Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Acronis Backup & Recovery 10 Advanced Server SBS Edition manuale d’uso - BKManuals

Acronis Backup & Recovery 10 Advanced Server SBS Edition manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Acronis Backup & Recovery 10 Advanced Server SBS Edition. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Acronis Backup & Recovery 10 Advanced Server SBS Edition o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Acronis Backup & Recovery 10 Advanced Server SBS Edition descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Acronis Backup & Recovery 10 Advanced Server SBS Edition dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Acronis Backup & Recovery 10 Advanced Server SBS Edition
- nome del fabbricante e anno di fabbricazione Acronis Backup & Recovery 10 Advanced Server SBS Edition
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Acronis Backup & Recovery 10 Advanced Server SBS Edition
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Acronis Backup & Recovery 10 Advanced Server SBS Edition non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Acronis Backup & Recovery 10 Advanced Server SBS Edition e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Acronis in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Acronis Backup & Recovery 10 Advanced Server SBS Edition, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Acronis Backup & Recovery 10 Advanced Server SBS Edition, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Acronis Backup & Recovery 10 Advanced Server SBS Edition. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 A d v a n c e d S e r v e r S B S E d i t i o n User's Guide[...]

  • Pagina 2

    Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc. Linux is a registered[...]

  • Pagina 3

    Table of contents 1 Introd ucin g Acronis® Ba ckup & Reco very™ 10 ........................................................................ 8 1.1 Acronis Backup & Rec overy 10 overview .................................................................................. 8 1.2 Getting started .................................................[...]

  • Pagina 4

    3. 1. 1 St art up pa ge .................................................................................................................................................. 79 3. 1. 2 Po p-u p m ess ag es .......................................................................................................................................... 79 3. 1.[...]

  • Pagina 5

    6 Direct man agement ................................ ........................................................................... 173 6.1 Adm inistering a managed machine ....................................................................................... 173 6. 1. 1 Da sh bo ard ..................................................................[...]

  • Pagina 6

    6. 8. 1 Cr ea ting A cro nis Se cur e Zon e .................................................................................................................... 24 7 6. 8. 2 Ma nag ing A cro nis Se cur e Zone .................................................................................................................. 249 6.9 Acronis Startup Re[...]

  • Pagina 7

    8. 1. 9 Su bsc ri pti on lif ecy cle F AQ ................................................................................................ .......................... 37 9 8.2 Where do I start ? ................................................................................................................... 381 8.3 Choosing a subscripti on .......[...]

  • Pagina 8

    8 Copyright © Acronis, Inc., 2000 - 2010 1 I nt r od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba ck up & Re co ver y 1 0 ov erv iew Based on Acronis’ paten ted disk imaging and bare metal restore techn ologies, Acronis Bac kup & Recovery 10 succe eds Acronis True Image Echo as th e next generation disaster re c[...]

  • Pagina 9

    9 Copyright © Ac ronis, Inc., 2000- 2010 Running services wi th minimal user rights Restricted rem ote access t o a backup agen t Secure communica tio n bet ween the product components Using third-party c ertificates for auth entication of the components Data encryption options for both dat a transmission and storag e Backup of rem ote machine s t[...]

  • Pagina 10

    10 Copyright © Acronis, Inc., 2000 - 2010 To recover the entir e machine or the opera ting system that fails to start, use the bootable media (p. 391). You cannot contr ol operations under bootable media using the manage ment server, but you can disconnect th e console fro m the ser ver and conne ct it to the machine booted fro m the m edia.  M[...]

  • Pagina 11

    11 Copyright © Ac ronis, Inc., 2000- 2010 1 . 2 . 1 U s i n g t h e m a n a g e m en t c o n s o l e As soon as the cons o le conn ect s to a manag ed machi ne (p. 397) or to a manage ment server (p. 398), the respective i tems appear across the consol e's workspace (in the menu, in the main area with the Welcome screen, the Navigatio n pane,[...]

  • Pagina 12

    12 Copyright © Acronis, Inc., 2000 - 2010 1. 2. 1.1 "Na v ig at ion " pa n e The navigation pane includes the Navigation tree and the Shortcut s bar. Navigation tree The Navigation tr ee enable s you to navigate a cro ss th e progra m views. Vie ws depend on whether the console is conne cted to a managed machine o r to t he m anag ement [...]

  • Pagina 13

    13 Copyright © Ac ronis, Inc., 2000- 2010  Log . Use this vie w to exa mine the history of centraliz ed management operati o ns, such as creating a managed entities group, applying a po licy, m anaging a centraliz ed vault; as well as the history of opera tio ns lo gged in the local logs of the registered machines and the storage nodes. Shortcu[...]

  • Pagina 14

    14 Copyright © Acronis, Inc., 2000 - 2010 Actions Contains a list of c ommon operati ons that can be perf o rmed on a m anaged m achin e or on a management ser v er. Alway s t he sam e for all v iews. Cli cking the operation opens t he respective action page (see th e Action pages (p. 16 ) section.) All the actions can also be accessed in the Acti[...]

  • Pagina 15

    15 Copyright © Ac ronis, Inc., 2000- 2010 The management co nsole "remembers" the way the panes' borders are set. Whe n you run the management cons o le nex t time, all the panes' borders w ill have th e same position that was se t previously. 1. 2. 1.4 Ma in ar ea, vi ew s a nd a ct io n pa ges The main area is a basi c place [...]

  • Pagina 16

    16 Copyright © Acronis, Inc., 2000 - 2010  By clicking in the i tems in the [Item's name] A c tions bar (on the Ac tions an d Tools pane);  By selecting the it ems in the Actions menu;  By right-clicking t he item a nd selecting the operation in t he context m enu. A cti on p ag es An action page app ears in the main area when clicki[...]

  • Pagina 17

    17 Copyright © Ac ronis, Inc., 2000- 2010 Action page - Contr ols Acronis Backup & Rec overy 10 remembers the change s you made on the action p ages. For example, if you started to cr eate a backup plan, and then f o r any reas o n switch ed to another view with o ut accomplishing the plan creation, y ou can clic k the B a ck navigation butt o[...]

  • Pagina 18

    18 Copyright © Acronis, Inc., 2000 - 2010 Bootable media builde r With bootable m edia build er, you can create bootable media in order to use the agents and other rescue utilities in a rescue environment. Availabilit y of the agent add-ons in a rescue en vironment depends on wheth er an ad d -on is install ed on the ma chine where the m edia buil[...]

  • Pagina 19

    19 Copyright © Ac ronis, Inc., 2000- 2010 1 . 3 . 2 C o m po n e n t s f o r c e n t r a l i z e d m an a g e m e n t This section lists th e co mponents included in the A cronis Backup & Recovery 10 editions that provide the centralized m anage ment capability. B esides these components, Acronis Backup & Reco very 10 Agents have to be ins[...]

  • Pagina 20

    20 Copyright © Acronis, Inc., 2000 - 2010 This feature also enable s automatic deployment and configuration of Agent for ESX/ ESXi t o any ESX/ESXi server, that is not necessarily managed by the vCenter. 1. 3. 2.2 St ora ge N ode Acronis Backup & Rec overy 10 Storage N o de is a ser ver aimed to o ptimize usage of various resources (such as th[...]

  • Pagina 21

    21 Copyright © Ac ronis, Inc., 2000- 2010 Encryption A managed vault can be configured so that anythin g written to it is encr y pted and anythin g read from it is decrypted transparently by the st o rage nod e, using a vault-specific encryption ke y stored on the node ser ver. In case the s to rage m edium is st o len or accessed by an un authori[...]

  • Pagina 22

    22 Copyright © Acronis, Inc., 2000 - 2010 The Deduplication (p. 18 ) add-on enables you t o create bootable media with the back up t o a deduplicating vault fun ctionality. 1 . 3 . 5 A c r o n i s W a k e - On - L A N P r o x y Acronis Wake- On -LAN Prox y e nables Acronis Backup & Recovery 10 Manage ment Server to wa ke up for backup machi ne[...]

  • Pagina 23

    23 Copyright © Ac ronis, Inc., 2000- 2010  Windows 2000 – all editi ons except for the Datacenter edition  Windows Server 2003/200 3 R2 - the Standard , E nterp rise, Small Business Server editions (x86, x64)  Windows Vista - all editi ons (x86, x64)  Windows 7 - all editi o ns (x 8 6, x64)  Windows Server 2008 - the Standard, En [...]

  • Pagina 24

    24 Copyright © Acronis, Inc., 2000 - 2010 Bootable Media Builder 80 MB 700 MB 300 MB CD -RW or DVD - RW drive Management Console 30 MB 950 MB 450 MB Screen resolution 1024*768 pixels or higher Management Server 40 MB 250 MB 400 MB for SQL Express Server 250 MB 400 MB for SQL Express Server Wake- on -LAN Proxy Negligible 30 MB 5 MB Storage Node 100[...]

  • Pagina 25

    25 Copyright © Acronis, Inc., 2000 - 2010 2 Un de rs ta ndi ng A cro ni s B ack up & Re co ver y 10 This section attempts to give its readers a clear un derstanding of the produc t so that they can use the product in vari ous circumstanc es without step- by -step instructions. 2. 1 Ba sic co nce pts Please familiariz e yourself with the basic [...]

  • Pagina 26

    26 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illus trate s the n otions discussed above. For mo re defin itions please r efer to the Glossary.[...]

  • Pagina 27

    27 Copyright © Acronis, Inc., 2000 - 2010 Ba ckup using bootable media You can boot the m achine u sing the bootable media, configure th e backup operation in the sa m e way as a simple backup plan and execute the o peratio n. This will help you extract files and l ogical volumes from a sy stem that failed to boot, take an imag e of the offlin e s[...]

  • Pagina 28

    28 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illus trate s data r ecovery under the operating s ystem (online). N o backup can proceed on the machin e while the recovery opera tion is taking place. If requ ired, you can connect the console to an o ther ma chine and configure a recover y o peration on that m achin e. T his abili[...]

  • Pagina 29

    29 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to recover dat a to bare metal, you bo o t the machi ne using the bootable media and config ure the recovery operation in th e same wa y as the recovery task. The following diagram illustrate s t he rec o very using the bootable media. 2. 2 Fu ll, i ncr em ent al a[...]

  • Pagina 30

    30 Copyright © Acronis, Inc., 2000 - 2010 It is widely accept ed that a full backup is the slowes t to do but the fastest to rest o re. With Acr o nis technologies, rec overy from an incremental backup m ay be n o t slower than recovery f rom a full one. A full backup is m o st useful when:  you need to roll bac k the system to its initial st a[...]

  • Pagina 31

    31 Copyright © Acronis, Inc., 2000 - 2010 P ar ame ter Fu ll ba cku p Di ff ere nti al ba cku p I nc re ment al ba cku p Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2. 3 Us er pr ivi le ges on a ma na ged ma chi ne When managing a machine running Windows, the scope of a user' [...]

  • Pagina 32

    32 Copyright © Acronis, Inc., 2000 - 2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are clear ed. This prevents the "modif y settings, leave pass words" trick. The program display s a warning each ti me you are trying to edit a plan (task) last modified by another user. On[...]

  • Pagina 33

    33 Copyright © Acronis, Inc., 2000 - 2010 “sons”; weekly bac kups are referred to as “fath ers”; the longest lived monthl y backups are call ed “grandfathers”. GFS as a tape rotation scheme GFS was initially cr eated and is often referred to as a tape rotati on scheme. Tape rotation sch emes, as such, do not provide au tomation. They j[...]

  • Pagina 34

    34 Copyright © Acronis, Inc., 2000 - 2010 The schedule m arked out according to th e GFS scheme. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Acronis uses incre mental and differential backup s that help sa ve storage spac e and optimize the cleanup so that cons o lidati on is not needed. In t erms of backup methods, w eekly backup is di[...]

  • Pagina 35

    35 Copyright © Acronis, Inc., 2000 - 2010 “D” stands for the backup that is c onsidered Dail y. “W” stands for t he bac kup that is c onsidered Weekly. “M” stands f or the backup that is considered M onthly. An ideal archive created according to the GFS schem e. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Keep daily backups:[...]

  • Pagina 36

    36 Copyright © Acronis, Inc., 2000 - 2010 The backups that outlive their nomin al lifetime be cause of dependencies are marked pink. The initial full backup will be deleted as soon as all differential and incremental ba ckups ba sed o n this backup are deleted. An archive create d according to the GFS sche me by Acronis Backup & Reco very 10. [...]

  • Pagina 37

    37 Copyright © Acronis, Inc., 2000 - 2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gi ves the following order o f moves: The Tower of Hanoi backup scheme is based on the same pa tt erns. It operate s with Sessions ins tead of Moves and with Backup levels instead of Rings . Commonly an N-le v el sch[...]

  • Pagina 38

    38 Copyright © Acronis, Inc., 2000 - 2010  the pattern starts with a ful l backup since the very first backup cannot be incremen tal  the scheme f orces every backup level to keep only the most recent backup , other backups from the level have to be delete d; however backup deletion is postponed in cases where the backup is a base for anothe[...]

  • Pagina 39

    39 Copyright © Acronis, Inc., 2000 - 2010 1. Delete backups older than This is a time inter v al count ed back from the moment when the retention rules are app lied. Every time a retention rul e is app lied, the program calculate s t he date and time in the past corresponding to this interval and del etes all backups created b efo re that mom ent.[...]

  • Pagina 40

    40 Copyright © Acronis, Inc., 2000 - 2010 Combination of rules 1 and 2 You can limit bo th the backu ps’ lifetime and the archi ve size. The diagra m below i llustrates the resulting rule. Example Delete backups o lder than = 3 Months Keep the archive size withi n = 200GB Never delete bac kups younger than = 10 Days  Every time the re tention[...]

  • Pagina 41

    41 Copyright © Acronis, Inc., 2000 - 2010 What you nee d to know about consolidation Please be aware that conso lidation is just a method of deletion but not an alternative to dele tion. The resulting backup w ill n ot contain data that w as pr esent in the deleted backup and was absent from the r et ained incremental or differential backup . Back[...]

  • Pagina 42

    42 Copyright © Acronis, Inc., 2000 - 2010 Recovering dynamic v olumes A dynamic volu m e can be r ecove red  over any type o f existing v olume  to unallocated space o f a di sk group  to unallocated space o f a b asic disk. Recovery over an ex isting volume When a dynamic volume is recovered over an existing v olume, eithe r basic or dyn[...]

  • Pagina 43

    43 Copyright © Acronis, Inc., 2000 - 2010 U na ll oc ate d s pac e ( ba s ic GP T di sk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and re sizing volum es during recovery You can resize the r esulting basic volume, both MBR and GPT, during recover y , or change the volume's location o n the di sk. A resulting dynamic v olume ca[...]

  • Pagina 44

    44 Copyright © Acronis, Inc., 2000 - 2010 de vi ce (ta pe dr iv e o r t ap e li br ary ) by. .. Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 + + + + ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Ta pe w ri tt en on a ta pe dev ice th ro ugh ... Backup Server ATIE 9.1 + + + + ATIE 9.5[...]

  • Pagina 45

    45 Copyright © Acronis, Inc., 2000 - 2010 6. Acronis Activ e Rest ore (p. 388) is not available when recovering from a tape. Recovery from a loc ally attached tape device Before creating a r ecovery task, insert or m o unt the ta pe co ntain ing the backup you need to rec over. When creating a r ecovery task, select the tape device from the list o[...]

  • Pagina 46

    46 Copyright © Acronis, Inc., 2000 - 2010 OID: 1.3.6.1.4.1.24 769.100.200.1.0 Value: "Unknown"  Text description o f the e vent OID: 1.3.6.1.4.1.24 769.100.200.2.0 Value: "?000000 00 " 2. 11 P ro pri et ar y A cro nis te ch nol og ies This section describes the proprietary technologies in herited by Acronis Backup & Reco[...]

  • Pagina 47

    47 Copyright © Acronis, Inc., 2000 - 2010 With the new Acronis Secure Zone behavior, you o btain the ability to:  list archives locat ed in the zone and backups contained in each archive  examine a backup 's content  mount a disk backup to copy files fr om t he backup to a physical disk  safely delete archi ves and backups from th[...]

  • Pagina 48

    48 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 1 . 3 U n i v e r s a l R e s t o r e ( A c r o n i s Ba c k u p & R e c o v e r y 1 0 U n i v e r s a l R e s t o r e ) Acronis Backup & Rec overy 10 Universal Rest o re is the Acro nis pr oprietary techn ology that helps recover and boot up Windows on dissimilar hardware o r a virtual machi[...]

  • Pagina 49

    49 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore and Micro soft Sysprep Universal Restor e is not a s ystem preparation tool. You c an apply it to any Windows image creat ed by Acronis product s, includin g im ages of s ystems prep ared w ith Micr osoft System Preparati o n Tool (Sysprep). The f ollowing is an exa mple of using both too[...]

  • Pagina 50

    50 Copyright © Acronis, Inc., 2000 - 2010 How it works When configurin g a recovery op eration, you select disks or volumes to rec o ver fr o m a backup . Acronis Backup & Rec overy 10 scans the selec ted disks or volumes in the backup . If this scan finds a supported operating sy ste m , the Acronis Ac tive Restore option become s available. [...]

  • Pagina 51

    51 Copyright © Acronis, Inc., 2000 - 2010 5. Once the syste m rec o very is start ed, the operating system bo o ts from the backup. The Acronis Active Restore ic o n appear s in the system tray. The machin e beco m es operation al and ready to provide necessary se rvices. The i mmediate user sees th e drive tre e and icons and can o pen fil es or [...]

  • Pagina 52

    52 Copyright © Acronis, Inc., 2000 - 2010 Using the manage ment server, you can creat e one or more centraliz ed archive storages (centralized vaults (p. 392)), which will be shared by the regist ered machines. A centralized v ault can be used by any backup policy as well as by any backup plan creat ed o n the regis tered machines usin g direct ma[...]

  • Pagina 53

    53 Copyright © Acronis, Inc., 2000 - 2010 You have to protect each serve r as a whole, the users' data on the w orkstations, and the virtual machines. You want to be able to track the health of the data pr otection, be sure that th e backup archives do not sto re duplicated inf ormation and that the o bsolete backup s are deleted from the sto[...]

  • Pagina 54

    54 Copyright © Acronis, Inc., 2000 - 2010 When installing the storage node, register it o n the m anagement server in the sa me way as you register the agen ts. Installation t ips  Both AMS and ASN can be in stalled o n a w o rkstati o n o perating system as well.  There can be multip le stora ge no des on the network. Each of the n o des ca[...]

  • Pagina 55

    55 Copyright © Acronis, Inc., 2000 - 2010 When you need and hav e the opportunity to back up any of the ser vers, navigate to the backup plan as described abo ve, select the plan and run it. 2. 12. 2. 2 P rot ec tin g th e w or kst at io n s Here is how to se t up the most p opular schedule: weekly full backup and daily increm ental backup of user[...]

  • Pagina 56

    56 Copyright © Acronis, Inc., 2000 - 2010  Install Agent for Wind ows or Agent for Linux on each virtual machine. Register the machi nes on the management server. The machines will be c o nsidered as ph y sical machin es. You can apply a backup policy to th ese mac hines o r creat e a backup plan on each machine s eparately. If any of the machi[...]

  • Pagina 57

    57 Copyright © Acronis, Inc., 2000 - 2010 2. 12. 4. 1 A po lic y on a m ach in e o r a gro up In the diagrams bel o w, eac h numbered scheme illustr ates t he re sult of the respectively nu mbered action. The container stand s for a group; the colored circle stands for a ma ch ine with ap plied policy; the dark colored circle s tands for a machine[...]

  • Pagina 58

    58 Copyright © Acronis, Inc., 2000 - 2010 In the diagram bel ow, the container stands for a gr oup; the one-color cir cle stands for a machine with one applied p o licy; th e two-color circl e stands for a machine with t wo applied policies; the white circle stand s for a machin e with no p o licy app lied. 1. Here is the initial state: two cust o[...]

  • Pagina 59

    59 Copyright © Acronis, Inc., 2000 - 2010 In the diagram bel ow, the container stands for a gr oup; the tw o-color circle stand s fo r a machine with two applied polici es; the three-color circle s tands for a machine with thre e applied policies and so on. Besides the All ma chines group , we have the custom G1 gr o up in the root and the custom [...]

  • Pagina 60

    60 Copyright © Acronis, Inc., 2000 - 2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1 -> G2 -> #4 G2 -> #4 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines -> #5 o r #6 G1 ->[...]

  • Pagina 61

    61 Copyright © Acronis, Inc., 2000 - 2010 another policy. In this c ase, the first policy's state o n t he m achi ne will be Revoki ng and the sec o nd policy's state will b e Deplo yi ng . The p o licies can app ear in the GUI simultane o usly or on e after another. Backup policy state diagram 2. 12. 5. 2 P oli cy st at us on a ma ch in[...]

  • Pagina 62

    62 Copyright © Acronis, Inc., 2000 - 2010 The policy gets th e Warning status o n Windows m achin es that have either a D: or F: volu me, unless an event that will r esult in an error occurs. The policy that has to back up the [Syst em] and the /dev/sda1 v olumes, will get the Warning status on the Windows machines (sin ce /dev/sda is not found) a[...]

  • Pagina 63

    63 Copyright © Acronis, Inc., 2000 - 2010 This status is defined as the most severe status of th e policy on the m achine s included in the group and its child groups. If the policy is currently not appli ed to any machine, its stat us is "OK". 2. 12. 5. 5 C u mul at iv e s ta te a nd st at us of a p oli cy In addition to the depl oyment[...]

  • Pagina 64

    64 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at s our ce Performed on a m anaged machine during bac kup. Acronis Backup & Recovery 10 Agent uses the storage node t o determine what data can be deduplicated, and d o es not transfer the data whose duplicates are alread y present in the vault. Deduplication at targ et Performed in th e[...]

  • Pagina 65

    65 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at target After backup to a dedu plicating vault is completed, the storage node runs the in dexing task to deduplicate data in the vault as follows: 1. It moves the it ems (disk blocks or files) from the archives to a spe cial file within the vault, storing duplicate items there o nl y once. [...]

  • Pagina 66

    66 Copyright © Acronis, Inc., 2000 - 2010  The deduplicated items tha t have changed ar e not ide nti cal anymore and therefore will not be deduplicated. 2. 12. 6. 4 D ed up li ca tio n be st pr ac tic es Follow these recom m endat ions when using dedu plication:  When creating a dedu plicating v ault, place the vault and its deduplication d[...]

  • Pagina 67

    67 Copyright © Acronis, Inc., 2000 - 2010 Similarly, in case of three machin es, the ratio becomes 1.5:1; for four m achine s, it is 1.6 :1. It approaches 2:1 as more su ch machines are back ed up to the same vault. This means that y ou can buy, say, a 10-TB st o rage devic e instead of a 20-TB one. The actual amount of capacity r e duction is inf[...]

  • Pagina 68

    68 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 2 . 7 P r i v il e g e s f o r c e n t r a l i z e d ma n a g em e n t This section describes the users' privileges that are required to manage a machin e locally and remotely, to manag e a machine registered o n Acronis Backup & Recovery 10 Man agement Server, and to access and manage Acron[...]

  • Pagina 69

    69 Copyright © Acronis, Inc., 2000 - 2010 For information ab o ut Acr onis security groups and their default members, see Acronis secur ity groups (p. 69 ). 2. 12. 7. 4 Ac ro ni s s ec ur ity g rou ps On a machine runnin g Windows, Acronis securi ty gro ups determine who can ma nage the machine re motely and act as Acronis Backup & Recovery 10[...]

  • Pagina 70

    70 Copyright © Acronis, Inc., 2000 - 2010 DCNAME stands for the NetBIOS name of the domain co ntroller. E ach dollar sign is surrounded by a single space on either side.  Instead of explici tly including t he names of all members of the Administrat ors group, the Administrators gr o up itself is included. Tip: To ensure proper g roup names, you[...]

  • Pagina 71

    71 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that two us ers on a machine, UserA and Us erB, perform backups fr om this machine to a centralized vault m anaged by a storage no de. On the storage node, let these users have regular (n on - administrative) acc o unts U serA_SN and UserB_SN, res pectively. Normally, UserA c an access only[...]

  • Pagina 72

    72 Copyright © Acronis, Inc., 2000 - 2010 The setup progra m will assi gn the above listed user rig hts to any existing account you specify for a corresponding ser v ice. If you choose t o specify an existing user account for the agent service or the s to rag e node ser v ice, make sure that this account is a m ember o f the Backup Opera tors grou[...]

  • Pagina 73

    73 Copyright © Acronis, Inc., 2000 - 2010 For instructions on h ow to manage SSL certificat es used for secure authenti cation, see SSL certificates (p. 77 ). Note: The comp onents of earlier Acronis products, including those of the Acronis True Image Ec ho family, cannot conn ect to the Acronis Backup & Re covery 10 components, regardless of [...]

  • Pagina 74

    74 Copyright © Acronis, Inc., 2000 - 2010 3. In the Acronis pa ne to the rig ht, double -clic k a communication o ption that you want to configure. The Administrati v e Te mplate contains the following options (each option is explained later in this topic):  Remote Agent po rts  Client Encrypt ion options  Server Encryption options 4. For[...]

  • Pagina 75

    75 Copyright © Acronis, Inc., 2000 - 2010 Required Data transfer will be performed only if encr y ption is e nabled on the server applic atio n (see "Server Encryption o ptions "); it will b e encrypted. Authentication pa r ameters Selecting the Trust s elf-sig ned certificates check box allows the client to connect to the server applica[...]

  • Pagina 76

    76 Copyright © Acronis, Inc., 2000 - 2010 Do not use The use of SSL certificat es is disabled. Any connection to a client application which requires the use of SSL certificat es will not be established. Use if possible The use of SSL certificat es is enabled. The server will use SSL certific ates if their use is enabled on the cli ent application,[...]

  • Pagina 77

    77 Copyright © Acronis, Inc., 2000 - 2010 2. 12. 8. 5 SS L c ert if ic at es Acronis Backup & Rec overy 10 components use Se cure Sockets Layer (SS L) certificates for s ecure authentication. SSL certificates for th e components c an be one of the two types:  Self-signed certifi c ates , such as certifi cates automatically generated du ring[...]

  • Pagina 78

    78 Copyright © Acronis, Inc., 2000 - 2010 To g ene ra te a ne w sel f-s ign e d ce rti fi cat e 1. Log on as a m ember of the Administrators group. 2. In the Start menu, click Run , and then type: c md 3. Run the follo wing comman d (note quotation marks): "%CommonProgramFile s% Acronis Utils acronisc ert" -- reinstall 4. Restart Wi[...]

  • Pagina 79

    79 Copyright © Acronis, Inc., 2000 - 2010 3 O pt i on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is app licable to both stan d-alone and advanced edi tio ns of Acronis Backup & Rec overy 10. 3. 1 Co nso le o pti ons The console option[...]

  • Pagina 80

    80 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for a ll result s. To make a settin g for each resul t (successful co m pletion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box. 3 . 1 . 3 T i m e- b a s e d a l e r t s Last backup This option is effec tive whe n the console is connecte[...]

  • Pagina 81

    81 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backu p & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents. The preset is: Sy stem Default font f o r both the m enus and the application[...]

  • Pagina 82

    82 Copyright © Acronis, Inc., 2000 - 2010 This parameter can als o be set by using Acronis Admini strative Template (p. 334 ). 3 . 2 . 3 E v e n t t r a c i n g You can configure the manag ement server t o log even ts in the Application Event Log of Window s, besides the manag ement server's own log. You can configure the manag ement server t[...]

  • Pagina 83

    83 Copyright © Acronis, Inc., 2000 - 2010 3 . 2 . 4 D o m a i n a c c e s s c r ed e n t i a l s This option deter m ines the user name and password th at the managemen t server will use to access the domain. The preset is: N o credential s The management server needs domain access creden tials when working with a dynamic group that is based on th[...]

  • Pagina 84

    84 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 6.1 VMw ar e vC ent er i nteg ra ti on This option defines wh ether to show virtual machines managed by a V M ware vCenter Server in t he management ser v er and show the backup status o f th ese machines in the vCente r. Integration is avail able in all Acronis Backup & Re covery 10 advanced edi[...]

  • Pagina 85

    85 Copyright © Acronis, Inc., 2000 - 2010 Note: Acronis Backup & Recovery 10 Online supports o nly HTTP and HTTPS proxy serve rs. Proxy settings for t he agen t and the management ser ver are configured separat ely, even if both are installed on the s ame mach ine. To s et up pr oxy s er ver se tti ng s 1. Select the Use a p roxy server check [...]

  • Pagina 86

    86 Copyright © Acronis, Inc., 2000 - 2010 3 . 3 . 2 E v e n t t r a c i n g It is possible to dupli cate lo g events generated b y the agent(s), operatin g on the managed machine, in the Applicati on Event Log of Wind o ws; or s end the events to th e specified SNMP manag ers. I f you do not modify the event tracin g o pti ons anywhere except f or[...]

  • Pagina 87

    87 Copyright © Acronis, Inc., 2000 - 2010 You can override the settings set here, exclusivel y for the events that occur du ring backup or during recovery, in the D efault backup and recovery options (p. 89 ). In this ca se, the settings set here will be effective for oper atio ns o ther than backup and recovery, such as archive v alidati o n or c[...]

  • Pagina 88

    88 Copyright © Acronis, Inc., 2000 - 2010  /etc/snmp/snmpd .conf - config uration file for the Ne t -SNMP SN M P agent  /etc/snmp/snmptrap d.conf - configuration file fo r the Net-SNMP trap da emon. 3 . 3 . 3 L o g c l e a n u p r u l e s This option specifies h ow to clean up the Acronis Backup & Recovery 10 agent log . This option defi[...]

  • Pagina 89

    89 Copyright © Acronis, Inc., 2000 - 2010 If you choose Yes, I want t o participate in the ACEP , informa tio n about the hardware configuration, the most and lea st used features and about an y problems will be automatically collected fr om the machine and sent to Acro ni s o n a regular basis. The end results are intended to pr o vide softwar e [...]

  • Pagina 90

    90 Copyright © Acronis, Inc., 2000 - 2010 (p. 93 ) Pre/Post data capture commands (p. 95 ) + + - - Multi-volume snapshot (p. 97 ) + + - - File -level backup snap shot (p. 97 ) - + - - Use VSS (p. 97 ) + + - - Compression level (p. 98 ) + + + + Backup performanc e: Backup priority (p. 99 ) + + - - HDD writing speed (p. 99 ) Dest: HDD Dest: HDD Dest[...]

  • Pagina 91

    91 Copyright © Acronis, Inc., 2000 - 2010 Additional settings (p. 109 ): Overwrite data on a t ape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after backu p has finished Dest: removable media Dest: removable media Dest: removable media Dest: removable media Ask for the first media whil e backi[...]

  • Pagina 92

    92 Copyright © Acronis, Inc., 2000 - 2010 The AES cryptograp hic algorithm operates in the Ciph er -block chain ing (CBC) mode and uses a randomly generated key with a user-defin ed size of 128, 192 or 256 bits. The larger the key size, t he longer it will take fo r the pr ogram to encrypt the archi v e and the more secure your data will b e. The [...]

  • Pagina 93

    93 Copyright © Acronis, Inc., 2000 - 2010 Exclusion examples Cr it eri on Ex am ple D esc rip tio n Wi nd ows an d L in ux By name F.log F Excludes all files named "F.lo g" Excludes all folders nam ed "F" By mask (*) *.log F* Excludes all files with th e .log extension Excludes all files and folder s with names starting w ith &[...]

  • Pagina 94

    94 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y p re/ po st c omm an ds 1. Enable pre/post commands execution by ch eck ing th e fo llowing options:  Execute before the ba c kup  Execute after the backup 2. Do any of the f o llowing :  Click Edit to specify a new command or a batch fil e  Select the existing c ommand or the bat[...]

  • Pagina 95

    95 Copyright © Acronis, Inc., 2000 - 2010 4. If successful exe cutio n of the command is critical for y our backup strategy, sel ect the Fail the task if the comman d execution fails check box. In case the command execution fa ils, the program will rem ove the resulting TIB file and temporary files if possible, and the task will fail. When the che[...]

  • Pagina 96

    96 Copyright © Acronis, Inc., 2000 - 2010 4. Depending on the result you want to obtain, select th e appropriate options as d escribed in the table below. 5. Click Test comma nd to che ck if the c omm and is correct. Ch ec k b ox S ele cti on Fail the backup task if th e command e xecution fails Selected Cleared Selected Cleared Do not perform the[...]

  • Pagina 97

    97 Copyright © Acronis, Inc., 2000 - 2010 fails. 3. 4. 1.5 Fil e- le ve l b ac ku p sn ap sh ot This option is effec tive only for fil e -level bac kup in Wind ows and Linux operating systems. This option defines wh ether to back up files one by o ne or by taking an in stant data snapshot. Note: Files that are stored o n network shares are al ways[...]

  • Pagina 98

    98 Copyright © Acronis, Inc., 2000 - 2010 transactions, at the moment of taking the data snaps hot by Acronis Backup & Recover y 10. Data consistency, in turn, ensur es that the application will be recovered in the corr ect state and bec ome operational im m ediately af te r recover y. Th e preset is: C reate snap shots usin g VSS Acronis Back[...]

  • Pagina 99

    99 Copyright © Acronis, Inc., 2000 - 2010  Maximum – the da ta will be compressed as much as p ossible. The backup duratio n will be maximal. You ma y w ant t o select maximum co mpression when backing up to removable m edia to reduce the numb er of blank disks required. 3. 4. 1.9 Ba cku p per fo rm an ce Use this group of options to spe cify[...]

  • Pagina 100

    100 Copyright © Acronis, Inc., 2000 - 2010  Click Writing speed stated in kilobytes per se c ond , and then en ter the wri ting speed in kilobytes per second. Ne tw or k co nn ec ti on s pe ed This option is effec tive for Win dows and Linux opera ting systems and bootable media. This option is available when a location on the n et work (net wo[...]

  • Pagina 101

    101 Copyright © Acronis, Inc., 2000 - 2010 4. For the e-mail message to include the log entri es related to the backup, s elec t th e Add full log to the notification chec k box. 5. Click Addition al e-mail par ameters , to configure additional e-mail para m eters as follows, then click OK :  From - type the e-mail address of the user from who [...]

  • Pagina 102

    102 Copyright © Acronis, Inc., 2000 - 2010 The When user intera ction is required check box – to send notific ation during the operati o n when user interac tio n is re quired – is always selected. Click Send test W inPopup message to check if the s ettings are correct. 3. 4. 1.1 1 Ev en t tra ci ng It is possible to dupli cate lo g events of [...]

  • Pagina 103

    103 Copyright © Acronis, Inc., 2000 - 2010 To s el ect wh et her t o s end th e bac ku p o per at ion s eve nts t o t he SN MP ma nag er s: Choose one of th e following:  Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 85 ).  Send SNMP no ti ficati[...]

  • Pagina 104

    104 Copyright © Acronis, Inc., 2000 - 2010 The backup will aut omatically be split into several files if the destination disk's fil e system does not allow the esti mated file size. Such might be the case when the ba ckup is placed on FAT16 and FAT32 file system s t hat hav e a 4GB file size limit. If the destination disk ru ns out of free sp[...]

  • Pagina 105

    105 Copyright © Acronis, Inc., 2000 - 2010 To access file or folder NTFS p ermissions, select Properties > Secu rity . 3. 4. 1.1 5 Me di a com po ne nt s This option is effec tive for b oth Windows and Linu x operating sys tems, when the backup destinati on is removable m edia. When backing up to r emovable media, you can make this media work a[...]

  • Pagina 106

    106 Copyright © Acronis, Inc., 2000 - 2010 For example, if the backup destination on the netw o rk becom es unavailable or not reachable , t he program will atte m pt to re ach the destination every 30 seconds, but no more tha n 5 times. The attempts will be stopped as soon as the connection i s resumed OR the specified number of attempts is perfo[...]

  • Pagina 107

    107 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 1.1 8 T a sk st a rt co nd it io ns This option is effec tive in Wind ows and Linux opera ting systems. This option is not avail able when operating und er bootable media. This option deter m ines the program behavior in case a backup task is ab o ut to st art ( the schedu led time comes or th e eve[...]

  • Pagina 108

    108 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 1.1 9 T a sk fa ilu re ha nd ling This option is effec tive for Win dows and Linux opera ting systems. This option is not avail able when operating und er the bootab le media. This option deter m ines the program behavior when an y of the ba ckup plan's tasks fails. The preset is no t to restar[...]

  • Pagina 109

    109 Copyright © Acronis, Inc., 2000 - 2010 If you leave this option unchang ed, then the backups, belonging to the p o licy o r plan being created, might be written o nto tape s c ontainin g backups written by different backup policies and comprisin g of data from diff erent machines. Similarl y, backups from other policies m ight be writ ten onto[...]

  • Pagina 110

    110 Copyright © Acronis, Inc., 2000 - 2010 Overwrite data on a tape witho ut prompting for user confi rmation This option is effec tive only when bac king up to a tape devic e. The preset is: Disab l ed . When starting backup to a non-empty tape in a loc ally attached tape device, the program will warn that you are abou t to lose data on the t ape[...]

  • Pagina 111

    111 Copyright © Acronis, Inc., 2000 - 2010 When the option is enabled, Acronis Backup & Recov ery 10 will restart the ma chine after the backup process is complet ed. For example, if the machine boots from a hard disk drive by default and y ou select this check box, the machine will be restarted and the operating syste m wi ll start as soon as[...]

  • Pagina 112

    112 Copyright © Acronis, Inc., 2000 - 2010 creating a rec overy task, yo u can either use a default op tion, or override th e default option with the custom value that will be specific for this task onl y. You can also custo m ize a d efault option itself b y c han ging its value against the pr e -defined one. The new value will be us ed by defaul[...]

  • Pagina 113

    113 Copyright © Acronis, Inc., 2000 - 2010 Reboot machine automatically if it is requir ed for recovery + + - - Change SID after reco very Windows recovery - Windows recovery - Notifications: E-mail (p. 115 ) + + - - Win Pop- up (p. 116 ) + + - - Event tracing: Windows events log (p. 117 ) + + - - SNMP (p. 117 ) + + - - 3. 4. 2.1 Pr e/P os t c om [...]

  • Pagina 114

    114 Copyright © Acronis, Inc., 2000 - 2010 5. Click Test comma nd to che ck if the c omm and is correct. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails Selected Cleared Selected Cleared Do not reco ver until the command e xecution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery only after[...]

  • Pagina 115

    115 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y t he re co ver y p roc es s pr ior it y Select one of the f o llowing:  Low – to minimize resources taken by the r ecovery proces s, leaving more resources t o other processes running on the machine  Normal – to run t he rec o very pro ces s with n ormal speed, allocating resourc e[...]

  • Pagina 116

    116 Copyright © Acronis, Inc., 2000 - 2010  From - type the e-mail address of the user from who m the m essage will be sent. If you leave this field empty, m essages will be constructed as if they are fr o m the destin ation add ress.  Use encryption – you can opt for encrypted connec tion to the mail server. SSL an d TLS encryption types [...]

  • Pagina 117

    117 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 2.5 Eve nt t ra cin g It is possible to dupli cate lo g events of the rec overy operations, perfor m ed on the manag ed machin e, in the Applicati on Event Log of Wind o ws; or s end the events to th e specified SNMP managers. Wi nd ow s ev en t log This option is effec tive only in Win dows operati[...]

  • Pagina 118

    118 Copyright © Acronis, Inc., 2000 - 2010  Types of events to s end – c hoo se the types of events t o be sent : All events , Errors and warnings , or Erro r s only .  Server name/IP – type the name or IP address of the host running t he SN M P ma nagement application, the m essages will be sent to.  Community – t ype the name o f [...]

  • Pagina 119

    119 Copyright © Acronis, Inc., 2000 - 2010 This option defines wh ether to validate a backup t o e nsur e that the bac kup is not corrupted, before data is recovered fr om it. Check file system after recovery This option is effec tive only when r ecovering disks or volum es. When operating und er bootable media, this option is not effective for th[...]

  • Pagina 120

    120 Copyright © Acronis, Inc., 2000 - 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ea se of use and administra tion, a vault is associated with the archives' me tadata. Referring to this me tadata makes for fast and c onvenien t operations with archi ves and backups stored in the vault. A vault can be organ ized o[...]

  • Pagina 121

    121 Copyright © Acronis, Inc., 2000 - 2010 Way of working with the "Vaults" view Vaults (on the na vigation pane) - top element of th e vaults tree. Cli ck this item to display groups of centralized and pers o nal v aults. Centralized . This grou p is avail able when th e console is connected to a managed m achine or to a management s er[...]

  • Pagina 122

    122 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out privileges depending on the user rights, see the User privileg es o n a st o rage node (p. 70 ) sec tio n. Unmanaged vaults An unmanaged vau lt is a centrali zed vault that is not managed by a storage node. To access an unmanaged vault, a us er has to have access pri v ileges for the [...]

  • Pagina 123

    123 Copyright © Acronis, Inc., 2000 - 2010 Related sections: Operations with arch ives st ored in a vault (p. 154) Operations with ba ckups (p. 155) Filtering and sortin g archives (p. 157) Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clickin g the v aul t in the vault s tree. Duplicates actions[...]

  • Pagina 124

    124 Copyright © Acronis, Inc., 2000 - 2010 Delete a vault 1. Select the vault. 2. Click Delete . You'll be asked whether to ke ep the archives stored in t he vault, or delete the vaul t along with all the arch ives. The plans and tasks that use this vault will fail. If you choose to keep th e archives for a managed vault, the vault will be d [...]

  • Pagina 125

    125 Copyright © Acronis, Inc., 2000 - 2010 Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the v ault. You may need to enter ac cess crede ntials for the storage node. Path (p. 125) Specify where the v ault will be created. Managed cent ralized vaults can reside on a network share, SAN, NAS, o r on a ha rd[...]

  • Pagina 126

    126 Copyright © Acronis, Inc., 2000 - 2010 Va ult d at aba se p ath To s pec if y t he pa th w her e the v aul t's d ata bas e w ill be c re ate d 1. In the Local fold ers of the s to rage node, se lect the desired folder or ent er the full path to the folder in the Path fi eld. To create a new f o lder for the database, click Create f older [...]

  • Pagina 127

    127 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 2.2 Cr eat in g a n u nm an ag ed ce nt ra li zed v au lt To c re ate a n unm an age d c en tra li zed v aul t, pe rfo rm th e fol lo win g s te ps. Vault Name Specify a unique na me for the vault. The creati o n of two centrali zed va ults with the same name is prohibit ed. Comments Enter the disti[...]

  • Pagina 128

    128 Copyright © Acronis, Inc., 2000 - 2010 To a tta ch a ma nag ed va ult to a s tor age n ode , per for m the f oll owi ng s teps . Vault Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vault. Path Specify the path to the loca tio n where the archives are stored. Database pa th Specify a local fold er[...]

  • Pagina 129

    129 Copyright © Acronis, Inc., 2000 - 2010 by different comp o nents of other versions of the product by means o f Acr o nis Backup & Recov ery 10, see the Tape co m patibility table (p. 43 ) section. Acronis Backup & Rec overy 10 enables you t o set up di stribution of backups by media. For example, a separate tape set c an be us ed to ba[...]

  • Pagina 130

    130 Copyright © Acronis, Inc., 2000 - 2010 4. A tape with backups written by the storage n o de cann o t be read on a tape devic e, locally attached to a machin e, the agent is installed on, becau se of a difference in tape fo rm at. To get information about the readab ility of the archives on tapes, wri tt en by differ ent components of other ver[...]

  • Pagina 131

    131 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 3.5 Get ti ng s tar te d wi th a ta pe li br ar y If you have a tap e library device at tached to a machine with Acronis Backup & Recovery 10 St o rage Node installed, all yo u nee d to do t o back up onto the tape lib rary is to crea te an archive vault on the device under storage node manageme[...]

  • Pagina 132

    132 Copyright © Acronis, Inc., 2000 - 2010 If the tape barc ode cannot be read, an other T ask s Need I nteraction window as ks you to label a tape. A cti on s on a ta pe l ib ra ry va ul t If a tape library v ault is sele cte d on the Navigation pane of the console, the Centra li zed vau lts page toolbar will contain t he foll o wing two acti ons[...]

  • Pagina 133

    133 Copyright © Acronis, Inc., 2000 - 2010 To change the set tings of the backup policy/plan to be created click Change… in the Backup options section on the Create b ackup po li cy/plan page. It o pen s the Backup option s window where the Tape support page is contained with the pre-defined values. When backing up to a t ape and the end of the [...]

  • Pagina 134

    134 Copyright © Acronis, Inc., 2000 - 2010 Any user with access to a managed vault on a tape li brary is able to perform th ese operation s. However two or more user s cannot manage a tape library drive simultane o usly, because some operations can tak e minutes, hours or even da ys. For example, if a user launch es a tape library Rescan task, all[...]

  • Pagina 135

    135 Copyright © Acronis, Inc., 2000 - 2010 L ab el in g When a tape requir ed for data recovery is not found , the Task Need Interaction window will ask the user to bring the tape and insert it into a tape library s lot. So, all the tape cartrid ges need a barc o de or other readable lab els. If a tape does no t get a label, y o u should define it[...]

  • Pagina 136

    136 Copyright © Acronis, Inc., 2000 - 2010 If you leave this option unchan ged, then the backups, belonging to the p olicy or plan being created, might be written o nto tape s c ontaining backup s w ritte n by different backup polici es and co m prising of data from diff erent machines. Similarl y, backups from other policies m ight be written ont[...]

  • Pagina 137

    137 Copyright © Acronis, Inc., 2000 - 2010 cycle. The same tap e rotation enables you to ge t by wi th the minimum number of c artridges and not to be buried in used tapes. Acronis Backup & Rec overy 10 enables you to achi eve full automation of tape rotation while backing up onto tape libraries. This section provid es yo u with usefu l infor [...]

  • Pagina 138

    138 Copyright © Acronis, Inc., 2000 - 2010  capability of the tape library (number of driv es, loader s, slots and available tapes; capacity of tapes)  requirements for perf orming data recovery ( maximal duration) You need to anal yze every arg ument that is relevant for your case and select th e main criteria for the choice. Then choose a [...]

  • Pagina 139

    139 Copyright © Acronis, Inc., 2000 - 2010 backup policy/plan s tarts on Wednesday and full back ups should be created on ever y fourth Frid ay, on Wednesday the firs t backup will be full instead o f an increm ental one. There are anal yzed examples sho wing how the GFS scheme can be c ombined with different tape options in the foll o wing sec ti[...]

  • Pagina 140

    140 Copyright © Acronis, Inc., 2000 - 2010 The next figure d emonstrates the data backup archive at the moment. The differ ential backup is drawn as a blue rec tangle in the figure. Number 1 in the green rectangle ma rks the incre mental backup created o n Monday of the 1st week of the year. Then the following bac kups are written onto tape 02 : ?[...]

  • Pagina 141

    141 Copyright © Acronis, Inc., 2000 - 2010 Below, the figure sh ows the deleted backup s as actua l, but demonstrates tape usage during the whole year for the GFS backup scheme in combin ation with the specified tape options. A number in the green rectang le marks an incremental bac kup created on Monday of the c o rrespondin g week of the year. T[...]

  • Pagina 142

    142 Copyright © Acronis, Inc., 2000 - 2010 The full backup stor ed on tape 01 is d eleted after the next full bac kup is created onto both tapes 23 and 24 on Friday of t he 5 2nd week. As all bac kups of tape 01 have b ee n deleted, the tape is considered as fr ee and can be reused. Further analysis of t he exa m ple pr oves that the m aximal numb[...]

  • Pagina 143

    143 Copyright © Acronis, Inc., 2000 - 2010 If all the backups hav e to be kept during the year, the archive will req uire 28 tap es. As the GFS backup sche me forces automatic del etion of the outdated backup s, on the first Friday of the second year the tapes keep only the backups disp layed in the next figure.[...]

  • Pagina 144

    144 Copyright © Acronis, Inc., 2000 - 2010 This figure dem o nstrates th at the GFS Example 2 tap e rotation scheme is more sui table for the case than GFS Example 1 . The a dvantages of the GFS Example 2 tape r o tation s cheme for the anal yzed case are the foll owing:  it uses 16 tapes instead of 25  a data recovery ta sk requ ires one (2[...]

  • Pagina 145

    145 Copyright © Acronis, Inc., 2000 - 2010  backup deletion fre es a tap e so it can be reused. The main drawbac k is the l arge number of required ta pes that is used 5-10%. If we have to ke ep a daily backup fo r a wee k (4 backups) and a weekly bac kup for a month (4 backups), the total nu mber of required tapes will b e equal to 4+4+13+1 = [...]

  • Pagina 146

    146 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 1 Suppose, the backup plan has the following tape opti o ns:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is cleared  the Always use a free tape : For each incremental bac kup option is cleared  the Always use a free [...]

  • Pagina 147

    147 Copyright © Acronis, Inc., 2000 - 2010  five-level sche me requires up t o five tapes f o r this cas e. T oH Ex am ple 2 Suppose, the backup plan has the following tape options:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is selected  the Always use a free tape : For ea[...]

  • Pagina 148

    148 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 3 Imagine the backup pla n has the f o llowing tap e o p tions:  the Use a separate ta pe set option is selected  the Always use a free tape : For each full backup option is selected  the Always use a free tape : For each incremental bac kup option is selected  the Always use a [...]

  • Pagina 149

    149 Copyright © Acronis, Inc., 2000 - 2010 To simplify the tape pla nnin g lets discard the p o ssibility tha t the calculated tapes might contain backups of other data. I t is implied that the Use a sepa r ate tape set option is enabled . To calculate the nu mber of tapes you should take in to account the following c onsiderations :  full back[...]

  • Pagina 150

    150 Copyright © Acronis, Inc., 2000 - 2010 Total number of req uired tapes = r ound up ((2*F_GB + 12*I_GB + 11*D_GB) * C L / T_GB) + 1 = ro und up ( (2*320 + 12* 1 6 + 11 *40) * 1 / 400 ) + 1 = round up ( 3. 18 ) + 1 = 5 (tape s). T ap e p la nn in g: E xam pl e 2 Imagine the cas e with the f o llowing featur es:  full backup size is F _GB  [...]

  • Pagina 151

    151 Copyright © Acronis, Inc., 2000 - 2010 node database has all the required information ab o ut the c o ntent of the moved tapes. So all you need to do is to perform th e inventory (p. 134) procedure for t he managed vault on the library where th e tapes we re placed t o. 2. If you move t apes to a tape library managed by another storage node, y[...]

  • Pagina 152

    152 Copyright © Acronis, Inc., 2000 - 2010 Metadata The .meta folder is created during backup in every personal vault. This folder con tains additional information about a rchives and backups stored in the vault, such as archive o wners or the machine name. If you acciden tally delete the .meta f older, it will be au tomatically recr eated next ti[...]

  • Pagina 153

    153 Copyright © Acronis, Inc., 2000 - 2010  [Archive Name] The Actions bar is availab le when you select an arch ive in the ar chives table. Duplicates acti ons of the archi v es toolbar.  [Backup Name] The Ac tion s bar is available when you expand the archive and click on a ny o f its backups. Duplicates ac tio n s of the archives t o olba[...]

  • Pagina 154

    154 Copyright © Acronis, Inc., 2000 - 2010 4. 2. 2.1 Cr eat in g a pe rs ona l v au lt To c re ate a p ers on al va ult 1. In the Name field, type a name for the vault b eing created. 2. [Optional] In th e Commen ts field, add a descrip tion of the vault. 3. In the Path field, click Change... In the opened Person al Vault Path window, specify a p [...]

  • Pagina 155

    155 Copyright © Acronis, Inc., 2000 - 2010 To Do Validate an archive Click Validate . The Validation (p. 233 ) page will be opened with the pre-s elected archive as a source. Validation of an a rchive will check all the archive's backu ps. Export an a rchive Click Export . The Export (p. 240 ) page will be opened with the pre-select ed archiv[...]

  • Pagina 156

    156 Copyright © Acronis, Inc., 2000 - 2010 Validate a backup Click Validate . The Validation (p. 233 ) page will be opened with the pre-s elected backup as a source. Validation of a fil e backup imitates re covering of all files from th e backup to a dummy destination. Valid ation of a d isk backup calculates a checksum for e very data block saved[...]

  • Pagina 157

    157 Copyright © Acronis, Inc., 2000 - 2010 4 . 3 . 4 F i l t e ri n g a n d s o r t i ng a r c h i v e s The following is a guid eline for you to filter and s ort archi v es in the ar chives table. To Do Sort backup a rchives by any column Click the column's header to sort the archives in a scending order. Click it once again to sort th e arc[...]

  • Pagina 158

    158 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aunched systemati cally keeping t he critical data safely protected. The scheduler uses lo cal ti m e of the m achine t he ba[...]

  • Pagina 159

    159 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last successful backup completed The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multiple conditions) is not met is defin ed by the Task start c o nditions (p. 1 07) backup option. What-ifs  What if an event o cc u[...]

  • Pagina 160

    160 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily s chedule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 da y (s ). 2. Once at: 06:0 0:00 PM . 3. Effective: From: not set . The t ask will be started on the current day, if it has been created b efo re 6PM. If yo[...]

  • Pagina 161

    161 Copyright © Acronis, Inc., 2000 - 2010 task's recurrence s is 4 hours, and bet ween the third, fourth and fifth is 2 hours. In this case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 da y (s). 2. Every: 4 h o urs. From: 08:00:00 AM Until: 1 2:00:00 PM . 3. Effective: From: 09/20/2 0 09 . To: not[...]

  • Pagina 162

    162 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Friday at 1 0PM, starting fr om a cer tain date (say 05/14/2009) and endin g after six months. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 week(s) on: Fri . 2. Once at: 10:0 0:00 PM . 3. Effective: From: 05[...]

  • Pagina 163

    163 Copyright © Acronis, Inc., 2000 - 2010  Thursday: every 3 h o urs fr om 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. sa me as on Monday)  Saturday: once at 9 PM  Sun day: once at 9 PM Combining the identical times, the following thr ee schedules can be add ed to the task: First schedule 1. Every: 1 we ek (s) on : Mon , Fri[...]

  • Pagina 164

    164 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run during the spec ified time interval. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be ru n 12 times from 10 AM to 10 PM during one day . In[...]

  • Pagina 165

    165 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of Novemb er. By setting up this date we just define that the task must be discon tinued in 20 10, after autu m n end s in the northern hemispher e. Several monthl y schedules for on e task In the case when the task needs to be run on differ[...]

  • Pagina 166

    166 Copyright © Acronis, Inc., 2000 - 2010 Use Wake- On -LAN When this setting is e nable d, Acronis Backup & Recovery 10 Management Server will use the Wake- On -LAN (WOL) func tio nalit y to wake up turned-off registered machines wh en a backup, cleanup or validation is sch eduled to start. If th e backup task on each machine starts with a d[...]

  • Pagina 167

    167 Copyright © Acronis, Inc., 2000 - 2010 Then the time of th e task's first run on each machine m ay be an y time between 09:00:00 AM and 09:59:59 AM; the interval between the first and the second run is exac tly two hours — for instance: First machine: Ev ery day a t 09:30:03 AM and 11:30:03 AM Second machine : Every day at 09: 00:00 AM [...]

  • Pagina 168

    168 Copyright © Acronis, Inc., 2000 - 2010 Examples "Bad block" eme r gency ba ckup One or more bad blo cks that have suddenly appeared o n a hard dis k usually indicate that the hard disk drive will so o n fail. Sup pose that you want to create a bac kup plan that will back up hard disk data as soon as such a situation occurs. When Wind[...]

  • Pagina 169

    169 Copyright © Acronis, Inc., 2000 - 2010 2. In the list of ev ents in the ri ght pane, double-click the name of an event whose pr operties you want to view. 3. In the Event Prop erties dialog box, v iew the event's properti es such as the event source, sho wn in the Source field ; and the ev ent number, shown in th e Event ID field. When yo[...]

  • Pagina 170

    170 Copyright © Acronis, Inc., 2000 - 2010 Example: It is required to run t he bac kup task after free space o n the managed machine is changed by at least 1 GB, but only if all users are logged off and more than 12 hours ha ve passed since the last backup . Set the schedule, conditions and t he Task start c ondit ions backup option as follows: ?[...]

  • Pagina 171

    171 Copyright © Acronis, Inc., 2000 - 2010  Task start conditi o ns: Skip the task execution . As a result, (1) If 9:00 PM co mes and the loca tio n's h ost is availab le, the backup task starts ri ght o n time. (2) If 9:00 PM co mes but the hos t is unavailable a t the moment, the backup task will start on the next workday if the l ocatio[...]

  • Pagina 172

    172 Copyright © Acronis, Inc., 2000 - 2010  If the task start c onditions are Wait unt il the condition s are met and the Run th e task anyway after check box is selected with, say, th e 1 Hour waiting time, the task (schedul ed to run at 3:00 PM) will star t at 4:0 0 PM — the t ime w hen the waiting period ends. 5 . 7 . 4 U s e r l o g g e d[...]

  • Pagina 173

    173 Copyright © Acronis, Inc., 2000 - 2010 6 D ir ect m an agem ent This section covers o perati o ns that can be performed directly on a m anaged machine by using the direct console-agent co nne ction. The content of this secti on is applicable to both stand-alone and advanced editions o f Acron is Backup & Recovery 10. 6. 1 Ad mi nis ter in [...]

  • Pagina 174

    174 Copyright © Acro nis, Inc., 2000- 2010 licenses. Please make sure you h ave a valid license on Acroni s License Server. After a successful licen se check the agent will start working. Trial version of prod uct expires in X day (s) Please make sure you h ave a valid license on Acroni s License Server. Connect Once the trial version of the p rod[...]

  • Pagina 175

    175 Copyright © Acronis, Inc., 2000 - 2010 H ow it i s d ete rmi ned Errors Highlight the date in red if at least one "Error" entry a ppeared in the log on t his date. Warnings Highlight the date in yellow if no "Error" entries appear ed and at least one "Warn ing" entry appeared in the log o n this date. Information [...]

  • Pagina 176

    176 Copyright © Acro nis, Inc., 2000- 2010  In the backup tabl e, select the backup plan (task).  Use the toolbar's but to ns t o take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 1 7 9) section f or details. You can ru n, edit, stop and delete the creat ed plans and tasks.  Use the Information[...]

  • Pagina 177

    177 Copyright © Acronis, Inc., 2000 - 2010 A backup plan status is derived fro m the results o f the last run of the plans' tasks. S tat us H ow it i s d ete rmi ned H ow to han dle 1 Error At least one task has failed. Otherwise, see 2 Identify the failed task s -> Check the tasks log t o find out the reason of the failure, t hen do one o[...]

  • Pagina 178

    178 Copyright © Acro nis, Inc., 2000- 2010 Need interaction Any running task can put itself into the Need interact ion state when it needs human inter action such as changing m edia or ig noring a read error. The next state may be Stopping (if the us er chooses to stop the t ask) or Running (on selec ting Ignore/Retry or anothe r action, such as R[...]

  • Pagina 179

    179 Copyright © Acronis, Inc., 2000 - 2010 centralized plan has failed 2 Warning Last result is "Succe eded with warning" View the log to read th e warnings - > [optionally] Perform actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" No action is required.[...]

  • Pagina 180

    180 Copyright © Acro nis, Inc., 2000- 2010 Run a plan/ta sk Backup plan Click Run . In the Run Backup Plan (p. 183 ) windo w, select the task you n eed to be run. Running the back up plan starts the selected task of th at plan immediately in spite of its schedul e and conditions. Why can't I run th e backup plan?  Do not have the app ropri[...]

  • Pagina 181

    181 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 188 ), except for the following limitat ions : It is not always possible to u se all scheme options, when editing a backu p plan if th e created archive is not em pty (i.e. contains back ups). 1. [...]

  • Pagina 182

    182 Copyright © Acro nis, Inc., 2000- 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks. Why can't I de lete the backup plan?  The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of it s tasks is r[...]

  • Pagina 183

    183 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If req uired, you can hide the displayed c olumns and show hidden o nes. To s how o r h ide c ol umns 1. Right-click an y column header to open the co ntex t menu. The menu items tha[...]

  • Pagina 184

    184 Copyright © Acro nis, Inc., 2000- 2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recov ery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Master boot record recov ery Recovery (disk to existing V M) Recovery of a disk/volum e backup to an existing virtual machine Recovery (disk to new VM) Re[...]

  • Pagina 185

    185 Copyright © Acronis, Inc., 2000 - 2010 Pr ogress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progr ess, elapsed time and other para meters. Ba cku p pla n de ta ils The Backup plan de tails window (also duplicat ed on the Information panel) aggr ega[...]

  • Pagina 186

    186 Copyright © Acro nis, Inc., 2000- 2010  Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule.  Backup options - backup options changed against the default values. 6 . 1 . 3 Log The Log stores th e history of operati ons performed b y Acronis Bac kup & Recovery 10 on the mac[...]

  • Pagina 187

    187 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry. 2. Do one of the followin g  Click View Details . Th e log entry's details will be displayed in a separat e window.  Expand th e Information panel, by clicking the chevron. Save the selected log entries to a file 1. Select a single log ent ry [...]

  • Pagina 188

    188 Copyright © Acro nis, Inc., 2000- 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r h ide c ol umns 1. Right-click an y column header to open the co ntext m enu. The menu items that are t icked o ff [...]

  • Pagina 189

    189 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g s teps . General Plan name [Optional] Enter a uniq ue name for the backup plan. A conscious name lets you id entify the plan among others. Plan's credentials (p. 191) [Optional] The backup plan will run on behalf of th e user who is creating [...]

  • Pagina 190

    190 Copyright © Acro nis, Inc., 2000- 2010 Access credentials (p. 200) [Optional] Provide credentials for the location if the pl an account does not have a cce ss permissions to the l ocation. To access this opti o n, sele ct the Advanced v iew check box. Archive comments [Optional] Enter c omments on the archive. To a ccess this opti o n, select [...]

  • Pagina 191

    191 Copyright © Acronis, Inc., 2000 - 2010 Virtualization s erver (p. 211) Here you select the resulting virtual machine type and location. Available o ptions depend o n the host you selec te d in the pre vio us step. Storage (p. 211) Choose the storage o n the v irtualizati on server or the folder to pla ce the v irtual machin e files in. Resulta[...]

  • Pagina 192

    192 Copyright © Acro nis, Inc., 2000- 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed. Select this option to back up specific files and folders. If you are not conc erned about recovery of the op erating system along with all the settings and applications, but pla n to keep safe only [...]

  • Pagina 193

    193 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the ma chine goes into hibernation (hiberfil.s ys) are not backed up. After recover y , the files will be re -cre ated in the appropriate place with the zero size. A volume backup s to res all o ther files and f olders of t[...]

  • Pagina 194

    194 Copyright © Acro nis, Inc., 2000- 2010 6 . 2 . 6 E x c l u s i o n s Set up exclusions for the specific t y pes of fil es yo u d o not wish to back up. For example, you may not want database, hidden and system files and folder s, as well as files w ith specifi c extensi o ns, to be stored in the archiv e. To s pec if y w hi ch fi les a nd fol [...]

  • Pagina 195

    195 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes th[...]

  • Pagina 196

    196 Copyright © Acro nis, Inc., 2000- 2010  To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you select. While you are revi[...]

  • Pagina 197

    197 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 200) to the arc hive name. If you do not select the Name ba c kup files us ing the archive name. . . check box:  Each backup will hav e a unique file name with th e exact time stamp and the backup type; for example: MyData_ 2010_03_26_[...]

  • Pagina 198

    19 8 Copyright © Acro nis, Inc., 2000- 2010  Your script can m o ve older backups based on the date stamp. See also “The *Dat e+ variable” (p. 200 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hin a da y Consider the follo wing scenario:  You want to perfor m hourl y backups of your server's c ritical files every day.  You want the [...]

  • Pagina 199

    199 Copyright © Acronis, Inc., 2000 - 2010  You want to swap th e drive s each Monday, so that on e drive contains backups of the curr ent week (Monda y through Sund ay), and the other dri ve those of the previous wee k. In this scenario, you need t o create two backup plans as foll o ws: a) When creating the first b ackup plan, specify MyMach [...]

  • Pagina 200

    200 Copyright © Acro nis, Inc., 2000- 2010 6. 2. 8.2 Th e [ DA TE ] va ri ab le If you specify the [DATE] vari able in the archive name, the fil e name of each backup will inclu de that backup’s creation da te . When using this variable, th e first backup o f a ne w day will b e a full backup. Before crea ting the next full backup, the sof tw ar[...]

  • Pagina 201

    201 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the source data usi ng the cre dentials of the backup plan account specified in the Gen eral section.  Use the followin g creden tials The program will ac cess the source data usin g the cred entials you specify. Use this option if the plan account d o es not have access permis[...]

  • Pagina 202

    202 Copyright © Acro nis, Inc., 2000- 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 29 ). 6. 2. 10. 2 Ba ck u p lat er sc he me With the Back up later scheme, the backup will b e performed only once, at the date and ti me you specify. Specify the appropria te settings as follows B[...]

  • Pagina 203

    203 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups. Monthly backups run every fourth Frida y, and weekly backups run on all other Friday[...]

  • Pagina 204

    204 Copyright © Acro nis, Inc., 2000- 2010  Keep monthly ba ckups indefin itely . Backup scheme para meters can then be s et up as foll o ws.  Start backup at: 11: 00 PM  Back up on: All days  Weekly/monthly : Saturday (for example)  Keep backups:  Daily: 1 week  Weekly: 1 month  Monthly: indefinite l y As a result, an arch[...]

  • Pagina 205

    205 Copyright © Acronis, Inc., 2000 - 2010  Have a weekl y summary of fil e changes since las t month (Friday weekly diff erential backup).  Have a monthly ful l backup of your files. Moreover, assu m e that yo u want to retain ac ces s t o all backup s, including the daily ones, f or at least six months. The following GFS sche me suits such[...]

  • Pagina 206

    206 Copyright © Acro nis, Inc., 2000- 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p. 159 ), weekly (p. 161 ), or monthly (p . 163 ) schedule. Setting u p schedule parameters allow s creating simple schedule s (example of a simple daily schedule: a backup task will be run every 1[...]

  • Pagina 207

    207 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an g o ba ck Ro ll- ba ck pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 da ys 16 to 47 days 16 days Adding a level d oubles the full backup and roll-back p [...]

  • Pagina 208

    208 Copyright © Acro nis, Inc., 2000- 2010 Incremental Specifies on what sched ule and un der which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full b ackup is created instead of the in cremental backup . Differential Specifies on what schedule an d under which conditio ns to pe[...]

  • Pagina 209

    209 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche me yields a full backup perfor m ed every Frid ay night. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param eters excep t Schedule in Ful l backup are left empty. All backups in the archive are kept indefinitely (no archi ve cleanup [...]

  • Pagina 210

    210 Copyright © Acro nis, Inc., 2000- 2010 Finally, we create r etention rules for the archiv e: let us retain only backups that are no older than six months, and let the c leanu p be performed after each backup task and also on the last day of every month. Retention rules : Delete ba ckups o lde r than 6 months Apply the rule s : After ba cking u[...]

  • Pagina 211

    211 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 1 1 A r c h i v e v a l i da t i o n Set up the validati on task t o check if the bac ked up data is re coverable. If the backup could n ot pass the validation su ccessfully, the valida tion task fails and the bac kup plan gets the Error status. To set up validati o n, specif y t he foll o wing pa[...]

  • Pagina 212

    212 Copyright © Acro nis, Inc., 2000- 2010 Which agent is installed on the host? The resulting virtual m achi ne ty pe and location depen d o n the agen t that resides o n the sele cte d host.  Agent for Windo ws is installed on th e host You have a choi ce of virtual machine types: VMware Workstati o n, Micr oso ft Vir tual PC, or Parallels Wo[...]

  • Pagina 213

    213 Copyright © Acronis, Inc., 2000 - 2010 If the managed machin e's operating system fails to start or you ne ed to recove r data to bare metal , boot the machin e from the bootable media (p. 391) or using Acronis Startup Recover y Manager (p. 47 ). Then, creat e a recovery task. Acronis Universal Re store ( p. 48 ) lets y o u recover and bo[...]

  • Pagina 214

    214 Copyright © Acro nis, Inc., 2000- 2010 Access credentials (p. 217) [Optional] Provide credentials for the archive lo cation if the ta s k account do es not have the right to access it. To access this option, select th e Advan c ed view check b ox. Where to recover This section appears aft er the required backup is sel ected and the type of dat[...]

  • Pagina 215

    215 Copyright © Acronis, Inc., 2000 - 2010 After any of the settings is cha nged against the defaul t v alue , a new line that dis plays the newly set value appears. T he setting status changes from Default to Custom . Should y ou modify the settin g again, the lin e will disp lay the new value unless th e new value is the default one. When the de[...]

  • Pagina 216

    216 Copyright © Acro nis, Inc., 2000- 2010 If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first o ne when the p rogram prompts.  If the archive is st o red on a network share, expand th e Network folders gr oup, then select the required netw orked m achin[...]

  • Pagina 217

    217 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 4.1 Dis ks /v olu mes s ele cti on To s el ect a b ac ku p and di sk s/ vo lum es t o r ec over : 1. Select one of the successiv e backups by its c reation d ate and time. Thus, you ca n revert the disk data to a certain moment in tim e. Specify the items to recover. By default, all it ems of the se[...]

  • Pagina 218

    218 Copyright © Acro nis, Inc., 2000- 2010  Use the followin g creden tials Th e program will access the locati on using the creden tials you specify. Use this option if th e task account does no t have access permissions to the l o cation. Y o u might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault. Specif[...]

  • Pagina 219

    219 Copyright © Acronis, Inc., 2000 - 2010 Please be aware tha t the target machine will be po wered off automatically be fore the recovery. If you prefer to power it off manuall y, modify the VM po wer management op tion. Disk #: Disk # (MODEL ) (p. 221 ) Select the destinati o n disk for ea ch o f the so urce disk s. NT signature (p. 21 9) Selec[...]

  • Pagina 220

    220 Copyright © Acro nis, Inc., 2000- 2010  Keep existing The program will lea v e the existing NT sign ature of the t arget hard disk as is. 6. 3. 6.2 Vol um es Available volume dest inati o ns depend on the agents o perating o n the machine. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows[...]

  • Pagina 221

    221 Copyright © Acronis, Inc., 2000 - 2010 M BR des t in at io n To s pec if y a de st in ati on di sk : 1. Select the disk to recover t he MBR to. 2. Click OK . Vo lu me de st in at ion To s pec if y a de st in ati on vol um e: 1. Select a volu m e or unall ocated space where you want the selected volume to be r ecovered to. The destination v o l[...]

  • Pagina 222

    222 Copyright © Acro nis, Inc., 2000- 2010  Logical . Informa tion about logical vo lumes is located not in the MBR, but in the extended partition table. The number of logical volumes o n a disk is un lim ited. A l ogical volume cann o t be set as active. If you recover a sys tem volume to anoth er hard disk with its own volumes and operating s[...]

  • Pagina 223

    223 Copyright © Acronis, Inc., 2000 - 2010 Storage Initial settin g : the default s to rage of the v irtualizati on server if the new machin e is created o n the virtualization ser v er. Other wise the current user's documents fo lder. This is the place wher e the new virtual machin e will be creat ed. Whether you can chan ge the storage on t[...]

  • Pagina 224

    224 Copyright © Acro nis, Inc., 2000- 2010 Re co ver y ex clu sio ns Set up exclusions for the specific file s you do not wish to rec o ver. Use the Add , Edit , Remove and Remove A ll buttons to create t he list of file masks. Files whose names match any of t he m asks will be s kipped during recovery. You can use one or more wildcard characters [...]

  • Pagina 225

    225 Copyright © Acronis, Inc., 2000 - 2010  Do not overwrite ex i sting file - this will gi ve the file o n the hard disk priority over the file in the backup. If you allow files to be overwritten, you still have an op tion to prevent over writing of specific files by excluding (p. 224) the m from the recovery o peration. 6 . 3 . 7 A c c e s s [...]

  • Pagina 226

    226 Copyright © Acro nis, Inc., 2000- 2010 DVD supplied by th e hardware vendor o r downl o ad th e drivers from the v endor’s Web site. The driver files sh ould have the *.inf, *.s ys or *.oem extensions. If you d ownload the drivers in the *. exe, *.cab or *.zip forma t, extract them using a third-party application, such as WinRA R (http://www[...]

  • Pagina 227

    227 Copyright © Acronis, Inc., 2000 - 2010 Drivers for a virtual m achine When recovering a sy ste m to a new v irtual ma chine, the Universal Restore techn olo gy is appli ed in the background, becaus e the program knows what drivers are required for the supported virtual machines. When recovering th e system to an existing virtual m achi ne that[...]

  • Pagina 228

    228 Copyright © Acro nis, Inc., 2000- 2010 8. [Optionally] Re view the Virtual machine sett i ngs (p . 222 ) and make changes if necessary. Here you can change the path to the ne w virtual machine. The same type o f machines with the sam e name cannot be creat ed in th e same folder. Change either the VM name, or the path if you get an error messa[...]

  • Pagina 229

    229 Copyright © Acronis, Inc., 2000 - 2010  Windows was r ecovered to a dyna mi c volume tha t cannot be bo otable Solution : Reco v er Windo ws to a basic, simple or mirr ored volume.  A system volume w as rec overed to a disk that does not have an MBR When you configure r ecovery of a system volu me to a disk that does not have an MBR, the[...]

  • Pagina 230

    230 Copyright © Acro nis, Inc., 2000- 2010 6. 3. 11. 1 Ho w to re ac ti vat e GRU B an d c ha ng e i ts c on fi gu ra ti on Generally, you sh o uld refer to the boot l oader manual p ages for the appr o priate p rocedure. There is also the corresp o nding Kno wledg e Base ar ticle on the Acronis Web site. The following is an e xample of how to rea[...]

  • Pagina 231

    231 Copyright © Acronis, Inc., 2000 - 2010 9. Specify the disk o n which GRUB is located — typically, t he boot or root partition: root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot rec o rd (MBR) of the first disk, run the following com m and: setup (hd0) 11. Exit the G RUB shell: quit 12. Unmount t he m o unted fil [...]

  • Pagina 232

    232 Copyright © Acro nis, Inc., 2000- 2010 To resolve the pr o blem, d o either of the following:  Recover the files a s two or more groups. For ex ample, if the problem occurs when recoverin g 1 million files, tr y recovering t he first 5 0 0,000 o f the m and then the r emaining 500,000.  Modify the registr y as follows: Note: This proced [...]

  • Pagina 233

    233 Copyright © Acronis, Inc., 2000 - 2010 1. Connect to the management server and r emove the storage node from it. Note: All vaults mana ged by the storage nod e will also be removed from the man agement server. No archives will be lost. 2. Add the storage n ode to the management s erver again, by specifiying the ma chine on which the recovered [...]

  • Pagina 234

    234 Copyright © Acro nis, Inc., 2000- 2010 What to validate Validate Choose an object t o validate: Archive (p. 234 ) - in tha t case, you need to specify t he arch ive. Backup (p. 235 ) - sp ecify the archive first, and then select th e desired backup in th is archive. Vault (p. 236 ) - select a vault (or other location), which archive s to valid[...]

  • Pagina 235

    235 Copyright © Acronis, Inc., 2000 - 2010 Exporting and mounting are not supported for ba ckups stored in Acronis Online Ba ckup Storage.  If the archive is st o red in a centralized vault, expand th e Centralized group and click the vault.  If the archive is st o red in a personal vault, expand the Person al group and click the vault.  [...]

  • Pagina 236

    236 Copyright © Acro nis, Inc., 2000- 2010 6 . 4 . 4 L o c a t io n s e l e ct i o n To s el ect a l oca ti on Enter the full path to the l ocation in the Path fi eld or select the desired l ocation in the folders tree .  To select a centraliz ed vaul t, expand the Central i zed group and c lick the appropriate vault.  To select a personal v[...]

  • Pagina 237

    237 Copyright © Acronis, Inc., 2000 - 2010 6 . 4 . 6 W h e n t o v a l i d a t e As validation is a resource-intensive operation, it ma kes sense to schedule valid ation to the managed machine's off-pea k period. On the other hand, if you prefer to b e immedi ate ly inf ormed whether the data is not corrupted and can be successfully rec overe[...]

  • Pagina 238

    238 Copyright © Acro nis, Inc., 2000- 2010 Access credentials (p. 239) [Optional] Provide credentials for the archive locati o n. To access this o ption, s elect the Advanced vie w check box. Mount settings Volumes (p. 239 ) Select volumes t o mount an d configure the m ount settin gs for every v olume: assi gn a letter or enter the mount po int, [...]

  • Pagina 239

    239 Copyright © Acronis, Inc., 2000 - 2010  To access a managed vault, type the following string in the Path fi eld: bsp://node_ad dress/vault_name/  To access an unmanag ed centralized vault, type the full path to the v ault's f older. 2. In the table t o the righ t of the tree, s elec t the archive. The table displays the names of the[...]

  • Pagina 240

    240 Copyright © Acro nis, Inc., 2000- 2010  Read only - enables e xploring and opening files within the backup without com mitting any changes.  Read/write - with thi s mode, the program assume s t hat the ba ckup content will be modified, and cr eat es an in cremental backup to captu re the chang es.  Assign letter (in Wind ows) - Acroni[...]

  • Pagina 241

    241 Copyright © Acronis, Inc., 2000 - 2010 Usage scenarios Export enables y o u to separate a specifi c backup from a chain of incre m ental bac kups for fast recovery, writing onto rem o vable or deta chable media or other pu rposes. Example. When bac king up data to a remote locati on throug h an unstable or l o w-bandwidth netw o rk connection [...]

  • Pagina 242

    242 Copyright © Acro nis, Inc., 2000- 2010  export from an unman aged centralized vault . The ex port is perfor med by the agent installed on the managed machin e you specify. The destin ation can be any location acces sible to the agent, including a managed vault. Tip. When configuring e xport to a ded uplicating managed vault, choose a machin[...]

  • Pagina 243

    243 Copyright © Acronis, Inc., 2000 - 2010 Where to export Archive (p. 245) Enter the path to the location where th e new archive will be creat ed. Be sure to provide a distinct name and comment f o r the new arch ive. Access credentials (p. 246) [Optional] Provide credentials for the destination if th e task credentials do not h ave enough privil[...]

  • Pagina 244

    244 Copyright © Acro nis, Inc., 2000- 2010  If the archive is st o red in a l ocal folder on the machine, expand t he Local fo l ders g ro up and click the required f o lder. If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first o ne when the p rogram prom[...]

  • Pagina 245

    245 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the following:  Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section.  Use the followin g credentia l s The program will ac cess the location using t he creden tial[...]

  • Pagina 246

    246 Copyright © Acro nis, Inc., 2000- 2010 According to t he original FTP specifica tion, credentials required for acce ss to FTP servers are transferred through a ne twork as plaintext. This means that th e user name and password can be intercepted by an eavesdropper using a p acket sniffer.  To export data t o a locall y attached tape device,[...]

  • Pagina 247

    247 Copyright © Acronis, Inc., 2000 - 2010 Specify:  User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain)  Password . The passw ord for the account. 2. Click OK . According to the original FTP specification, c redentials required for access to[...]

  • Pagina 248

    248 Copyright © Acro nis, Inc., 2000- 2010 To a llo ca te s pa ce for Ac ro nis S ecu re Zo ne 1. Choose a hard disk (if several) on which to cr eate the zone. The unallocated spa ce is selected by default. The progra m displays the total space a vailable for the Acronis Secure Zone. 2. If you need to allo cate more space for the zone, you can sel[...]

  • Pagina 249

    249 Copyright © Acronis, Inc., 2000 - 2010  If there is no or not e nough unallocated space at the en d of the disk, but ther e is unallocated space between volu mes, the volumes will be moved to add more unallocat ed space to the end.  When all unallocated space is collected but it is still not enough, the program will take free space from [...]

  • Pagina 250

    250 Copyright © Acro nis, Inc., 2000- 2010  If there is not en o ugh unall ocated space, the pro gra m will tak e free space fr om the selected volumes, prop ortionally redu cing the volumes' size. Resizing of locked partiti o ns requ ires a reboot. Reducing a system volume to the minimum size might prevent the machine 's operating sy[...]

  • Pagina 251

    251 Copyright © Acronis, Inc., 2000 - 2010 Under Linux, when usin g a boot loader other than GR UB (such as LILO), consider installing it to a Linux root (or boot) partition boot record instead of the MBR bef o re acti v ating A SRM. Ot herwis e, reconfigure the b o ot loade r manually after the activation. Do not activate Disables boot tim e prom[...]

  • Pagina 252

    252 Copyright © Acro nis, Inc., 2000- 2010 Advantages:  Using Acronis Backup & Recovery 1 0 in Win dows Prei nstallation Envir onment provides more functionality than usin g Linux-based bo o table medi a. Having bo o ted PC-co mpatible hardware into WinPE, you can us e not only Acronis Backup & Recovery 10 Agent, but als o PE com mands [...]

  • Pagina 253

    253 Copyright © Acronis, Inc., 2000 - 2010 1. Download and ins tall Windows Automated Installati on Kit (WAIK). Automated Installa tion Kit (AIK) for Windows Vista (PE 2.0): http://www.micr osoft.com/Downl oads/details.aspx ?familyid=C7 D 4BC6 D-15F3-4284-9123- 679830D629F2&disp laylan g=en Automated Installa tion Kit (AIK) for Windows Vista S[...]

  • Pagina 254

    254 Copyright © Acro nis, Inc., 2000- 2010  user name and pass wo rd t o be enter ed on the cons ole side at c o nnection t o the ag ent. If you leave these fields empty, the connection will b e enabled on typing any sy m bols i n the prompt window. 5. [optional] N etwork setting s (p. 255):  TCP/IP settings t o be assign ed to the machin e [...]

  • Pagina 255

    255 Copyright © Acronis, Inc., 2000 - 2010 quiet Disables displaying o f startu p m essages when the Linux kernel is loadin g, and starts the management cons o le aft er the kernel is loaded. This parameter is i mplicitly specified when cr eating the bootable media, but yo u can remove this parameter while in th e boot menu. Without this para m et[...]

  • Pagina 256

    256 Copyright © Acro nis, Inc., 2000- 2010  IP address  Subnet mask  Gateway  DNS server  WINS server. Once the bootabl e agent st arts o n a m achine, the conf iguration is applied to the machin e’s network interface card (NIC.) If the settings have n o t been pre-configu red, the agent uses DHCP auto configuration. You also have[...]

  • Pagina 257

    257 Copyright © Acronis, Inc., 2000 - 2010 D riv er s f or U niv er sa l R est or e While creating bo o table media, you have an option t o add Windows drivers to th e media. The drivers will be used by Uni versal Restore when recovering Windows on a machine w ith a dissimilar processor, different motherboard or differen t mass storage device than[...]

  • Pagina 258

    258 Copyright © Acro nis, Inc., 2000- 2010 4. Specify path to the folder where the WinPE files are l o cated. 5. Specify netw o rk settings (p . 255) for the machine net wo rk adap ters or choos e DHCP auto configuration. 6. Specify the full path to the resulting ISO file incl uding the file na me. 7. Check your set tings in the summary screen and[...]

  • Pagina 259

    259 Copyright © Acronis, Inc., 2000 - 2010 controller, network adapter, tape drive or oth er devic e. You wi ll have to repeat this pr ocedure for each driver y ou want to be inclu ded in the resulting WinPE boot media. 6. Choose whether you want to create ISO or WIM imag e or upload th e media on Acronis PXE Server. 7. Specify the full path to th[...]

  • Pagina 260

    260 Copyright © Acro nis, Inc., 2000- 2010 Once the machine b oots into the Bart PE and y ou conf igure the network connection, sel ect Go - > System -> Storage - > Acron i s Backup & Recovery 10 to start. 6 . 1 0 . 2 C o n n ec t i n g t o a m a c h i n e b o o t e d f r om m e d i a Once a machine bo o ts from b o otable media, the [...]

  • Pagina 261

    261 Copyright © Acronis, Inc., 2000 - 2010 6. 10. 3. 1 Se tt in g up a d is pla y m ode For a machine bo o ted from m edia, a disp lay video mode is detect ed automatically based on th e hardware configuration (monitor and graphics card specifications). If, for some re aso n, the video mode is detected inc orrectly, do the following: 1. In the boo[...]

  • Pagina 262

    262 Copyright © Acro nis, Inc., 2000- 2010 6 . 1 0 . 4 L i s t o f c o m m an d s a n d u t i l i t i e s a v ai l ab l e i n L i n u x - ba s e d b o o t a b l e m e d i a Linux-based bootabl e media contains the foll owing command s and command lin e utilities, which you can use when runnin g a command shell. To start the command sh ell, press C[...]

  • Pagina 263

    263 Copyright © Acronis, Inc., 2000 - 2010 grep ping umount growisof s pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 . 1 0 . 5 R e c o v e r i n g M D d e v i c e s a n d l o g i c a l v o l u m e s To recover MD d ev ices, known as L inux S o ftware RAID, and/or devices creat ed by Logic[...]

  • Pagina 264

    264 Copyright © Acro nis, Inc., 2000- 2010 To c re ate th e vo lu me st ruc tu re b y u si ng a sc rip t 1. Boot the machine from a Li nux-based bootable media. 2. Click Acronis Bootable Agent . Then, click Run management console . 3. On the toolbar, cli ck Actions , and then click Sta rt shell . Alternati v ely, you c an press CTRL+ALT+F2. 4. Run[...]

  • Pagina 265

    265 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that you pre v iously perf ormed a disk backup of a machine with the following disk configuration:  The machine has two 1-gigabyte and tw o 2-gigab y te SCSI hard disks, mounted on /dev/sda , /dev/sdb , /dev/ sdc , and /dev/sdd , r espectively.  The first and second pairs of hard dis[...]

  • Pagina 266

    266 Copyright © Acro nis, Inc., 2000- 2010 --- Volume group --- VG Name my_volg roup ... VG Access read/wr ite VG Status resizab le ... VG Size 1.99 GB ... VG UUID 0qoQ4l- Vk7 W-yDG3 -uF1l -Q2AL-C0z0- vMeACu 5. Run the follo wing comman d to creat e the logical v o lu me; in the -L parameter, sp ecify the size given by VG Size : lvm lvcreate -L1.9[...]

  • Pagina 267

    267 Copyright © Acronis, Inc., 2000 - 2010 2. Use the -- mount c ommand, specifying the volu me's index in the -i parameter. For example: trueimagemnt -- moun t /mn t -- filename smb://s erver/backups/linux_machine.ti b - i 4 This command mounts the logical volume DYN1, whose in dex in the bac kup is 4, on the mount point /mnt. To u nm ou nt [...]

  • Pagina 268

    268 Copyright © Acro nis, Inc., 2000- 2010 On a machine tha t has an operating sy ste m on the har d disk, the BIOS must be co nfigured so that the network interfac e card is ei ther the first boot device, or at least prior to the Hard D rive device. The example below sho ws one of reasonable BIOS configu rations. If you don’t insert bootable me[...]

  • Pagina 269

    269 Copyright © Acronis, Inc., 2000 - 2010 Sometimes after t he v o lume has be en backed up and its image plac ed into a safe storage, the machine disk c onfiguration might chang e due to a HDD replace m ent or hard ware loss. In such case with the help of Acr o nis Dis k D irect o r Lite, the user has the possibility t o recreat e the necessary [...]

  • Pagina 270

    270 Copyright © Acro nis, Inc., 2000- 2010 6 . 1 1 . 3 C h o o s i n g t h e o pe r a t i n g s y s t e m f o r d i s k m a n a g e me n t On a machine with t wo o r mo re operating syste ms, representation of disks and volumes depends on which operating sy stem is currently running. A volume may ha v e a differ ent le tter in diff erent Windows o[...]

  • Pagina 271

    271 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 5 D i s k o p e r a t i o n s Acronis Disk Dire ctor Lite in cludes the following operations that can be perform ed o n disks:  Disk Initialization (p. 271 ) - initializes the new hardwar e added to the system  Basic disk cloning (p. 272 ) - transfers complete da ta from the so urce basic [...]

  • Pagina 272

    272 Copyright © Acro nis, Inc., 2000- 2010 6. 11. 5. 2 Ba si c di sk cl on in g Sometimes it is n ece ssary to transfer all the disk data o nto a ne w disk. It can be a case of expanding the system v olume, startin g a new system layout or disk e vacuation due to a hardware fau lt. In any case, the reason for the Clone basic disk operation can be [...]

  • Pagina 273

    273 Copyright © Acronis, Inc., 2000 - 2010 volumes, then the C lone b asic disk operation will be i m possible and t he user will not be able to continue. If you are about to clone a disk co mprising of a syste m v olu me , pay attention t o the Advan c ed options . By clicking Finish , you'll ad d the pending op eration of the disk cloning. [...]

  • Pagina 274

    274 Copyright © Acro nis, Inc., 2000- 2010 6. 11. 5. 3 D is k co nve rs io n: MB R t o GP T You would want to co nvert an MBR basic disk to a GPT basic disk in the f o llowing cases:  If you need more than 4 primary v o lumes on o ne disk.  If you need additi o nal disk reliability against any possi ble data damage. If y ou ne ed to co nve r[...]

  • Pagina 275

    275 Copyright © Acronis, Inc., 2000 - 2010 (To finish the added o perat io n you will have to commit (p. 283) it. Exiting the program without committing the pending op erations will effec tively cancel them.) 6. 11. 5. 5 D is k co nve rs io n: ba si c to d y nam ic You would want to co nvert a basic di sk to dynamic in the foll owing cases:  If[...]

  • Pagina 276

    276 Copyright © Acro nis, Inc., 2000- 2010 dynamic disks (all volume types excep t Simple volumes), then you will be warn ed here about the possible damage to the data in volved in the conversion . Please note, t he operation is unavailable f or a dynamic d isk containing Spanned, Stripe d, or RAID - 5 volumes. 3. If you click OK in this warni ng [...]

  • Pagina 277

    277 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 6 V o l u me o p e r a t i o n s Acronis Disk Direct or L ite i ncludes the following operations that can be performed on volumes:  Create Volume (p. 2 77 ) - Creates a new volu me with the help of the Create Volume Wizard.  Delete Volume (p. 281 ) - Deletes the se lected volume.  Set A[...]

  • Pagina 278

    278 Copyright © Acro nis, Inc., 2000- 2010 space available on each dis k that you want t o include i n the volume and the size o f the volu me will depend on the size of the smallest space. Access to the data on a striped volu m e is usuall y faster than access t o the sa me data on a single physical disk, because the I/ O is spread across more th[...]

  • Pagina 279

    279 Copyright © Acronis, Inc., 2000 - 2010  RAID-5 You will obtain a brief description of every type o f volume for better underst anding of t he advantages and limit atio ns of each possib le volume architectur e. If the current ope rating system, installed on t his machine, does not suppo rt the selected type of volume , you will receive the [...]

  • Pagina 280

    280 Copyright © Acro nis, Inc., 2000- 2010 The maximum value normally includes the m ost possib le unallocated space. But in some cases the possible unallocat ed space and the proposed ma ximum volume size migh t differ (e.g . when the size of one mirror es tablishes t he size of the other mirror, o r the las t 8Mb of the disk space is reserved fo[...]

  • Pagina 281

    281 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 2 D el et e v ol um e This version of Ac r onis Disk Director Lite has reduced functionality because it is ma inly a tool for preparing bare-metal systems for recovering previou sly saved volum e images. The features of re sizing the existing volume s and cr eating the new volu mes, using fr ee [...]

  • Pagina 282

    282 Copyright © Acro nis, Inc., 2000- 2010 6. 11. 6. 4 C h ang e vol um e let te r Windows operating systems assign letters (C:, D:, etc) to hard dis k volumes at sta rtup. These letters are used by applicati o ns an d operating syste ms to locate files and folders in th e volumes. Connecting an add itional disk, as well as creating or deleting a [...]

  • Pagina 283

    283 Copyright © Acronis, Inc., 2000 - 2010  to save additional space which is being lost due to the cluster size on th e FAT16 or FAT32 file systems  as a quick and m ore or less reliab le way of destr o ying data, residing in this volume If y ou wa nt to f orm at a vo lum e: 1. Select a volu m e to for m at. 2. Right-click on the selected v[...]

  • Pagina 284

    284 Copyright © Acro nis, Inc., 2000- 2010 Quitting Acronis Dis k Director Lite with o ut commi tting the pendin g o perati ons effectively cancels them, so if you try to exit Disk management without committing t he pend ing operations, you will receive the appr o priate wa rning. 6. 12 C ol lec ti ng sy ste m in fo rma tio n The system infor m at[...]

  • Pagina 285

    285 Copyright © Acronis, Inc., 2000 - 2010 7 C en tr al iz ed man ag em en t This section covers o perati o ns that can be performed centrally by usin g the components for centralized manage ment. The content of this se ctio n i s o nly app licable to advanced editions of Acronis Backup & Rec overy 10. 7. 1 Ad mi nis ter in g A cro ni s B ac k[...]

  • Pagina 286

    286 Copyright © Acronis, Inc., 2000 - 2010 Vaults with low free space : X View vaults The alert is displayed if at lea st one centralized vault has less than 10% free space. View vaults will take you to t he Centralized vaults (p. 122 ) view where you ca n examine the vault size, free space, con tent and tak e the necessary steps to increase the f[...]

  • Pagina 287

    287 Copyright © Acronis, Inc., 2000 - 2010 Statistics for the s elected date ar e displayed to the rig ht o f the char t. All the statistics fields are interactive, i.e. if yo u click any field, the Log view will be open ed with the log entries pre-filt ered by this field. At the top of the char t, you can select the activi ties to display dependi[...]

  • Pagina 288

    288 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 2.1 Ba cku p pol ic y dep lo ym en t sta tes A backup policy depl oyment state is a combination of the policy deployment states on all m achin es the policy is appli ed to. For example, if the policy is applied to three machines and has the "Deploying" stat e on the 1st ma chine, the "[...]

  • Pagina 289

    289 Copyright © Acronis, Inc., 2000 - 2010 In the Log view, apply the Error filter if there are too many log entries. You can a lso sort the "error" entries by backu p plans, managed entities o r machines. 2. Once the reas on of the fail ure is clear, do one or more of t he foll o wing:  Remove the reason o f the f ailure. After that,[...]

  • Pagina 290

    290 Copyright © Acronis, Inc., 2000 - 2010 Edit a policy Click Edit . Editing policies is perfor med in the same way a s creating (p . 346 ). Once the policy i s edited, the management s erver updates the policy on a ll machines the policy was deployed to. Delete a policy Click Delete . As a result, the p olicy will be revoked from the ma chines i[...]

  • Pagina 291

    291 Copyright © Acronis, Inc., 2000 - 2010 To Do Sort backup p olicies by any column Click the column's header to sort the back up policies in ascending ord er. Click it once again to sort th e backup po licies in descending o rder. Filter backup policies by name/owner Type a policy's name / owner 's name in the fields be low the co[...]

  • Pagina 292

    292 Copyright © Acronis, Inc., 2000 - 2010 Actions To Do View details of the machine (group). Click View details . In the Machine d etails (p. 299 )/Group d etails (p. 309) window, examin e all information on the selected machine (or the selected grou p). View tasks of the machine (group). Click View tasks . The Tasks (p. 318) view will display a [...]

  • Pagina 293

    293 Copyright © Acronis, Inc., 2000 - 2010 Custom groups - g roups created manu ally by the managemen t server adminis trator.  Static groups Static groups contain machin es manuall y added to the gro up by the ad ministrator. A static member re mains in the grou p until the administrat or removes the member f rom the group or deletes the corr [...]

  • Pagina 294

    294 Copyright © Acronis, Inc., 2000 - 2010 To Do Add a new machine to th e management server Click Add a m achine to AMS . In the Add m achine (p. 296 ) window, se lect the machine th at needs to be added to the man agement server. Import machines from Active Directory Click Impor t machines from Active Directory . In the Impo rt machines from Act[...]

  • Pagina 295

    295 Copyright © Acronis, Inc., 2000 - 2010 The backup policies applied to the group th e machine is no w a member of will be deployed to th e machine. Remove a machine fro m the current static group Click Remove fr om group . The backup policies applied to the group will be re voked from the machine automatically. Deleting the selected machine fro[...]

  • Pagina 296

    296 Copyright © Acronis, Inc., 2000 - 2010 Refresh a list of machine s Click Refresh . The management con sole will update the list of machin es from the management server with th e most recent information . Though the list of machines is refreshed auto matically based on events, t he data may not b e retrieved immediately from t he management ser[...]

  • Pagina 297

    297 Copyright © Acronis, Inc., 2000 - 2010 3. In the Search for field, type the machine's (or the organiz atio nal unit) na m e, then click Search . You can use the ast erisk (*) to sub stitute for zer o or m o re charact ers in a machine (or an organizational unit ) name. The left part of the window displays the machine ( o r org anizational[...]

  • Pagina 298

    298 Copyright © Acronis, Inc., 2000 - 2010 2. Click Synchronize machine s with text file on the toolb ar. 3. In the Path field, enter the path to a .txt o r .csv file containin g the list of machines, or click Browse and select the file in t he Browse wind o w. 4. Under Logon set tings , specify the user na m e and pass word of a user who is a mem[...]

  • Pagina 299

    299 Copyright © Acronis, Inc., 2000 - 2010 The machine being add ed b ecom es a member of m ore than one gr o up. As a r esult, the backup policies applied t o the first group will remain o n the machine, and the backup policies app lied to the second, third, etc. g roup wi ll be deployed to the machi ne. M ovi ng a ma ch in e t o an ot he r g ro [...]

  • Pagina 300

    300 Copyright © Acronis, Inc., 2000 - 2010  Offline - the machin e is unavailable f o r the m anage ment server: it is turned o ff, o r its network cable is unplu gged.  Unknown - this sta tus is displayed until the first c o nnecti on between the manag ement server and the machine is e stabli shed after adding the machi ne or starting the m[...]

  • Pagina 301

    301 Copyright © Acronis, Inc., 2000 - 2010 Filtering and so r ting Filtering and sortin g o f the backup policies is per formed in the same way as fo r th e Backup policies view. See the Filt ering and sorting backup policies (p. 290) secti on for details. Plans and tasks Displays a list of the plan s (both local and centrali zed) and tasks ex ist[...]

  • Pagina 302

    302 Copyright © Acronis, Inc., 2000 - 2010 Stop a plan/ta sk Backup plan Click Stop . Stopping the run ning backup plan stops all its tasks. Thus, a ll the task operations will be aborted. Task Click Stop . What will happen if I stop the task? Generally, stopping t he task aborts its operation (backu p, recovery, validation, exporting, conversion,[...]

  • Pagina 303

    303 Copyright © Acronis, Inc., 2000 - 2010 Only tasks that d o not belong to a backup plan, such as a recovery task, can be modified by d irect editing. When you need to mod ify a task belonging to a local backup plan , edit the backup plan . A task belonging to a centralized backup plan can be modified by editing th e centralized policy that spaw[...]

  • Pagina 304

    304 Copyright © Acronis, Inc., 2000 - 2010 Refresh table Click Refresh . The management con sole will update the list of back up plans and tasks existing on the machine with th e most recent information . Though the list is refreshed automatically based on events, the data may no t be retrieved immediately from the managed machine, du e to some la[...]

  • Pagina 305

    305 Copyright © Acronis, Inc., 2000 - 2010 Group1 in the root c o ntain s Group2 to which the policy is applied directl y. Group2 , in turn , contains child Group3 that inherit s the policy from the parent a nd applies the policy to Machin e1 respectively. The machine (or gr o up) to which the policy was applie d directly is boldfaced and mark ed [...]

  • Pagina 306

    306 Copyright © Acronis, Inc., 2000 - 2010 View detailed information on a group Clic k View details . In the Gro up details (p. 309 ) window, exam ine information on t he selected group. Rename a custom group/subgroup Click Renam e . In the Name column, type a new name for th e selected group . Built-in groups cannot be renamed. Edit a custom grou[...]

  • Pagina 307

    307 Copyright © Acronis, Inc., 2000 - 2010  Listed in txt/c sv file (p. 308) All the machines that ar e listed in the specified .tx t or .csv file will be members of the dynamic group. 3. In the Comments fi eld, enter a description o f the crea ted group. 4. Click OK . Adding multiple criteri a Adding multiple crit eria forms a condition accord[...]

  • Pagina 308

    308 Copyright © Acronis, Inc., 2000 - 2010 If OU3 has child c ontainers an d y ou also n ee d to add t he m achi nes of those con tainers to the group, select the Include c hild c ontainers check bo x. L ist ed i n tx t/ cs v f il e cr it eri on When you use this cri terion, the dynamic group w ill i nclude machines from the l ist give n in the sp[...]

  • Pagina 309

    309 Copyright © Acronis, Inc., 2000 - 2010 Gr ou p det ai ls Aggregates in tw o tabs all i nformation on the select ed group. Allows performin g operations with the policies applied t o the grou p. This information is al so dup licated in the Information panel. Group Displays the foll o wing infor m ation on the group:  Name - name of the s ele[...]

  • Pagina 310

    310 Copyright © Acronis, Inc., 2000 - 2010 The policy that is dir ectly applied to the group is disp layed as follows: Group name The following exa m ple illus trate s how the policy that is applied on the group thro ugh inheritance is displayed. Group1 > Group2 > Group 3 Group1 in the root c o ntain s Group2 to which the policy is applied d[...]

  • Pagina 311

    311 Copyright © Acronis, Inc., 2000 - 2010 2. Acronis Backup & Re co very 10 Agent f o r ESX/ES Xi is deli vered as a virtual appli ance. Do ei ther of the following:  Deploy the agent (p. 312 ) to the ESX / ESXi ser v er or  Install and configure t he ag ent manually as described in "Installing ESX/ESXi v irtual appliance" [...]

  • Pagina 312

    312 Copyright © Acronis, Inc., 2000 - 2010 You can create b o th static and dynamic groups o f virt ual machines. Any virtual machine that is currently available can be added to a static gr oup. You cannot create groups that co ntain b o th physical and virtual machin es. The dynamic me mbership criteria for virtual machines are as foll o ws:  [...]

  • Pagina 313

    313 Copyright © Acronis, Inc., 2000 - 2010 management ser v er and you will be abl e to apply backup policies to the virtual machines or back up each machine individu ally. The update of already installed agents is perf o rmed in the s ame wa y as deployment. Upon selecting a host or cluster where the agent is installed, you will be suggested to u[...]

  • Pagina 314

    314 Copyright © Acronis, Inc., 2000 - 2010 By default, the sof tw are will use the account tha t you h av e already specified, either when configuring integrati on with the vCenter, o r when get ting access to the ESX/ESXi server. You have the option to specif y crede ntials for a different accoun t if need be. The virtual applian ce's time z[...]

  • Pagina 315

    315 Copyright © Acronis, Inc., 2000 - 2010  Server 3 uses storag es B, C, D The VA can be depl oyed to either C or D. If there is n o storage shared by all the s ervers, you can import the VA m anually int o any of the h osts. This will work, but backup performance will be far fr om optimal. After deployment , t he age nt virtual appliance can [...]

  • Pagina 316

    316 Copyright © Acronis, Inc., 2000 - 2010 Note: You can skip this step if both the sto rage node and the users' machines are in t he same Active Directory domain. For information ab o ut us er rights on a st o rage node and in its managed vaults, s ee User rights on a storage node (p. 70 ). 3. Add (p. 317) the storage node to the Acronis Bac[...]

  • Pagina 317

    317 Copyright © Acronis, Inc., 2000 - 2010 Change the compacting task schedule After deleting backup s from deduplicating vaults, eith er manually or d uring cleanup, unreferenced d ata may appear in th e deduplicating vaults and their databases. The compacting p rocedure deletes such d ata in order to free up mor e storage space. Only one compact[...]

  • Pagina 318

    318 Copyright © Acronis, Inc., 2000 - 2010 Storage node properties The tab displays th e follo wing informa tion about the s elec ted st o rage node :  Name - the na me of the mach ine where the storage node is installed  IP - the IP add ress of the m achine where the storage node is installed  Availability :  Unknown - this sta tus is[...]

  • Pagina 319

    319 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 6.1 Ac t io ns o n ta sk s The following is a guid eline for you to perfor m operati o ns with tas ks. To Do Create a new backup plan, or a task on a re gistered machine Click New , and select one of th e following:  Backup plan (p. 188 )  Recovery task (p. 212 )  Validation task (p. 233 ) [...]

  • Pagina 320

    320 Copyright © Acronis, Inc., 2000 - 2010 tasks owned by o ther users Delete a task Click Delete . Why can't I de lete the task?  Task belongs to a backu p plan A task belonging to a b ackup plan cannot be deleted separately from the plan. Edit th e plan to remove the task or delete the entire p lan .  Do not have the appropriate privi[...]

  • Pagina 321

    321 Copyright © Acronis, Inc., 2000 - 2010 Filter tasks by typ e, executio n state, status, type, origin, la st result, schedule. In a field below the corr esponding header, select th e required value from the li st. Configuring tasks tabl e By default, the table has eight columns that are displayed, others are hidden. If required, you can hide th[...]

  • Pagina 322

    322 Copyright © Acronis, Inc., 2000 - 2010  Use the Information panel to review the de tailed information on the selected l og entry. The panel is collapsed by default. To expand the panel, click the chevron. The content of the panel is also duplicated in th e Lo g entry details (p. 32 4 ) win dow. Ways to open the "Log" view with the[...]

  • Pagina 323

    323 Copyright © Acronis, Inc., 2000 - 2010 Save all the filtered log entries to a file 1. Set filters to get a list of th e log entries that satisfy th e filtering criteria. 2. Click Save All to File . 3. In the op ened window, specify a p ath and a name for the file. As a result, t he log entries of that list will b e saved. Delete all the log en[...]

  • Pagina 324

    324 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 7.3 Cen tr al iz ed log e nt ry de ta ils Displays detailed information on the log entry you have selected and l et s you co py the details to the clipboard. To copy the details, click the Copy to clipboard bu tton. Log entry data fields A centralized log en try con tains the following data field s:[...]

  • Pagina 325

    325 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 Management Ser ver offers report templates fo r:  Registered machin es  Backup policies existin g on the m anage m ent ser v er  Local and centraliz ed backup plans existing on the re gistered machines  Local and centraliz ed tasks existing on the regist ered [...]

  • Pagina 326

    326 Copyright © Acronis, Inc., 2000 - 2010  Availability (physi cal machines only): The type s o f the machines' availabilit y — Online or Offline . With the default fil te r setti ngs, the report includes all ph y sical machin es. Report view Under Report vie w , choos e how the rep ort will look:  Select whether t o show all items i[...]

  • Pagina 327

    327 Copyright © Acronis, Inc., 2000 - 2010  Execution state : Th e execution states of the ba ckup plans — for example, Running .  Status : The status es of the backup plans — OK , Warnin g , and/or Error .  Last finish time : The perio d within which the las t backup finished under each o f the backup plans.  Schedule : The type s[...]

  • Pagina 328

    328 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 8.5 Rep or t a bo ut t he a rc hi ve s a nd b ack up s In this view, you can gener ate a repor t ab out the archives that are stored in manag ed ce ntralized vaults. This rep o rt consists o f one or more tables. Filters Under Filters , choos e which archives to include in the report. Only the archi[...]

  • Pagina 329

    329 Copyright © Acronis, Inc., 2000 - 2010 Report view Under Report vie w , choos e how the rep ort will look:  Specify which table co lumn s to show, and in which order.  Select which diagra ms to include in the report. The diagrams show space usage in the vaults. 7. 1. 8.7 Rep or t a bo ut t he ta sk a cti vi tie s In this view, you can ge[...]

  • Pagina 330

    330 Copyright © Acronis, Inc., 2000 - 2010 Explorer, click the Information bar that appears at th e top of the webpage by default, and then cli ck Allow blocked con tent . To a llo w a ct iv e c on ten t perm ane nt ly in Internet Explor er 1. On the Tools m enu, click Internet Options , and t hen click the Advan c ed tab. 2. Select the Al low act[...]

  • Pagina 331

    331 Copyright © Acronis, Inc., 2000 - 2010 To l oa d the A cro ni s Adm ini st r ativ e Tem pl ate 1. Run Windows Gr oup Policy Objects Editor ( %w indir% system32gpedit. m sc.) 2. Open the Group Policy object (GPO) you want to edit. 3. Expand Computer Configuration . 4. Right click Adm inistrative Templates . 5. Click Add/Remo ve Templates . 6.[...]

  • Pagina 332

    332 Copyright © Acronis, Inc., 2000 - 2010 Default value: 10 Acronis Backup & Rec overy 10 agents connect to the storage node to access its man aged v aults during backup or re covery. The Client C onne ction Limit param et er det erm ines th e maximum number of such connec t ions that th e storage node can han dle simultaneousl y. When this l[...]

  • Pagina 333

    333 Copyright © Acronis, Inc., 2000 - 2010 If the volume ha s 5 GB of free space, th en the total size of Vault A is 2 0 GB + 5 GB = 25 GB, and that of Vault B is 45 GB + 5 GB = 50 GB, regardl ess of the size of the volume. The percentage of fr ee space in a vault is the v ault's free space divid ed by the vault's total size. In the prev[...]

  • Pagina 334

    334 Copyright © Acronis, Inc., 2000 - 2010 7. 2. 1.3 Ac r on is Ba ck up & Re cov er y 10 Ma na gem en t Ser ve r The following are the parameters of Acronis Backup & Recover y 10 Manage ment Server tha t can be set by using Acr o nis Admini strative Template. Collecting Logs Specifies when t o collect lo g entries from m achines manag ed [...]

  • Pagina 335

    335 Copyright © Acronis, Inc., 2000 - 2010 Trace Level Description: Specifi es the minimu m level of severity of events to be rec o rded in to the even t log. Only events of levels gr eater than or equal t o the v alue in Trace Leve l will be recorded. Possible values: 0 (Internal event), 1 (Debugg ing information), 2 (Inform ation), 3 (Warnin g),[...]

  • Pagina 336

    336 Copyright © Acronis, Inc., 2000 - 2010 Otherwise, it c o nnects to a n um ber of regis tered machines depending on the all otted number of simultane ous connections. After synchr onization for a machine is co mplete, the management ser v er ma y disconnect fr om that machine and use the fr ee connection for synchronization wi th another machin[...]

  • Pagina 337

    337 Copyright © Acronis, Inc., 2000 - 2010 If Real Time Mon i toring is set t o True , the manage ment server instead sends req uests to machines to provid e new data when ever it will appear, and then en ters a listening mode. This approach is called real-time monitoring. Real-time monitoring may reduce network traffic — for exa m ple, when c e[...]

  • Pagina 338

    338 Copyright © Acronis, Inc., 2000 - 2010 You may want t o increase the initial size o f the snapsh ot storage — or to place it on a different volume — when experien cing problems with backing up data that changes extensi v ely durin g backup. This parameter is used when creating a backup policy and applies to all centralized backup plans tha[...]

  • Pagina 339

    339 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 Agent periodicall y checks whether its licens e key is present on the license serv er. T he first check is performed every time that Acronis Backup & Recovery 10 Agent starts and sub sequent checks are performed once in the nu mber of days g ive n by License Check Int[...]

  • Pagina 340

    340 Copyright © Acronis, Inc., 2000 - 2010 For details on ho w the agent log is cleaned up, see Log cleanup rules (p. 88 ). Windows Event Lo g Specifies when t o record A cronis Backup & Rec overy 10 Agent's events int o the Application event log in Windows. This parameter has t wo settings: Trace State Description: Specifi es whether to [...]

  • Pagina 341

    341 Copyright © Acronis, Inc., 2000 - 2010 With the default setting s, the snapshot storage is created in a Windows' temp o rary files fo lder and initially occupies 50 percent of the space avail able on the volume containing that fo lder. Th is size may then gro w if m o re space is needed for the sn apshot. You may want t o increase the ini[...]

  • Pagina 342

    342 Copyright © Acronis, Inc., 2000 - 2010 Connection parameter s Remote Agent po rts Specifies the por t that the compo nen t will use for inc om ing and outgoing communication wi th other Acronis comp onents. Select one of the f o llowing: Not Configured The component will us e the default TCP port numbe r 9876. Enabled The component will us e t[...]

  • Pagina 343

    343 Copyright © Acronis, Inc., 2000 - 2010 Always use The use of SSL certificat es is enabled. The connecti o n will b e established o nly if t he use of SSL certificates is enab led on the ser v er application. Disabled The same as Not confi gured . Server Encryption options Specifies whether to e ncr ypt the transferred data when the component a[...]

  • Pagina 344

    344 Copyright © Acronis, Inc., 2000 - 2010 Level Name Description 0 Unknown Event whose lev el of severity is unkn own or not applicable 1 Debug Event used for debug purp oses 2 Information Informational ev ent, such a s one about the successful co m pletion o f an operati o n or startup of a s ervice 3 Warning Event which is a po ssible impendin [...]

  • Pagina 345

    345 Copyright © Acronis, Inc., 2000 - 2010 regular basis. The end results are intended to provid e software improvements and enhanced functionality to bet ter meet the n eeds of Acronis customers. Acr onis does not collect any personal data. The ter ms of participation can be foun d on the Acronis Web site. Disable The information will not be sent[...]

  • Pagina 346

    346 Copyright © Acronis, Inc., 2000 - 2010 Parameters related to vault databases The following tw o paramet ers deter m ine paths to Acronis Bac kup & Recovery 10 Storage Node's internal databases, which contain information ab o ut managed vaults. The database that is locate d in the folder specified by the Databa s ePath para meter is ty[...]

  • Pagina 347

    347 Copyright © Acronis, Inc., 2000 - 2010 Policy credentia ls (p . 349) [Optional] You can c hange the po licy a cco unt cred entials if necessary. T o access this opti on, select the Advan c ed view c heck box. Policy commen ts [Optional] Type a description of the backup policy. To access this option, select the Advan c ed view check box. Label [...]

  • Pagina 348

    348 Copyright © Acronis, Inc., 2000 - 2010 Backup options Settings [Optional] Configu re parameters o f the backup o peration, such as pre/post backup commands, maxi mum net wo rk band width allocated for the backup s tream or the backup archive compression l evel. If you do nothing in thi s section, th e default values (p. 89 ) as set in the mana[...]

  • Pagina 349

    349 Copyright © Acronis, Inc., 2000 - 2010 After you have p erfo rm ed all the r equired steps, clic k OK to create th e backup p olicy. 7 . 3 . 1 P o l ic y c r e d e n t i al s Provide the credentials under which the centraliz ed tasks will run on the machin es. To s pec if y c re den ti als 1. Select one of the following:  Use Acronis se rvi[...]

  • Pagina 350

    350 Copyright © Acronis, Inc., 2000 - 2010 To i ncl ude I n th e V olu mes co lum n: Co mm ent s Wi nd ows an d L in ux v ol ume s All volumes Type or select: [All Volum es] Refers to all volumes on mach ines running Windows, and all mounted volumes on machines running Linux. Wi nd ows vo l umes Volume C: Type C: or select it fro m the list Syst[...]

  • Pagina 351

    351 Copyright © Acronis, Inc., 2000 - 2010 The names of te m plates ar e case-sensitive. What doe s a disk or volum e backup store? For supported file systems, a disk o r volu m e backup st o res only those sectors t hat con tain data. This reduces the resul ting backup size and speeds up the backup and rec o very ope rations. Windows The swap fil[...]

  • Pagina 352

    352 Copyright © Acronis, Inc., 2000 - 2010 For example, le t a Linux m achi ne co ntain a hard disk which is split into thr ee volu mes, or partiti ons: the first, second, and third partitions. These partitions are availab le in the tree as /dev/hda 1, /dev/hda2, and /d ev/hda3, respectively. To perfor m a disk backup of the, sa y , third partitio[...]

  • Pagina 353

    353 Copyright © Acronis, Inc., 2000 - 2010 --- Logical volume --- LV Name /dev/ vg_mymachine/lv_root VG Name vg_my machine … --- Logical volume --- LV Name /dev/ vg_mymachine/lv_bin VG Name vg_my machine … Tip: To be able to automatically create the vo lume structure information during reco very, make sure that the volume with the /etc/Acronis[...]

  • Pagina 354

    354 Copyright © Acronis, Inc., 2000 - 2010 C: ProgramData in Windows Vista) You can use other envir onment variables or a combination of environm ent variables and text. For example, to refer to the Acronis folder in th e machines' Program Files folder, typ e: %PROGRAMFILES% Acronis Templates Templates are si milar to en v ironment variable[...]

  • Pagina 355

    355 Copyright © Acronis, Inc., 2000 - 2010  Password . The passw ord for the account. 2. Click OK . 7 . 3 . 4 E x c l u s i o n s Set up exclusions for the specific t y pes of fil es yo u d o not wish to back up. For example, you may not want database, hidden and system files and folder s, as well as files with specific extensions, to be stored[...]

  • Pagina 356

    356 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to specify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes the[...]

  • Pagina 357

    357 Copyright © Acronis, Inc., 2000 - 2010 The program g enerates a c o mmon na m e for the new archives and displays it in the Name field. Th e name looks like [ P olicyNa me]_[MachineName]_Archive1. If yo u are n o t satisfied with the automatically gene rated name, construct another na me. If you selected S tore all ma chines' archives in [...]

  • Pagina 358

    358 Copyright © Acronis, Inc., 2000 - 2010  Back up now – to create a backup task for manual sta rt and run the task immedi ate ly after its creation.  Back up later – t o create a backup task for manual sta rt OR schedule one -time ta sk executi o n in the future.  Simple – to schedule when and how often to bac kup data and specif [...]

  • Pagina 359

    359 Copyright © Acronis, Inc., 2000 - 2010 To set up the simple ba ckup scheme, specify t he app ropriate setting s as follows. Backup Set up the backup schedule - when a nd how often to back u p the data. To learn more abou t setting up the schedule, s ee the Schedu ling (p. 158 ) section. Retention r ule With the simple scheme, only one retentio[...]

  • Pagina 360

    360 Copyright © Acronis, Inc., 2000 - 2010 Week ly/Monthly: Specifies which of the days select ed in the B a c k up on field you want t o reserve for wee kly and monthly backups. A m o nthly backup w ill be performed every f o urth such day. T he defau lt value is Friday. Keep backup s : Specifies how long you wan t the backups t o be stored in th[...]

  • Pagina 361

    361 Copyright © Acronis, Inc., 2000 - 2010 As a result, an archi ve of daily, weekly, and m o nthly backup s w ill be cr eated. Daily backups will be available for seven da y s sin ce creation. For instance, a daily backup o f Sunday, Jan uary 1, will be available through nex t Sunday, January 8; the first weekly backup, the one of Sat urday, Janu[...]

  • Pagina 362

    362 Copyright © Acronis, Inc., 2000 - 2010  Daily: 6 months  Weekly: 6 month s  Monthly: 5 years Here, daily incre m ental bac kups will be created on Tuesda ys and Thursdays, with weekly and monthly backups perf ormed on Fridays. Note that , in order to choose Friday in the Wee kly/monthly field, you need t o first sele ct it in the Back[...]

  • Pagina 363

    363 Copyright © Acronis, Inc., 2000 - 2010 levels you select. See the example below for detail s. Example Schedule parameters are set as follows  Recur: Every 1 da y  Frequency: Once at 6 PM Number of levels : 4 This is how the first 14 days (or 14 sessions) of this s cheme's schedule look. Sha ded numbers denote backup levels. 1 2 3 4 [...]

  • Pagina 364

    364 Copyright © Acronis, Inc., 2000 - 2010 Here are the backup s we have on day 12 (numbers in gray denote deleted backu ps). 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been cr eated, so the backup of da y five is still stored. Since it depends on the full backup of day one, that ba ckup is ava[...]

  • Pagina 365

    365 Copyright © Acronis, Inc., 2000 - 2010 This setting is recommend ed for backup d estinations such as shared folders or centralized vaults. When there is insufficient space while backing up The archive will be cl eaned up only d uring backup and only if there is not eno ugh space to create a n ew backup. In this case, the program will act as fo[...]

  • Pagina 366

    366 Copyright © Acronis, Inc., 2000 - 2010 Incremental: Sched ule: Weekly, every workd ay , at 9:00 PM Also, let all backup s older than one year be del et ed from the archive, and let the cleanup be performed upon crea ting a new backup. Retention rules: D elete backups older than 12 mon ths Apply the rule s : After ba c king up By default, a one[...]

  • Pagina 367

    367 Copyright © Acronis, Inc., 2000 - 2010 Resulting tasks Any custom sche me always produces three backup tasks and — in case the retenti on rules are specified — a cleanu p task. Each tas k is listed in the list of tasks either as Schedule d (if the schedule has been set up) or a s Manual (if the schedule ha s not been s et up). You can manu[...]

  • Pagina 368

    368 Copyright © Acronis, Inc., 2000 - 2010 3. Validation schedule (appe ars o nly if yo u have selected the o n schedule in ste p 1 ) - set the schedule of validation. F or more information see the Scheduling (p. 158) secti o n.[...]

  • Pagina 369

    369 Copyright © Acronis, Inc., 2000 - 2010 8 O nl ine b ack up This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Onli ne Backup Storage. Acronis Backup & Re covery 10 Online might b e unavailable in your region. To find mo re information,[...]

  • Pagina 370

    370 Copyright © Acronis, Inc., 2000 - 2010 8 . 1 . 2 W h a t d a t a c a n I b a c k u p an d r e c o v e r ? You can back up fil es, vo lu mes, disks, or the entire physical machine as o ften as you wish. Unlike most online backup so lutio ns, Acronis Backup & Recovery 10 Onli ne enables bare metal recovery directly from the o nline st orage.[...]

  • Pagina 371

    371 Copyright © Acronis, Inc., 2000 - 2010 Host-based bac kup is available only for paid lice nses of VMware ESXi. Choose the below approach if yo ur ESXi Server uses a free licen se. Install Acronis software into the guest system The machine will b e treate d as a physical on e. You will need a s eparate server o r wo rkstati o n subscription for[...]

  • Pagina 372

    372 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 6.4 Wha t if a n et wo rk co nn ect io n is lo st du rin g on li n e b ac ku p or r ec ov er y? The software will tr y to reach the online storag e every 30 seconds. Aft er five unsuccessful attempts the backup or rec o very tas k will fail . You can change th e numbe r of attempts and the interval [...]

  • Pagina 373

    373 Copyright © Acronis, Inc., 2000 - 2010 The hard disk drive is sent back to you but it is n o t po ssible to recover from it. H owever, recover y from a locally att ached device is possible with the L arg e scale rec overy (p. 377) option. 8. 1. 7.2 Why w ou ld I wa nt to u se In it ia l S ee din g? This service helps yo u save time and network[...]

  • Pagina 374

    374 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 7.8 How t o p er fo r m in it ia l s ee din g? 1. Decide on the m edia (p. 373 ) that you will send. 2. Attach the m edia to the machine you are going to bac k up. Alternati vely, you can back up to a local or network f older and then c o py/move the backup to the media. 3. Start Acronis Bac kup &am[...]

  • Pagina 375

    375 Copyright © Acronis, Inc., 2000 - 2010 St ep 1 Delicately rem o ve your har d disk drive from the machi ne. St ep 2 Place the hard dri v e into a n anti-static bag to protect the drive from ele ctrostatic discharge. If y ou do not have an anti-stati c bag, simply wrap the hard dri v e into alu m inum foil. St ep 3 Use a sturdy box that is at l[...]

  • Pagina 376

    376 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this company's web site, prepare and print two prepaid ship ping labels: 1. Shipping lab el for sending y our hard dri ve. This label is placed on the t o p of the box. You should send your packag e to one of the Acr onis dat[...]

  • Pagina 377

    377 Copyright © Acronis, Inc., 2000 - 2010  An order was created – The first ba ckup is about to start and the license cann ot be used for any other machine. Fro m this p oint on, you can cancel the order if somethin g goes wrong. This will return the license to t he po o l of available lic enses.  A full backup ha s started – This statu[...]

  • Pagina 378

    378 Copyright © Acronis, Inc., 2000 - 2010 Once you order Large Scale Recovery for a particular machine, Acronis send s you a USB hard disk drive with all of th e backup s m ade fro m this machine. You can recover data directly from the dis k or copy the backups t o a local or network folder. 8. 1. 8.2 Why w ou ld I us e L ar ge S ca le Re co ve r[...]

  • Pagina 379

    379 Copyright © Acronis, Inc., 2000 - 2010 can cancel the order if something goes wrong. This will return the license t o the p o ol of availab le licenses.  The order is bein g pro cessed - Order processing in the datacenter started.  Writing data – Y our backups are being written on to t he media. From this point on, you cannot cancel th[...]

  • Pagina 380

    380 Copyright © Acronis, Inc., 2000 - 2010 If you purchased your sub scriptions online using th e Acronis Web sit e, they are available im m ediately on your account manag ement Web page. The ne wly obtained sub scriptions are li ste d at the Manage Subscriptions tab. 8. 1. 9.3 Whe n doe s my s ub scr ip ti on be gin ? Your subscription begins whe[...]

  • Pagina 381

    381 Copyright © Acronis, Inc., 2000 - 2010 Wh at d oes " Au to -re ne w" me an ? Auto-renewal means that when the current subscript io n expires, th e next subscription will be automatically s elected fro m the available sub scriptions. The next subscripti o n m ust be identical to the current subscripti on. If an identical subscrip tio [...]

  • Pagina 382

    382 Copyright © Acronis, Inc., 2000 - 2010  Windows Server 2008 R2 - the Standard , Enterprise, Small Busines s Server, Datacenter, Foundation editions  Windows MultiP o int Serve r 2 010 Workstation ope rating systems supported by Acronis Backup & Recovery 10 Onl ine:  Windows 2000 P rofessi o nal SP4  Windows XP Prof essional SP2[...]

  • Pagina 383

    383 Copyright © Acronis, Inc., 2000 - 2010  As soon as a subscripti on is activated, its subscripti o n period st arts. To avoid losing sub scription time, activate th e subscription only when you are read y to back up the machine.  If a machine alre ady has a su bscription, the ne w subsc ription will replace t he old o ne. You can reassign[...]

  • Pagina 384

    384 Copyright © Acronis, Inc., 2000 - 2010 Depending on y our settings, this ba ckup will be e ither full or incremental. But its size is not lik ely to be less than a full bac kup size. Therefore, it is not practical t o reassign a sub scription to a machine whose first backup wa s done as an initial seeding. Yo u will need to either redo th e in[...]

  • Pagina 385

    385 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure p rox y s et tin gs fo r an age nt 1. Connect the cons o le t o the machine fo r which yo u wa nt to configure proxy setting s. 2. In the Op tions m enu, located on the toolbar, clic k Machine options . 3. Click Online ba ckup proxy . 4. Enter the proxy server settings. For detailed infor [...]

  • Pagina 386

    386 Copyright © Acronis, Inc., 2000 - 2010  Dual destinat ion (p. 106) By using the Ba c kup perfo rmance > Net w ork conn ection speed option, you can v ary the transferrin g speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up. 8. [...]

  • Pagina 387

    387 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration code A character string f o r regist ering a subscription or lice nse that was bought fr o m an Acro nis par tner. When you purchase such subscriptions o r licenses, you receive a confirma tio [...]

  • Pagina 388

    388 Copyright © Acronis, Inc., 2000 - 2010 9 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af ter the syst em recovery is start ed. The system bo o ts from the backup (p. 394 ) and the machine becomes operational and r eady to provide nec essary services. The data r equir[...]

  • Pagina 389

    389 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation of loaders other tha n Window s load ers and GR UB. A gen t (A cr oni s Ba cku p & R eco ve ry 1 0 Ag en t) An application tha t performs data backup and recovery and enab les other management op erations on the machine (p. 3 97), such as tas k management and oper[...]

  • Pagina 390

    390 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati o n (p. 389), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup stream o r data compre ssion level. Backup options are a part of a backup pla n (p. 390 ). Ba cku p pla n (P lan ) A set of rules that spec[...]

  • Pagina 391

    391 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 389) installed on the machine find s data item s using the selection rules. For example, if the selection rule is [A ll volumes], the entire machin e will b e backed up. 5. On each machine, the agent installed on th e machine creates a backup plan (p. 390) usin g other ru[...]

  • Pagina 392

    392 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manually modified. Custom groups cannot be created wi thin b uilt-in groups. There is no way to remove a physi cal machine from the built-in group exc ept for re m oving the machine from the managem ent server. Virtual machin es are removed as a[...]

  • Pagina 393

    393 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 3 89) from a backup archive (p. 389) in order to get rid of outdated backups or prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p. 39 0) that produces the archi v e. This o perat[...]

  • Pagina 394

    394 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma na ge me n t Any management o peratio n that is performed on a managed machine (p. 397 ) using the direc t console (p. 393)-agen t (p. 3 8 9) connecti on (as opposed to centralized manage ment (p. 392) when the operations are c onfigured on the management s erver (p. 398) and propagat ed by th[...]

  • Pagina 395

    395 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Management http://support.micr o soft.c om/kb/222189 /EN -US/ D yna mi c di sk A hard disk manag ed by Log ical Disk Manag er (LDM) t hat is available in Windows starting with Windows 2000. L DM helps flexibly all o cate v olumes o n a storage device fo[...]

  • Pagina 396

    396 Copyright © Acronis, Inc., 2000 - 2010  the administrat or changes the crit eria so that the mach ine does not meet them anymore. There is no way t o remove a m achine from a dynamic group manuall y e xcept fo r deleting the machine from th e management server. D yna mi c v ol um e Any volume l ocated on dynamic dis ks (p. 39 5), or more pr[...]

  • Pagina 397

    397 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 389) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecover the data fr om a full backup. G GF S ( Gr and fa th er -Fa th er -So n) A popular backup sche me (p. 39 1) aimed to main tain the optimal balance betwe en [...]

  • Pagina 398

    398 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d v au lt A centralized vault (p. 392) manag ed by a storage node (p. 399). Archi ves (p. 389) in a managed vault can be accessed as f o llows : bsp:// node _address/vault_name/archiv e_name/ Physically, managed vaults can reside on a network share, SAN, NAS, o n a hard dr ive local to t he stora[...]

  • Pagina 399

    399 Copyright © Acronis, Inc., 2000 - 2010 P lan See Backup plan (p. 3 9 0 ). P oli cy See Backup policy (p. 390 ). R Re co ver y po in t Date and time to w hich th e backed up dat a can be reverted to. Re gi st ere d ma ch in e A machine (p. 397) managed by a manage ment server (p. 398). A machine can be registered on o nly one management server [...]

  • Pagina 400

    400 Copyright © Acronis, Inc., 2000 - 2010  prevent access to the backup archives, even in c as e the storage medium is stolen or access ed by a malefactor, by usin g encrypted vaults (p. 396 ). S tor ag e nod e- sid e cle an u p Cleanup (p. 392) perf ormed by a storage node (p. 399) according t o the backup p lans (p. 390) that produce the arc[...]

  • Pagina 401

    401 Copyright © Acronis, Inc., 2000 - 2010 U Un iv er sa l R es tor e (Ac ro ni s Bac ku p & R eco ve ry 10 U ni ve rs al Re st or e) The Acronis propri et ary t echnology that helps boot up W indows on dissimila r hardware or a virtual machine. The Uni v ersal Res to re hand les differences in devices that are critical for the operating syste[...]

  • Pagina 402

    402 Copyright © Acronis, Inc., 2000 - 2010 Vi rt ua l m ac hi ne On Acronis Backup & Recover y 10 Manag ement Serve r, a m achine (p. 397) is con sidered virtual if it can be backed up fr o m the virtuali zation host without installin g an agent (p. 389) on the m achi ne. A virtual machine ap pears on the management se rver after registration [...]