Acronis Backup & Recovery 11 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Acronis Backup & Recovery 11, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Acronis Backup & Recovery 11 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Acronis Backup & Recovery 11. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Acronis Backup & Recovery 11 should contain:
- informations concerning technical data of Acronis Backup & Recovery 11
- name of the manufacturer and a year of construction of the Acronis Backup & Recovery 11 item
- rules of operation, control and maintenance of the Acronis Backup & Recovery 11 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Acronis Backup & Recovery 11 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Acronis Backup & Recovery 11, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Acronis service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Acronis Backup & Recovery 11.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Acronis Backup & Recovery 11 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    A c r o n i s B a c k u p & R e c o v e r y 1 1 Update 0 User Guide Applies to th e followin g edit i ons:  Advanc ed Server  Virtual E dition  Advanc ed Server SBS Edition  Advanc ed Workstation  Server f o r Linux  Server f o r Window s  Workstati o n[...]

  • Page 2

    2 Copyr i ght © Acronis , In c., 2000-20 1 1 Copyright © Acronis, Inc . , 2000-2011. All rights reserve d.           [...]

  • Page 3

    3 Copyr i ght © Acronis , In c., 2000-20 1 1 Table o f conten ts 1 Introducing Acro nis Backup & Rec o very 11 ................................ ................................................ 9 1.1 What's new in Acron i s Backup & Recovery 1 1 ....................................................................... 9 1.2 Acronis Bac k[...]

  • Page 4

    4 Copyr i ght © Acronis , In c., 2000-20 1 1 4 .3 .2 T he [D AT E] va ria b le ................................................................................................................................ 69 4 .3 .3 Ba ck up s pl it ti ng an d s i mp lif ie d fi le na m ing .......................................................................[...]

  • Page 5

    5 Copyr i ght © Acronis , In c., 2000-20 1 1 5 .1 .5 W he n t o rec ov er ................................ ................................................................................................... 133 5 .1 .6 T as k cre de nt ia ls ...........................................................................................................[...]

  • Page 6

    6 Copyr i ght © Acronis , In c., 2000-20 1 1 7 .1 .1 A rch iv e s el ect io n ................................................................................................................................ ... 212 7 .1 .2 Ba ck up s ele ct io n .......................................................................................................[...]

  • Page 7

    7 Copyr i ght © Acronis , In c., 2000-20 1 1 9 .6 .3 Di sk co n ver si on : MBR t o G PT ................................ ............................................................................... 247 9 .6 .4 Di sk co n ver si on : GPT t o MB R ...................................................................................................[...]

  • Page 8

    8 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1. 3 .4 Ba ck up p lan s an d ta sk s ................................................................................................ ......................... 313 1 1. 3 .5 S to rag e no des .............................................................................................................[...]

  • Page 9

    9 Copyr i ght © Acronis , In c., 2000-20 1 1 1 In tro duc in g Acro n is Back up & Rec ove ry 1 1 1. 1 Wh at 's n ew in Ac ro nis B a ck up & Re cov er y 11 Acronis Bac kup & Recovery 11 builds on t he su ccess that Acro nis Backup & Recovery 1 0 has established by bring i ng enterprise-class capabili ti es to the small busine[...]

  • Page 10

    10 Copyr i ght © Acronis , In c., 2000-20 1 1 Using boo table media, you c an apply Acronis Universal Restore to an operating system without performing the rec overy.  Linux L VM support (p. 36 ) LVM stru cture i s saved in a backup and can be recovered.  Acronis Un iversal Restore for Li n ux systems (p. 137) Recover L inux systems to dissi[...]

  • Page 11

    11 Copyr i ght © Acronis , In c., 2000-20 1 1 When installing an agent, you can enter the license key i nstead of specifyi ng the l icense server. As soon as the machine is registered on th e managem ent server, the key will be added t o the li st of licenses hand l ed by t he server.  The managemen t server w eb page for components i nstallati[...]

  • Page 12

    12 Copyr i ght © Acronis , In c., 2000-20 1 1 Console The c onsole provides Graphical User Interfac e and remote c onne ction to the agent s and other Acronis Bac kup & Recovery 11 component s. Usage of the co nsole is not licensed. Bootable media builder With boo table media builder, you c an create bootab le m edia in order t o use the ag en[...]

  • Page 13

    13 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 2.1 .1 U ni ver sal R esto re The Universal Restore ad d-on enables you to use the restore t o dissim ilar hardware func tionali ty on the mac hi ne where t he agent is installed and c reate bootable media with this fu nctio nality. Universa l Restore han dl es differences in d ev ices that are crit[...]

  • Page 14

    14 Copyr i ght © Acronis , In c., 2000-20 1 1  For o ff-loaded bac kup, Agent for VMware vSphere ESX(i) (Windows) can be installed on a machine running Windows . Acronis Bac kup & Recovery 11 Agent for VM ware vSph ere ESX(i) is referred as A gent for ESX(i) later in this do cument. 1 . 2 . 4 A g e n t f o r H y p e r - V Acronis Bac kup &a[...]

  • Page 15

    15 Copyr i ght © Acronis , In c., 2000-20 1 1 The st orage nodes enable creat i ng highly scalable and flexi ble, in terms of the hardware suppor t, storage infrast ruct ure. Up to 5 0 sto rage nodes can be set up, ea ch being able to manage up to 20 vaults. The ad ministrator c ontrols the storage n odes centrally from t he Acronis Backup & R[...]

  • Page 16

    16 Copyr i ght © Acronis , In c., 2000-20 1 1 The c onsole has two distributions: for installation on Windows and install ation o n Linux. While bot h distributions enab l e conn ection to any Acro ni s Backup & Recovery 1 1 agent and Acronis Bac kup & Recovery 11 Management Server, we reco m m end t hat you use the conso le for Windows if[...]

  • Page 17

    17 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 4 Te ch ni ca l S upp or t Maintenance and Support Program If you need assi stance with your Acronis product , please go to http://www.acronis.com/support/ Product Updates You can download the latest updates fo r all your registered Acronis soft ware product s from our website at any time after logg[...]

  • Page 18

    18 Copyr i ght © Acronis , In c., 2000-20 1 1 2 G ett ing st ar ted Step 1. Installation These brief installation i nstruct i ons enable yo u to st art u si ng the pro duc t qu i ckly. For th e complete d escription o f installation methods an d procedures, please refer to t he Installation document ation. Before installation, make sure that:  [...]

  • Page 19

    19 Copyr i ght © Acronis , In c., 2000-20 1 1 a. Run t he setup program and c l ick Install Acr onis Backup & Recovery 1 1 . b. After ac cepting the t erm s of the license a greem ent, select t he Connect to remote machines check box. c. Follow th e on-screen instruc tions. Step 2. Running Run Acro ni s Backup & Recovery 1 1 Management Con[...]

  • Page 20

    20 Copyr i ght © Acronis , In c., 2000-20 1 1 To save your mac h ine to a fi le: Under Where to back up , c l ick Location , an d select the location where the backup will be saved. Click OK t o confirm your sel ection. Click OK at the bot tom of the window to start the backup. Tip. Using the bo otable media, you c an do off-li ne ("cold"[...]

  • Page 21

    21 Copyr i ght © Acronis , In c., 2000-20 1 1 Administering t h e manag ement server  Use the Machines w ith agents view t o manage machines registered on the management server. To effec tiv ely work w i th a l arge number of mach i nes, organize t hem into groups (p. 300 ).  Use the Virtual m achines (p. 312 ) view to manage supported vi rt[...]

  • Page 22

    22 Copyr i ght © Acronis , In c., 2000-20 1 1 Key elements of the console wo rkspac e Na me D es cri pti on Navigati o n pane Contains the Navig at i o n tree and th e Shortcut s ba r . Lets you navi g ate to the different views. For deta il s, see Navigati on pane ( p. 22 ). Main area Here you configu r e and m onitor bac k up, recovery and othe [...]

  • Page 23

    23 Copyr i ght © Acronis , In c., 2000-20 1 1  Mounted i mages . This no de is displaye d if at least one volume is mount ed. Use this view to manage mounted i mages. Views for a management serve r When th e console is connect ed to a management serv er, the fo l lowing vi ews are avai lable in t he navigation tree. The Short l ist displays [...]

  • Page 24

    24 Copyr i ght © Acronis , In c., 2000-20 1 1 Operations with pane Ho w to ex pa nd/ min im iz e p an es By default, the Navigation pane appears expanded. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( ). T he pane wi ll be min i mized and the c hevron changes its direction ( ). Clic[...]

  • Page 25

    25 Copyr i ght © Acronis , In c., 2000-20 1 1  In the information pan el (collapsed by d efaul t), v iew the item's detail s. To expan d the panel, cli ck the arro w mark ( ).  Perform act i ons on the selected item. Th ere are several ways of performing the same action on selected items:  By clicking the buttons o n the table too l [...]

  • Page 26

    26 Copyr i ght © Acronis , In c., 2000-20 1 1 Action p a ge - Create backup pla n Using controls and specifying s ettings Use active co ntrols to specify a bac kup plan or recovery t ask settings and paramet ers. By default, such fi elds as credent i als, opt i ons, comment s, an d some others are hidden. Most settings are configured by cli cking [...]

  • Page 27

    27 Copyr i ght © Acronis , In c., 2000-20 1 1 Navigati o n b uttons 2 . 1 . 3 C o n s o l e o p t i o n s The c onsole options define the way information is repr ese nted in the Grap hi cal User Interfac e of Acronis Bac kup & Recovery 11. To access the conso l e options, select Options > C o nsole options from the t op menu. 2. 1.3 .1 Al e[...]

  • Page 28

    28 Copyr i ght © Acronis , In c., 2000-20 1 1 To make a selection, choose the font fr om the respec ti v e co mbo-box and set the fon t's pro per ties. You can preview the fo nt's appearanc e by clicking B rowse to the ri ght. 2. 1.3 .4 Po p-u p m essa g es These o ptions are effective when the console is c onne cted to a managed mac hi [...]

  • Page 29

    29 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Enabled for all results. To make a sett i ng for eac h result (succ essful c ompletion, fai lure or suc cess with warnings) individually, sel ect o r clear the respective c heck box. 2. 1.3 .5 S tart up pa ge This opt i on defines whet her to show the Welc o me screen or the Dashboard vi[...]

  • Page 30

    30 Copyr i ght © Acronis , In c., 2000-20 1 1 3 U nde rst and ing Ac ron is Bac kup & Rec ov ery 1 1 This sect i on at tempts to gi ve its readers a clear unders tanding of the product so t ha t they can use the pro duc t in various circumst ances without step- by - step inst ructions. 3. 1 O wne rs an d cre de ntia ls This sect i on explains [...]

  • Page 31

    31 Copyr i ght © Acronis , In c., 2000-20 1 1 1. In the P lan parameters (or Task parameter s ) section, cli ck Show plan 's cr ed entials, c o mments , label (or S how task c redentials ). 2. Click Pl a n's (Task) cre d entials . 3. Enter the credent i als under which the pl an (task) will run. Scheduled or p ostponed start The plan (ta[...]

  • Page 32

    32 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 3 F ul l , i ncr e me nta l a nd d i ffe ren tia l ba ck ups Acronis Bac kup & Recovery 11 provides the capabili ty to use popular backup schemes, such as Grandfather-Fa ther-Son and Tower of Hanoi, as well as to create cus tom bac kup s chemes. All bac kup schemes are b ased on full, increment [...]

  • Page 33

    33 Copyr i ght © Acronis , In c., 2000-20 1 1 Differential backup A differential backup stores changes to t he data against th e latest full backup . Yo u need access to the c orresponding full backup to recover the data from a d i fferential backup. A d i fferent i al backup i s most useful when:  you are interested in sav ing only the most re[...]

  • Page 34

    34 Copyr i ght © Acronis , In c., 2000-20 1 1 Linux A volume backup stores all files and folders of the select ed volume independent of their attribut es; a boot record an d the file system super block. A disk backup sto res all disk volumes as we l l as the zero track wi th the master boo t reco rd. 3. 5 A bo ut dy na mic a nd log ic al v o l ume[...]

  • Page 35

    35 Copyr i ght © Acronis , In c., 2000-20 1 1 When reco v ering a dynamic volu me to disk group unall ocat ed space, the so ftware preserves the volume's original type and size. If the disk group configuration does not allow for t he origi nal volume type, the volume will be reco v ered as a si mple or spanned volume. I f this volume does not[...]

  • Page 36

    36 Copyr i ght © Acronis , In c., 2000-20 1 1 3 . 5 . 2 B a c k u p a n d r e c o v e r y o f l o g i c a l v o l u m e s a n d MD d e v i c e s ( L i n u x ) This sect i on explains how y ou wou l d back up and rec o ver volumes managed by Linux Logical Volume Manager (LVM ), called logical volumes; and multiple -disk (MD) devices, c al led Linux[...]

  • Page 37

    37 Copyr i ght © Acronis , In c., 2000-20 1 1 For det ai led instruct i ons on h ow to recover l ogical volumes, see Recovering MD devices and logi cal volumes (p. 38 ). 3. 5.2 .2 B ack ing up MD dev ic es MD d ev ices, kno wn as Linux Software RAID, c ombine s everal volumes and m ake sol i d block devices ( /dev/md0, /dev/md1, ... , /d ev/md31 )[...]

  • Page 38

    38 Copyr i ght © Acronis , In c., 2000-20 1 1 automat i cally assembled follow i ng the reboot. To v iew or ch ang e the partition type, use a disk partitioning ut i lity suc h as fdisk .  Otherwise (suc h as in the sec ond example), perfo rm the recovery from boo table media. No reboot wi ll be required in t hat c ase. In boo table media, you [...]

  • Page 39

    39 Copyr i ght © Acronis , In c., 2000-20 1 1 To crea t e t he vo lum e str uc tur e manu al ly 1. Boot the machine fro m a L inux-based bootable media. 2. Click Acronis Ba ckup & Rec ov ery 11 . T hen, cli ck Run managemen t console . 3. On t he toolbar, click Actions , and then click Start s hell . Al ternative l y, you can press CTRL+ALT+F2[...]

  • Page 40

    40 Copyr i ght © Acronis , In c., 2000-20 1 1 Th e following picture illust rates this co nfiguration. Do t he followi ng to recover data from t hi s archive. Step 1: Cr eating the volume structure 1. Boot the machine fro m a L inux-based bootable media. 2. In the management con sol e, press C TRL+ALT+F2 . 3. Run t he followi ng commands to create[...]

  • Page 41

    41 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In Archive , click Change and then specify the name of the archive. 3. In Backup , click Cha ng e and then select t he backup from which y ou want to recover dat a. 4. In Data type , selec t Volumes . 5. In Items to recover , select the c heck box next to my_volgroup -my_l o gvol . 6. Under Where to[...]

  • Page 42

    42 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 6 C omp at ib il ity wi th e ncry pt io n s of tw ar e Acronis Bac kup & Recovery 11 fully retains its func tion ality when interac ting with fil e -level encryption software. Disk-level encryption software encrypt s data on the fly. This is why data contained in t he backup is not encrypted. Di[...]

  • Page 43

    43 Copyr i ght © Acronis , In c., 2000-20 1 1 You can recover an encrypted system part i tion by u si n g boot abl e media only. If the rec overed system fails to bo ot , rebu ild Master Boot Record as described in t he f ollowi ng     Restoring Wind[...]

  • Page 44

    44 Copyr i ght © Acronis , In c., 2000-20 1 1 OID: 1. 3.6.1.4.1.2476 9. 100.20 0.2.0 Value: "? 00000000"[...]

  • Page 45

    45 Copyr i ght © Acronis , In c., 2000-20 1 1 4 Ba cku p 4. 1 B ac k u p now Use the Back up now featu re to co nfi gure and ru n a one-tim e backup in a few simple steps. The backup process will start immediately aft er you perform the requ i red steps and click OK . For a l ong-time backup strategy that includes schedu l es and c onditions, time[...]

  • Page 46

    46 Copyr i ght © Acronis , In c., 2000-20 1 1 To access these settings, cli ck Show backup fil e naming, acce ss credentials, archive com ments . File n aming (p. 65 ) [Opt i onal] Select t he Name backup files usi n g the archive n ame, as in Acronis T rue Im ag e Echo, rather th an auto-generated n ames check box if you want to use simpli fied f[...]

  • Page 47

    47 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Configure parameters o f the backup operat i on, such as pre/post backup commands, maxi mum network bandwi dth al located for t he backup stream or t he backup archive co mpression level. If you d o not hing in t his section, the default values (p. 95 ) will be used. After any o f the sett[...]

  • Page 48

    48 Copyr i ght © Acronis , In c., 2000-20 1 1 In order t o recover your operat i ng system along with all the settings and applications, you have to perform a disk bac kup. Virtual machines Available if Acro ni s Backup & Recovery 1 1 Agent for E S X(i) or Acronis Bac kup & Recovery 11 Hyper-V is installed. Select t hi s opt i on to bac k [...]

  • Page 49

    49 Copyr i ght © Acronis , In c., 2000-20 1 1  Use the following cr edentials The pro g ram will access t he source dat a using the c red entials you specify. Use this opt i on if t he plan's acco unt does n o t have access permissions t o the data. Specify:  User na me . When ent eri ng the n am e of an Ac tive Direc tory user account,[...]

  • Page 50

    50 Copyr i ght © Acronis , In c., 2000-20 1 1 C ri ter i on E xa mpl e D es cri pti on W i ndow s an d Li nu x By name F.log F Excludes a l l files named "F.log" Excludes a l l folders named "F" By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith &q[...]

  • Page 51

    51 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . Warning: Acc ordi n g to t h e ori g inal FTP spec i fic ation, cred entials require d for access to FTP servers are transferred throu gh a network a s pl aintext. Th is me a ns th a t th e user na me and password can be i nter cepted b y an eavesdr opper using a packet sniffer. 4 . 2 . 5[...]

  • Page 52

    52 Copyr i ght © Acronis , In c., 2000-20 1 1 To access this set ting , click Show backup type, 2 nd l o cation, vali d ation, c o nvert to virtual machine . Select t he backup type.  Full - sel ected by default for all backup loc ations (except for Ac ronis Online Backup St orage).  Increm enta l . At the fi rst t i me a full backup wil l b[...]

  • Page 53

    53 Copyr i ght © Acronis , In c., 2000-20 1 1 Start back up at Specifies when to start a backup. The default v alue is 12:0 0 PM. Back u p on Specifies t he days on whi ch to perfor m a backu p. The defau lt value is Workdays . Weekly/M onth l y Specifies which of the days selected in the Back u p on field you want to reserve for weekly and monthl[...]

  • Page 54

    54 Copyr i ght © Acronis , In c., 2000-20 1 1  Keep backup s:  Daily: 1 w eek  Weekly: 1 month  Mont hl y: indefinitely As a result, an archive of dai ly, weekly, and m onthly bac kups will be c reated. Daily backups will be available for seven days since creation. For instan ce, a daily backup o f Sunday, January 1, will be available [...]

  • Page 55

    55 Copyr i ght © Acronis , In c., 2000-20 1 1  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Fr iday  Keep backup s:  Daily: 6 m on ths  Weekly: 6 months  Mont hl y: 5 y ears Here, daily incre mental backups will be creat ed on Tue sdays and Thursdays, with week ly and monthly bac kups perfo[...]

  • Page 56

    56 Copyr i ght © Acronis , In c., 2000-20 1 1 Dif ferential backu p schedule Specifies on what schedule and under which conditions to p er form a differ ential backup. If the arch i ve conta i ns no fu ll backups at the time of the task run, a full backup i s created instead of the dif ferential backup . Clean u p archive Specifies ho w to get rid[...]

  • Page 57

    57 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples Weekly full backu p The fo l lowing scheme yields a fu ll backup p erformed every Friday night. Full backup : Schedule: Weekl y , every Fri d ay , at 10:00 PM Here, all parameters exc ept Schedule in Full ba ckup are l eft empty. Al l backup s in the arch i ve are kept indefinitely (no archive[...]

  • Page 58

    58 Copyr i ght © Acronis , In c., 2000-20 1 1 Finally, we create retent i on rules for the arc hi ve: let us retain o nl y backups tha t are no older th an six months, and let the cleanup be performed aft er each backup task and also on the l ast day o f every month. Retention rules : Delete backups o l der than 6 months Apply the rules : After ba[...]

  • Page 59

    59 Copyr i ght © Acronis , In c., 2000-20 1 1  Recur: Every 1 day  Frequency: Once at 6 PM Number o f levels : 4 Backup type : Fu l l/Differentia l /Increment al This is how the first 14 days (or 14 sessions) o f this scheme's schedule look. Sh aded numbers denot e backup l evels. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1[...]

  • Page 60

    60 Copyr i ght © Acronis , In c., 2000-20 1 1 A new level 3 differential backup has not yet b een crea ted, so the b ackup of day fi ve is still stored. Since it depends on the full backup of day on e, that backup is available as we l l. Th is enables us t o go as far b ack as 11 days, which is t he best- case scenar i o. The fo l lowing day, howe[...]

  • Page 61

    61 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Selecting the destination In the P ath field, enter the full path to the d estination, or select t he desired destination i n the location tree as described in " Sel ecting bac kup destinations" (p. 61 ). 2. Using the archives table To assist you wi th choosing th e rig ht dest i nation, t[...]

  • Page 62

    62 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Onli ne backup storage To back up da ta to Acronis O nline Backup Sto rage, c lick Log i n and spe c ify the cred enti als to log in to the onl ine storage. Then, expand the Online b a ckup sto ra ge group and se l ect the account . Prior to ba cki n g up to the onl i ne sto[...]

  • Page 63

    63 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Stora ge nodes When you need to back up data to a stora ge node that i s no t registe r ed on t he managem ent serve r, or when operat ing on a mach ine booted wit h bootab l e media:  To access a managed vault, type the following st ring in the Path fie l d: bsp://n o de[...]

  • Page 64

    64 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . To learn more abou t operations av ailable depending on the user privileges, see the Users' privileges on a m anaged machine (p. 31 ) sec tion. 4 . 2 . 9 L a b e l ( P r e s e r v i n g m a c h i n e p r o p e r t i e s i n a b a c k u p ) Any time data on a machine is bac ke d up, i[...]

  • Page 65

    65 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows XP All Editions winXPP roGuest Windows XP All Editions (64 bit ) winXPP ro64Guest Windows Se rver 2003, Al l Editions winNetStanda rdGuest Windows Se rver 2003, Al l Editions (64 bit) winNetStanda rd64Guest Windows 200 8 winLonghor nG ues t Windows 200 8 (64 bit) winLonghor n64Guest Windows Vi [...]

  • Page 66

    66 Copyr i ght © Acronis , In c., 2000-20 1 1 This behavior is useful when you rotat e USB hard drives and want each drive to keep a single full backup (p. 67 ) or all backups created during a week (p. 67 ). But you might end up with no backups i f a full bac kup to your only drive fails. This behavior c an be suppressed by adding the [Date] vari [...]

  • Page 67

    67 Copyr i ght © Acronis , In c., 2000-20 1 1 Result:  The bac kups of January 1, 201 1 , January 2, 20 11, and s o on, are st ored respectively as MyMach i ne-1.1.2011.t ib, MyM achine-1.2. 2011 . tib, and so on.  Your script can move older bac kups based on the date stamp. See also  [...]

  • Page 68

    68 Copyr i ght © Acronis , In c., 2000-20 1 1  You want to back up to the arc hiv e MyMachine on an external h ard disk drive .  You have two such drives. Either of them has drive letter D in the operating system when attac hed to the mac hi ne.  You want to swap the drives each Monday , so that one drive c ontai ns backup s of the curren[...]

  • Page 69

    69 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 3 . 2 T h e [ D A T E ] v a r i a b l e If you spec i fy the [DATE] variable in t he archive name, t he fil e name of each backup wi ll include that   When using th i s variable, the first bac kup of a n ew day wil l be a fu l l b[...]

  • Page 70

    70 Copyr i ght © Acronis , In c., 2000-20 1 1 The sc heduler uses local time of the machine th e bac k up plan exists on. Befo re creat i ng a sch edul e, be sure t h        Schedule To define when a task has[...]

  • Page 71

    71 Copyr i ght © Acronis , In c., 2000-20 1 1 What- ifs  What if an event o ccurs (and a con d ition, if a n y, is me t) whil e the previous task run has not completed? The event will be ignored.  What if an event o ccurs while the sc h eduler i s waiting for the con dition required by the previous event? The event will be ignored.  What [...]

  • Page 72

    72 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: not s et . The t ask wil l be start ed on the current day, if it has b ee n creat ed before 6PM . If you have c reated the task aft er 6 PM, the task will be s tarted for the fi rst t i me on the next day a t 6 PM. To: no t set . T he task will be performed for an indefinite nu m [...]

  • Page 73

    73 Copyr i ght © Acronis , In c., 2000-20 1 1 To: no t set . Second dail y schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 0 3:00:00 PM Until: 07 :00:00 PM . 3. Effect i ve: From: 0 9/20/2009 . To: no t set . 4 . 4 . 2 W e e k l y s c h e d u l e Weekly sc hedule i s effect i ve in Windows and Linux operating systems . To sp eci fy a w eek[...]

  • Page 74

    74 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: 0 5/13/2009 . The t ask wil l be start ed on the nea rest Friday at 10 PM. To: 1 1/13/200 9 . The task will be performed for the last time on this date, bu t the task it self will still be availabl e in th e Tasks view after th is date. (If th i s date were not a Friday, th e task[...]

  • Page 75

    75 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Every: 9 hours From: 1 2:00:00 PM Until: 09 :00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Second sched u le 1. Every 1 week(s) on: Tu e , Wed , T hu . 2. Every 3 hours From 09 : 00:00 AM u ntil 09:00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Third schedule 1. Every: 1 wee[...]

  • Page 76

    76 Copyr i ght © Acronis , In c., 2000-20 1 1 Advanced sc heduli ng settings (p. 79 ) are availab l e only for machines registered on A cronis Bac kup & Recovery 11 Management Server. To specify these settings, c l ick Cha nge in the Adv a nced settings area. All the settings you made are di splayed in the Result field at the bo ttom o f the w[...]

  • Page 77

    77 Copyr i ght © Acronis , In c., 2000-20 1 1  During nort hern spring and aut umn, the task runs every 12 hours on all workdays.  During nort hern summer, the task runs every first and fifteenth o f every month at 10 PM. Thus, the following three sc hedules are added to the task. Firs t s chedule 1. Mont hs: December , January , Fe bruary .[...]

  • Page 78

    78 Copyr i ght © Acronis , In c., 2000-20 1 1 Event type Specifies the ev ent t y pe: Error , Warning , Info rmation , Audit success , o r Audit fa ilure . Event ID Specifies the ev ent number, which typically identifies the particular kind of events among events from th e same source. For example, an Error event with E vent source disk an d E ven[...]

  • Page 79

    79 Copyr i ght © Acronis , In c., 2000-20 1 1 How to view events in Event viewe r T o ope n a l og i n E ve nt Vi ewe r 1. On t he Desktop or in the Start menu, right-click My Computer , and t hen click Manage . 2. In the C ompu ter M a nagement console, expan d System To ols , an d then expand Event Viewer . 3. In Event Vi ewer , click the n am e[...]

  • Page 80

    80 Copyr i ght © Acronis , In c., 2000-20 1 1 Distribute start time within the tim e window When th i s setting is enabled, the backup task on each registered machine w ill start wi th a specifi c delay from th e start time set in th e backup plan. T hi s distributes the tasks' actual st art times wi thin a time interval. You m ay want t o us[...]

  • Page 81

    81 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy a dv an ced s et ti ng s 1. Connect to the manag ement server or to a mac hi ne regi stered on i t, and then start creat i ng a backup pl an. 2. In How to back up , select t he Simpl e, T ower of Hanoi, or Custom scheme, and then c li ck Schedule to specify a schedule for the scheme. 3. Un[...]

  • Page 82

    82 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4.7 .1 U se r i s i dle Applies to: Windows "User is idle" means t hat a screen saver is running on the managed mac hine or t he machine is locked. Example: Run t he backup task on the manag ed machine every d ay at 9PM, preferably when the user is idle. If the user i s still active by 11P[...]

  • Page 83

    83 Copyr i ght © Acronis , In c., 2000-20 1 1 Example A company uses different locations on the same network-attac hed s torage for backing up users data and servers. Th e workday st arts at 8AM and end s a t 5 PM. Users' data should be backed up as soon as the users log off, but not earl ier than 4 : 30 PM and not later t han 10 PM. Every da[...]

  • Page 84

    84 Copyr i ght © Acronis , In c., 2000-20 1 1  Task st art conditions: Wait until th e conditions are met , Run the task anyway after 3 hour(s). As a result, (1) If all users are l ogged o ff at 8PM, t he backup task will start at 8PM. (2) If t he last u ser logs off b etween 8PM and 11PM, the backup task will start im mediately aft er the user[...]

  • Page 85

    85 Copyr i ght © Acronis , In c., 2000-20 1 1 The fo l lowing picture illustrat es this example. Usage sc enarios  Reliable d isaster recovery (p. 90 ) Store y our bac kups both on-site (fo r imm ediate reco very) and off-site (t o secure the backups from local st orage fail ure or a natural disaster).  Keeping only the latest r ecovery poin[...]

  • Page 86

    86 Copyr i ght © Acronis , In c., 2000-20 1 1  A local folder o n a fixed or removable drive  A network folder  An FTP o r SFTP server  Acronis Bac kup & Recovery 11 Storage Node  Acronis Secu re Zone You can cop y or move a bac kup to any of these l ocations:  A local folder o n a fixed or removable drive  A network folde[...]

  • Page 87

    87 Copyr i ght © Acronis , In c., 2000-20 1 1 If allowed by the backup sch eme, you can al so spec i fy when to aut omatically delete t he backups from each of the locations. 4 . 5 . 3 S e t t i n g u p r e t e n t i o n o f b a c k u p s You can set ret ention rules for backups when creating a backup plan (p. 45 ). The available retention rules d[...]

  • Page 88

    88 Copyr i ght © Acronis , In c., 2000-20 1 1 You can cho ose to apply the ret ention rules before c re ating a backup, af ter c reating a bac kup , on a schedule, or combine th ese options. For the second an d next loc ations, creating a bac kup means copying or movi ng a bac kup there from the previous locat i on. 4 . 5 . 4 R e t e n t i o n r u[...]

  • Page 89

    89 Copyr i ght © Acronis , In c., 2000-20 1 1 The o utda ted bac kup will be kept until all backups t hat depend o n it also become out da ted. Then, all the chain wil l be deleted at once during the reg ular cleanup. If you chose moving outdat ed ba ckups to the n ex t location, th e ba ckup will b e cop i ed there without delay. Only its deletio[...]

  • Page 90

    90 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 5.6 .1 Ex am ple 1. Rep li cati ng bac kup s t o a n etwo rk f old er Consider the fo l lowing scenar i o:  You want to perform a full backup of your machine manually.  You want to store the backups i n Acronis Secu re Zone (p. 170 ) on the mach i ne.  You want to store a copy of the backup[...]

  • Page 91

    91 Copyr i ght © Acronis , In c., 2000-20 1 1 the P ath fi eld. Under Rete ntion rules , select Move backups older than 1 week . Then, specify the tape d evice in the 2 n d location field. Make sure that the tape device is ready t o work. The preparation steps are described i n the "Backing up a m achine t o a directly at tac hed t ape device[...]

  • Page 92

    92 Copyr i ght © Acronis , In c., 2000-20 1 1 Restric tion s  Conversion is not avai lable on machines running Linux.  Conversion of a backup from t he f ollowing locat i ons is not available: CD, DVD, tape devices and Acronis On l ine Backup St orage.  If you have set up copying or moving backup s to o ther locations (p. 84 ), you can no[...]

  • Page 93

    93 Copyr i ght © Acronis , In c., 2000-20 1 1 or Hyper-V virtual mac hi ne is bac ked up at a hypervisor level), the task wil l be creat ed on the machine where t he agent is. The t arget virtual machine must be powered off b y the time of conversion, otherwise the conversion task will fail. If this hap pens, you c an restart the conversion t ask [...]

  • Page 94

    94 Copyr i ght © Acronis , In c., 2000-20 1 1 Storage space Disks of t he resulting virtual machine will use as much storage spa ce as the ori ginal data oc cupies. Assuming that the original disk size is 100 GB and t he d isk stores 1 0 GB of data, th e corresponding virtual disk w i ll oc cupy ab ou t 10 GB. VM ware calls this format " thin[...]

  • Page 95

    95 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7 De f a ult ba ck up opt i ons Each Acronis agent has i ts own default b a ckup opt ions. Onc e an agent is installed, the default op tions have pre-defined value s, which are referred to as presets in the document ation. When c reating a backup pl an, y ou can either use a default o ption , or ove[...]

  • Page 96

    96 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up HDD writing spee d (p. 100 ) Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Network c[...]

  • Page 97

    97 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Pre/Post ba ckup comman ds (p. 110 ) + + + + PE only PE only Pre/Post data capture commands (p. 112 ) + [...]

  • Page 98

    98 Copyr i ght © Acronis , In c., 2000-20 1 1 When th e Reset archive bit check box is selected, A cronis Backup & Recovery 11 will reset the archive bits o f all files being b acked u p. Acronis Bac kup & Reco very 11 itself does no t use the archive bit value. When perform ing incremental o r differential backup, it det ermines whether a[...]

  • Page 99

    99 Copyr i ght © Acronis , In c., 2000-20 1 1  When you specify an already ex isting archive as the destinat i on of the backup plan.  When you edi t a backup plan t hat has already resulted in a backup. The preset is: Disabled. To pro te ct the a rch iv e f ro m u nau tho ri ze d a cc ess 1. Select t he Set password for the a rchive check b[...]

  • Page 100

    100 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 4 B a c k u p p e r f o r m a n c e Use this group of options to spec i fy the am ount of network and syst em resourc es to allocate to the backup process. Bac kup performance options mi ght have a m ore or l es s not i ceable effect on the speed of the ba ckup process. T hi s depends on the o[...]

  • Page 101

    101 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7.4 .3 Ne tw ork con ne c t ion sp eed This opt i on is effec tive for Windows and Linux operat i ng systems an d boo table media. This opt i on is available when a loc ation on the n etwor k (network sha re, managed vault or an FTP/SFTP server) is selected as the backup destination. The o ption de[...]

  • Page 102

    102 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixed size Enter the desired file size or sel ect it fro m the drop-down list. The bac kup wil l then b e spli t into multiple files of t he specified size. T hi s comes in handy when creating a bac kup that you plan to burn to multiple CDs or DVD s later on. You mig ht also want to split the ba ckup [...]

  • Page 103

    103 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding informatio n to a DRP tem plate You can append additional information to a DRP template i f you are we ll familiar with XML and HTML. T he default path s to the DRP template are:  %ProgramFil es% AcronisBackupA nd Recover y drp.xsl - in 32-bit Windows  %ProgramFil es(x86)%AcronisBack[...]

  • Page 104

    104 Copyr i ght © Acronis , In c., 2000-20 1 1 Ignore bad sectors The preset is: Disabled . When th e option is disabled, the program will display a pop-up window each time it c omes across a bad sec tor and ask for a user d ecision as t o whether to cont i nue or stop the ba ckup pro cedure. In order t o ba ck up the valid information o n a rapid[...]

  • Page 105

    105 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on is no t availabl e when o perating under the boot able medi a. This opt i on defines whet her the agent(s) o perating on the managed mach i ne have to log events of the bac kup operations in the A pplication E vent Log of Windows (t o see this log, ru n eventv wr.exe or select Control Pa[...]

  • Page 106

    106 Copyr i ght © Acronis , In c., 2000-20 1 1 plan has t o run under the acc o unt with the A dministrator or Ba ckup O perat or privileges. If a snapshot cannot be taken, the backup will fail.  Create a snapshot if it is possible Back up fil es directly if t aking a snapshot is not possible.  Do not create a snapshot Always bac k up files [...]

  • Page 107

    107 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on defines ho w to take and to work with a snapshot o f a logical volume. Use of snapsho ts ensures a t i me-consistent backup of volumes whose dat a may change during t he backup process. The preset is: Acronis Backup & Recovery 11 Tip: We rec o mme n d ch a nging t h e pres et only if[...]

  • Page 108

    108 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r a file -level bac kup of a data sour ce that inc ludes mounted v olumes or clust er shared volumes. This opt i on is effec tive only when yo u select for backu p a fo lder that is higher in t he folder hierarchy than th[...]

  • Page 109

    109 Copyr i ght © Acronis , In c., 2000-20 1 1 When th i s option i s set to Disable , the volumes' sna ps hots will be taken one after the other. As a result, if the d ata spans ac ross several volumes, t he re sulting backup m ay be no t consistent. 4 . 7 . 1 7 N o t i f i c a t i o n s Acronis Bac kup & Recovery 11 provides the abi lit[...]

  • Page 110

    110 Copyr i ght © Acronis , In c., 2000-20 1 1  Pass word  ent er the password. d. Click OK . 11. Click Send test e -mail message to check if t he settings are c orrect. 4. 7.1 7.2 Me sse ng er ser vic e ( Win Po pup) This opt i on is effec tive for Windows and Linux operat i ng systems o n the sending machine an d only for Windows on the re[...]

  • Page 111

    111 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram does n ot support interac tive commands, i.e. commands that require user i nput (for example, "pau se"). To sp eci fy p re /p ost c omm and s 1. Enable pre/post commands execu tion by checking the following opt i ons:  Execute b efore the backup  Execute a fter the backup[...]

  • Page 112

    112 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Ar g uments field, spec i fy the command execution arguments, if required. 4. Select t he Fail the task if the c o mmand exec u tion fails check bo x if successful execu tion of the command is critical for you. The co m mand is considered failed if its exit code is not equal to zero. If the [...]

  • Page 113

    113 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the Worki n g direc to ry field, specify a p ath to a directory where t he command/batch file will be execut ed. 3. In the Ar g uments     ?[...]

  • Page 114

    114 Copyr i ght © Acronis , In c., 2000-20 1 1 successful ly executed. Delete the TIB file and temporary files and fail the tas k if the command execution fails. execution f ai lure or success . command execution result. * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 4 . 7 . 2 0 R e p l i ca t i o n / c l e a n u p i [...]

  • Page 115

    115 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption applies to backing up to a sto rag e node. Eject tape The preset is: Disabled . When th i s check box is selected, the software will ejec t tapes after a successful bac kup and/or when a tape i s full. Always use a free tape By default, the software tries t o write a ba ckup onto a tape c [...]

  • Page 116

    116 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram will try to execute the fai led task again if you sel ect t he Restart a failed tas k check box and spec i fy the n umber of attempts and th e time interval bet ween the attempts. The program stops trying as soo n as an attempt completes suc cessfull y OR the spec i fied number of attemp[...]

  • Page 117

    11 7 Cop yright © Acr o nis, In c., 200 0 -2011 Time d iagram: Wait until con ditio n s are met Skip the task execution Delaying a b ackup might be un acceptable, for example, when you need to back up data strict l y at the specified time . Then it makes sense t o skip the bac kup ra ther than wai t for the co nditions, especial ly if the event s [...]

  • Page 118

    118 Copyr i ght © Acronis , In c., 2000-20 1 1  Software - Acronis VSS Pr ovider VSS will use Acronis VSS Provi der for taking snapshots.  Software - Sy stem p rovider VSS will use the sy stem provider (M i crosoft Software Shadow Copy pro vi der) for t aki ng snapshot s.  Software - A software provider VSS will use any avai l able so ftw[...]

  • Page 119

    119 Copyr i ght © Acronis , In c., 2000-20 1 1 5 Re cov er y When it c omes to data rec overy, first consider the mos t functional method : connect the console t o the managed m a chine running t he operating system and c reate the recovery task. If the mac hi ne's operating sys tem fails to start or you need to recover data to bare m etal , [...]

  • Page 120

    120 Copyr i ght © Acronis , In c., 2000-20 1 1 Select dat a to recover. Access c redentials (p. 125 ) [Opt i onal] Provide credent i als for t he archive location i f the task accou n t does not have the right to access it. To access t his op tion, click Show access cred entials . Where to recover This sect i on app ears after the requi red bac ku[...]

  • Page 121

    121 Copyr i ght © Acronis , In c., 2000-20 1 1 [Optional] Universal Re s tore for Wind ows/Linux Applies to: sy stem disk or vo l ume recovery. Using Acronis Univers a l Restore req uires a separate license. Universal Restore for Windows/Linux (p. 134 ) Use Acronis Un i versal Resto re when you need to recover and boo t up an operat i ng systems o[...]

  • Page 122

    122 Copyr i ght © Acronis , In c., 2000-20 1 1  You are recovering custo m or non-Windows boo t load ers (such as L I LO and GRUB).  The disk geometry i s different t o that s tored in t he backup. There are probably other t i mes when you m ay need to recover the MBR, but the ab ove are the most common. When reco v ering the M BR of one dis[...]

  • Page 123

    123 Copyr i ght © Acronis , In c., 2000-20 1 1 Lo ca ti on D et ai l s FTP, SF TP If the arch i ve is stored on an FTP or SFTP ser ver , type the server na m e or address in the Path field as follows: ftp://ftp_se rver:port _n umber or sftp : //sf t p_serve r:po rt number If the port nu m ber is not specified, port 21 i s used for FTP a nd port 22[...]

  • Page 124

    124 Copyr i ght © Acronis , In c., 2000-20 1 1  In the search string, type t he information that helps t o i dentify the requi red dat a items (this can be a mac hi ne name, a file or folder name, or a disk label) and t he n click Search . You can use the asterisks (*) and question marks (?) wildcards. As a result, in the Search window, y ou wi[...]

  • Page 125

    125 Copyr i ght © Acronis , In c., 2000-20 1 1 Solution: To be able to bro wse such dat a , connect direct ly to a machine, sel ect the required personal vault and then select Data view . 5 . 1 . 2 A c c e s s c r e d e n t i a l s f o r l o c a t i o n Specify th e credentials required for access to the locat ion where t he backup is stored. To s[...]

  • Page 126

    126 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 1.4 .1 S ele ctin g targ et dis ks Available disk o r volume destinations depend on the agents operat i ng on t he machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 11 Agent fo r Windows or A gen t for Li nu x is installed. The select ed disks wil l be recovered[...]

  • Page 127

    127 Copyr i ght © Acronis , In c., 2000-20 1 1 D isk d esti nat ion To sp eci fy a d est ina ti on di sk : 1. Select a di sk where you want the select ed disk to rec o ver to. Th e destination disk's space should be at l east t he same size as the uncompressed i mage data. 2. Click OK . All the data store d o n the targ et disk will be replac[...]

  • Page 128

    128 Copyr i ght © Acronis , In c., 2000-20 1 1 Also, you have to map the volumes manually if t hey are Linux logical volumes, or Linux soft ware RAI D (MD d ev ices). For more information on recovering logical volumes and MD devices, see Recovering MD d ev ices and logical volumes (p . 38 ). The au tomatic mapping is performed as follows. 1. If th[...]

  • Page 129

    129 Copyr i ght © Acronis , In c., 2000-20 1 1 Available when the Acronis Backup & Recovery 11 Agent fo r Hyper-V or Agent fo r ESX(i) is installed. On select i ng this, you specify the v irtualization server and the target v irtual machine. Then you proceed to the reg ular volume mappin g proc edure described below. Please b e aware t ha t t [...]

  • Page 130

    130 Copyr i ght © Acronis , In c., 2000-20 1 1 Be careful ! To be on the saf e side, it is advisable t o a ssi gn unique nam es to the volumes. The L i nux-style boot abl e media shows loc al disks and volumes as unmount ed (sda1, sda 2.. .). Ch ang in g v olu me p ro pert i es S iz e an d l ocat i o n When reco v ering a volume to a basic MBR d i[...]

  • Page 131

    131 Copyr i ght © Acronis , In c., 2000-20 1 1 Vo lu me ( pa rtit ion ) a li gnm ent Acronis Bac kup & Recovery 11 automat i cally eliminates v olume misalignment  a situation, when volume clusters are not aligned with disk sect ors. The misalignment occurs when recoveri ng volumes created wi th t he Cyl inder/Head/Secto r (CH S) addressi n[...]

  • Page 132

    132 Copyr i ght © Acronis , In c., 2000-20 1 1 Files and folders wi l l be recovered to the same path(s) as they are in t he ba ckup. Fo r example, if you h av e backed up all fil es and folders in C: DocumentsF i nanceReports , the files will be recovered to t he same path. If t he folder does not exist, it will be created automat i cally. ?[...]

  • Page 133

    133 Copyr i ght © Acronis , In c., 2000-20 1 1 By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith "F" (such as folders F, F1 and f iles F .l og, F1. log) By mask ( ?) F?? ?.l og Excludes a l l .log files with names cons i stin g of four symbols and s ta r ti[...]

  • Page 134

    134 Copyr i ght © Acronis , In c., 2000-20 1 1 To learn more abou t using credent i als in Acronis Backup & Recovery 1 1 , see t he Owners and credent ials (p. 30 ) section. To learn more abou t operations av ailable depending on the user privileges, see the User privileges on a managed mach ine section. 5. 2 A cro ni s U niv e rsa l R es tor [...]

  • Page 135

    135 Copyr i ght © Acronis , In c., 2000-20 1 1 Sometimes Universa l Restore i s applied i n the background bec ause the soft war e knows what dri vers or modules are required for the suppor ted virtual mac hi nes. These c ases are as follows:  recovering a system to a new virtual machine  recovering a system to any virtual mach i ne by means[...]

  • Page 136

    136 Copyr i ght © Acronis , In c., 2000-20 1 1 Universal Restore settings Automatic driver search Specify where t he program will search for the Hardware Abst raction Layer (HAL), HDD controller driver and net work adapter driver(s):  If the d rivers are on a vendor's disc or ot her removable media, turn on the Searc h rem o vable media . [...]

  • Page 137

    137 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 2.2 .2 U ni ver sal R esto re i n Linu x When Universal Resto re is applied to a Linux operat i ng system, i t updat es a temporary fi le system known as the initial RAM disk (initrd). T hi s ensures t hat the operating system can boot on the new hardware. Universal Restore ad ds modules for th e n[...]

  • Page 138

    138 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 3 . 1 R e c o v e r i n g v o l u m e s Let's assume you backed up the system an d boot volumes (or t he entire machine) and want to recover t hese volumes to a d ifferent platform. The ability of the recovered system to boo t up depends on the foll owing facto rs:  Source operatin g syste[...]

  • Page 139

    139 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: non- convertible Solution Recover the oper ati ng system to an MB R disk. 2. Perform th e recovery under the bootable media. or After recove ry, turn off the UEFI m ode in BIOS. Otherwise, the[...]

  • Page 140

    140 Copyr i ght © Acronis , In c., 2000-20 1 1  The plus (+ ) sign on a green background means t hat the sourc e disk wil l be recovered wi thout any limitations.  The plus (+ ) sign on a yellow background means that the so urce d isk will be rec overed with some limitations. To overcome such limitations, you mi ght need to perform some addi[...]

  • Page 141

    141 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB UEFI OS: convertible + The target di sk wi ll be initialized as MBR . The recove red disk OS will be automati[...]

  • Page 142

    142 Copyr i ght © Acronis , In c., 2000-20 1 1 Customers familiar w ith Acronis Reco v ery for M i crosoft E xchange can no te that t hi s product uses Active Restore to achieve immediate availabil ity of an Exchange information store after star ting the recovery. Whi le based on the same tech nolog y, rec ove ry of the Information Store p roceeds[...]

  • Page 143

    143 Copyr i ght © Acronis , In c., 2000-20 1 1 If your op erating syste m and i ts loader reside on d i ffere nt volumes, al ways include bot h volumes i n the backup. The volumes must also be rec overed toget h er; other wise the re is a high risk that the operat i ng system wi ll not start. 2. Create boot able medi a. 3. If a system failure oc c[...]

  • Page 144

    144 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. Micros o ft V i rtual PC does not s u pport disks t h at are larg er than 127 GB . Acro n is enab l es yo u to cr ea te a Virtual PC machi n e wit h l a rger disks s o th at you can attac h the disks to a M i crosoft Hyper -V virtu a l m a chine. To con ve rt a d is k b a ckup to a v irt ua l ma [...]

  • Page 145

    145 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 5 . 1 V i r t u a l m a c h i n e t y p e / v i r t u a l i z a t i o n s e r v e r s e l e c t i o n The new vi rtual machine c an be creat ed either on a virtualization server (t hi s requires Acron i s Backup & Rec overy 11 Agent for Hy per-V or Agent fo r ESX(i) to be installed) or i n any[...]

  • Page 146

    146 Copyr i ght © Acronis , In c., 2000-20 1 1 When adding a n ew virtual disk, al ong with interfac e and capacity, you c an specify its fo rmat.  Thin format. The disk occ upies as much st orage space as the dat a it stores. T hi s saves th e s torage space. To enable thin format , select t he Thin provisioning (for ESX), or Dynamically expa [...]

  • Page 147

    147 Copyr i ght © Acronis , In c., 2000-20 1 1 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompt s whether you want to rec over the MBR along with t he system volume. Opt for no t re covering, on l y if you do not want the system to b e bo otable. Solution : Recover t he volume once again alon g[...]

  • Page 148

    148 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Mount the system yo u are rec overi ng: mkdir /mnt/system/ mount - t ext3 / dev/sda2 /mnt/system/ # root partition mount - t ext3 / dev/sda1 /m nt/system/ boot/ # bo ot partiti on 3. Mount the proc and dev fil e systems to the system you are rec overi ng: mount - t proc n one /mnt/system/proc/ moun[...]

  • Page 149

    149 Copyr i ght © Acronis , In c., 2000-20 1 1 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure th e bootloader by usi ng too l s and documentation fro m the Linux d i stribution t hat you use. For exampl e, in D ebi an and U buntu, you may need t o edit some c ommented lines in t[...]

  • Page 150

    150 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba[...]

  • Page 151

    151 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 1 A d d i t i o n a l s e t t i n g s Specify th e additional settings for the recovery operat i on by selecting or clearing the fo l lowing check boxes. Validate backup archiv e before recovery The preset is Disabled . This opt i on defines whet her to vali date a backup to ensure that the ba[...]

  • Page 152

    152 Copyr i ght © Acronis , In c., 2000-20 1 1 Set current date and time for recov ered files This opt i on is effec tive only when rec overi ng files. The preset is Enabled .       ?[...]

  • Page 153

    153 Copyr i ght © Acronis , In c., 2000-20 1 1 To sel ect w het he r t o se nd th e rec ov ery op er ati on s e ven t s t o the SN MP ma na ge rs : Choose one of the followi ng:  Use the setting set i n the Machine o ptions  to use the setting spec i fied for t he machine. For more information refer to Machine options.  Send SNMP n otific[...]

  • Page 154

    154 Copyr i ght © Acronis , In c., 2000-20 1 1 If the file NTFS permi ssions were preserved during backup (p. 106 ), you c an choose whether to recover t he permissi ons or l et th e fil es inherit the N TFS permissions from the folder to which they are reco vered. 5 . 7 . 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r re[...]

  • Page 155

    155 Copyr i ght © Acronis , In c., 2000-20 1 1 8. In the P assword field, enter the password. 9. Click Additional e-mail pa rameter s... to co nfi gure the additional e-mail parameters as follows: a. From - type the e-mail address of th e user from whom the message will be sent. If you leave this field empty, messages will be co nstructed as if t [...]

  • Page 156

    156 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption enables you to define t he commands t o be automatically executed before and after the data rec overy. Example of h ow you can use t he pre/post co m mands:  Launc h the Ch e ckdisk co m mand in ord er to find an d fix logical file sy stem errors, physical errors or bad sectors to be st[...]

  • Page 157

    157 Copyr i ght © Acronis , In c., 2000-20 1 1 * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 5. 7.7 .2 Po st -rec ove ry co mman d To sp eci fy a com ma nd/ exe cu tab le fi le to b e exe cut ed a fte r th e rec o ve ry is co mpl et ed 1. In the C ommand field, type a command or browse to a batch file. 2. In the Work[...]

  • Page 158

    158 Copyr i ght © Acronis , In c., 2000-20 1 1 6 S tor in g t he bac k ed u p da ta 6. 1 Va ul ts A vault is a loc ation for st oring backup arc hi ves. For ease o f use and administration, a vault i s associated wi th t he archives' metadata. Referring t o this metadata makes for fast and convenient operations wi th arc hi ves and bac kups s[...]

  • Page 159

    159 Copyr i ght © Acronis , In c., 2000-20 1 1 'Vaults ' view Vaults (on the navi gation pane) - t op item of the vaults tree. Click this item t o display centralized an d personal vaults. To perform actions o n any vault, use the toolbar that i s located at the t op of t he Vaults view. For cent ral ized vaults, see the Actions on centr[...]

  • Page 160

    160 Copyr i ght © Acronis , In c., 2000-20 1 1 6 . 1 . 2 C e n t r a l i z e d v a u l t s A centralized vault is a net worked location allott ed by the management server adm i nistrator to serve as sto rage for t he ba ckup archive s. A centralized vau lt can be managed by a sto rage node or be unmanaged. The t otal number and si ze of archives s[...]

  • Page 161

    161 Copyr i ght © Acronis , In c., 2000-20 1 1 All the operations described here are performed by c l ic ki ng the c orresponding buttons o n the vaults toolbar. T hese operations c an be also acc essed from t he [Vault name] actions item of t he main menu. The fo l lowing is a guideline for you to perform operations with c entrali zed vaults. To [...]

  • Page 162

    162 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Delete a vault 1. Select the vault. 2. Click Dele t e . The vault w ill be delet ed along with a ll the archiv es stor ed in there. The plans and tasks that use this vault will fa i l. Change use r credent ials for accessin g a vau lt Click Chang e user . Changing use r credentia l s is availabl[...]

  • Page 163

    163 Copyr i ght © Acronis , In c., 2000-20 1 1 The dedu pl ication d atabase stores the hash values of al l items stored i n the v ault  except fo r those that can no t be dedu pl icated, suc h as encrypted files. If the vault i s creat ed on the disk local t o the storage nod e, the deduplication dat abase is placed t o the same vault (the Pl [...]

  • Page 164

    164 Copyr i ght © Acronis , In c., 2000-20 1 1 Va ult pa th To sp eci fy t h e pa th w her e the ma nag ed va ul t w ill be cr ea te d 1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree. Managed vaults can be organized:  On the hard drives local to the storage nod e.  On a network share. ?[...]

  • Page 165

    165 Copyr i ght © Acronis , In c., 2000-20 1 1 The AES cryptographic algorithm operat es in the C ipher-block c hai ning (CBC) mode and uses a randomly generated key with a user-defined size o f 128, 192 or 25 6 bits. The larger t he key size, the longer it will t ake for the pro g ram to en crypt the archives stored in t he vault and the more sec[...]

  • Page 166

    166 Copyr i ght © Acronis , In c., 2000-20 1 1 If no o bjects were foun d, delete the name and enter another one. If several objec ts for the entered name we re found , select one of them and click OK , or click Cancel and specify another name. At first, the software tries t o find the entered names in the l ist of loc al users and groups on the m[...]

  • Page 167

    167 Copyr i ght © Acronis , In c., 2000-20 1 1 At ta chi ng a m ana g ed va ult A vault managed by a storage node can b e a ttach ed to another storage no de. You might need to do so when retiri ng the st orage node hardware, when the storage nod e is lost or when balancing loads between st orage nodes. As a result, t he first node stops managing [...]

  • Page 168

    168 Copyr i ght © Acronis , In c., 2000-20 1 1 Zone is con si dered as a personal vault available to al l users th at can log on t he system. Personal vaults are c reated automat i cally when backing up any of th e above locations. Personal vaults c an be used by local backup plans or local tasks. Centralized bac kup plans cannot use personal vaul[...]

  • Page 169

    169 Copyr i ght © Acronis , In c., 2000-20 1 1 Validate a vault Click Validate . You will be taken to the Val idation (p. 211 ) page, wh ere this vault is already pre-selecte d as a source . The vault va l idation c hecks all the arc hives sto red in the vault. Delete a vau lt Click Dele t e . The deletin g operat ion actua lly remov es only a sho[...]

  • Page 170

    170 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Make sure that none of the b ackup plans uses vault A while m erging, or disable th e gi ven plans. See Actions on backup plans and tasks (p. 2 58). 2. Move t he content of vault A folder t o vault B manually by means of a third-party file manager. 3. Edit the backup pl ans th at use vault A : redi[...]

  • Page 171

    171 Copyr i ght © Acronis , In c., 2000-20 1 1 After you configure the required settings, cli ck O K. In the Resul t co nfi rmation (p. 172 ) window, review the expect ed layout and cli ck O K t o start c reati ng the zon e. 6. 2.1 .1 Ac ron is Se cu re Zo ne Dis k The Acro ni s Secure Z one c an be located on any fixed h ard drive. Acronis Sec ur[...]

  • Page 172

    172 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 2.1 .4 R es ult co nfi rma tio n The Res u lt confirmati on wi ndow displa ys the expect ed partition layout ac cording t o the sett i ngs you have cho sen. Click OK , if you are satisfied with the layout and the Acronis Sec ure Zone creation will start. How the set t ings you make will be processe[...]

  • Page 173

    173 Copyr i ght © Acronis , In c., 2000-20 1 1  If there is n ot enough un allocated space, the program will take free spa ce from the sel ected volumes, propo rtionall y reducing t he volumes' size. Re si zing of loc ke d part i tions requires a reboot. Reducing a system volum e to t he mi n imum s iz e mi ght prevent t h e mach i ne&apos[...]

  • Page 174

    1 74 Cop yright © Acronis, In c., 200 0 -2011 An autoloader is a p articular case of tape libraries. It c ontains one drive, several slots, a changer and a barc ode reader (optional). A s ta nd-a l on e tape drive (al so called streamer ) contains one slot and can hold only one tap e a t a time. 6 . 3 . 2 O v e r v i e w o f t a p e s u p p o r t [...]

  • Page 175

    175 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Add the reg istry key described bel ow. Sp ecify the new locat ion path in the registry value TapesDatabase Path . Registry key: HKEY_L OCAL_MACH I NESOFTWAREAc ronis ARSMSet tings Registry value: Tapes DatabasePat h Possible data val u es: Any string 0 to 327 65 characters l ong. Description: [...]

  • Page 176

    176 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.2 .5 Pa ral l el op erat ion s Acronis Bac kup & Recovery 11 can simultaneously perf orm operations with v arious co m ponents of a tape d evice. During an op eration that uses a drive (backing up, reco v ering, rescanning (p. 186 ), or erasing (p. 185 )), you can launch an operation t hat us[...]

  • Page 177

    177 Copyr i ght © Acronis , In c., 2000-20 1 1 ABR11 Bootable Media ABR11 Agent for Windows ABR11 Agent for Linux ABR11 Storage Node Ta pe wr it te n on a l oca ll y a tt ac he d ta pe de vi ce (t ap e d ri ve or ta pe li br ar y) by .. . Bootable M edia 9.1 + + + + Echo + + + + ABR10 + + + + ABR11 + + + + Agent for Windows 9.1 + + + + Echo + + + [...]

  • Page 178

    178 Copyr i ght © Acronis , In c., 2000-20 1 1 Backing up On t he Actions menu, click Back up now or Create backup plan . Confi g ure (p. 45 ) th e backup settings. When spec i fying t he backup dest i nation, sel ect t he tape d evice. Results  The resulting b ackups wi ll be loc ated in an aut omatically created personal vault (p. 189 ). To a[...]

  • Page 179

    179 Copyr i ght © Acronis , In c., 2000-20 1 1 6. In the N a vigation tree, c l ick Storage nodes . Select the storage n ode t o which your tape device is attac hed, and then click Cre a te vault . Proceed as descr ibed in the "Creating a m anaged centralized vault" (p. 162 ) section. In the Tape pool step, sel ect the pool you decided t[...]

  • Page 180

    180 Copyr i ght © Acronis , In c., 2000-20 1 1 5. If any of the detected backups c on tinue on o ther tap es that have not been rescanned yet, l oad these t apes as prompted a nd rescan them. 6. After th at, you can select t he required backup. If the backup is located on a stora g e node 1. Connect the console to the management server. 2. Detect [...]

  • Page 181

    181 Copyr i ght © Acronis , In c., 2000-20 1 1 15. Click OK t o s tart the recovery. 16. If any of the required tapes are n ot loaded for some reason, the software will show you a message with the identifier of th e needed tape. Load the tap e, and click Retry to c on tinue the recovery. 6. 3.3 .5 R ec ove ri ng un der bo otab le med ia fr om a ta[...]

  • Page 182

    182 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .2 Ta p e p oo l s Acronis Bac kup & Recovery 11 uses tape p ools that are logical groups of tapes. The software contains the fo l lowing predefined t ape pools: Unrecognized tap es , I mported tapes , Free tapes , and Acronis . Also, you can create your o wn custom po ols. Predefined pools[...]

  • Page 183

    183 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .3 O p era ti ons wit h p ool s Cr eat in g a p ool To crea t e a po ol : 1. In the N a vigation tree, c l ick Tape managem en t . If connect ed to the management server, select the st orage node to which y our tape device is attached. 2. Click New poo l . 3. Specify th e pool name. 4. [Opt i o[...]

  • Page 184

    184 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Select t he required pool and click Remove . 3. Select t he pool to which the t apes of the pool being deleted will be moved after the deletion. 4. Click OK t o delete the pool. 6. 3.4 .4 O p era ti ons wit h tap es R ena mi ng When a n ew tape i s detec ted by the s oftware, it i s automaticall y [...]

  • Page 185

    185 Copyr i ght © Acronis , In c., 2000-20 1 1  You need to take several tapes out of a tape devi ce simultaneously .  Your tape dev ice does not have a mail slot and t he tapes to be taken o ut are locat ed in slots of non-det achable magazine(s). You need to move tapes on e by one to slots of one slot magazine and then t ake the magazi ne [...]

  • Page 186

    186 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o s tart the operation. R es cann in g The informat i on abo ut the c o ntents of t apes is st ored in a dedicated database. The rescanning operation reads the content s of tapes and u pda tes the database i f the information in it mi smatches the dat a s tored o n tapes. The arc hives d[...]

  • Page 187

    187 Copyr i ght © Acronis , In c., 2000-20 1 1 Result. T he selected tap es are moved to the pool associated with the sel ected vault. The b a ckups stored on the t apes can be fo und in th i s vault. A backup spread over several tapes will not appear in the vault until all of th ese tapes are rescanned. In ve nto ryi ng The invento ryi ng operati[...]

  • Page 188

    188 Copyr i ght © Acronis , In c., 2000-20 1 1 Combination of fast an d full inventorying Full inventory i ng of an entire tape device may t ake a long time. If you need t o inventory only a few tapes, proceed as follows: 1. Perform the fast inventorying of t he tape device. 2. Click th e Unrecognized tapes pool. Find the tapes you want t o invent[...]

  • Page 189

    189 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat to d o if I re mov ed a t ap e b y mis ta ke? Unlike an erased (p. 185 ) tape, the data from a remove d tape i s not physically deleted. Hence, you can make backups stored on such tape available again. To do so: 1. Load the tape int o your tape device. 2. Perform the fast inventorying (p. 187 ) [...]

  • Page 190

    190 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. If you back u p multipl e machines t o a tape library with multiple drives, assoc iate the vaul t with the who l e library. This wil l allow you t o back up the m achines simul taneousl y via different dri ves. If you assoc i ate a v ault or sev eral vaults with o ne drive, backups will be queued[...]

  • Page 191

    191 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .2 Ex am ple 2. Bac kin g u p t o ta p es o n a w e ek ly r o ta tio nal ba sis Consider the fo l lowing scenar i o:  You want to back up several machines to a tap e devi ce at tached to Acronis Backup & Recovery 11 Storage Node.  You want to create full backup s on Fridays and i ncre[...]

  • Page 192

    192 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .3 Ex am ple 3. Dis k- to -di sk- to tap e wi th se ndin g tap es to an off- sit e st ora ge Consider the fo l lowing scenar i o:  You want to back up a machine t o a hard di sk and replicat e each backup to t he locally attach ed tape d evice.  You want to eject tapes wi th each bac kup [...]

  • Page 193

    193 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Perform the fast inventorying (p. 187 ) with the Mov e newly detected tapes f rom the 'Unrecognized ta p es' or ' Imported tapes' pools to the 'Fr ee tapes' pool chec k box select ed. Result . The l oaded t apes are in the Free tapes po ol. If some of them are sent to [...]

  • Page 194

    194 Copyr i ght © Acronis , In c., 2000-20 1 1 Up to 50 storage nodes c an be set up. 6 . 4 . 2 S u p p o r t e d t y p e s o f s t o r a g e A managed vault c an be organized:  On t he hard drives local to t he storage nod e  On a network share  On a St orage Area Network (SAN)  On a Network Attached St orage (NAS)  On a tape libra[...]

  • Page 195

    195 Copyr i ght © Acronis , In c., 2000-20 1 1  The mac hi ne where t he storage node i s planned to be installed meet s the system requirements described in t he installation document ation .  You downloaded the setup p rogram of Ac ronis Backup & Recovery 11. Setting up the storag e node 1. Install Acronis Backup & Recovery 1 1 Sto[...]

  • Page 196

    196 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Select t he storage node; th en, perform t he required operations as described i n "Actions o n storage no des" (p. 197 ). 6 . 4 . 5 U s e r p r i v i l e g e s o n a s t o r a g e n o d e User acco unts can have the different s cope of user's privileges on Acronis Bac kup & Re c[...]

  • Page 197

    197 Copyr i ght © Acronis , In c., 2000-20 1 1 However, if UserA i s a memb er of the Administrato rs group on the mac hi ne, t hi s user can additionally ac cess the archives creat ed from this machine by UserB  even though UserA's accou nt on t he storage node is a regular one. 6 . 4 . 6 O p e r a t i o n s w i t h s t o r a g e n o d e [...]

  • Page 198

    198 Copyr i ght © Acronis , In c., 2000-20 1 1 Refresh th e list of storage nodes Click Refresh . The manage ment conso l e will update the list of sto r age nodes from the managem ent serve r with the most r ecent in format i on. The list of storag e nodes is refreshed auto m atically based on even ts. Howeve r , the data m ay not be retrieved im[...]

  • Page 199

    199 Copyr i ght © Acronis , In c., 2000-20 1 1  Withdrawn - the storage node was registered on ano t her management server . As a result, it is not possibl e to c ontrol t he node from t he current management server .  Archives - the total number of archives stored i n all the vaults managed by the storage no de.  Backups - the total numb[...]

  • Page 200

    200 Copyr i ght © Acronis , In c., 2000-20 1 1 Parameters related to compac ting As backups are deleted from a d edupli cating vault, its dedupli cation data store (p. 205) may contain unused dat a blocks (items) th at are no l onger referred to fro m any backup. T he storage node processes the dat a store to delete the u nused items. This operat [...]

  • Page 201

    201 Copyr i ght © Acronis , In c., 2000-20 1 1 The C o mpacting Trigger Threshold parameter enables you to set up a balance between t he extra space requ i red to store unused i tems and the compacting frequency. The l arger the value o f this parameter, the fewer unused i tems are allowed in t he data sto re, but compac ting wil l likely be more [...]

  • Page 202

    202 Copyr i ght © Acronis , In c., 2000-20 1 1 Fast Operation C on nection Limit Description: Specifi es the maximum number of si multaneous co nnec tions to t he st orage node for purposes o ther than backup, rec overy, and operations with arc hi ves. Possible values: A ny integer number between 1 and 2 147483647 Default value: 10 Components o f [...]

  • Page 203

    203 Copyr i ght © Acronis , In c., 2000-20 1 1 The C h eck Hash Va lue On Ser v er Si d e parameter determines whether the storage node must ensure th at the hash value matc hes the data block. Such check puts an additional load on th e storage no de. Normally, suc h check i s not necessary. You can set this parameter to True to make th e deduplic[...]

  • Page 204

    204 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the am ount of free space in a managed vault, in megabytes, below which an error is recorded i n the storage node's log and any backup to the vault bec omes prohibited. Possible values: A ny integer number bet ween 0 and 21474 83647 Default value: 50 When th e amount of fr[...]

  • Page 205

    205 Copyr i ght © Acronis , In c., 2000-20 1 1 deduplicati ng vault . The D edupli cation add-on t o the agent must be installed on any mach i ne that backs u p to such vault. Without the add -on backing up t o the vault i s not possible. The dedu pl ication is p erformed on data blocks. T he block size is 4 KB for dis k -level backups and 1 B to [...]

  • Page 206

    206 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e the backup pr ocess is c ompl eted, the v ault c onta ins the resulting backup and the temporary file with the unique data blocks. T he temporary file will be pro cessed on the next stage. The ba ckup (TIB file) cont ai ns hash values and the data that cannot be d edupli cated. Furt her processi[...]

  • Page 207

    207 Copyr i ght © Acronis , In c., 2000-20 1 1 Compac ting After one or more backup s or archives have been del eted fro m the vaul t  either manually or during cleanup  the dat a store may c on tain blocks whi ch are no longer referred to from any arch i ve. Such blocks are d el eted by t he compacting task, which is a sc heduled task perfo[...]

  • Page 208

    208 Copyr i ght © Acronis , In c., 2000-20 1 1 To increase deduplicat i on performanc e, follow the rec ommendations b el ow. Place the deduplication databas e and dedupl icating va ult on separate physical devices To increase th e speed o f access to a deduplication dat abase, the dat abase and t he vault must b e located on separate physical dev[...]

  • Page 209

    209 Copyr i ght © Acronis , In c., 2000-20 1 1 64 -bit opera ting sys tem For o ptimal deduplication performance, install t he sto r ag e node i n a 6 4 -bi t o pera ting system. The machine should n ot run applications t hat require much system resourc es; for example, Database Management Syst em s (DBMS) or Enterpr i se Resource Planning (E RP )[...]

  • Page 210

    210 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip: The al l ocati o n unit si ze on most NTFS and ext3 volumes is 4 KB. This al l ows f o r block-le v el de duplicat i on. Other exam p les o f all o cation u nit sizes allowing f o r block-lev el dedu p licati o n incl u de 8 KB, 16 KB, and 64 KB. File-level backup Deduplication of a file is not p[...]

  • Page 211

    211 Copyr i ght © Acronis , In c., 2000-20 1 1 7 Op er ati ons wi th a rchiv es and ba ckup s 7. 1 Va l ida ti ng ar chi ve s a nd ba ck ups Validation is an o peration that checks t he possibili ty of data rec overy from a backup. Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validatio[...]

  • Page 212

    212 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. When to validate Start validation (p. 213 ) Specify when and ho w often to perform validation. Task para meters Task name [Opt i onal] Ent er a unique name fo r the val idat[...]

  • Page 213

    213 Copyr i ght © Acronis , In c., 2000-20 1 1  To select a cent ral ized vault, ex pand t he Centrali zed group and click th e appropriat e vault.  To select a personal vault, expand the Personal group and cli ck t he appropriate vault.  To select a l ocal folder (C D/DVD d rive, or loc al ly attached t ape device), expand the Local fold[...]

  • Page 214

    214 Copyr i ght © Acronis , In c., 2000-20 1 1 Ch oo se on e o f th e f o llo win g :  Now - to start t he val idation t ask rig ht aft er its creation, t ha t is, aft er clicking OK on the Validation page .  Later - to start t he one-time validation task, at the date and time you specify. Specify th e appropriate parameters as follows:  [...]

  • Page 215

    215 Copyr i ght © Acronis , In c., 2000-20 1 1  Your choice o f backups belonging t o the same arch i ve - the resul ting archive will c ontain only the specified backup s. Consolidat i on is performed as required, so the resulting archive may co ntain full, incremental an d differential bac kups.  An entire v ault that can be exported by us[...]

  • Page 216

    216 Copyr i ght © Acronis , In c., 2000-20 1 1 personal vaults, locally att ached tape dev ices, removable media and , in the ad v anced produ ct versions, managed an d unmanaged c entralized vaults. When th e console is connect ed to a management server , two export methods are available:  Export from a manag ed vault . The export is performed[...]

  • Page 217

    217 Copyr i ght © Acronis , In c., 2000-20 1 1 Backups - you n ee d to specify the archive first, and then select t he desired backup(s) in this archive. Browse Select t he Archive (p. 217) or the Backups (p. 217 ) . Show access credentials (p. 217 ) [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have e[...]

  • Page 218

    218 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy cr ede nt ia ls 1. Select o ne of the following:  Use the curre nt user credentials The so ftware wil l access the location usi ng the credentials of th e current u ser.  Use the following cr edentials The pro g ram will access t he location using t he credential s you spec ify. Use[...]

  • Page 219

    219 Copyr i ght © Acronis , In c., 2000-20 1 1  To export data t o a locally att ac hed tap e devi ce, expan d the Tape drives group, t hen click the required device. I n stan d- al one editions of A cronis Backup & Recovery 11, t ape devices are available only if you have upgraded from Acro ni s Back up & Rec overy 10. For information [...]

  • Page 220

    220 Copyr i ght © Acronis , In c., 2000-20 1 1  Pass word . The passwor d for the account. 2. Click OK . Acc o rding to the original FTP s p ecif i catio n , crede ntials requir ed for acces s to FTP servers are transferr ed through a n etwork as plaintext . This me ans that the user name and pa ssw ord can be intercept ed by an eavesdro pp er [...]

  • Page 221

    221 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 1 A r c h i v e s e l e c t i o n Selecting the archive 1. Enter the full path to the l ocation in t he Path field, or sel ect the desired folder in th e folders tree.  If the arc hive is stored in Acro ni s Online Bac kup St orag e, click Log in and specify the credent ials to log in t o t[...]

  • Page 222

    222 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 2 B a c k u p s e l e c t i o n To sel ect a ba ck up : 1. Select o ne of the backups by its creation date/time. 2. To assist you wi th choosing th e rig ht bac kup , th e bottom table d isplays the volume s contained in the select ed backup. To obtain info rmation on a vo lume, right-click it[...]

  • Page 223

    223 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 5 M a n a g i n g m o u n t e d i m a g e s Onc e a volume is mount ed, you can b r owse files and folders co ntained in the backup usi ng a file manager and c opy the desired files to any destination. Th us, if you need to take out only a few fi les and folders from a volume backup, you do no[...]

  • Page 224

    224 Copyr i ght © Acronis , In c., 2000-20 1 1 source. Validation of an a r chive will check all the a rc hive's backups . Export an archiv e Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted archive as a sou rce. The expo r t of an archive cr eates a dupl ic at e of th e arch i ve w i th all its backups in t[...]

  • Page 225

    225 Copyr i ght © Acronis , In c., 2000-20 1 1 data block sav ed in the backup . Export a backup Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted backup as a source . The expo r t of a backup c r eates a new archiv e with a se l f -sufficient c opy of the backup in the locat i on you speci fy. Convert a ba ckup t[...]

  • Page 226

    226 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 4 . 4 D e l e t i n g a r c h i v e s a n d b a ck u p s The Backups del etion window disp l ays the same tab as for the vaults view, but with check boxes for each arc hive and backup. The arc hiv e or b ackup you have cho sen to delete has th e check mark. Review th e archive or bac kup that you [...]

  • Page 227

    227 Copyr i ght © Acronis , In c., 2000-20 1 1 8 Bo ot ab le med ia Bootable media Bootab l e media is physical media (C D, D VD, U SB drive or other m edia support ed by a machine BIO S as a bo ot device) th at boots on any PC-compatible machine and enables you to ru n Acronis Bac kup & Recovery 11 Agent either in a L i nux-based environment [...]

  • Page 228

    228 Copyr i ght © Acronis , In c., 2000-20 1 1 PE -based bootable media does n ot support UEFI. 8. 1 Ho w to c rea te bo ota bl e med ia To enable creat ing physical media, t he machine must have a CD/DVD recording drive or allow a flash drive to b e attached. To enable PXE or WDS/RIS configuration, the machine must h av e a net work connec tion. [...]

  • Page 229

    229 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// www.microsoft . com/downloads/detai l s.aspx?fa m ilyid=696DD 665 -9F76 - 4177 -A 811-39C26 D3B3B3 4&displayl ang=en You can find system requirements for installation b y follow ing the abo v e links. 2. [optional] Burn the WAIK to DV D or copy t o a flash d ri ve. 3. Install the M i cros[...]

  • Page 230

    230 Copyr i ght © Acronis , In c., 2000-20 1 1  build an ISO i mage of a b ootab le disc to burn it later on a blank d isc  upload t he selected co mponents to Acronis PXE Server  upload t he selected co mponents to a WDS/RIS. 8. [optional] Wi ndows system drivers to be used by Acronis Universal Restore (p. 232 ). T hi s window appears on[...]

  • Page 231

    231 Copyr i ght © Acronis , In c., 2000-20 1 1 nousb2 Disables USB 2.0 sup port. USB 1.1 devices st i ll work wit h this parameter. This p arame ter allows you t o use some USB drives in th e U SB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard d isk drives. Prevents t he kernel from fre[...]

  • Page 232

    232 Copyr i ght © Acronis , In c., 2000-20 1 1 Pre-configuring multiple netwo rk connection s You can pre-con fi gure TCP/I P settings fo r up to ten network interface cards. To ensu re that each NIC will be assigned th e appropriate sett i ngs, c reate the media on the serv er for whic h the media is custo m ized. When you sel ect an existing NIC[...]

  • Page 233

    233 Copyr i ght © Acronis , In c., 2000-20 1 1  to get the mass-storage drivers t hat you explicitly specify fro m the m edia. This is necessary when the t arget hardware has a spe cific mass storage cont ro ll er (such as a SCSI, RAID, o r Fi ber Channel adapter) for t he hard disk. For more i nformation p l ease refer to Univ ersal Restore. T[...]

  • Page 234

    234 Copyr i ght © Acronis , In c., 2000-20 1 1 8 . 1 . 3 A d d i n g t h e A c r o n i s P l u g - i n t o W i n P E 2. x o r 3 . 0 Bootab l e Media Builder provides t hree methods of integrating Acron i s Backup & Recovery 11 with WinPE 2.x or 3.0:  Adding the Acro ni s Plug-in to the exi sting PE ISO. T his c omes in handy when you have t[...]

  • Page 235

    235 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e a mac hine boots into WinPE, Acronis Backup & Recovery 11 starts automatic al ly. To crea t e a PE i mag e (ISO fil e) fr om th e resu lt ing W IM f ile :  replace th e default boot .wim file in your Windo ws PE fo l der with t he newly created WIM fi le. For the ab ove example, t ype: co[...]

  • Page 236

    236 Copyr i ght © Acronis , In c., 2000-20 1 1 Remote connection To connect to the m achine remot el y, select Connect -> M a nage a remote machine in the console menu and specify one of the mac hine's IP addresses. P rovi de the user name and password if these have been configured when creat i ng the boo table media. Local c o nnection Ac[...]

  • Page 237

    237 Copyr i ght © Acronis , In c., 2000-20 1 1 3. From t he list of suppor ted video mod es, choose the ap propriate one b y typing its number (for example, 318 ), an d then press ENT ER. If you do not wish t o follow this procedure every time you bo ot from media on a given hardware configuration, re-create th e bootable media with t he a ppropri[...]

  • Page 238

    238 Copyr i ght © Acronis , In c., 2000-20 1 1  acronis  asamba  lash Linux commands and utilities busybox ifco nfig rm cat init rmmod cdre cord insmod route chmod iscs iadm scp chown kill scsi_id chroot kpartx sed cp ln sg_m ap26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod[...]

  • Page 239

    239 Copyr i ght © Acronis , In c., 2000-20 1 1 8. 5 A cro ni s Sta rtu p Re cov ery Man age r Acronis St artup Recovery Manager is a modificat i on of the boot abl e agent (p. 368), residi ng on the system disk in Windows, or on t he /boot partition in Linux and co nfi gured to start at boot time on pressing F11. It el iminates t he need fo r a se[...]

  • Page 240

    240 Copyr i ght © Acronis , In c., 2000-20 1 1 Bootab l e compon ents are u ploaded to Acro nis PXE Server using Acronis Boo table Media Builder. To upload bo otable component s , start th e Bootable Media Bu i lder (either from t he management conso le, by select i ng Tools > Cr ea te bootable media or as a separate component) and fol low the [...]

  • Page 241

    241 Copyr i ght © Acronis , In c., 2000-20 1 1 If the h ardware has multiple network interfac e cards, make sure t hat the card suppor ted by the BIO S has th e network cable plugged in. 8 . 6 . 3 W o r k a c r o s s s u b n e t s To enable the Acronis PXE Serve r to work in another subnet (acro ss the switch ), configure the swi tch to relay the [...]

  • Page 242

    242 Copyr i ght © Acronis , In c., 2000-20 1 1 9 D isk m ana gem ent Acronis Disk D irector Lite is a tool for prepa ri ng a machine disk/volume co nfi guration fo r recovering the volume ima g es saved by t he Acronis Backup & Recovery 11 software. Sometimes after the volume has been backed up and i ts image placed int o a safe storage, the m[...]

  • Page 243

    243 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Back up the disk on whi ch volumes will b e created or managed. Havin g your most i mportant data backed up to ano ther hard disk, network share o r rem ovable media will allo w you to wor k on disk volumes b ei ng reassured th at your dat a is safe. 2. Test y our disk t o make sure it i s fully fu[...]

  • Page 244

    244 Copyr i ght © Acronis , In c., 2000-20 1 1 The t op part of the view co ntains a disks and v olumes table enabling data sorting and c ol umns custo m ization and toolbar. The table presents th e numbers of t he disks, as well as assigned letter, label, type, capacity, free spac e size, used space size, fi le system, and status fo r each volume[...]

  • Page 245

    245 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis Disk D irector Lite wil l detect that the disk is u n usable by the syst em and n ee ds to be initialized. The Dis k management view will show t he newly detected hardware as a gray block with a grayed icon, thus indicating t hat the di sk is unusable by the sy stem. I f you ne ed to in it ia [...]

  • Page 246

    246 Copyr i ght © Acronis , In c., 2000-20 1 1           ?[...]

  • Page 247

    247 Copyr i ght © Acronis , In c., 2000-20 1 1 I f you ne ed to co p y th e NT si gna tu re: 1. Select t he Copy NT signature      system on the hard disk, uninsta[...]

  • Page 248

    248 Copyr i ght © Acronis , In c., 2000-20 1 1 1. MBR disk c onversi on: dynami c to basic (p. 249) using t he Convert to basic operat i on. 2. Basic disk c onversi on: M BR to GPT using the Convert to G PT operation. 3. GPT disk c onversi on: b asi c t o dynamic (p. 248 ) using t he Convert to dynamic operation. 9 . 6 . 4 D i s k c o n v e r s i [...]

  • Page 249

    249 Copyr i ght © Acronis , In c., 2000-20 1 1 Sys tem disk conversion Acronis Disk D irector Lite does not require an operat i ng system rebo ot after basic to dynamic conversion o f the disk, if: 1. There is a si ngle Windows 2008 /Vi sta op erating syste m installed on the di sk. 2. The mac hi ne runs this operating system. Basic to dynamic c o[...]

  • Page 250

    250 Copyr i ght © Acronis , In c., 2000-20 1 1  safe co nversion of a dynami c disk t o basic when it co n t ains volumes with data for simp l e and mirrored volumes  in multiboot systems, boot ability of a syst em that was offline during t he operation 9 . 6 . 7 C h a n g i n g d i s k st a t u s Changing disk st atus is effec tive for Wind[...]

  • Page 251

    251 Copyr i ght © Acronis , In c., 2000-20 1 1  Store coll ections of simi lar files separately  for exam ple, an MP3 c ollection or vi deo files on a separate volume;  Store backups (images) of oth er volumes/disks on a spec i al volume;  Install a new op erating system (or swap file) on a new volume;  Add new hard ware to a mac hi[...]

  • Page 252

    252 Copyr i ght © Acronis , In c., 2000-20 1 1 data it self. If a physical disk fai l s, t he portion of the RA ID -5 volume t hat was on that failed disk can be re-creat ed from the rem aining data and the parity. A RAID-5 volume provides re liability and is able t o overcome t he physical disk size limit ations with a higher than mirrored disk- [...]

  • Page 253

    253 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a S triped volume:  Select t wo or more dest i nation disks to create the v olum e on. To create a RA ID-5 volume:  Select t hree destination disks t o create the volume o n. After you choose the disks, t he wizard will calculat e th e maximum size of the resulting volume, depending on[...]

  • Page 254

    254 Copyr i ght © Acronis , In c., 2000-20 1 1 In setting t he cluster size you can ch oose between any number in t he preset amount for each file system. Note, t he program suggests the cluster size best sui ted t o the volume with the chosen file system. If you are creating a basic volume, whi ch c an be made into a syst em volume, t hi s page w[...]

  • Page 255

    255 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 3 S e t a c t i v e v o l u m e If you have several pri mary volumes, you must specify one to be the boot vol ume. For t hi s, you can set a v olume to become active. A disk can have only one ac tive volume, so if you set a volume as active, the volume, which was ac tive before, wi ll be au to[...]

  • Page 256

    256 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 5 C h a n g e v o l u m e l a b e l The volume label i s an optional at tribute. It is a name a ssi gned to a volume for easier recognition. Fo r example, one volume c ould be called SYST EM  a volum e with an operating system, o r PROGRAM  an applicat i on volume, D A TA  a data v ol[...]

  • Page 257

    257 Copyr i ght © Acronis , In c., 2000-20 1 1 If you set a 64K cl uster size for FAT16/F AT32 or an 8KB-64KB cluster size f o r NTFS, W indows ca n mo u nt the volume, b ut s o me pro g rams (e.g. Setup pro grams) might ca lculate its disk s pa ce incorr ectly. 9. 8 P end i ng op er ati on s All operat i ons, whi ch were prepared by the user in m[...]

  • Page 258

    258 Copyr i ght © Acronis , In c., 2000-20 1 1 10 Ad mi nis ter ing a man ag e d mac hin e This sect i on desc ri bes the v iews that are avail able through the navigation tree o f the console connec ted to a managed machine and ex plains how to work with each vi ew. 10 .1 Ba ck up pla ns an d tas ks The Backup plans an d tasks view keeps you i nf[...]

  • Page 259

    259 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a plan/tas k Click Det a ils . In the respect ive Plan De t ails (p. 267 ) or Task De t ails (p. 26 8) wi ndo w, revie w the plan or task deta i ls. View plan' s/task's log Click Log . You will be taken to the Lo g (p. 269 ) view contain ing the list of the log entr i[...]

  • Page 260

    260 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/task Click Edi t . Backup plan editin g is perform ed in the same way as creation (p . 45 ) , except f or the follow i ng limita t ions : It is not always pos sible to use all sch eme options, when ed iting a backup pl an if the creat ed arch i ve is not empty (i.e. conta i ns backup[...]

  • Page 261

    261 Copyr i ght © Acronis , In c., 2000-20 1 1 1 Need intera ction At least one task ne eds user interactio n. Otherwise, see 2. Identify the tasks that need i ntera ction (the p r ogram wil l display what actio n is ne eded) -> Stop the tasks or enable the tasks to run ( change m edia; p rovide addit i onal spa ce on the vault; i gnore the rea[...]

  • Page 262

    262 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 2.3 Ta s k st ate s A task c an be in one of the fo llowing stat es: Idle ; Waiting ; Running ; Need i nteraction . The initial t ask state i s Idle . Onc e the task is st arted manually or th e event spec i fied by th e s chedule occ urs , th e task enters either the Ru nning stat e or the Wai[...]

  • Page 263

    263 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 1 . 3 E x p o r t a n d i m p o r t o f b a c k u p p l a n s The expo rt operation creates a fil e with c ompl ete c onf ig uration of the bac kup plan. You can import the file to reuse the export ed backup pl an on another machine. Centralized backup plans can be exported from a manag ement se[...]

  • Page 264

    264 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 3.1 Ed it ing th e exp ort f il e The expo rt file is an .xml file and c an be edited with a text editor. Here is how t o make some useful chan g es. How to m o dify credentials In the export fi le, the <login> tags include t he user name and the < pa sswo r d> tags include the user[...]

  • Page 265

    265 Copyr i ght © Acronis , In c., 2000-20 1 1 </lo gin> <pas sword e n crypted= "true"> XXXY YYZZZ888 </pa ssword> How to change item s to back up Replacing a directly spec ified item with another directly s pecified item Inside the <plan><target s><in clusi ons> section: 1. Delete the <ID> tag.[...]

  • Page 266

    266 Copyr i ght © Acronis , In c., 2000-20 1 1 <specific> <backup_type > disks </backup_typ e> <disk_level_ options /> <file_level_ options /> <inclusion_r ules> <rules_ty pe> disks </rules_t ype> <rules> <rule> [BOOT] </ rule> <rule> [SYSTEM] </ rule> </rules> <[...]

  • Page 267

    267 Copyr i ght © Acronis , In c., 2000-20 1 1 The default path to the dedicat ed f older is %ALLUSERSPROFI LE%AcronisBa ck u pAndReco v eryim p ort . The pat h is stored in the reg istry key HKEY_LOC AL_MACHINESOFTWAREAcronis MMS Configur a tionImport f olderPath . The ab sence o f the key means t hat the ag ent does not monitor th e ded[...]

  • Page 268

    268 Copyr i ght © Acronis , In c., 2000-20 1 1  Last finis h time - how much time has passed since the last plan o r task end.  Last r esult - the result o f the last plan or t ask run.  Type - backup plan or task type.  Owner - th e name of the user who creat ed or last mo di fied the p l an  Next s ta rt tim e - when the plan o r [...]

  • Page 269

    269 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .2 Lo g The loc al event log st ores the history of o perations performed by Acronis Bac kup & Recovery 11 o n the mac hi ne. To view a plain list of log ent ri es, select Events in the D isplay drop-down l ist; to view log entries grouped by activities, select Activities . The details of the s[...]

  • Page 270

    270 Copyr i ght © Acronis , In c., 2000-20 1 1 Save all the filtered log entries to a file 1. Set filters to get a list of the log entri es that satisfy the filteri ng criteria. 2. Click Save all to file . 3. In the opened window, spec if y a path and a na m e for the f ile. All log ent ri es in the list w i ll be saved t o the spec if ied f ile. [...]

  • Page 271

    271 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixing issues that caused ale rts To find and fi x the issue that caused th e alert , click Fix th e is sue . You wi ll be t aken to the correspo nding view,where you c an examine the issue and take t he ne cessary steps to resolve it. Optionally, y ou c an click View d etails to get more infor mation[...]

  • Page 272

    272 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 5 . 1 C u s t o m e r E x p e r i e n c e P r o g r a m This opt i on defines whet her the machine will participa te in th e Acronis Customer Experienc e Program (ACEP). If you c hoose Yes, I want to partici p ate in the ACEP , information ab out the hardware c onfig uration, the most and least [...]

  • Page 273

    273 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts view of the Navigation pane. When the c onsole is connected to the management serv er, t hi s sett i ng will also co ntrol the color sc heme of the Last backup column's value for eac h machine. Last c onnection This opt i on is effec tive when t he c onsole [...]

  • Page 274

    274 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]

  • Page 275

    275 Copyr i ght © Acronis , In c., 2000-20 1 1 You can override the set tings set here, ex clusively for the events th at occ ur during backup or during recovery, i n the D efaul t backup and recovery options. In this c ase, the settings set here wi ll be effective for operations oth er than bac kup and recovery, suc h as archive vali dation or cl[...]

  • Page 276

    276 Copyr i ght © Acronis , In c., 2000-20 1 1  /etc/snmp/snmpd.conf - co nfi guration file for the Net-SNMP SNMP agent  /etc/snmp/snmptrapd . conf - c onfiguration file for th e Net-SN MP trap daemon. 10 .5. 4.3 W ind ows ev ent l o g This opt i on is effec tive only in Windows o perating systems. This opt i on is no t availabl e when o per[...]

  • Page 277

    277 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to use this option, you must be l ogged on as a member of the Administrators g roup on the mac hi ne. You have the opportunity to register the mac hi ne on the management server when i nsta l ling an Acronis Bac kup & Recovery 11 agent. If the m achine is no t registered, selecting Cent[...]

  • Page 278

    278 Copyr i ght © Acronis , In c., 2000-20 1 1  Google Chr o me. In Options , click Under th e Hood . Under Netw o rk , click Change proxy s ettings .[...]

  • Page 279

    279 Copyr i ght © Acronis , In c., 2000-20 1 1 11 Ce nt ral ize d m ana gem ent This sect i on c overs operations that can be performed centrally by using the components fo r centralized manage ment. The c ontent of this section i s only applicable t o advanced editions of Acronis Bac kup & Recovery 11. 11 .1 Un der st and ing cen tra liz ed m[...]

  • Page 280

    280 Copyr i ght © Acronis , In c., 2000-20 1 1 Organizing a manag ed archive storage What sho uld the capacity o f your cent ral ized vault be? What if tran sferri ng size able backups t o the vault will c ause networ k congestion? D oes backup o f a n online prod uction server affect t he server performance? To ensure that the cen tralized backup[...]

  • Page 281

    281 Copyr i ght © Acronis , In c., 2000-20 1 1 3. To specify creden tials for c on nection, c lick Options and then type the u ser name and password in the Us er name and Password boxes respec tivel y. In Windows, if you leave the User na me box empty, the c redentials under which the co ns ole is running will be used. 4. To save the password for [...]

  • Page 282

    282 Copyr i ght © Acronis , In c., 2000-20 1 1 For informat i on abou t Acronis security g roups and t hei r default mem bers, see Acronis security groups (p. 283 ). 11 .1. 2.4 Pr ivi l eges fo r rem o t e con nect i o n in Li nux Remote c onnections to a machine running L i nux  i ncluding those performed by the roo t user  are established [...]

  • Page 283

    283 Copyr i ght © Acronis , In c., 2000-20 1 1 Example 2 The ab ove auth entication policy might not work on Linux distributions with kernel version 2.4      because the p am_succeed_if.so modul e is not sup ported there. In this c ase, you can use the fo l lowing authentic[...]

  • Page 284

    284 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to c onne ct to the management serv er remotely , an admi nistrator of the management server must also b e a member of the A cronis Remot e Users group. No user  even a me mber of the A dministrators group  can b e an administrator o f the management serv er without being a member of [...]

  • Page 285

    285 Copyr i ght © Acronis , In c., 2000-20 1 1 New accounts If you c hoose to create dedicated user accounts for the services, th e setup program wil l create the following user ac counts:  For t he service of Acronis Bac kup & Rec overy 1 1 Agent fo r Windows and Acro nis Backup & Recovery 11 Agent for VMware vSphere ESX(i) (Windows), [...]

  • Page 286

    286 Copyr i ght © Acronis , In c., 2000-20 1 1 In addition, there are two Acronis services which ru n under a syst em acc oun t:  The Acr on is Scheduler 2 Servi ce provides scheduling fo r Acronis compon ents' tasks. It runs und er the L ocal System account and cannot run u nder a different ac count.  The Acr o nis Rem o te Agent Servi[...]

  • Page 287

    287 Copyr i ght © Acronis , In c., 2000-20 1 1 C omp on en t na me C an be cl ien t C an be s erv er Acronis Backup & Recover y 11 Management Console Yes No Acronis Backup & Recover y 11 Agent Yes Yes Acronis Backup & Recover y 11 Management Server Yes Yes Acronis Backup & Recover y 11 Storag e Node Yes Yes Acronis PXE Ser ver No Y[...]

  • Page 288

    288 Copyr i ght © Acronis , In c., 2000-20 1 1 the Acro ni s client. Du ring component installation you mig ht b e asked to c onfirm the port opening o r to open the po r t manually, in case y ou are usi ng a firewall other than Windows Firewall. After installation, you can c h ange the ports a t any time to mat ch your p referabl e values or fo r[...]

  • Page 289

    289 Copyr i ght © Acronis , In c., 2000-20 1 1 For self-signed cert ificates, the c ertifi cate thumbprint (also known as fingerprint or hash) is used for future host identification: if a client has p rev iously connec ted to a server by using a self -signed certificat e and tries to establish c onnection again, the server checks whet her the cert[...]

  • Page 290

    290 Copyr i ght © Acronis , In c., 2000-20 1 1  When selecting what data to back up, you can either s el ect items on the registered mac hi nes directly or use the selection rul es. For more i nformation, see "Selecting data to ba ck up" (p. 290 ).  When spec ifying where t o store mach i nes' arch ives, you can select to stor[...]

  • Page 291

    291 Copyr i ght © Acronis , In c., 2000-20 1 1 Selecting a c heck box for a mac hi ne means bac ki ng up all the machine's disks. To select individual disks and/or v olumes, expand the m achine item an d select check boxes next to t he disks and/or volumes . Notes for p hysical m achines, their dis ks and volumes  If your o perating system[...]

  • Page 292

    292 Copyr i ght © Acronis , In c., 2000-20 1 1 Point t o t he folders and files to be ba cked up . If you specified a pat h to a file or folder explicitly, t he plan will back up this item on each machine where this exact path will be foun d. To i nc l ude I n th e Fi l es and f ol de rs co lum n, t yp e or se le ct : File Text.do c in folder D: [...]

  • Page 293

    293 Copyr i ght © Acronis , In c., 2000-20 1 1 The root user's home directory /root Directory for all user-related prog ram s /usr Directory for system configurat i on fi l es /etc 1 1 . 2 . 3 S e l e c t i o n r u l e s f o r v o l u m e s Define volume se l ection ru l es, ac cording to which the volumes on the mac hines included in the cen[...]

  • Page 294

    294 Copyr i ght © Acronis , In c., 2000-20 1 1 Boot volu me Type or sel ec t: [ B OOT] Refers to the re g iste red machin e's boot volume. The boot volu me contains th e W indows folder and the suppo rting files for th e Windows op erating sys tem ( typ i cally located in the Wi ndowsSystem32 folder ) . It may or may not be the same as the s[...]

  • Page 295

    295 Copyr i ght © Acronis , In c., 2000-20 1 1 Note on Li nu x machines You can include bo th Windows and Linux volumes (partitions) in on e centrali zed backup plan. For example, i t is possible to set up a cent rali zed backup plan to back up volume C: on Windows machines and partition /dev/hda1 on Linux machines. Unlike Windows, there is no c l[...]

  • Page 296

    296 Copyr i ght © Acronis , In c., 2000-20 1 1 /dev/vg_mymachine/lv_root /dev/vg_mymachine/lv_bin To see the l ist of logical volumes on a machine, run the lvdisplay ut ili ty. In our exam p l e, t he out pu t would be similar to the fo l lowing: --- Logical volume --- LV Name /dev/vg_mymachine/l v_root VG Name vg_mymachine … --- Logical volume [...]

  • Page 297

    297 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to create Acronis Secu re Z one in ad v ance o n each mac hi ne the cen tralized plan is created for. For information on how to c reate Acronis Secure Zone, see t he C reating Acronis Secure Zone (p. 170 ) section. 2. Naming the archives Data from each machine wi ll be bac ked up to a separa [...]

  • Page 298

    298 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 2 . 6 W h a t i f a m a c h i n e d o e s n o t h a v e d a t a m e e t i n g t h e s e l e c t i o n r u l e s A centralized b ackup plan can be deployed to a machi ne that does not have data meeting the selection rules. No erro r or warning will be lo gged during the plan deployment because it[...]

  • Page 299

    299 Copyr i ght © Acronis , In c., 2000-20 1 1 from th e regi stered machines and fro m the m anagement server. The c hart shows the n umber of log entries of each t ype ( Su cceeded , With warnings , Failed ) for a part i cular day. Statistic s for the selected date are displaye d to the right o f the ch art. Al l the st atistics fields are inter[...]

  • Page 300

    300 Copyr i ght © Acronis , In c., 2000-20 1 1  Select a m achine (or group) to perform ac tions on it. See "Actions on machines" (p. 301) and "Actions on groups" (p. 308 ).  To view detailed information about the selected m achine or group and perform additional operations (such as run/stop t asks, import/export backup p[...]

  • Page 301

    301 Copyr i ght © Acronis , In c., 2000-20 1 1 Example: T he accounting depart m ent fo rm s a separate Act i ve Directory organizational unit (OU). You si mply specify the ac counting O U as the group m e mbership criterion and create t he centralized b ackup pl an for i t. If a new ac countant is hired, the new machine will be added to the group[...]

  • Page 302

    302 Copyr i ght © Acronis , In c., 2000-20 1 1 deleted fro m the m achine . If the machi ne is not ava i lable at the m oment, these actions will be per formed on the ma c hine as soon as the mach ine becomes ava il ab l e to th e manage m ent serv er. Grouping actions To Do Create a cus tom static or dynamic group Click Cre at e gr oup . In the C[...]

  • Page 303

    303 Copyr i ght © Acronis , In c., 2000-20 1 1 Other actions To Do View deta i led i nformat i on on a ma chine Click Det a ils . In the Machi ne details (p . 306 ) window, exa mine infor mati o n on the ma chine. View log entries of a machine Click L og . The Log (p. 324 ) view will di splay a l i st of the machine' s l o g entries . Update [...]

  • Page 304

    304 Copyr i ght © Acronis , In c., 2000-20 1 1 Select t he Sav e passw o rd check box to store t he pass word fo r futu re connections. 5. Click Next , and then click Proceed . Initiating registration on the machine side The registrat i on proc edure can be initiated on the machine side. 1. Connect the console to the machine where Acro ni s Backup[...]

  • Page 305

    305 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the P ath field, enter a path to the .txt or . csv file, or click Browse and select the file in the Browse window. 4. Under Logon setti ngs , specify t he user name and p assword of a user who is a member of the Administrato rs group on all machines th at are listed in the file. 5. Click OK t o [...]

  • Page 306

    306 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o add machines. Onc e the machines app ear in th e group, the centralized backup plans created for the group (if any) are deployed t o the mach ines. If any of t he selected machines is not av ailable or reachable at the moment, the action will be kept in t he management server as pendin[...]

  • Page 307

    307 Copyr i ght © Acronis , In c., 2000-20 1 1  Installed a gents - full name of A cronis agents, installed on the machine.  Proces sor - the type of CPU used in t he managed machine.  CPU clock - c l ock rate of the C PU.  RAM - m emory size.  Descri ption - th e machine's description ( taken from the Computer desc ription in [...]

  • Page 308

    308 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 2.3 Ac ti ons on gr oup s Actions are avai lable when y ou select the Machines with agents vi ew i n the N av igation tree. You sel ect a g roup in the Navigation tree o r in the Machines wi th agents view to perform an action on t he group. The fo l lowing is a guideline to perform ac tions on[...]

  • Page 309

    309 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Move one c ustom group to another Click Move to . In the Move t o gro up (p. 311 ) window, sp ecify a group that will be a new parent of the sele cted group. Delete a custom group Click Dele t e . Deletion of a pa r ent g r oup wi l l delete i ts chi ld groups as w ell. Centrali z ed backup plan[...]

  • Page 310

    310 Copyr i ght © Acronis , In c., 2000-20 1 1 Operating system: Windows Server 2 008 Operating syst em : Windows Server 2003 will add t o the same group all the m achines whose operating system is W indows 20 00 OR Windows 200 3. b) Entries of different criteria are c ombined by logical multipli cation (AND) For example, consider the fo l lowing [...]

  • Page 311

    311 Copyr i ght © Acronis , In c., 2000-20 1 1 A registered machin e has to be specified by its registration address, that is, you need t o provide exactly t he same host name, full y qualified domain na me (FQDN), or I P address as was specified when th e machine was i nitially added t o the management server. Otherwise, the machine will not be a[...]

  • Page 312

    312 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a backup plan Click Det a ils . In the Backup plans and tasks window, exa mine all infor m ati on related to the selected ba ckup plan. View log o f a back up plan Click Log . The Log vie w wil l display a list of the l og ent r ies related to the selected backu p plan. Run a b[...]

  • Page 313

    313 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding a virtu al machine as a virtual machi n e On Ac ronis Backup & Recovery 11 Management Server, a machine is considered virtual i f it c an be backed up from t he virtualization host without inst alli ng an agent on the machine. This is po ssi ble when using th e Acronis Backup & Recovery[...]

  • Page 314

    314 Copyr i ght © Acronis , In c., 2000-20 1 1  To review detailed informat i on on the sel ected plan (task), use t he information panel at the bott om of the wi ndow. The pan el is collapsed by defaul t. To expand the panel, c l ick the arrow mark ( ). The con tent of the panel is also duplicat ed in the Plan details (p. 267 ) and Task detail[...]

  • Page 315

    315 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/tas k Click Edi t . Centralized backup pla n The editing of centra lized backu p plans is performe d in th e same way as creating . Once the plan is ed ited, the m ana g ement serv er updates the plan on all machin es the plan was deployed to . Task The editing of tasks is performe d[...]

  • Page 316

    316 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 3 . 6 L i c e n s e s The L icenses view enables you to m anage licenses stored on Acronis Lic ense Server. The l icense server can be either integrated with A cronis Backup & Recovery 11 Management Server, or installed as a separat e component . Acces sing the Licenses view To access the Li[...]

  • Page 317

    317 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Acti on s menu, sel ect C h ange licens e server . 4. Specify th e name or IP address of the machine with th e license server . 5. Click OK . After ch ang ing the license server, the management server deploys the new license server's IP address to the registered mac hines and they st ar[...]

  • Page 318

    318 Copyr i ght © Acronis , In c., 2000-20 1 1 LicenseServerCmdLine .exe supports t he followi ng para meters: --status <IP -ad dress or ho stname> Displays the t otal number of l icenses and t he number of available licenses for eac h Acronis produc t. --import <IP -ad dress or ho stname> <l icense key > Adds a new l icense key [...]

  • Page 319

    319 Copyr i ght © Acronis , In c., 2000-20 1 1 A predefined report template is preset so that you can generate a repo rt with one click. To start generating a report , select a report template in the Repo rts view, an d then c l ick Generate on the toolbar. The repo rt will con tain the information sel ected, grouped and sorted a ccording to th e [...]

  • Page 320

    320 Copyr i ght © Acronis , In c., 2000-20 1 1  Origin : The types of origin of t he ba ckup plans  Local and/or Ce n tralized .  Machines : The list of machines on which the backup plans exis t.  Backed up data ty pe : Th e types of backed up data  Machines/Disks/Volum es and/or Files .  Deployment state : The deployment stat es[...]

  • Page 321

    321 Copyr i ght © Acronis , In c., 2000-20 1 1  Select whet her to show all items in a sing l e table or to group them by a particular column.  Specify which table columns to show, and in which order.  Specify how to sort the table. 11 .3. 7.4 R ep ort ab out th e a rch ive s a nd b ac kup s In this view, you can generate a report about t[...]

  • Page 322

    322 Copyr i ght © Acronis , In c., 2000-20 1 1 With th e default filter settings, the report includes informat ion about all centralized manage d vaults plus the combined total. Report view Under Report view , choose ho w the report will look:  Specify which table columns to show, and in which order.  Select which diag rams to i nclude in t [...]

  • Page 323

    323 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 7.8 R ep ort v iew In order fo r your web bro wse r to correct ly display dates and other information i n generated repo rts , enable act i ve cont ent (JavaScript). You can all ow act i ve cont ent to run t emporar i ly for t he currently displayed webpa ge, or enable i t permanent l y. To all[...]

  • Page 324

    324 Copyr i ght © Acronis , In c., 2000-20 1 1 To export en tire table cont en ts to a *.txt or *.csv file, click Save all to fil e . Alerts view on the management s erver When th e console is connect ed to the management server, the Alerts view displays a l erts c ol lected from bot h the registered machines and t he management server. Alerts col[...]

  • Page 325

    325 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Select a s i ngle a c tivity Select Activi t ies in the Dis play drop-down list and click an a cti vity. The Informa t ion pane wi l l show l og ent r ies for the se lected activ i ty. Select a s i ngle log entry Click on it. Select m ultiple lo g entries  non-contig u ous : ho ld down C TRL [...]

  • Page 326

    326 Copyr i ght © Acronis , In c., 2000-20 1 1 To copy the d etail s, c l ick the Copy to clipboard button . Log entry data fields A log entry c ontains the fo l lowing data fields:  Type - Type o f event (Error; Warning; I nformation).  Date and time - Date and time when t he event took place.  Backup plan - T he backup plan t he event r[...]

  • Page 327

    327 Copyr i ght © Acronis , In c., 2000-20 1 1 You al so have t he abili ty to delete proxies from th e list. Please keep i n mind th at an y chan ge to this option affects the entire management server. If you de lete a proxy from the list, the Wake - On -LAN funct i onality in the corresponding subnet wi ll be disabl ed for all cent ral ized back[...]

  • Page 328

    328 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts sec tion of the Dashbo ard . When t he console is c onnected to the management serv er, t hi s sett i ng will also c ontrol the color scheme o f the Last c onnect column's value for eac h machine. 11 .3. 10.3 Do main a cce ss cre den tia ls This opt i on det[...]

  • Page 329

    329 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]

  • Page 330

    330 Copyr i ght © Acronis , In c., 2000-20 1 1 To disable this opt i on, clear t he Log events check box. S NMP not ifi cat ion s This opt i on defines whet her the management server h as to send it s own log events t o the specified Simple Network Management Protoc ol (SNMP) manag ers. You can choose the t y pes of events t o be sent. For det ai [...]

  • Page 331

    331 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Maximum log si ze: 1 GB . On cleanup , keep 95% of the maximum log size . When th e option is enabled, the program compares the act ual log size with the maximum size aft er every 100 l og entries. On ce t h e maximum log size is ex ceeded, t he pr ogram deletes th e oldest log entries.[...]

  • Page 332

    332 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 4 . 1 P a r a m e t e r s s e t t h r o u g h a d m i n i s t r a t i v e t e m p l a t e The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 component s that can be set by using Acronis Adm i nistrative Template. For informatio n on how to apply the administrative template[...]

  • Page 333

    333 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// msdn2.microsoft.c om/en-us/library/aa374 177.aspx 11 .4. 1.2 Ac ron is Ba ckup & Re cov ery 11 Ag ent f or Wind ow s The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 Agent that can be set by using Acronis Administrat iv e Temp la te. Lice n sing Specifies how o ft[...]

  • Page 334

    334 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 11 will cont i nue working with full func tionali ty for the number of days specified in Maximum T ime W ithout License S erver , as count ed fr om the m oment o f installation or from the last successful check. [...]

  • Page 335

    335 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), or 5 (Critical error) Default value: 4 (only errors and critical errors will be sent  if Trace State is set t o True ) SNMP Specifies the types of the ag ent's events to send notificat i on[...]

  • Page 336

    336 Copyr i ght © Acronis , In c., 2000-20 1 1 An empty st ri ng means the folder %AllUsersProfile%Application DataAcron isBackupAndRecovery MMS Temp. You can specify a l ocal folder on any volume, including a volume you are bac king up. Snapshot St o rage Absolu te Size Description: Specifi es the i nitial size of the snapshot storage, in me[...]

  • Page 337

    337 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the password for aut hen tication wi th t he proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Important. The password can be viewed by any user w ho has access to the admi nistrative template, such as to an administrator of the [...]

  • Page 338

    338 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es whether to record Acronis Bac ku p & Rec overy 11 Management Serve r's events into the event log. Possible values: T rue or Fa lse Default value: Fal se Trace Le v el Description: Specifi es the m inimum level o f severi ty of ev ents t o be recorded into the ev ent lo[...]

  • Page 339

    339 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 200 If the t otal number of online registered machines d oes not exceed the value in Maximum Con nections , c onnections to those m achines are always kept , and the management serv er periodical l y performs sync hronization wi th eac h machine. Otherwise, i t c onnects to a number o f[...]

  • Page 340

    340 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: T rue or Fa lse Default value: Fal se By default, Acronis Backup & Recovery 11 Management Server c onnec ts t o registered machines to perform synchronizat i on  in particular, t o retrieve data such as backup l ogs. This appro ach is known as a po l ling mechanism . If Real Ti[...]

  • Page 341

    341 Copyr i ght © Acronis , In c., 2000-20 1 1 Specifies the l ocation and initial size of the snapshot storage  a temporary file that i s used when backing up data by taking a snapsho t. This file is delete d as soon as the backup is c omplete. With th e default settings, t he snapshot st orage is created in t he temporary files folder of the [...]

  • Page 342

    342 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the name or IP address of the proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Proxy Ser v er P ort Description: Specifi es the port number o f the proxy server Possible values: A ny integer number between 0 and 65 535 Default v[...]

  • Page 343

    343 Copyr i ght © Acronis , In c., 2000-20 1 1 The c omponent wil l use the default settings, whic h is to use encryption if possible and to trust sel f-signed SSL c ertifi cates (se e the foll owing option). Enabled Enc ryption is enab l ed. In Encryption , select one of the foll owing: Enabled Data transfer will be enc rypted if encrypt i on is [...]

  • Page 344

    344 Copyr i ght © Acronis , In c., 2000-20 1 1 Disabled Enc ryption is disabled; any connection t o a client ap pl ication which requires encryption will not be established. Required Data transfer will be perfo rm ed only if enc ryption is enabled on the client application (see "Client Enc ryption options" ); it will be encrypt ed. Authe[...]

  • Page 345

    345 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the minimum sever i ty level o f events to b e recorded in the file. Only events of levels great er than or equal to File Trace Mi n imal Level will be recorded. Possible values: A ny severity l evel from Unkn o wn throu g h Cri tical , or Blocked to not record any events Defau[...]

  • Page 346

    346 Copyr i ght © Acronis , In c., 2000-20 1 1 12 On lin e bac kup This sect i on pro v ides details about using the Acronis Backup & Recovery Online service. T his service enables you t o do online backups t o Acronis Online Backup St orage. Acr o nis Backup & Rec o very On line might be un a vailable in y ou r region. To find m ore info [...]

  • Page 347

    347 Copyr i ght © Acronis , In c., 2000-20 1 1 directly from the o nl ine storage. Files c an be recovered from disk -lev el bac kups as well as from file-level bac kups. For informat i on abou t backing up v irtual machines see "How to back up virtual machines to the online storage? (p. 347 )" 1 2 . 1 . 3 H o w l o n g w i l l m y b a c[...]

  • Page 348

    348 Copyr i ght © Acronis , In c., 2000-20 1 1 Install Acronis software into the guest syst e m The mac hi ne will be treated as a physical one. Y ou wil l need a separa te server or workst ation subscription for this machine. This app roach comes in handy when:  the mac hi ne is not hos ted o n a virtualization server  the virtualization pr[...]

  • Page 349

    349 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 6.5 W hat ha ppen s if I ru n out of spa ce? When a mac hi ne's bac kups are about to exceed the storage space allowed by its subsc ri ption, you receive an e-mail n otification wi th an al ert. In addition, you can see this alert on t he account management web page near the m achine. This[...]

  • Page 350

    350 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 7.3 Is I niti al S eedi ng a pa id s ervi ce? Ye s, you need to buy one Initial Seeding l icense per ma chine. 12 .1. 7.4 W hat typ es of h ard dri ve can I us e f or Ini tia l S eedi ng? Acronis ac cepts hard disk drives of t he followi ng interf ace types: I DE, ATA, SA TA, USB connected driv[...]

  • Page 351

    351 Copyr i ght © Acronis , In c., 2000-20 1 1  In Backup scheme , select Initial seeding . Specify t he s aid media as the b ackup destination.  [Opt i onal, bu t strongly recommended] Enable backup encryption in Backup options > Archive protec tion . The bac kup starts immediately after you click the fi nal OK . 5. [Opt i onal] If you w[...]

  • Page 352

    352 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 1 Delicately remo v e your hard di sk drive from t he machine. S tep 2 Place the hard drive into an anti -static bag to pro tect the drive from electrostat ic discharge. If y ou do not have an anti-static bag, si mply wrap the hard drive into aluminum foil. S tep 3 Use a sturdy box that is at l [...]

  • Page 353

    353 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 4 Choose the transport company t hat you will use for shi pping. On that company's web si te, prepare and print two prepaid shipping labels: 1. Shipping l abel for se nding your hard driv e. T his label is pl aced o n the top of the box. Y ou should send your package to one of the A cronis [...]

  • Page 354

    354 Copyr i ght © Acronis , In c., 2000-20 1 1  An order w a s cr eated  The backup is about t o start and t he license cannot be used for the same or any other machine. From t his point on, you can cancel th e order if something goes wron g . This will return the license to the po ol of available licenses.  A full backup h a s s tarted ?[...]

  • Page 355

    355 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e you o r der Large Scale Rec overy for a par ticular machine, Ac ronis sends yo u a USB hard disk drive with all of t he bac kups made from t his machine. You can recover data directly fro m the di sk or copy the backups to a local or network folder. 12 .1. 8.2 W hy w oul d I us e Lar ge Scal e R[...]

  • Page 356

    356 Copyr i ght © Acronis , In c., 2000-20 1 1 can cancel the o rder if something goes wrong. This will return t he l icense to t he pool of available licenses.  The order i s being process ed - Order processing in t he datacent er s tarted.  Writing data  Your backups are b ei ng written o nto the media. From this p oi nt o n, you cannot[...]

  • Page 357

    357 Copyr i ght © Acronis , In c., 2000-20 1 1 If you purc hased your subscriptions o nl ine using the Ac ronis Web site, t hey are available immediate ly on your ac count management Web page. The newl y o btained subscriptions are li sted at the Man age Subscriptions tab . 12 .1. 9.3 W hen do es my sub scri pti on be gin? Your subscription begins[...]

  • Page 358

    358 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat doe s " Aut o- rene w" mean? Auto-renewal means t hat when th e curren t subscription expires, t he next subscription will be automat i cally selected from the available subscript ions. The n ext subscription must be ident i cal to the c urrent subscription. If an identical subscriptio[...]

  • Page 359

    359 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 9.8 Ca n I r evo ke a su bsc rip ti on f ro m a machi n e? You cann ot retur n an activated subscription to th e list of av ailable subsc ri ptions, but you can reassig n (p. 361 ) it to a di fferent mac hi ne in Acro ni s Backup & R ecovery 11 GUI . 12 .1. 9.9 Ca n I canc el my sub scri pt[...]

  • Page 360

    360 Copyr i ght © Acronis , In c., 2000-20 1 1  Windows Server 20 08/2008 R2 (x64) with Hy per- V.  Microsoft Hyper-V Server 2008 / 2008 R2 . If your bac kups are likely to exceed the storage quota f or this type of subscription, you may want to use a sub scription with larger storage quota. For example, you c an use a server subscription or[...]

  • Page 361

    361 Copyr i ght © Acronis , In c., 2000-20 1 1 To act iv ate s ubs cri pt io n s 1. Connect the console to the management server. 2. In the Acti on s pane, click Activate online backu p subsc riptions . 3. Specify th e credentials to l og in to the onli ne storage. 4. Select t he machine and then c l ick Select s u bscription . 5. From Available s[...]

  • Page 362

    362 Copyr i ght © Acronis , In c., 2000-20 1 1 Depending on your settings, t his backup wil l be either fu l l or incremental. But its size is not l ikely to be less than a full backup size. T herefore, it is not practical to reassi gn a subsc ri ption t o a machine whose first backup was done as an initial seeding. You wi ll need to either redo t[...]

  • Page 363

    363 Copyr i ght © Acronis , In c., 2000-20 1 1 To con fig ur e p ro xy se tti ng s f or an ag en t 1. Connect the console to the mac hi ne for whi ch you want to c onfig ure proxy set tings. 2. In the Opti o ns menu, l ocated on the toolbar, click Machine options . 3. Click Online b ackup prox y . 4. Enter the proxy server settings. For detailed i[...]

  • Page 364

    364 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup and recovery options Some bac kup and recovery options are not supported by online backups. For example, Backup splitting (p. 101 ). By using the Backup perf ormance > Network con nection speed opt ion, you can vary the tran sferri ng speed as kilobytes p er second, but not as a per centage.[...]

  • Page 365

    365 Copyr i ght © Acronis , In c., 2000-20 1 1 Permission for a machine to use an extra service of Ac r onis Backup & Recovery Online. You can buy Initial Seeding lic enses and/or Large Scale Recovery licenses . Reassign a subs cription Assign a sub scription that is already ac tivated, to a d iffe rent mach i ne. Registration code A charac te[...]

  • Page 366

    366 Copyr i ght © Acronis , In c., 2000-20 1 1 13 G los sary A Ac ron is A c t ive Re stor e The Acro ni s proprietary technology that brings a system online immediately aft er the system recovery is st arted. The system b oots fr om the backup (p. 372 ) and the m achine bec omes operational an d ready t o provide necessary services. T he data req[...]

  • Page 367

    367 Copyr i ght © Acronis , In c., 2000-20 1 1 Ac ron is Uni ve rsa l R est ore The Acro ni s proprietary technology that helps b oot up Windows or Linux on dissimilar hardware o r a virtual machine . Universal Restore handles differences in devices that are critical fo r the operat i ng system start -up, su ch as storage c ontrollers, motherboard[...]

  • Page 368

    368 Copyr i ght © Acronis , In c., 2000-20 1 1 B ack up opti on s Configuration parameters of a backup o peration (p. 3 6 7), suc h as pre/post backup commands, maximum net work bandwidth all otted for the backup stream o r data compression level. Backup options are a part of a backup pl an (p. 368). B ack up p la n (P lan ) A set o f rules th at [...]

  • Page 369

    369 Copyr i ght © Acronis , In c., 2000-20 1 1 B oota bl e medi a A physical med i a (CD, D VD, USB flash drive o r ot her m edia supported by a machine (p. 375 ) as a bo ot device) that contains the bootable agent (p. 368 ) or Windows Preinstallat ion Environment (Wi nPE) (p. 379 ) with t he Acr onis Plug-i n for Wi nPE (p. 366 ). A machine c an [...]

  • Page 370

    370 Copyr i ght © Acronis , In c., 2000-20 1 1  creating and managi ng centralized vau lts (p. 370 ) for storing archives  managing sto rage nodes (p. 378 )  monitoring act i vities of the Acronis Bac kup & Reco v ery 11 compo nents, creating report s, viewing the c entralized log and more. Ce ntr al iz e d ta sk A t ask (p. 378 ) pro[...]

  • Page 371

    371 Copyr i ght © Acronis , In c., 2000-20 1 1 Consolidation m i ght be n ee ded when deleting backups , either manu al ly or during cleanup (p. 370 ) . For example, the retention rul es require to delete a ful l bac kup (p. 374 ) that has expired b ut retain the next incremental (p. 375 ) one. The backup s wil l be combined i nto a si ngle full b[...]

  • Page 372

    372 Copyr i ght © Acronis , In c., 2000-20 1 1  viewing the st ate, progress and properties of the centrali zed tasks (p. 370 ) exi sting on t he machine  viewing and manag i ng the l og of t he agent's operat ions  disk management operations, suc h as clone a disk, create volume, c onvert volume. A kind of d i rect management i s pe[...]

  • Page 373

    37 3 Cop yright © Acr o nis, In c., 200 0 -2011 D ynam ic dis k A hard disk managed by Logical Disk Manager (LD M) that i s available in Windows st arting with Windows 200 0. LDM helps flexibly allocate v olumes o n a storage device for bet ter fault t ol erance, better performance or larger volume size. A dynamic disk c a n use either the master [...]

  • Page 374

    374 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic vol um e Any volume loc ated on dynamic d isks (p. 372 ), or more precisely, on a d isk group (p. 372 ). Dynamic volumes can spa n multiple disks. Dynam ic volumes are usually configured depending on the desired goal:  to increase th e volume size (a span ned volume)  to reduce the acc[...]

  • Page 375

    375 Copyr i ght © Acronis , In c., 2000-20 1 1 I Im ag e The same as Disk backup (p. 372). In cr eme nta l ba cku p A bac kup (p. 367 ) that stores changes to the data ag ainst t he latest bac kup. You need ac cess to ot her backups from the same arch ive (p. 367 ) to res tore data from an i ncremental bac kup. In de xing An act i vity (p. 367 ) p[...]

  • Page 376

    376 Copyr i ght © Acronis , In c., 2000-20 1 1 M Ma ch ine A physical or v irtual comput er uniquely identified by an operat i ng system installation . Machines with multiple op erating systems (mu lti -boot syst em s) are c onsidered as multipl e machines. Ma nag ed ma chin e A mac hine (p. 375 ), either physical or virtual, where at l east one A[...]

  • Page 377

    377 Copyr i ght © Acronis , In c., 2000-20 1 1 P Pe rs ona l va ult A local or networked vault (p. 379 ) created using direct managem ent (p. 371 ). On ce a personal vault is created, a shortcut to it appears on the managed machine i n the Vaults list. Multiple machines c an use the same physical location; for exampl e, a network share; as a perso[...]

  • Page 378

    378 Copyr i ght © Acronis , In c., 2000-20 1 1 S S tat ic gr o u p A group of machines which a management server (p. 376 ) ad ministrator po pulates by manually adding machines t o the group. A mac hi ne remains in a static group until the administrator rem oves it from th e group or from the m anagement server. S to rage n o de (A cr oni s Ba cku[...]

  • Page 379

    379 Copyr i ght © Acronis , In c., 2000-20 1 1 Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validation of a disk backup c al culates a chec ksum for ev ery data bl ock saved in th e backup . Both procedu res are resource-intensive. While the suc cessful vali dation means a high probab [...]