import machines from Active Directory Click Impor t machines from Active Directory . In the Impo rt machines from Act[...]

  • Seite 295

    295 Copyright © Acronis, Inc., 2000 - 2010 The backup policies ap plied to the group the machine is now a member of will be deployed to th e machine. Remove a machine fro m the current static group Click Remove fr om group . The backup policies applied to the group will be re voked from the machine automatically. Deleting the selected machine from[...]

  • Seite 296

    296 Copyright © Acronis, Inc., 2000 - 2010 Refresh a list of machine s Click Refresh . The management con sole will update the li st of machines fro m the management server with th e most recent information . Though the list of machines is refreshed auto matically based on events, t he data may not b e retrieved immediately from t he management se[...]

  • Seite 297

    297 Copyright © Acronis, Inc., 2000 - 2010 3. In the Search for field, t ype the machine's (or the orga nizational unit) name, then click Search . You can use the ast erisk (*) to substitute for zer o or m o re charact ers in a machine (or an organizational unit ) name. The left part of the window displays the machine ( o r org anizational un[...]

  • Seite 298

    298 Copyright © Acronis, Inc., 2000 - 2010 2. Click Synchroni ze machines with text file on the toolb ar. 3. In the Path field, ent er the path to a .txt or .cs v file c ontaining the list of machine s, o r click Browse and select the file in t he Browse wind o w. 4. Under Logon set tings , specify the user name and password of a user who is a m e[...]

  • Seite 299

    299 Copyright © Acronis, Inc., 2000 - 2010 The machine being add ed becomes a member o f mor e than one group. As a resu lt, the backup policies applied t o the first group will remain o n the machine, and the backup policies app lied to the second, third, etc. g roup will be deployed to the machine. M ovi ng a ma ch in e t o an ot he r g ro up To[...]

  • Seite 300

    300 Copyright © Acronis, Inc., 2000 - 2010  Offline - the machin e is unavailable f o r the m anage ment server: it i s turned off, o r its network cable is unplu gged.  Unknown - this sta tus is displayed until the first c onnection between the manag ement server and the machine is established after adding the m achi ne or starting the mana[...]

  • Seite 301

    301 Copyright © Acronis, Inc., 2000 - 2010 Filtering and so r ting Filtering and sortin g o f the backup policies is performed in the sa me way as for the Backup po licies view. See the Filt ering and sorting backup policies (p. 290) secti on for details. Plans and tasks Displays a list of the plan s (both local and centrali zed) and tasks ex isti[...]

  • Seite 302

    302 Copyright © Acronis, Inc., 2000 - 2010 Stop a plan/ta sk Backup plan Click Stop . Stopping the ru nning backup plan stops all its task s. Thus, all the task op erations will be aborted. Task Click Stop . What will happen if I stop the task? Generally, stopping t he task aborts its operation (backu p, recovery, validation, exporting, conversion[...]

  • Seite 303

    303 Copyright © Acronis, Inc., 2000 - 2010 Only tasks that d o not belong to a backup plan, such as a recovery task, can be modified by d irect editing. When you need to mod ify a task belonging to a local backup p lan, edit the backup plan . A task belonging to a centralized backup plan can be modified by editing th e centralized policy that spaw[...]

  • Seite 304

    304 Copyright © Acronis, Inc., 2000 - 2010 Refresh table Click Refresh . The management con sole will update the list of back up plans and tasks existing on the machine with th e most recent information . Thou gh the list is refreshed automatically based on events, the data may no t be retrieved immediately from the managed machine, du e to some l[...]

  • Seite 305

    305 Copyright © Acronis, Inc., 2000 - 2010 Group1 in the root c o ntain s Group2 to which the policy is applied directl y. Group 2 , in turn, contains child Group3 that inherit s the policy from the par ent and appli es the policy to Machin e1 respectively. The machine (or gr oup) to which the policy was app lied directly is boldfaced and marked w[...]

  • Seite 306

    306 Copyright © Acronis, Inc., 2000 - 2010 View detailed information on a group Click View details . In the Gro up details (p. 309 ) window, exam ine information on t he selected group. Rename a custom group/subgroup Click Renam e . In the Name column, type a new name for th e selected group . Built-in groups cannot be renamed. Edit a custom group[...]

  • Seite 307

    307 Copyright © Acronis, Inc., 2000 - 2010 All the machines that ar e listed in the specified .tx t or .csv file will be m embers of the dynamic group. 3. In the Comments fi eld, ent er a description of the created group . 4. Click OK . Adding multiple criteria Adding multiple crit eria forms a condition accordin g to the following rules: a) All t[...]

  • Seite 308

    308 Copyright © Acronis, Inc., 2000 - 2010 L ist ed i n tx t/ cs v fi le cr it eri on When you use this cri terion, the dynamic group w ill i nclude machines from the list given in the specified .txt or .cs v file. If you later modify the file, the contents of the gr oup will change accordingly. The file is checked every 15 minut es. If you later [...]

  • Seite 309

    309 Copyright © Acronis, Inc., 2000 - 2010 Gr ou p det ai ls Aggregates in tw o t abs all i nformation on the select ed group. Allows perfor ming operati ons with the policies applied t o the grou p. This information is al so duplicated in the Information panel. Group Displays the foll owing information on the group:  Name - name of the s elect[...]

  • Seite 310

    310 Copyright © Acronis, Inc., 2000 - 2010 The policy that is dir ectly applied to the group is disp layed as follows: Group name The following exa m ple illus trates how the policy that i s applied o n the gr o up throug h inheritance is displayed. Group1 > Group2 > Group 3 Group1 in the root c o ntain s Group2 to which the policy is applie[...]

  • Seite 311

    311 Copyright © Acronis, Inc., 2000 - 2010 2. Acronis Backup & Rec overy 10 Agent for ESX/ES Xi is de livered as a virtual applianc e. Do either of the following:  Deploy the agent (p. 312 ) to the ESX / ESXi ser v er or  Install and configure t he ag ent manually as describ ed in "Installing ESX / ESXi virtu al appliance"  [...]

  • Seite 312

    312 Copyright © Acronis, Inc., 2000 - 2010 You can create b o th static and dynamic groups of virtual machin es. Any virtual machine that is currently available can be added to a static gr oup. You cannot create groups that contain both physical and virtual machin es. The dynamic membe rship criteria for virtual machines are as follows:  Virtua[...]

  • Seite 313

    313 Copyright © Acronis, Inc., 2000 - 2010 management ser v er and you will be abl e to apply backup policies to the v irtual machines or back up each machine individu ally. The update of already installed agents is perf o rmed in the sa me way as deploymen t. Upo n selecting a host or cluster where the agent is installed, you will be suggested to[...]

  • Seite 314

    314 Copyright © Acronis, Inc., 2000 - 2010 By default, the sof tw are wi ll use the account that you h av e already specified, either when configuring integrati on with the vCenter, o r when get ting access to the ESX/ESXi server. You have the option to specif y c rede ntials for a different accoun t if need be. The virtual applian ce's time [...]

  • Seite 315

    315 Copyright © Acronis, Inc., 2000 - 2010  Server 3 uses storag es B, C, D The VA can be depl oyed to either C or D. If there is no storage shared by all the servers, you can import the VA m anually int o any of the h osts. This will work, but backup performance will be far fr om optimal. After deployment , t he age nt virtual appliance can ap[...]

  • Seite 316

    316 Copyright © Acronis, Inc., 2000 - 2010 2. Create a user acc o unt for e ach user whom you wa nt to all o w to acc ess the storag e node. Note: You can skip this step if both the sto rage node and the users' machines are in t he same Active Directory domain. For information ab out user rights on a storage node and in its managed vau lts, s[...]

  • Seite 317

    317 Copyright © Acronis, Inc., 2000 - 2010 Change the compacting task schedule After deleting backup s from deduplicating vaults, eith er manually or d uring cleanup, unreferenced d ata may appear in th e deduplicating vaults and their databases. The compacting p rocedure deletes such d ata in order to free u p mor e storage space. Only on e compa[...]

  • Seite 318

    318 Copyright © Acronis, Inc., 2000 - 2010 Storage node properties The tab displays th e follo wing informa tio n about the selected storage node:  Name - the na me of the mach ine where the storage node is installed  IP - the IP add ress of the m a chine where th e storage node is installed  Availability :  Unknown - this sta tus is d[...]

  • Seite 319

    319 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 6.1 A cti on s on ta sk s The following is a guid eline for you to perfor m operati o ns with tas ks. To Do Create a new backup plan, or a task on a re gistered machine Click New , and select one of t he following:  Backup plan (p. 189 )  Recovery task (p. 213 )  Validation task (p. 233 ) T[...]

  • Seite 320

    320 Copyright © Acronis, Inc., 2000 - 2010 tasks owned by o ther users Delete a task Click Delete . Why can't I de lete the task?  Task belongs to a backu p plan A task belonging to a b ackup plan cannot be deleted separately from the plan. Edit th e plan to remove the task or delete the entire p lan.  Do not have the ap propriate privi[...]

  • Seite 321

    321 Copyright © Acronis, Inc., 2000 - 2010 Fil ter tasks by ty pe, execution state, status, type, origin, la st result, schedule. In a field below the corr esponding header, select th e required value from the li st. Configuring tasks tabl e By default, the table has eight columns that are displayed, others are hidden. If requ ired, you can hide t[...]

  • Seite 322

    322 Copyright © Acronis, Inc., 2000 - 2010  Use the Information panel to review the detailed information on the sele cte d log entry. The panel is collapsed by default. To expand the panel, click the chevron. The content of the panel is also duplicated in th e Lo g entry details (p. 32 4 ) win dow. Ways to open the "Log " view with th[...]

  • Seite 323

    323 Copyright © Acronis, Inc., 2000 - 2010 Save all the filtered log entries to a file 1. Set filters to get a li st of the log entries that sati sfy the filtering criteria. 2. Click Save All to File . 3. In the op ened window, specify a p ath and a name for the file. As a result, t he log entries of that list will b e saved. Delete all the log en[...]

  • Seite 324

    324 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 7.3 C ent ra li zed l og en try d et ai ls Displays detailed info rmati o n on the l o g entry you have selected and l et s you co py t he details to the clipboard. To copy the details, click the Copy to clipboard bu tton. Log entry data fields A centralized log en try contains the following data fi[...]

  • Seite 325

    325 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 Management Ser ver offers report templates for:  Registered machin es  Backup policies existin g on the management server  Local and centraliz ed backup plans existing on the re gistered machines  Local and centraliz ed tasks existing on the regist ered machin[...]

  • Seite 326

    326 Copyright © Acronis, Inc., 2000 - 2010  Availability (physi cal machines only): The type s o f the machines' availabilit y — Online or Offline . With the default fil ter settings, the report includ es all ph y sical machin es. Report view Under Report vie w , choos e how the report will lo ok:  Select whether t o show all items in[...]

  • Seite 327

    327 Copyright © Acronis, Inc., 2000 - 2010  Execution state : Th e execution states of the backup pl ans — for example, Running .  Status : The status es of the backup plans — OK , Warnin g , and/or Error .  Last finish time : The perio d within which the las t backup finished under each o f the backup plans.  Schedule : The type s[...]

  • Seite 328

    328 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 8.5 Re po r t a bo ut t he a rc hi ve s a nd b ack up s In this view, you c an gener ate a report about the arch ive s that ar e stored in managed centralized vaults. This rep o rt consists of one or more tables. Filters Under Filters , choos e which archives to include in the report. Only the archi[...]

  • Seite 329

    329 Copyright © Acronis, Inc., 2000 - 2010 Report view Under Report vie w , choos e how the rep ort will look:  Specify which table co lu mns to show, and in which order.  Select which diagra ms to include in the report. The diagrams show space usage in the vaults. 7. 1. 8.7 Re po r t a bo ut t he ta sk a cti vi tie s In this view, you c an [...]

  • Seite 330

    330 Copyright © Acronis, Inc., 2000 - 2010 Explorer, click the Information bar that appears at th e top of the webpage by default, and then click Allow blocked con tent . To a llo w a ct iv e c on ten t per ma ne nt ly in Internet Explor er 1. On the Tools menu, click Internet Op ti ons , an d then click the Advan ced tab. 2. Select the Allow a ct[...]

  • Seite 331

    331 Copyright © Acronis, Inc., 2000 - 2010 To l oa d the A cro ni s Adm ini st rat ive T emp la te 1. Run Windows Gr o up Policy Objects Editor (%windir%system 32 gpedit. msc.) 2. Open the Group P o licy obj ect (GPO) y o u want to edit. 3. Expand Computer Co nfigura ti on . 4. Right click Adm inistrative Templa tes . 5. Click Add/Remo v e Templ[...]

  • Seite 332

    332 Copyright © Acronis, Inc., 2000 - 2010 Default value: 10 Acronis Backup & Rec overy 10 agents connect to the storage node to access its man aged vaults during backup or re covery. The Client Connection Lim it parameter determines th e max imum number of such connec tions that the storage node c an han dle simultaneously. When this limit is[...]

  • Seite 333

    333 Copyright © Acronis, Inc., 2000 - 2010 If the volume ha s 5 GB of free space, th en the total size of Vault A is 2 0 GB + 5 GB = 25 GB, and that of Vault B is 45 GB + 5 GB = 50 GB, regardless o f the size of the volume. The percentage of fr ee space in a vault is the v ault's free space divid ed by the vault's total size. In the prev[...]

  • Seite 334

    334 Copyright © Acronis, Inc., 2000 - 2010 7. 2. 1.3 A cro ni s Bac ku p & R ec ove ry 1 0 M ana ge m ent S erv er The following are the parameters of Acronis Backup & Recover y 10 Manage ment Server tha t can be set by using Acr o nis Admini strative Template. Collecting Logs Specifies when t o collect lo g entries from machines manag ed [...]

  • Seite 335

    335 Copyright © Acronis, Inc., 2000 - 2010 Trace Level Description: Specifi es the minimu m level of severity of events to be rec o rded in to the even t log. Only events of levels gr eater than or equal t o the value in T race Leve l will be recorded. Possible values: 0 (Internal event), 1 (Debuggin g information), 2 (Information) , 3 (Warni ng),[...]

  • Seite 336

    336 Copyright © Acronis, Inc., 2000 - 2010 Otherwise, it c o nnects t o a number o f registered m achi nes depending o n the all o tted number of simultane ous connections. After synchr onization for a machine is co mplete, the management ser v er ma y disconnec t from that machine and use the free connection for synchronization wi th another mach[...]

  • Seite 337

    337 Copyright © Acronis, Inc., 2000 - 2010 If Real Time Mon i toring is set t o True , the manage ment server instead send s requests to machines to provid e new data when ever it will appear, and then en ters a listening mode. This approach is called real-time monitoring. Real-time monitoring may reduce network traffic — for exa m ple, when c e[...]

  • Seite 338

    338 Copyright © Acronis, Inc., 2000 - 2010 You may want t o increase the initial size of the snapsh o t storag e — or to place it on a different volume — when experien cing problems with backing up data that changes extensi v ely during backup. This parameter is used when creating a backup poli cy and applies to all centraliz ed backup plans t[...]

  • Seite 339

    339 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 Agent periodicall y checks whether its licens e key is present on the license serv er. T he first check is performed every time that Acronis Backup & Recovery 10 Agent starts and sub sequent checks are performed once in the number of days given by License Check Interv[...]

  • Seite 340

    340 Copyright © Acronis, Inc., 2000 - 2010 For details on ho w the age nt lo g is clean ed up, see Log cleanup rules (p. 89 ). Windows Event Lo g Specifies when t o record A cro nis Backup & Recover y 10 Agent's e v ents into the Application event log in Windows. This parameter has t wo settings: Trace State Description: Specifi es whethe[...]

  • Seite 341

    341 Copyright © Acronis, Inc., 2000 - 2010 With the default setting s, the snapshot storage is created in a Windows' temp o rary files folder and initially occupies 50 percent of the space avail able on the volume containin g that fold er. This size may then gro w if m o re space is nee ded for the snapshot. You may want t o increase the init[...]

  • Seite 342

    342 Copyright © Acronis, Inc., 2000 - 2010 Connection parameter s Remote Agent po rts Specifies the por t that the component will use for incoming and outgoing commu nication with other Acronis comp onents. Select one of the f o llowing: Not Configured The component will us e the default TCP port numbe r 9876. Enabled The component will us e the s[...]

  • Seite 343

    3 43 Copyright © Acronis, Inc., 2000 - 2010 Always use The use of SSL certificat es is enabled. The connecti o n will b e established o nly if t he use of SSL certificates is enabled on the ser v er applica tio n. Disabled The same as Not confi gured . Server Encryption options Specifies whether to encrypt the transferred data when the component a[...]

  • Seite 344

    344 Copyright © Acronis, Inc., 2000 - 2010 Level Name Description 0 Unknown Event whose lev el of severity is unkn own or not applicable 1 Debug Event used for debug pu rposes 2 Information Informational ev ent, such a s one about the successful co m pletion o f an operati o n or startup of a s erv ice 3 Warning Event which is a po ssible impendin[...]

  • Seite 345

    345 Copyright © Acronis, Inc., 2000 - 2010 regular basis. The end results are intended to provide software improvements an d enhanced functionality to bet ter meet the n eeds of Acronis customers. Acr onis does not collect any personal data. The ter ms of participation can be foun d on the Acronis Web site. Disable The information will not be sent[...]

  • Seite 346

    346 Copyright © Acronis, Inc., 2000 - 2010 Parameters related to vault databases The following tw o parame ters determine paths to Acr onis Backup & Recovery 10 Storage No de's internal databases, which contain information ab o ut managed vaults. The database that is locat ed in the folder specified b y the DatabasePa th parameter is t yp[...]

  • Seite 347

    347 Copyright © Acronis, Inc., 2000 - 2010 Policy credentia ls (p. 349) [Optional] You can c hange the po licy a cco unt cred entials if necessary. T o access this opti on, select the Advan c ed view c heck box. Policy commen ts [Optional] Type a description of the backup policy. To access this option, sel ect the Advanced view check box. Label [O[...]

  • Seite 348

    348 Copyright © Acronis, Inc., 2000 - 2010 Backup options Settings [Optional] Configu re parameters o f the bac kup o peration, such as pre/post backup commands, maxi mum network bandwidth all o cated f o r the backup s tream or the backup archive compression l evel. If you do nothing in thi s section, th e default values (p. 90 ) as set in the ma[...]

  • Seite 349

    349 Copyright © Acronis, Inc., 2000 - 2010 After you have p erfo rm ed all the r equired steps, clic k OK to create th e backup p olicy. 7 . 3 . 1 P o l i c y c r ed e n t i al s Provide the credentials under which the centraliz ed tasks will run on the machin es. To s pec if y c re den ti als 1. Select one of the f o llowing:  Use Acronis se r[...]

  • Seite 350

    350 Copyright © Acronis, Inc., 2000 - 2010 To i ncl ude I n th e V olu mes co lum n: Co mm ent s Wi nd ows an d L in ux v ol ume s All volumes Type or select: [All Volum es] Refers to all volumes on mach ines runn ing Windows, and all moun ted volumes on machines running Linux. Wi nd ows vo l umes Volume C: Type C: or select it fro m the list Sy[...]

  • Seite 351

    351 Copyright © Acronis, Inc., 2000 - 2010 The names of te m plates ar e case-sensitive. What doe s a disk or volum e backup store? For supported file systems, a disk or volume backup stores only th ose sect o rs that contain data. This reduces the resul ting backup size and speeds up t he backup and recovery operations. Windows The swap file (pag[...]

  • Seite 352

    352 Copyright © Acronis, Inc., 2000 - 2010 For example, le t a Linux machine contain a hard disk w hich is split into three volu mes, or partiti ons: the first, second, and third partitions. These partiti ons are available in the tree as /dev/hda 1 , /dev/hda2, and /d ev/hda3, respectively. To perfor m a disk backup of the, sa y, t hir d partition[...]

  • Seite 353

    353 Copyright © Acronis, Inc., 2000 - 2010 --- Logical volume --- LV Name /dev/vg_my machine/lv_root VG Name vg_mymachi ne … --- Logical volume --- LV Name /dev/vg_my machine/lv_bin VG Name vg_mymachi ne … Tip: To be able to automatically create the vo lume structure information during reco very, make sure that the volume with the /etc/Acronis[...]

  • Seite 354

    354 Copyright © Acronis, Inc., 2000 - 2010 C: ProgramData in Windows Vista) You can use other envir onment variables or a combination of environm ent variables and text. For example, to refer to the Acronis folder in the m achine s' P rogram Files folder, type: %PROGRAMFILES% Acronis Templates Templates are si m ilar to en vironment variabl[...]

  • Seite 355

    355 Copyright © Acronis, Inc., 2000 - 2010  Password . The passw ord for the account. 2. Click OK . 7 . 3 . 4 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folder s, as well as files with specific e xt ensions, t o be stored [...]

  • Seite 356

    356 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C:FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes the[...]

  • Seite 357

    357 Copyright © Acronis, Inc., 2000 - 2010 The program g enerates a c o mmon na me for the new archives and displays it in the Name field. Th e name looks like [ P olicyNa me]_[MachineName]_Archiv e1. If you are not satisfied with the automatically gene rated name, construct another na me. If you selected S tore all ma chines' archives in a s[...]

  • Seite 358

    358 Copyright © Acronis, Inc., 2000 - 2010  Back up now – to create a backup task for manual start and run the task immediately after its creation.  Back up later – t o create a backup task for manual sta rt OR schedule one-tim e task execution in the future.  Simple – to schedule when and how often to backup data and specify retent[...]

  • Seite 359

    359 Copyright © Acronis, Inc., 2000 - 2010 To set up the simple ba ckup scheme, specify t he app ropriate setting s as follows. Backup Set up the backup schedule - when a nd how often to back u p the data. To learn more abou t setting up the schedule, see the Schedu ling (p. 159 ) section. Retention r ule With the simple scheme, only one retention[...]

  • Seite 360

    360 Copyright © Acronis, Inc., 2000 - 2010 Weekly/Monthl y : Specifies which of t he days selected in the Back up on field y o u want t o reserve for wee kly and monthly backups. A m o nthly backup w ill be performed every f o urth such day. T he defau lt value is Friday. Keep backup s: Sp ecifies how long y ou want the bac kups to be stored in th[...]

  • Seite 361

    361 Copyright © Acronis, Inc., 2000 - 2010 As a result, an archi ve of daily, weekly, and m o nthly backup s w ill be cr eated. Daily backups will be available for seven da y s sin ce creation. For instance, a daily backup o f Sunday, Jan ua ry 1, will b e available through nex t Sunday, January 8; the first weekly backup, the one of Saturday, Jan[...]

  • Seite 362

    362 Copyright © Acronis, Inc., 2000 - 2010  Daily: 6 months  Weekly: 6 month s  Monthly: 5 years Here, daily incre m ental bac kups will be created on Tue sdays and Thursdays, with wee kly and monthly backups perf ormed on Fridays. Note that , in order to choose Friday in the Wee kly/monthly field, you need t o first sele ct it in the Bac[...]

  • Seite 363

    363 Copyright © Acronis, Inc., 2000 - 2010 levels you select. See the example below for detail s. Example Schedule parameters are set as follows  Recur: Every 1 da y  Frequency: Once at 6 PM Number of levels : 4 This is how the first 14 days (or 14 sessions) of this s cheme's schedule look. Sha ded numbers denote backup levels. 1 2 3 4 [...]

  • Seite 364

    364 Copyright © Acronis, Inc., 2000 - 2010 Here are the backup s we have on da y 12 (numbers in g ray denote d eleted backups). 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been cr eated, so the backup of da y five is st ill stor ed. Since it depends on the full backup of day one, that ba ckup is[...]

  • Seite 365

    365 Copyright © Acronis, Inc., 2000 - 2010 This setting is recommend ed for backup d estinations such as shared folders or centralized vaults. When there is insufficient space while bac king up The archive will be clean ed up only du ring backup and only if there is not enou gh space to create a n ew backup. In this case, the program will act as f[...]

  • Seite 366

    366 Copyright © Acronis, Inc., 2000 - 2010 Incremental: Sched ule: Weekly, every workd ay , at 9:00 PM Also, let all backup s older than one year be del et ed from the archive, and let the cleanup be performed upon crea ting a new backup. Retention rules: D elete backups older than 12 mo nths Apply the rule s: After backing up By default, a one-y [...]

  • Seite 367

    367 Copyright © Acronis, Inc., 2000 - 2010 Resulting tasks Any custom sche me always produces three backup tasks and — in case the retenti on rules are specified — a cleanu p task. Each tas k is listed in the list of tasks either as Schedule d (if the schedule has been set up) or a s Manual (if the schedule ha s not been s et up). You can manu[...]

  • Seite 368

    368 Copyright © Acronis, Inc., 2000 - 2010 3. Validation sche dule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. F or more information see t he Scheduling (p. 159) secti o n.[...]

  • Seite 369

    369 Copyright © Acronis, Inc., 2000 - 2010 8 O n lin e bac ku p This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Online Backup St orage. Acronis Backup & Re covery 10 Online might b e unavailable in your region. To find mo re information[...]

  • Seite 370

    370 Copyright © Acronis, Inc., 2000 - 2010 8 . 1 . 2 W h a t d at a c a n I b a c k u p a n d r e c o v er ? You can back up fil es, vo lu m es, disks, o r the entire ph ysical machine as often as you wish. Unlike most online backup so lutio ns, Acronis Backup & Recovery 10 Onli ne enables bare metal recovery directly from the online storage. [...]

  • Seite 371

    371 Copyright © Acronis, Inc., 2000 - 2010 Host-based bac kup is available only for paid lice nses of VMware ESXi. Choose the below approach if yo ur ESXi Server uses a free license. Install Acronis software into the guest system The machine will b e treate d as a physical on e. You will need a s eparate server o r wo rkstati o n subscription for [...]

  • Seite 372

    372 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 6.4 Wh at i f a n et wo rk co nn ect io n is lo st d uri n g o nl in e b ac ku p or r ec ov er y? The software will tr y to reach the online storag e every 30 seconds. Aft er five unsuccessful attempts the backup or rec o very tas k will fail. You can change th e number of attempts and the in terval[...]

  • Seite 373

    373 Copyright © Acronis, Inc., 2000 - 2010 The hard disk drive is sent back to you but it is n o t po ssible to recover from it. H o wever, re covery from a locally att ached device is possible with the Large scale recovery (p. 37 7 ) option. 8. 1. 7.2 Wh y wo ul d I w an t to us e I ni ti al Se ed in g? This service helps yo u save time and netwo[...]

  • Seite 374

    374 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 7.8 Ho w to p er fo r m in it ia l s ee din g? 1. Decide on the media (p. 373 ) that you will send . 2. Attach the media t o the m achine you are going to back up . Alternativel y, you can back up t o a local or network f o lder and t hen copy /move the backu p to the media. 3. Start Acronis Backup [...]

  • Seite 375

    375 Copyright © Acronis, Inc., 2000 - 2010 St ep 1 Delicately rem o ve your har d disk drive from the machi ne. St ep 2 Place the hard dri v e into a n anti-static bag to protect the drive from electrostatic discharge. If you do not have an anti-stati c bag, simply wrap the hard dri ve into aluminum foil. St ep 3 Use a sturdy box that is at least [...]

  • Seite 376

    376 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this company's web site, prepare and print two prepaid ship ping labels: 1. Shipping label for sending your hard drive. This lab el is placed on the top of the bo x. You sh o uld send your packag e to one of the Acr onis data[...]

  • Seite 377

    377 Copyright © Acronis, Inc., 2000 - 2010  An order was created – The first ba ckup is about to start and the license cannot be used for any other machine. Fro m this p oint on, you can cancel the order if somethin g goes wrong. This will return the license to t he po o l of availab le licenses.  A full backup ha s started – This sta tu[...]

  • Seite 378

    378 Copyright © Acronis, Inc., 2000 - 2010 Once you order Large Scale Recovery for a particular machine, Acronis send s you a USB hard disk drive with all of th e backup s m ade from this machine. You can recover d ata directly fro m the disk or copy the backups t o a local or network folder. 8. 1. 8.2 Wh y wo ul d I u se La rg e S ca le R ec ov e[...]

  • Seite 379

    379 Copyright © Acronis, Inc., 2000 - 2010 can cancel the order if something goes wrong. This will return the license t o the p o ol of availab le licenses.  The order is bein g pro cessed - Order processing in the datacenter started.  Writing data – Y o ur backu ps are being written onto th e media. Fro m this point on, you cannot cancel [...]

  • Seite 380

    380 Copyright © Acronis, Inc., 2000 - 2010 If you purchased your sub scriptions online using th e Acronis Web site, they are available immediately on your account manag ement Web page. The ne wly obtained sub scriptions are li ste d at the Manage Subscriptions tab. 8. 1. 9.3 Wh en d oes m y su bsc ri pt ion b eg in? Your subscription begins when y[...]

  • Seite 381

    381 Copyright © Acronis, Inc., 2000 - 2010 Wh at d oes " Au to -r en ew " me an ? Auto-renewal means that when the current subscrip tion expires, th e next subscription will be automatically s elected fro m the a v ailable subscrip tions. The nex t subscripti on must be identical to the current subscripti on. If an identical subscrip tio[...]

  • Seite 382

    382 Copyright © Acronis, Inc., 2000 - 2010  Windows Server 2 008 R2 - the Standard, Enterprise, S mall Business Ser v er, Datac enter, Foundation editions  Windows MultiP o int Serve r 2 010 Workstation ope rating systems supported by Acronis Backup & Recovery 10 Onl i ne:  Windows 2000 P rofessi o nal SP4  Windows XP Prof essional[...]

  • Seite 383

    383 Copyright © Acronis, Inc., 2000 - 2010  As soon as a subscripti on is activated, its subscripti o n period st arts. To avoid losing sub scription time, activate th e subscript ion o nly wh en you are ready to back up the machine.  If a machine alre ady has a subscription, the ne w subsc ription will replace t he old o ne. You can reassig[...]

  • Seite 384

    384 Copyright © Acronis, Inc., 2000 - 2010 Depending on y our settings, this ba ckup will be e ither full or incre mental. But its size is not likely to be less than a full bac kup size. Therefore, it is not practical t o reassign a sub scription to a machine whose first backup wa s done as an initial seeding. Yo u will need to either redo th e in[...]

  • Seite 385

    385 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure p rox y s et ti ng s for an a gen t 1. Connect the cons ole to the machine fo r which yo u wa nt to configure proxy settings. 2. In the Options m enu, located on the toolbar, click Machine option s . 3. Click Online ba ckup proxy . 4. Enter the proxy ser ver settings. For detailed informa [...]

  • Seite 386

    386 Copyright © Acronis, Inc., 2000 - 2010  Dual destinat i on (p. 107) By using the Ba c kup perfo rmance > Network connection speed option, you can vary the transferring speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up. 8. 7 Te[...]

  • Seite 387

    387 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration code A character string f o r regist ering a subscription or license that was b ought from an Acronis partner. When you purchase such subscriptions o r licenses, you receive a confirma tio n e-[...]

  • Seite 388

    388 Copyright © Acronis, Inc., 2000 - 2010 9 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af te r the s y stem recovery is start ed. The system boots from the backup (p. 394) and the machin e become s operational and r eady to provide necessary servic es. The data requir[...]

  • Seite 389

    389 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation o f load ers other than Windows load ers and GRUB. A gen t (A cr on is B ack up & Re cov er y 10 A ge nt ) An application tha t perfor m s data backup and recovery and enables other management operati ons on the machine (p. 3 97), such as tas k management and oper[...]

  • Seite 390

    390 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati on (p. 389), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup stream or data compre ssion level. Backup options are a part o f a backu p plan (p. 390 ). Ba cku p pla n ( Pl an ) A set of rules that spec[...]

  • Seite 391

    391 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 389 ) installed o n the m achine finds da ta items using the sel ect ion rules. For example, if the selection rule is [A ll volumes], the entire machin e will be backed up. 5. On each machine, the agent installed on the m achine create s a backup pla n (p. 390) using oth [...]

  • Seite 392

    392 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is n o way to remove a physical machine from the built-in group exc ept for re m oving the machine from the managem ent server. Virtual machin es are removed as a r[...]

  • Seite 393

    393 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 3 89) from a backup archive (p. 389) in order to get rid of o utdated backups o r prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p. 39 0) that produces the archi v e. This o per[...]

  • Seite 394

    394 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma nag em en t Any management o peratio n that is performed on a managed machine (p. 397 ) using the direc t console (p. 393)-agen t (p. 389) connection (as oppo sed to centralized manageme nt (p. 392) when the operations are c o nfigured o n the manag ement server (p. 398) and propagat ed by the[...]

  • Seite 395

    395 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Management http://support.micr o soft.c o m/kb/222 1 89/EN-US/ D yna mi c di sk A hard disk manag ed by Log ical D isk Manag er (LDM) that is availab le in Windows starting with Windows 2000. L DM helps flexibly all ocate volumes on a storage de vice fo[...]

  • Seite 396

    396 Copyright © Acronis, Inc., 2000 - 2010  the administrat or changes the crit eria so that the mach ine does not meet them anymore. There is no way t o remove a m achine from a dynamic group manuall y e xcept fo r deleting the machine from th e management server. D yna mi c v ol um e Any volume l ocated on dynamic dis ks (p. 39 5 ), or mor e [...]

  • Seite 397

    397 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 389) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecove r th e data from a full backup. G GF S ( Gr and fa th er -Fa t h er-S on ) A popular backup sche me (p. 39 1) aimed to main tain the optimal balance betwe e[...]

  • Seite 398

    398 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d va ult A centralized vault (p. 392) managed by a storag e no de (p. 399 ). Archiv es (p. 389) in a man aged vault can be accessed as f o llows : bsp:// node _address/vault_name/archiv e_name/ Physically, managed vaults can reside on a network share, SAN, NAS, o n a hard drive local to the stora[...]

  • Seite 399

    399 Copyright © Acronis, Inc., 2000 - 2010 P lan See Backup plan (p. 3 9 0 ). P oli cy See Backup policy (p. 390 ). R Re co ver y po in t Date and time to w hich th e backed up data can be reverted to . Re gi st ere d ma ch in e A machine (p. 397) managed by a manage ment server (p. 398). A machine can be registered on o nly one management se rver[...]

  • Seite 400

    400 Copyright © Acronis, Inc., 2000 - 2010  prevent access to the b ack up archives, even in case the st orage medium is stolen or accessed by a malefactor, by usin g encrypted vaults (p. 396 ). S tor ag e nod e- sid e cl ea nu p Cleanup (p. 392) perf ormed by a storage node (p. 399) according t o the backup p lans (p. 390) that produce the arc[...]

  • Seite 401

    401 Copyright © Acronis, Inc., 2000 - 2010 U Un iv er sa l R es tor e (Ac ro ni s Bac ku p & R eco ve ry 1 0 U ni ve rsa l Re st or e) The Acronis propri et ary t echnology that helps boot up Window s on dissimilar hardware o r a virtual machine. The Uni versal Restore handles differences in devices that are critical f o r the op erating syste[...]