Acronis Backup & Recovery 11 Server manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Acronis Backup & Recovery 11 Server, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Acronis Backup & Recovery 11 Server one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Acronis Backup & Recovery 11 Server. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Acronis Backup & Recovery 11 Server should contain:
- informations concerning technical data of Acronis Backup & Recovery 11 Server
- name of the manufacturer and a year of construction of the Acronis Backup & Recovery 11 Server item
- rules of operation, control and maintenance of the Acronis Backup & Recovery 11 Server item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Acronis Backup & Recovery 11 Server alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Acronis Backup & Recovery 11 Server, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Acronis service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Acronis Backup & Recovery 11 Server.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Acronis Backup & Recovery 11 Server item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    A c r o n i s B a c k u p & R e c o v e r y 1 1 Update 0 User Guide Applies to th e followin g edit i ons:  Advanc ed Server  Virtual E dition  Advanc ed Server SBS Edition  Advanc ed Workstation  Server f o r Linux  Server f o r Window s  Workstati o n[...]

  • Page 2

    2 Copyr i ght © Acronis , In c., 2000-20 1 1 Copyright © Acronis, Inc . , 2000-2011. All rights reserve d. “Acronis” and “Acro ni s Secure Z one” are reg istered trademarks of Acro ni s, Inc . "Acronis Comput e with Confidence", “Acronis Startup Recovery Man ag er”, “ A cronis Act i ve Restore” and t he Acronis logo are [...]

  • Page 3

    3 Copyr i ght © Acronis , In c., 2000-20 1 1 Table o f conten ts 1 Introducing Acronis Backup & Recovery 1 1 ................................ ................................................ 8 1.1 What's new in Acronis Backup & Recovery 1 1 ....................................................................... 8 1.2 Acronis Bac kup &[...]

  • Page 4

    4 Copyr i ght © Acronis , In c., 2000-20 1 1 4 .4 .5 Up on a n A cr on is Dr iv e Mo nit or a le rt ..................................................................................................... 62 4 .4 .6 C on dit io ns ................................................................................................ ........................[...]

  • Page 5

    5 Copyr i ght © Acronis , In c., 2000-20 1 1 5.5 How to convert a disk backup to a virtual machine ........................................................... 120 5 .5 .1 Vi rt u a l mac hi n e ty pe / v ir tu ali za tio n s e rv er se le ct io n .......................................................................... 122 5 .5 .2 Vi rt u a l mac[...]

  • Page 6

    6 Copyr i ght © Acronis , In c., 2000-20 1 1 8 .1 .1 Li nu x- ba se d b oo ta bl e m ed ia ................................................................ ................................................ 161 8 .1 .2 A dd ing t he Ac ro ni s P lug -in to W in P E 1 .x ................................................................................[...]

  • Page 7

    7 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0. 5 .2 A ler ts ..................................................................................................................................................... 202 1 0. 5 .3 E- mai l no ti fi ca tio ns .............................................................................................[...]

  • Page 8

    8 Copyr i ght © Acronis , In c., 2000-20 1 1 1 In tro duc in g Acro n is Back up & Rec ove ry 1 1 1. 1 Wh at 's n ew in Ac ro nis B a ck up & Re cov er y 11 Acronis Bac kup & Recovery 11 builds on t he su ccess that Acro nis Backup & Recovery 1 0 has established by bring i ng enterprise-class capabili ti es to the small busine[...]

  • Page 9

    9 Copyr i ght © Acronis , In c., 2000-20 1 1  Exporting and im p ortin g backup p lans (p. 193 ) Export a backup plan to an . xml file and import it to a different machine.  Deploying backup pl ans as file s (p. 196 ) Export a backup plan from o ne machine and deploy it as an .xml file to multiple mac hines.  Disaster Recovery Plan (p. 82[...]

  • Page 10

    10 Copyr i ght © Acronis , In c., 2000-20 1 1 File backup File-level data protection is based o n ba cking up files a nd folders residing on t he machine where the agent is installed or on a network share. Files can be recovered to t heir original locat i on or to anot her place. It is po ssible to rec over all files and folders that were backed u[...]

  • Page 11

    11 Copyr i ght © Acronis , In c., 2000-20 1 1  FAT16/32  NTFS  Ext2 / Ext3/E x t4  ReiserFS3 - part icular files cannot be recovered from disk backups l ocated on A cronis Bac kup & Recovery 11 Storage Node  ReiserFS4 - volume rec overy without the volume resize cap ability; particular fi les cannot be recovered fro m disk bac k[...]

  • Page 12

    12 Copyr i ght © Acronis , In c., 2000-20 1 1 2 G ett ing st ar ted Step 1. Installation These brief installation i nstruct i ons enable yo u to st art u si ng the pro duc t qu i ckly. For th e complete d escription o f installation me thods and procedures, please refer to the Installation document ation. Before installation, make sure that:  Y[...]

  • Page 13

    13 Copyr i ght © Acronis , In c., 2000-20 1 1 Create a bac kup plan if you n ee d a long-term bac kup strategy including bac kup schemes, schedules and co ndi tions, timely delet ing of bac kups, or moving them to different locations. Step 5. Recovery Rec over (p. 97 ) To recover dat a , you need t o select the ba cked up dat a and t he des tinati[...]

  • Page 14

    14 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis B ac kup & Recovery 11 Man a geme n t C o nsole - Welcome scree n Key elements of the console wo rkspac e Na me D es cri pti on Navigati o n pane Contains the Navig at i o n tree and th e Shortcut s ba r . Lets you navi g ate to the different views. For deta il s, see Navigati on pane ( p. [...]

  • Page 15

    15 Copyr i ght © Acronis , In c., 2000-20 1 1  Backup plans a nd tasks . Use th i s view to manage b ac kup plans and t asks on th e managed machine: run, edi t, stop and delete plans and tasks, view their progress.  Vaults . Use this vi ew to manage personal vaults and archives sto red in t here, add new vaults, rena m e and d el ete the ex[...]

  • Page 16

    16 Copyr i ght © Acronis , In c., 2000-20 1 1 2. 1.2 .1 Vi ew s A view appears on the main area when c li cking any ite m in the Navigation tree in t he Navigation pane (p. 14 ) . "Log" view Common way of working with views Generally, ev ery view c ontains a tab l e of items, a table to olbar with b ut tons, and the Info rmation panel. ?[...]

  • Page 17

    17 Copyr i ght © Acronis , In c., 2000-20 1 1 Filter ite ms by predefined column value In a field below the co rr espond ing colu mn's header, select the r equired value from the d rop -dow n list. Filter ite ms by entered value In a field below the co rr espond ing colu mn's header, type a value. As a result you will see th e list of va[...]

  • Page 18

    18 Copyr i ght © Acronis , In c., 2000-20 1 1 Using controls and specifying s ettings Use active co ntrols to specify a bac kup plan or recovery t ask settings and paramet ers. By default, such fi elds as credent i als, opt i ons, comment s, an d some others are hidden. Most setti ngs are configured by cli cking the respective Show … links. O th[...]

  • Page 19

    19 Copyr i ght © Acronis , In c., 2000-20 1 1 2. 1.3 .2 Cr ed ent ial s c a che The o ption specifies whether to st ore the c redentials entered whi le using the manage ment console. The preset is: Disabled . If the o ption is disabled, ac cess credentials for v arious locat i ons t hat yo u enter during a con sol e session are st ored only until [...]

  • Page 20

    20 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Enabled. To make a selection, select or clear th e Notify if bootable media is not c reated check box. Notify when the management console is con nected to a component of a d ifferent version This opt i on defines whet her to display a pop-up window when a console is c onne cted to an age[...]

  • Page 21

    21 Copyr i ght © Acronis , In c., 2000-20 1 1 3 U nde rst and ing Ac ron is Bac kup & Rec ov ery 1 1 This sect i on at tempts to gi ve its readers a clear unders tanding of the product so t ha t they can use the pro duc t in various circumst ances without step- by - step inst ructions. 3. 1 O wne rs an d cre de ntia ls This sect i on explains [...]

  • Page 22

    22 Copyr i ght © Acronis , In c., 2000-20 1 1 1. In the P lan parameters (or Task parameters ) sect ion, cli ck Show plan 's cr edentials, c omments, label (or S how task c redentials ). 2. Click Pl a n's (Task) credentials . 3. Enter the credent i als under which the plan (task) will r un. Scheduled or p ostponed start The plan (task) c[...]

  • Page 23

    23 Copyr i ght © Acronis , In c., 2000-20 1 1 influence of all the metho ds’ shortcomings. For examp le, weekly differentia l bac kup facilitates archive cleanup because it c an be easily deleted alon g with t he weekl y set o f dail y incremental backups depending on it. Backing up with the full , increment al or different i al backup m ethod r[...]

  • Page 24

    24 Copyr i ght © Acronis , In c., 2000-20 1 1 the same fu l l backup at the same point o f time. The above ment i oned difference i mplies creat i ng a differential backup after (or instead of) creating multiple incremental backups. An increment al or differ en tial ba ck u p created after disk d efragment ation might b e consider ably larger t ha[...]

  • Page 25

    25 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 5 B ac kup a nd re cove r y o f d yn amic v ol ume s (W in do ws ) This sect i on explains in brief ho w to bac k u p and recover dynamic volumes (p. 234 ) using Acronis Backup & Recovery 11 . A dynamic volum e i s a volume loc ated on dynamic disk s (p. 233 ), or more exactly, on a disk group ([...]

  • Page 26

    26 Copyr i ght © Acronis , In c., 2000-20 1 1 Example 1 . The group contains fewer disks t han is required for the dynamic vol ume. Assume you are going to recover an 80 GB RA ID-5 volume that had resi ded on three disks, t o a disk group consisting of two disks. The t o tal size of un al located space is 1 00 GB: 40 GB on the fi rst disk an d 60 [...]

  • Page 27

    27 Copyr i ght © Acronis , In c., 2000-20 1 1 Disk-level encryption software encrypt s data on the fly. This is why dat a contained in the backup is not encrypted. Disk-level encrypt i on software often modifies system areas: boot reco rds, or part ition tables, or file system t abl es. These fac tors affect disk-level backup and recovery, t he ab[...]

  • Page 28

    28 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 7 Su p p or t f or SN MP SNMP object s Acronis Bac kup & Recovery 11 provides the fol lowing Simple Network M anagem ent Prot ocol (SNMP) object s t o SNMP management appli cations:  Type of event Object identifier (OID): 1.3.6.1.4.1.247 69.100.200.1.0 Syntax: OctetString The value may b e &q[...]

  • Page 29

    29 Copyr i ght © Acronis , In c., 2000-20 1 1 4 Ba cku p 4. 1 B ac k u p now Use the Back up now featu re to co nfi gure and ru n a one-tim e backup in a few simple steps. The backup process will start immediately aft er you perform the requ i red steps and click OK . For a l ong-time backup strategy that includes sc hedules and con ditions, tim e[...]

  • Page 30

    30 Copyr i ght © Acronis , In c., 2000-20 1 1 To access these settings, cli ck Show backup fil e naming, acce ss credentials, archive com ments . File n aming (p. 48 ) [Opt i onal] Select the Name backup files usi n g the archive n ame, as in Acronis T rue Im ag e Echo, rather th an auto-generated n ames check box if you want to use simpli fied fi[...]

  • Page 31

    31 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Configure parameters o f the backup operat i on, such as pre/post backup commands, maxi mum network bandwi dth al located for t he backup stream or t he backup archive co m pression level. If you do nothing in th is section, the default values (p. 75 ) will be used. After any o f the setti[...]

  • Page 32

    32 Copyr i ght © Acronis , In c., 2000-20 1 1 In order t o recover your operat i ng system along with al l the set ting s and appl ications, you have to perform a disk bac kup. 2. In the t ree below the Data to back up se ction, select the items to back up by selecting c heck boxes next to the items. Selecting a c heck box for a mac hi ne means ba[...]

  • Page 33

    33 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on is effec tive only for fi le systems that are supported by Windows. Select this chec k box to skip files and folders with the Hidden attribute. If a folder is Hidden , al l of its contents — including files th at are not Hidd en — will be excluded.  Excl u de all s ystem files and [...]

  • Page 34

    34 Copyr i ght © Acronis , In c., 2000-20 1 1 The ab ove sett i ngs are not effect i ve for t he fil es or fo l ders t hat were explicitly selected for backup. For example, assum e that you selected the folder MyFolder and the file MyFile.tmp outside that folder, an d selected to skip all .tmp files. In t hi s case, all .tmp files in the folder M [...]

  • Page 35

    35 Copyr i ght © Acronis , In c., 2000-20 1 1  Custom – to create a custo m scheme, where you are fr ee to set up a backup strat egy in th e way your ent erpri se needs it m ost: specify multiple schedules for different bac kup types, ad d conditions and specify the re tention rules.  Manual s ta rt – t o create a ba ckup task for m anua[...]

  • Page 36

    36 Copyr i ght © Acronis , In c., 2000-20 1 1  Custom retent i on periods for backups of eac h type Description Let us suppo se that we want t o set up a ba ckup plan that wi ll regularly produc e a series of dai ly (D), weekly (W), and monthly (M) backups. Here is a natu r al way t o do this: the foll owing table shows a sample two-month perio[...]

  • Page 37

    37 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup type Specifies t he types of da il y, week ly and month ly backups  Alw a ys full - all the daily, weekly and m onth l y backups will be al ways full. Th i s is the default selectio n for c ases when a tap e driv e is selected as a backup locat ion.  Full/D ifferential/In c reme n tal - da[...]

  • Page 38

    38 Copyr i ght © Acronis , In c., 2000-20 1 1  Keep month ly backups for half a year. Backup scheme parameters can t hen be set up as fo llo ws.  Start backup at: 6:00 PM  Back up on: Workday s  Weekly/monthly: Fr iday  Keep backup s:  Daily: 1 w eek  Weekly: 1 0 days  Mont hl y: 6 months With th i s scheme, you wil l have [...]

  • Page 39

    39 Copyr i ght © Acronis , In c., 2000-20 1 1  Weekly/monthly: Fr iday  Keep backup s:  Daily: 1 w eek  Weekly: 1 month  Mont hl y: indefinitely Backup i s thus performed only on Fridays. This makes Friday the only c hoice for weekly and mon thly backups, leavi ng no o ther date for daily backup s. The r esul ting “Grandfat her - [...]

  • Page 40

    40 Copyr i ght © Acronis , In c., 2000-20 1 1 backups  If ther e is only on e full ba ckup left and a full backup is in progress, then delete the last fu ll backup with all dependent increm ental/different ial backups  If ther e is only on e full ba ckup left, and an incrementa l or d ifferential ba ckup is in progr ess, an error o c curs sa[...]

  • Page 41

    41 Copyr i ght © Acronis , In c., 2000-20 1 1 Retention rules : Delete backup s older t h an 12 months Apply the rules : After backing up By default, a one-year-old full backup wi ll not be del eted unt i l all incremental backup s that depend on it become subject to deletion too. Fo r more information, see Retention rules (p. 69 ). Monthly full, [...]

  • Page 42

    42 Copyr i ght © Acronis , In c., 2000-20 1 1  Higher density o f more recent backups Parameters You can set u p the following parameters o f a Tower of Hanoi sc hem e. Schedule Set up a da i ly (p. 54 ) , weekly (p . 56 ), or month ly (p. 58 ) sch edule. Sett ing up schedu l e parameters allows for the creation of simple sch edules (exa m ple [...]

  • Page 43

    43 Copyr i ght © Acronis , In c., 2000-20 1 1 The sc heme all ows for efficient dat a storage: more b ac kups acc umul ate t oward the c urren t time. Having four backups, we could recover data as of tod a y, yesterday, hal f a week, or a week ago. Roll-back period The nu m ber of days we can go back i n the archive is different on di fferent d ay[...]

  • Page 44

    44 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup type Select t he type of backup  Full - sel ected by default for all backup loc ations (except for Ac ronis Online Backup St orage).  Increm enta l. At the first time a full backup wi ll be c reated. The next backups will be incremental. Se l ected as the one and only backup type fo r Acro[...]

  • Page 45

    45 Copyr i ght © Acronis , In c., 2000-20 1 1 the ru le: "on e ba ckup plan - one arc hiv e". Doing t he o pposite will not prevent the pro g ram from funct i oning but i s not prac tical or efficient, except for s ome specifi c cases. Why two or more plans should not back up t o the same archive 1. Backing up d ifferent sourc es to the [...]

  • Page 46

    46 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s FTP, SF TP To back up da ta to FTP or SFT P , type the serv er name or address in the Path f i eld as follows: ftp://ftp_se rver:port _n umber or sf tp://sft p_server:por t number If the port nu m ber is not specified, port 21 i s used for FTP a nd port 22 i s used for SFT P[...]

  • Page 47

    47 Copyr i ght © Acronis , In c., 2000-20 1 1  User na me . When ent eri ng the n am e of an Ac tive Direc tory user account, be sure to also specify the domain name (DOMAINUsername o r Usern am e@domain)  Pass word . The passwor d for the account . 2. Click OK . To learn more abou t operations av ailable depending on the user privileges, s[...]

  • Page 48

    48 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows 200 0 Se r ver win2000S er vGuest Windows 200 0 Adva nced Server win2000S er vGuest Windows XP All Editions winXPP roGuest Windows XP All Editions (64 bit ) winXPP ro64Guest Windows Se rver 2003, Al l Editions winNetStanda rdGuest Windows Se rver 2003, Al l Editions (64 bit) winNetStanda rd64Gu[...]

  • Page 49

    49 Copyr i ght © Acronis , In c., 2000-20 1 1  Be fore creat i ng a new ful l backup, the software will delete t he entire archive and start a new one. This behavior is useful when you rotat e USB hard drives and want each drive to keep a singl e full backup (p. 50 ) or all backups created during a week (p. 51 ). But you might end up with no ba[...]

  • Page 50

    50 Copyr i ght © Acronis , In c., 2000-20 1 1 In this sc enari o, create a backup plan with a dai ly schedule. When c reating the bac kup plan, specify MyMachine-[DATE ] as t he archive name, select the Name backup files using the archive n ame... check box, and select Full as t he backup type. Resul t:  The bac kups of January 1, 201 1 , Janua[...]

  • Page 51

    51 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 3.1 .5 Ex am ple 5. Da il y ba cku ps wi th w eek ly dri ve sw aps Consider the fo l lowing scenar i o:  You want to perform daily bac kups of your m achine: a full backup each Mon day and incremental backups on Tuesday t hrough Sunday.  You want to back up to the arc hiv e MyMachine on an ext[...]

  • Page 52

    52 Copyr i ght © Acronis , In c., 2000-20 1 1  The 1 0 differential backups of January 31, 2011, will be sto red as ServerFiles(1.31.2011)2.tib, ServerFiles(1.31.201 1)3.tib, and so on up to ServerFiles(1.31 .2011)1 1.tib.  The fo l lowing day, February 1 , the b a ckups will start with the full backup ServerFiles(2.1.2011 ). tib. T he diffe[...]

  • Page 53

    53 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4 Sc he du lin g Acronis sch edul er helps th e admi nistrator adapt bac ku p plans to the company’ s daily rout i ne and each employee’s work style. The plans’ tasks will be la unched systematically keepin g the critical data safely protec ted. The sc heduli ng is available when creat i ng a [...]

  • Page 54

    54 Copyr i ght © Acronis , In c., 2000-20 1 1 The task r un ti m e is withi n th e specif i ed ti m e interva l All users a re logged off The spec i fied per iod of t ime has pass ed since the last succes sful backup comple ted The sc heduler behavior, in c ase the event occu rs but the condition (o r any of multiple con di tions) is not m et is d[...]

  • Page 55

    55 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples "Simple" daily s chedu le Run t he task every day at 6PM. The sc hedule's parameters are t hus set up as follows. 1. Every: 1 day(s). 2. Once at : 06 :00:00 PM . 3. Effect i ve: From: not s et . The t ask wil l be start ed on the current day, if it has been creat ed before 6PM. [...]

  • Page 56

    56 Copyr i ght © Acronis , In c., 2000-20 1 1 task's rec urrences is 4 hours, and between t he third, f ourth and fi fth is 2 ho urs. In this case, the optimal way is to add two sc hedules to t he task. Firs t da ily s chedu le 1. Every: 3 day(s). 2. Every: 4 ho urs. From: 0 8:00:00 AM Until: 12:00:00 PM . 3. Effect i ve: From: 0 9/20/2009 . [...]

  • Page 57

    57 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples "One day in the week" schedule Run t he task every Friday at 1 0PM, starting from a c ert ain date (say 05/14/2009) and ending after si x months. The sc hedule's parameters are t hus set up as follows. 1. Every: 1 week(s) on : Fri . 2. Once at : 10 :00:00 PM . 3. Effect i ve: Fr[...]

  • Page 58

    58 Copyr i ght © Acronis , In c., 2000-20 1 1  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 1 2 PM and 9 PM (i.e. same as on M onday)  Saturday: onc e at 9 PM  Sunday: once at 9 PM Combining the i dentical t i mes, the foll owing t hree schedules can be added to th e task: Firs t s chedule 1. Every: 1 week(s) on: Mon ,[...]

  • Page 59

    59 Copyr i ght © Acronis , In c., 2000-20 1 1 Every: <... > From: <...> Until: <...> Set up how m any t imes the task will be run during the spec i fied ti me interval. For exampl e, setting the task frequency to Ev er y 1 hour Fro m 10 : 00:00 A M until 10:00:00 PM allows th e task to be r un 12 times from 10 AM to 10 PM during [...]

  • Page 60

    60 Copyr i ght © Acronis , In c., 2000-20 1 1 To: 1 2/01/201 0 . Actually the task wi ll end on t he last workday of November. By sett i ng up t hi s date we just define that t he task must be discontinued in 201 0 , after au tumn ends in the northern hemi sphere. Several m o nthly schedules f or one task In the case when the task n ee ds to be ru[...]

  • Page 61

    61 Copyr i ght © Acronis , In c., 2000-20 1 1 For example, y ou may want to set up a backup p lan th at will automat i cally perfo rm an emergency full backup of your data as so on as Windows disco v ers that your hard disk drive is about to fail . Parameters Log name Specifies the nam e of t he log. Select the nam e of a standard log ( Applicatio[...]

  • Page 62

    62 Copyr i ght © Acronis , In c., 2000-20 1 1 Micr osoft-Windows-Windows UpdateCli ent and event number 18 into the System log; the type o f this event i s Information . When creat i ng the pl an, type or select the following in t he Schedule area:  Log name : System  Event sourc e : Micros oft-Wind ows-Windows UpdateCli ent  Event type :[...]

  • Page 63

    63 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 4 . 6 C o n d i t i o n s Conditions add m ore flexibil i ty to the scheduler, enabling to execute backup t asks wi th respect t o certain conditions. Onc e a spec i fied event oc curs (see the " Scheduling (p. 53 )" sec tion for the list of available events), the scheduler c hecks the sp[...]

  • Page 64

    64 Copyr i ght © Acronis , In c., 2000-20 1 1  Task st art conditions: Wait until th e conditions are met , Run the task anyway after 2 hour(s). As a result, (1) If t he user b ecomes idle before 9PM, the backup task will start at 9PM. (2) If t he user b ecomes idle between 9PM and 11PM, the backup task will start immediately aft er the user be[...]

  • Page 65

    65 Copyr i ght © Acronis , In c., 2000-20 1 1  Condition: Fi ts the time interval , from 0 4:30:00 PM un til 10:00:00 PM .  Task st art conditions: Skip the ta sk exe cution . As a result, (1) if t he user logs o ff between 04:30:00 PM a nd 10:00:00 PM, t he ba ckup task will start i mmediately following th e l oggi ng off. (2) if t he user [...]

  • Page 66

    66 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4.6 .5 Ti me sin ce la st ba c kup Applies to: Windows, L i nux Enables t o put a backup task run on hold unt i l the specified time i nterval since t he last succ essful backup completion passes. Example: Run t he backup task at system st artup, but only if more t han 12 hours have passed since the[...]

  • Page 67

    67 Copyr i ght © Acronis , In c., 2000-20 1 1 Usage sc enarios  Reliable d isaster recovery (p. 71 ) Store y our bac kups both on-site (fo r imm ediate reco very) and off-site (t o secure the backups from local st orage fail ure or a natural disaster).  Keeping only the latest r ecovery points (p. 71 ) Delete older bac kups from a fast s tor[...]

  • Page 68

    68 Copyr i ght © Acronis , In c., 2000-20 1 1 Backups that were copied or moved to the next locat i on do not depend on the backup s remaining in the o ri ginal locat i on and vi ce versa. Yo u can reco v er data from an y bac kup without access t o ot her locations. Restrictions  Copying or mov i ng backups t o and fr om opt i cal discs (CD, D[...]

  • Page 69

    69 Copyr i ght © Acronis , In c., 2000-20 1 1 Tower of Hanoi scheme Each ba ckup is retained based on its level (p. 41 ), and t hen deleted. Y ou spec i fy the number of l evels in Number of levels . The ret ention rules are applied after creating a bac kup. They are applied sequentially in the prim ary, the sec ond and all next locat i ons. Custo[...]

  • Page 70

    70 Copyr i ght © Acronis , In c., 2000-20 1 1 You wi ll be ab l e to specify the locat ion where to move the b ackups and set up retent i on rules for that l ocat i on after you click OK . Deleting the last bac kup in the archive The ret ention rules are effect i ve if the arc hiv e co ntains more than one backup. This means t hat the last bac kup[...]

  • Page 71

    71 Copyr i ght © Acronis , In c., 2000-20 1 1 moment. The operations that had started befo re the inact i vity time began co ntinue without interruption. The inac tiv ity time affects al l locations, including the primary one. The preset is: Disabled. To specify the i nactivity time, select the Do not start replic a tion/cleanup wi th in the f oll[...]

  • Page 72

    72 Copyr i ght © Acronis , In c., 2000-20 1 1 Click OK . In Apply retenti o n rules , sel ect t he After backup chec k box. Result:  Backups that are younger than one month are kept, re gardless of their tot al size.  Backups that are older than one m onth are kept only if t he total size of all backup s (older plus younger) does n ot exceed[...]

  • Page 73

    73 Copyr i ght © Acronis , In c., 2000-20 1 1 [Virtual Mac hine Name] [Virtualization Server T y pe] Folder on V Mware v Center If the management serv er is i ntegrated wi th vCenter S erver, th e resultant virtual machines will appear in the Acronis Ba ckups folder o n th e vC enter. Yo u can spe cify a subfolder for the machines resultin g from [...]

  • Page 74

    74 Copyr i ght © Acronis , In c., 2000-20 1 1 What is the machine's processing power? Conversion will take th e selected m achine's CP U resou rce. Multiple conversion tasks will be queued on t hat machine and it may take considerable time to complete them all. Consider this when creating a cent ral ized backup plan with conversion for m[...]

  • Page 75

    75 Copyright © Acr o nis, In c., 200 0 -2011  Otherwise, the existing virtual machine is upd ated t o r eflect c hanges since the last conversion. If updating is no t possible (for example, if you deleted the intermediate snapshots, see below), t he virtual machine is re-creat ed from scrat ch. Intermedi a te snapshots To be able to upd ate the[...]

  • Page 76

    76 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Reset arch ive bit - + - + Restart the machin e automatical ly after backup is finished - - + + Archive p rotection (p. 78 ) (password + encr ypti on ) + + + [...]

  • Page 77

    77 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Media co m ponents (p. 86 ) Dest: removabl e media Dest: removabl e media - - Mount points (p. 87 ) - + - - Multi-volume snaps hot (p. 88 ) + + - - Notificati[...]

  • Page 78

    78 Copyr i ght © Acronis , In c., 2000-20 1 1 Reset archive bit The o ption is effective only for fil e-l evel bac kup in Windows operating syst em s and in bootable media. The preset is: Disabled . In Windows operat i ng systems, eac h file has the File i s ready for archiving attribute, avail ab l e by selecting File - > Properties - > G e[...]

  • Page 79

    79 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the E nter the password field, type a password. 3. In the C o nfirm the p assword field, re-type the password. 4. Select on e of the following:  Do not encrypt – th e archive wi l l be prot ected with t h e password only  AES 12 8 – the archive will be encrypted using the A dvanced Encr[...]

  • Page 80

    80 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup performance options mi ght have a m ore or l es s not i ceable effect on the speed of the ba ckup process. T hi s depends on the o verall system configuration and the physical c haracteristics of devices the bac kup is being performed from or to. 4. 7.4 .1 B ack up p ri ori ty This opt i on is e[...]

  • Page 81

    81 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption defines the amou n t of network c on nection bandwidth al located for transferring the backup data. By default t he speed is set to m aximum, i.e. the software uses all the network bandwidth it can get when tran sferri ng the b ackup data. Use t hi s option to reserve a part of the network [...]

  • Page 82

    82 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 6 C o m p r e s s i o n l e v e l This opt i on is effec tive for Windows and Linux operat i ng systems an d boo table media. The o ption defines the level of c ompression applied to t he data being backed up. The preset is: Normal. The o ptimal data compression level depends on the t y pe of d[...]

  • Page 83

    83 Copyr i ght © Acronis , In c., 2000-20 1 1 To set up s end in g D RPs : 1. Select t he Send disaster recovery plan check b ox. 2. Enter the e-mail address in the E -mail Address fi eld. You c an en ter several e-mail addresses in a semicolon-delimited format. 3. [Optional] C hange the d efaul t value of the Sub ject field, i f necessary. If you[...]

  • Page 84

    84 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 9 E v e n t t r a c i n g It is possible to duplicate log events o f the backup operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to t he specified SNMP m anagers. 4. 7.9 .1 S NMP not ifi cat ion s This opt i on is effec tive for b oth Win[...]

  • Page 85

    85 Copyr i ght © Acronis , In c., 2000-20 1 1 To sel ect w het he r t o lo g the ba ck up op er ati on s e ven ts in th e App l i c a tio n E v e n t L og o f W ind ow s: Choose one of the followi ng:  Use the setting set i n the Machine o ptions – to use th e setting spec i fied for t he machine. For more information refer to Machine options[...]

  • Page 86

    86 Copyr i ght © Acronis , In c., 2000-20 1 1 Always bac k up files directly. Administrator or Backup Operat or privi leges are n ot required. Trying to back up files that are opened for exclusive access will resu l t in a read error. Files in the backup may be not time-consistent. 4 . 7 . 1 2 F i l e - l e v e l s e c u r i t y These o ptions are[...]

  • Page 87

    87 Copyr i ght © Acronis , In c., 2000-20 1 1  Acronis Boota b le Agent is a boo table rescue utility (based on Linux kernel) that includes most of the fu nctionality o f the Acron i s Backup & Recovery 11 agent. Put t hi s co m ponent on the media if you want more functionality during recovery. Y ou will be able to configure the recovery o[...]

  • Page 88

    88 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 5 M u l t i - v o l u m e s n a p s h o t This opt i on is effec tive only for Wi ndows operat i ng systems. This opt i on app lies to disk-level bac kup. This o ption also appli es to fi le -level backup when the file-level bac kup is performed by t aki ng a snapsho t. (T he Fil e-leve l bac[...]

  • Page 89

    89 Copyr i ght © Acronis , In c., 2000-20 1 1 8. In the Us er name field, enter the user name. 9. In the P assword field, enter the password. 10. Click Additional e-mail pa rameter s... to co nfi gure the additional e-mail parameters as follo ws: a. From - type the e-mail address of th e user from whom the message will be sent. If you leave this f[...]

  • Page 90

    90 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 7 P r e / P o s t c o m m a n d s This opt i on is effec tive for Windows and Linux operat i ng systems an d PE-based boot able medi a. The o ption enables you to define t he commands t o be automatically executed before and aft er the backup procedure. The fo l lowing scheme illustrates when[...]

  • Page 91

    91 Copyr i ght © Acronis , In c., 2000-20 1 1 only after the command is successful ly executed. Fa il the task if the com m and execution f ai ls . command is executed desp ite execution f ai lure or success . the com mand execution and irrespect i ve of the command execution result. * A co m mand is co nsi dered failed if its exit c ode is not eq[...]

  • Page 92

    92 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy p re /p ost d ata c apt ure c omm an ds 1. Enable pre/post data capture commands execution by checking th e foll owing options:  Execute b efore the data ca ptu re  Execute a fter the data capt u re 2. Do any of the fo l lowing:  Click Edi t to spe cify a new c ommand or a batch f[...]

  • Page 93

    93 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Depending on the result you want to obtain, select the approp riate opt i ons as described in the table below. 5. Click Test command to check if the command is co rrec t. C hec k b ox Se l ect io n Fail the ta s k if t h e comm and executio n fail s* Selected Cleared Selected Cleared Do not ba c k u[...]

  • Page 94

    94 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a n exact copy of a disk or volume on a physical level, sel ect the Back up sector- by -sec to r check box. The resulting bac kup will be equal in size t o the disk being bac ked up (if the Compress ion level (p. 82 ) o ption is set to None ). Use the sect or- by -s ector bac kup for backing [...]

  • Page 95

    95 Copyr i ght © Acronis , In c., 2000-20 1 1 To handle the si tuation when t he conditions are no t met for t oo long and further delaying the bac kup is becoming risk y, you can set the time interval after which t he task wi ll run irrespective of the condition. Select t he Ru n the task anyway a f ter check box and spec i fy the time interval. [...]

  • Page 96

    96 Copyr i ght © Acronis , In c., 2000-20 1 1  Hardware/softw a re - Sel ect automatically (selected by d efault) VSS will use the hardware-based provider that supports the sou rce volume. If none is found, VSS will use th e Microsoft S oftware Shadow C opy provider.  Software - Select automatically In most cases, VSS will use the Microsoft [...]

  • Page 97

    97 Copyr i ght © Acronis , In c., 2000-20 1 1 5 Re cov er y When it c omes to data rec overy, first consider the mos t functional method : connect the console t o the managed m a chine running t he operating system and c reate the recovery task. If the mach i ne's operating sys tem fails to start or you need to recover data to bare m etal , b[...]

  • Page 98

    98 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for t he archive location i f the task accou n t does not have the right to access it. To access this o p tion, click Show access cred entials . Where to recover This sect i on app ears after the requi red bac kup is selec ted and the type o f data to rec over is defi[...]

  • Page 99

    99 Copyr i ght © Acronis , In c., 2000-20 1 1 Universal Restore for Windows/Linux (p. 112 ) Use Acronis Un i versal Resto re when you need to recover and boo t up an operat i ng systems on dissimilar hardware. After you complete all the required st eps, click OK to c reate t he co m mit creat i ng of the reco v ery task. 5 . 1 . 1 W h a t t o r e [...]

  • Page 100

    100 Copyr i ght © Acronis , In c., 2000-20 1 1 There are probably other t i mes when you m ay need t o recover t he MBR , b ut the above are t he most common. When reco v ering the MBR of one disk t o another Acronis Backup & Recovery 11 recovers Track 0, which do es not affect the t arget disk’s partition table and part i tion layout. Ac ro[...]

  • Page 101

    101 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 1.1 .2 Da ta cat a lo g Data catalog lets you easily find t he required version of dat a and select it for rec overy. On a m anaged machine, the dat a catalog fu nc tionality is available thr ough th e Da ta view t ab f or any vault ac cessible from th i s machine. On the management server, t he ca[...]

  • Page 102

    102 Copyr i ght © Acronis , In c., 2000-20 1 1 Solutions:  Run t he catalogi ng manually by cli cking Catalog no w . Fo r the Data catalog , all backups stored in the managed vaults will be c ataloged. For the Data view , only the backups stored o n the selected vault will be cataloged. T he bac kups that have already been cataloged, will not b[...]

  • Page 103

    103 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 1 . 3 A c c e s s c r e d e n t i a l s f o r d e s t i n a t i o n To sp eci fy cr ede nt ia ls 1. Select on e of the following:  Use the task c redentials The pro g ram will access t he destination using t he credentials of t he task account spec i fied in the Task p arameters section.  Us[...]

  • Page 104

    104 Copyr i ght © Acronis , In c., 2000-20 1 1 On select i ng this, you specify the v irtualization server and the target v irtual machine. Then you proceed to the reg ular disk mapping proc edure described below. Please b e aware t ha t t he target machine will be powere d off autom a tic a lly be f ore the recov ery. If y ou prefer to power it o[...]

  • Page 105

    105 Copyr i ght © Acronis , In c., 2000-20 1 1 Note : Y o u should be abs olutely sure t ha t no n e of th e ex i sting disks on this ma ch ine has the sam e NT signature. Ot herwise, the operating system r un s from the f i r st d isk at the st artup; disco v ers t h e same signature o n the sec ond one, automatic ally generates a new u n ique NT[...]

  • Page 106

    106 Copyr i ght © Acronis , In c., 2000-20 1 1 Recover t o: Physical machine Available when the Acronis Backup & Recovery 11 Agent fo r Windows or A gen t for Li nu x is installed. The select ed volumes wi ll be recovered to t he physical disks of t he machine the console is connec ted to. On selecting this, you proceed to the reg ular volume [...]

  • Page 107

    107 Copyr i ght © Acronis , In c., 2000-20 1 1 Size : (p. 107 ) [Opt i onal] Change the recovered volume size, locat i on and other properties. MB R d est ina ti on To sp eci fy a d es tina ti on d i sk: 1. Select t he disk to recover th e MBR to. 2. Click OK . Vo lu me d est ina ti on To sp eci fy a t a r g et vo lu me or un al lo cat ed sp ac e [...]

  • Page 108

    108 Copyr i ght © Acronis , In c., 2000-20 1 1 installed operating syste m could p rev ent t he machine from booting. You cannot set a logical drive or dynamic v olume active .  Logical . Information about logical volumes i s located no t in t he MBR, bu t in th e extended partition table. The number of logical volumes on a di sk is unlimited. [...]

  • Page 109

    109 Copyr i ght © Acronis , In c., 2000-20 1 1  VMWare VM FS (64 KB) - select this o ption when recovering the volume as a VMware Virtual Machine File Syst em partition.  Vista a lignment ( 1 MB) - select this option if the recovered volume wi l l be used u nder Windows operat i ng systems start i ng from Windows Vist a, or when recovering v[...]

  • Page 110

    110 Copyr i ght © Acronis , In c., 2000-20 1 1 Specify files and fo l ders you do not wish t o be recovered. R ec ove ry e xclu si ons Set up exclusions for the specific fi les you do not wish to recover. Use the Add , Edit , Remove and Remove All buttons to creat e the list of fi le masks. Files whose names match any of the masks will be sk i ppe[...]

  • Page 111

    111 Copyr i ght © Acronis , In c., 2000-20 1 1  Later - the recovery task will be start ed manually afterwards. If yo u need to schedule the task, clear th e Task wi ll be star ted manually check b ox, and specify the required date and time. 5 . 1 . 6 T a s k c r e d e n t i a l s Provide credent ials for the account under whi ch the task will [...]

  • Page 112

    112 Copyr i ght © Acronis , In c., 2000-20 1 1  Install Universa l Restore fro m the product installation pac kag e (in addition to A gent for Windows, Agent for Linux or Bo ota ble Media Builder).  If the agent is already installed, you can connect t he management console t o the mac hine, click Help > C ha nge lice nse and spec i fy the[...]

  • Page 113

    113 Copyr i ght © Acronis , In c., 2000-20 1 1 The best practice is to store driv ers for all t he hardwar e used in y our organizat i on in a si ngle repository sort ed by device type or by the hardware configurations. You c an keep a copy of the repository o n a DVD or a flash drive; pic k some drivers and add t hem to the bootable media; c reat[...]

  • Page 114

    114 Copyr i ght © Acronis , In c., 2000-20 1 1 Specify th e appropriate drivers by c l icking Add driver . The dri vers defined here wi l l be instal l ed, with appropriate warni ngs, even if t he program finds a b etter driver. The recovery process If Universal Restore cannot find a compatible driver in the specified locat i ons, i t will display[...]

  • Page 115

    115 Copyr i ght © Acronis , In c., 2000-20 1 1  Source and t a rget dis k partition style : MBR o r GPT. System and boot volumes of BIO S platforms use MBR di sks. System and boot volumes of UEFI pl atforms u se GPT d i sks. When selecting no t initialized target disk for rec overy, this disk will be automat i cally initialized either to GPT or[...]

  • Page 116

    116 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT UEFI OS: non- convertible - Solution Recover the oper ati ng system to a GPT disk. 2. Perform th e recovery under the bootable media. or After recove ry, turn on the UEFI m ode in BIOS. Otherwise, the [...]

  • Page 117

    117 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB BIOS OS: convertible + The source d isk will be recovered without any modificat ion. + The target di sk wi ll[...]

  • Page 118

    118 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB UEFI OS: convertible + The target di sk wi ll be initialized as MBR . The recove red disk OS will be automati[...]

  • Page 119

    119 Copyr i ght © Acronis , In c., 2000-20 1 1 Customers familiar w ith Acronis Reco v ery for M i crosoft E xchange can no te that t hi s product uses Active Restore to achieve immediate availabil ity of an Exchange information store after star ting the recovery. Whi le based on the same tech nolog y, rec ove ry of the Information Store p roceeds[...]

  • Page 120

    120 Copyr i ght © Acronis , In c., 2000-20 1 1 If your op erating syste m and i ts loader resi de o n differe n t volumes, always inc l ude both vo l umes in the backup. The volumes must also be rec overed toget h er; other wise there i s a hi g h risk that the operating system wi ll not start. 2. Create boot abl e media. 3. If a system failure oc[...]

  • Page 121

    121 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. Micros o ft V i rtual PC does not s u pport disks t h at are larg er than 127 GB . Acro n is enab l es yo u to cr ea te a Virtual PC machi n e wit h l a rger disks s o th at you can attac h the disks to a M i crosoft Hyper -V virtu a l m a chine. To con ve rt a d is k b a ckup to a v irt ua l ma [...]

  • Page 122

    122 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 5 . 1 V i r t u a l m a c h i n e t y p e / v i r t u a l i z a t i o n s e r v e r s e l e c t i o n The new vi rtual machine c an be creat ed either on a virtualization server (t hi s requires Acron i s Backup & Rec overy 11 Agent for Hy per-V or Agent fo r ESX(i) to be installed) or i n any[...]

  • Page 123

    123 Copyr i ght © Acronis , In c., 2000-20 1 1 When adding a n ew virtual disk, al ong with interfac e and capacity, you c an specify its fo rmat.  Thin format. The disk occ upies as much st orage space as the dat a it stores. T hi s saves th e s torage space. To enable thin format , select t he Thin provisioning (for ESX), or Dynamically expa [...]

  • Page 124

    124 Copyr i ght © Acronis , In c., 2000-20 1 1 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompt s whether you want to rec over the MBR along with t he system volume. Opt for no t re covering, on l y if you do not want the system to b e bo otable. Solution : Recover t he volume once again alon g[...]

  • Page 125

    125 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Mount the system you are recovering: mkdir /mnt/system/ mount - t ext3 / dev/sda2 /mnt/system/ # root partition mount - t ext3 / dev/sda1 /m nt/system/ boot/ # bo ot partiti on 3. Mount the proc and dev file systems to the system yo u are rec overi ng: mount - t proc n one /mnt/system/proc/ mount -[...]

  • Page 126

    126 Copyr i ght © Acronis , In c., 2000-20 1 1 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure th e bootloader by usi ng too l s and documentation fro m the Linux d i stribution t hat you use. Fo r exampl e, in D ebi an and U buntu, you may need to edit some c ommented lines in t[...]

  • Page 127

    127 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) Additiona l settings (p. 128 ): Validate ba c kup archiv e before r ecovery + + + +[...]

  • Page 128

    128 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 1 A d d i t i o n a l s e t t i n g s Specify th e additional settings for the recovery operat i on by selecting or clearing the fo l lowing check boxes. Validate backup archiv e before recovery The preset is Disabled . This opt i on defines whet her to vali date a backup to ensure that the ba[...]

  • Page 129

    129 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 2 E r r o r h a n d l i n g These o ptions are effective for Windows and Linux o perating systems and boo table media. These o ptions enab l e you t o specify how t o handle errors that mi ght oc cur during reco v ery. Do not show messages and dialogs while proces sing (silent mode) The preset[...]

  • Page 130

    130 Copyr i ght © Acronis , In c., 2000-20 1 1  Types of even ts to s end – choose the types of events to be sent: All events , Err ors and warnings , o r Errors only .  Server name/IP – t ype the name o r IP address of the host ru n ning the SNMP management application, the messages will be sent to.  Comm unity – type t he name of [...]

  • Page 131

    131 Copyr i ght © Acronis , In c., 2000-20 1 1 Enable t he Moun t points option to recover fi les and folders that were stored on the mou n ted volumes and were bac ked up with t he enabled Moun t points option. For det ai ls of bac ki ng up mounted v olumes or c l uster shared volumes, see Mount points (p. 87 ). The preset is: Disabled . This opt[...]

  • Page 132

    132 Copyr i ght © Acronis , In c., 2000-20 1 1 c. Some Internet service pro v iders require authent ication on the incoming mail server befo re being allowed t o send something. If this is yo ur case, sel ect t he Log on to incoming m ail server check bo x to enable a PO P server and to set up its settings:  Incoming m ail server (P O P) – en[...]

  • Page 133

    133 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram does n ot support interac tive commands, i.e. commands that require user i nput (for example, "pau se".) A post-rec overy command will not be executed if the r ecovery proceeds wi th rebo ot. To sp eci fy p re /p ost c omm and s 1. Enable pre/post commands execut i on by chec k[...]

  • Page 134

    134 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the Worki n g directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Ar guments field, spec i fy the c ommand execution arguments, i f required. 4. Select t he Fail the task if the c ommand execution fails check box if succ essful exe cution of th[...]

  • Page 135

    135 Copyr i ght © Acronis , In c., 2000-20 1 1 6 S tor ing th e b ack ed u p da ta 6. 1 Va ul ts A vault is a loc ation for st oring backup arc hi ves. For ease o f use and administration, a vault is associated wi th t he archives' metadata. Referring t o this metadata makes for fast and convenient operations wi th arch ives and bac kups s to[...]

  • Page 136

    136 Copyr i ght © Acronis , In c., 2000-20 1 1 6 . 1 . 1 W o r k i n g w i t h v a u l t s This sect i on briefly describes t he main GUI element s of the select ed vault, and suggests ways t o work with them. Examining information on a vault Information abo ut the select ed vault is located at the t o p pane of the selected vault. Usi ng the stac[...]

  • Page 137

    137 Copyr i ght © Acronis , In c., 2000-20 1 1 Sharing a personal vault Multiple machines c an refer to the same physical location; fo r exampl e, t o the same shared folder. However, each of the mach ines has its own sho rt cut in the Vaults tree. Users that ba ck up to a shared folder can see and manage each other's archives according t o t[...]

  • Page 138

    138 Copyr i ght © Acronis , In c., 2000-20 1 1 Delete a vault Click Dele t e . The deletin g operat ion actua lly remov es only a short cut to the fo l der fro m the Vaults view. The folder itself remains untou c hed . You have the opt ion to keep o r delete a r chives c ontain ed in the folder . Refresh vau l t table informat i on Click Refresh .[...]

  • Page 139

    139 Copyr i ght © Acronis , In c., 2000-20 1 1 4. In the vaults tree, select v ault B to check whet her the archives are displayed. If not, click Ref resh . 5. Delete vault A . 6. 2 A cro ni s Se cure Zone Acronis Secu re Zone is a secure p artition that enables keeping backup arc hi ves on a manag ed machine disk space and therefore rec overy of [...]

  • Page 140

    1 40 Cop yright © Acronis, In c., 200 0 -2011 6. 2.1 .1 Ac ron is Se cu re Zo ne Dis k The Acro ni s Secure Z one c an be located on any fixed h ard drive. Acronis Sec ure Zone is always created at the end of the hard disk. A machine can have only one Acro ni s Secure Z one. Acronis Secure Zone i s creat ed using unallocated spac e, if available, [...]

  • Page 141

    141 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 2.1 .4 R es ult co nfi rma tio n The Res u lt confirmati on wi ndow displa ys the expect ed partition layout ac cording t o the sett i ngs you have cho sen. Click OK , if you are satisfied with the layout and the Acronis Secure Zone crea tion will start. How the set t ings you make will be processe[...]

  • Page 142

    142 Copyr i ght © Acronis , In c., 2000-20 1 1  If there is n ot enough un allocated space, the program will take free spa ce from the sel ected volumes, propo rtionall y reducing t he volumes' size. Re si zing of loc ke d part i tions requires a reboot. Reducing a system volum e to t he mi n imum s iz e mi ght prevent t h e mach i ne&apos[...]

  • Page 143

    143 Copyr i ght © Acronis , In c., 2000-20 1 1 7 Op er ati ons wi th a rchiv es and b ack ups 7. 1 Va l ida ti ng ar chi ve s a nd ba ck ups Validation is an o peration that checks t he possibili ty of data rec overy from a backup. Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validatio[...]

  • Page 144

    144 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. When to validate Start validation (p. 145 ) Specify when and ho w often to perform validation. Task para meters Task name [Opt i onal] Ent er a unique name fo r the val idat[...]

  • Page 145

    145 Copyr i ght © Acronis , In c., 2000-20 1 1  To select a cent ral ized vault, ex pand t he Centrali zed group and click th e appropriat e vault.  To select a personal vault, expand the Personal group and cli ck t he appropriate vault.  To select a l ocal folder (C D/DVD d rive, or loc al ly attached t ape device), expand the Local fold[...]

  • Page 146

    146 Copyr i ght © Acronis , In c., 2000-20 1 1 Ch oo se on e o f th e f o llo win g :  Now - to start t he val idation t ask rig ht aft er its creation, t ha t is, aft er clicking OK on the Validation page .  Later - to start t he one-time validation task, at the date and time you specify. Specify th e appropriate parameters as follows:  [...]

  • Page 147

    147 Copyr i ght © Acronis , In c., 2000-20 1 1  Your choice o f backups belonging t o the same arch i ve - the resul ting archive will c ontain only the specified backup s. Consolidat i on is performed as required, so the resulting archive may co ntain full, incremental an d differential bac kups. Usage sc ena rios Export enables you to separat[...]

  • Page 148

    148 Copyr i ght © Acronis , In c., 2000-20 1 1 When th e console is connect ed to a management server , two export methods are available:  Export from a manag ed vault . The export is performed b y the st orage node t hat manages the vault. The d esti nation can be a network sha re or a loca l folder of the storage no de.  Export from an unm[...]

  • Page 149

    149 Copyr i ght © Acronis , In c., 2000-20 1 1 Select t he Archive (p. 149) or the Backups (p. 149 ) . Show access credentials (p. 149 ) [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. Where to export Browse (p. 150 ) Specify th e path to the locat i on where t he new[...]

  • Page 150

    150 Copyr i ght © Acronis , In c., 2000-20 1 1  Use the following cr edentials The pro g ram will access t he location using t he credential s you spec ify. Use t hi s opt i on if t he task ac count does not have acc ess permissi ons to t he l ocation. Yo u might need t o provide special credent i als for a network share or a s torage node vaul[...]

  • Page 151

    151 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Using the archives table To assist you wi th choosing th e rig ht dest i nation, the t able on t he right displays t he names of the archives co ntained in each loc ation you select in t he tree . While you are rev iew ing t he location c on tent, arc hi ves can b e added , deleted or modified by a[...]

  • Page 152

    152 Copyr i ght © Acronis , In c., 2000-20 1 1 mount operation. The moun t operation is available when t he console is connec ted to a managed machine running either Wi ndows or Linux. Mount i ng volumes in the read/ write mode enab l es yo u to modify t he ba ckup cont ent , that is, save, move, c reate, delete files or fo l ders, and run execut [...]

  • Page 153

    153 Copyr i ght © Acronis , In c., 2000-20 1 1  If the arc hive is stored in a l ocal folder o n the mach ine, expand the Local folders group and click th e required folder. If the arch iv e is located on remo vable m e dia, e .g. DVDs, fi rst insert the last DVD and the n i n sert the d iscs i n order star ting from t he first one when the pro[...]

  • Page 154

    154 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 3 A c c e s s c r e d e n t i a l s To sp eci fy cr ede nt ia ls 1. Select on e of the following:  Use the curre nt user credentials The pro g ram will access t he location using t he credential s of t he current user.  Use the following cr edentials The pro g ram will access t he locati[...]

  • Page 155

    155 Copyr i ght © Acronis , In c., 2000-20 1 1 To explore a mount ed volume select it in t he table and click Explore . T he default file manager window opens, all owing the user to examine the moun ted volume cont ents. Unmounting images Maintaining the m ounted vol umes takes c onsiderable system reso urces. It is recommended t hat you unmount t[...]

  • Page 156

    156 Copyr i ght © Acronis , In c., 2000-20 1 1 The progra m duplicates you r select ion in the Backups deleti on ( p. 157 ) w i ndow that has check boxes fo r each arc hive and ea c h backup . Review the se lec t i on and make co r rections i f ne ed be ( select th e check boxes f o r the des i red archi ves), then confirm the delet ion. Delete a [...]

  • Page 157

    157 Copyr i ght © Acronis , In c., 2000-20 1 1 Delete a single or multiple ba ckups Select one of the backups you want to delete, then cl ick Del et e . The progra m duplicates you r select ion in the Backups deleti on ( p. 157 ) w i ndow that has check box es for each archiv e and ea ch backup. Rev iew the sel ection and co rrect if need be (sele[...]

  • Page 158

    158 Copyr i ght © Acronis , In c., 2000-20 1 1 full backup whi ch will be dat ed the i ncremental bac kup date. When y ou delete an incremental or differential backup from the middle of t he chain, the resulting backup type will be increm ental. Please be aware th at c onsolidation is just a method of del etion but not an alternat i ve to d el eti[...]

  • Page 159

    159 Copyr i ght © Acronis , In c., 2000-20 1 1 8 Bo ot ab le med ia Bootable media Bootab l e media is physical media (CD, DVD, USB d rive or ot her media supported by a mac hi ne BIOS as a bo ot device) th at boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 11 Agent either in a L i nux-based environment or W[...]

  • Page 160

    160 Copyr i ght © Acronis , In c., 2000-20 1 1 PE -based bootable media does n ot support UEFI. 8. 1 Ho w to c rea te bo ota bl e med ia To enable creat ing physical media, t he machine must have a CD/DVD recording drive or allow a flash drive to b e attached. To enable PXE or WDS/RIS configuration, the machine must h av e a net work connec tion. [...]

  • Page 161

    161 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// www.microsoft . com/downloads/detai l s.aspx?fa m ilyid=696DD 665 -9F76 - 4177 -A 811-39C26 D3B3B3 4&displayl ang=en You can find system requirements for installation b y follow ing the abo v e links. 2. [optional] Bu rn the WAIK to DV D or copy t o a flash drive. 3. Install the Mic rosof[...]

  • Page 162

    162 Copyr i ght © Acronis , In c., 2000-20 1 1  build an ISO i mage of a b ootab le disc to burn it later on a blank d isc  upload t he selected co mponents to Acronis PXE Server  upload t he selected co mponents to a WDS/RIS. 8. [optional] Windo ws system driv ers to be used by Acronis Universal Restore (p. 164 ). T his window appears on[...]

  • Page 163

    163 Copyr i ght © Acronis , In c., 2000-20 1 1 nousb2 Disables USB 2.0 sup port. USB 1.1 devices st i ll work wit h this parameter. This p arame ter allows you t o use some USB drives in th e U SB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard d isk drives. Prevents t he kernel from fre[...]

  • Page 164

    164 Copyr i ght © Acronis , In c., 2000-20 1 1 Pre-configuring multiple netwo rk connection s You can pre-con fi gure TCP/IP settings for up to ten network interface c ards. To ensure that ea ch NIC will be assigned th e appropriate sett i ngs, c reate the media on the serv er for whic h the media is custo m ized. When you sel ect an existing NIC [...]

  • Page 165

    165 Copyr i ght © Acronis , In c., 2000-20 1 1  to get the mass-storage drivers t hat you explicitly specify fro m the m edia. This is necessary when the t arget hardware has a spe cific mass storage cont ro ll er (such as a SCSI, RAID, o r Fiber Channel adapter) for t he hard disk. For more i nformation p l ease refer to Univ ersal Restore. Th[...]

  • Page 166

    166 Copyr i ght © Acronis , In c., 2000-20 1 1 8 . 1 . 3 A d d i n g t h e A c r o n i s P l u g - i n t o W i n P E 2. x o r 3 . 0 Bootab l e Media Builder provides t hree methods of integrating Acron i s Backup & Recovery 11 with WinPE 2.x or 3.0:  Adding the Acro ni s Plug-in to the exi sting PE ISO. T his c omes in handy when you have t[...]

  • Page 167

    167 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e a mac hine boots into WinPE, Acronis Backup & Recovery 11 starts automatic al ly. To crea t e a PE i mag e (ISO fil e) fr om th e resu lt ing W IM f ile :  replace th e default boot .wim file in your Windo ws PE fo l der with t he newly created WIM fi le. For the ab ove example, t ype: co[...]

  • Page 168

    168 Copyr i ght © Acronis , In c., 2000-20 1 1 Remote connection To connect to the m achine remot el y, select Connect -> M a nage a remote machine in the console menu and specify one of the mac hine's IP addresses. P rovi de the user name and password if these have been configured when creat i ng the boo table media. Local c o nnection Ac[...]

  • Page 169

    169 Copyr i ght © Acronis , In c., 2000-20 1 1 3. From th e l ist of suppor ted video mod es, c ho ose the ap propriate one b y typing its number (for example, 318 ), an d then press ENT ER. If you do not wish t o follow this procedure every time you bo ot from media on a given hardware configuration, re-create th e bootable media with t he a ppro[...]

  • Page 170

    170 Copyr i ght © Acronis , In c., 2000-20 1 1  acronis  asamba  lash Linux commands and utilities busybox ifco nfig rm cat init rmmod cdre cord insmod route chmod iscs iadm scp chown kill scsi_id chroot kpartx sed cp ln sg_m ap26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod[...]

  • Page 171

    171 Copyr i ght © Acronis , In c., 2000-20 1 1 8. 5 A cro ni s Sta rtu p Re cov ery Man age r Acronis St artup Recovery Manager is a modificat i on of the boot abl e agent (p. 229), residi ng on the system disk in Windows, or on t he /boot partition in Linux and co nfi gured to start at boot time on pressing F11. It el iminates t he need fo r a se[...]

  • Page 172

    172 Copyr i ght © Acronis , In c., 2000-20 1 1 9 D isk m ana gem ent Acronis Disk D irector Lite is a tool for prepa ri ng a machine disk/volume co nfi guration for recovering the volume ima g es saved by t he Acronis Backup & Rec overy 11 so ftware. Sometimes after the volume has been backed up and i ts image placed int o a safe storage, the [...]

  • Page 173

    173 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Back up the disk on whi ch volumes will be c reated or managed. Having y our most important dat a backed up to ano ther hard d isk, networ k share or removable media will allo w you to work on disk volumes b ei ng reassured th at your dat a is safe. 2. Test your disk t o make sure it is fu l ly fun[...]

  • Page 174

    174 Copyr i ght © Acronis , In c., 2000-20 1 1 The t op part of the view cont ai ns a disks and volumes t abl e enabling data sorting and columns custo m ization and toolbar. The table presents th e numbers of t he disks, as well as assigned letter, label, type, capacity, free spac e size, used space size, fi le system, an d status for each v olum[...]

  • Page 175

    175 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis Disk D irector Lite wil l detect that the disk is u n usable by the syst em and n ee ds to be initialized. The Dis k management view will show t he newly detected hardware as a gray bloc k wi th a grayed icon, thus indicating t hat the di sk is unusable by the sy stem. I f you ne ed to in it i[...]

  • Page 176

    176 Copyr i ght © Acronis , In c., 2000-20 1 1 If there is so m e data on the d isk that was c hosen as the target, t he user will receiv e a warning: “ The selec ted target dis k i s not em p ty. The data on its vo lum es will be o verwritten. ”, meaning that all the dat a current l y located on the chosen target disk will be lost irrevocably[...]

  • Page 177

    177 Copyr i ght © Acronis , In c., 2000-20 1 1 I f you ne ed to co p y th e NT si gna tu re: 1. Select t he Copy NT signature chec k box. You rec ei ve the warning: “If th ere is a n operating system on the hard disk, uninstall either t he source o r the t arg et hard disk drive from your machine prior to starting t he machine again. Otherwise, [...]

  • Page 178

    178 Copyr i ght © Acronis , In c., 2000-20 1 1 1. MBR disk c onversi on: dynamic to basic (p. 179) using th e Conv ert to basi c operat ion. 2. Basic disk co nversi on: M BR to GPT using the Convert to G PT operation. 3. GPT disk c onversion: basic to dynamic (p. 178 ) using th e Conv ert to dynamic o peration. 9 . 6 . 4 D i s k c o n v e r s i o [...]

  • Page 179

    179 Copyr i ght © Acronis , In c., 2000-20 1 1 Sys tem disk conversion Acronis Disk D irector Lite does not require an operat i ng system rebo ot after basic to dynamic conversion o f the disk, if: 1. There is a si ngle Windows 2008 / Vista operat i ng syste m installed on the di sk. 2. The mac hi ne runs t his operating system. Basic to dynamic c[...]

  • Page 180

    180 Copyr i ght © Acronis , In c., 2000-20 1 1  safe co nversion of a dynami c disk t o basic when it co n t ains volumes with data for simp l e and mirrored volumes  in multiboot systems, boot ability of a syst em that was offline during t he operation 9 . 6 . 7 C h a n g i n g d i s k st a t u s Changing disk st atus is effec tive for Wind[...]

  • Page 181

    181 Copyr i ght © Acronis , In c., 2000-20 1 1  Store coll ections of simi lar files separately — for exam ple, an MP3 c ollection or vi deo files on a separate volume;  Store backups (images) of oth er volumes/disks on a spec i al volume;  Install a new op erating system (or swap file) on a new volume;  Add new hard ware to a mac hi[...]

  • Page 182

    182 Copyr i ght © Acronis , In c., 2000-20 1 1 data it self. If a physical disk fai l s, t he portion of the RA ID -5 volume t hat was on that failed disk can be re-creat ed from the rem aining data and the parity. A RAID-5 volume provides re liability and is able t o overcome t he physical disk size limit ations with a higher than mirrored disk- [...]

  • Page 183

    183 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a S triped volume:  Select t wo or more dest i nation disks to create the v olum e on. To create a RA ID-5 volume:  Select t hree destination disks t o create the volume o n. After you choose the disks, t he wizard will calculat e th e maximum size of the resulting volume, depending on[...]

  • Page 184

    184 Copyr i ght © Acronis , In c., 2000-20 1 1 In setting t he cluster size you can ch oose between any number in t he preset amount for each file system. Note, t he program suggests the cluster size best sui ted t o the volume with the chosen file system. If you are creating a basic volume, whi ch c an be made into a syst em volume, t hi s page w[...]

  • Page 185

    185 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 3 S e t a c t i v e v o l u m e If you have several pri mary volumes, you must specify one to be the boot vol ume. For t hi s, you can set a v olume to become active. A disk can have only one ac tive volume, so if you set a volume as active, the volume, which was ac tive before, wi ll be au to[...]

  • Page 186

    186 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 5 C h a n g e v o l u m e l a b e l The volume label i s an optional at tribute. It is a name a ssi gned to a volume for easier recognition. Fo r example, one volume c ould be called SYST EM — a volum e with an operating system, o r PROGRAM — an applicat i on volume, D A TA — a data v ol[...]

  • Page 187

    187 Copyr i ght © Acronis , In c., 2000-20 1 1 If you set a 64K cl uster size for FAT16/F AT32 or an 8KB-64KB cluster size f o r NTFS, W indows ca n mo u nt the volume, b ut s o me pro g rams (e.g. Setup pro grams) might ca lculate its disk s pa ce incorr ectly. 9. 8 P end i ng op er ati on s All operat i ons, whi ch were prepared by the user in m[...]

  • Page 188

    188 Copyr i ght © Acronis , In c., 2000-20 1 1 10 Ad mi nis ter ing a man ag e d mac hin e This sect i on desc ri bes the v iews that are avail able through the navigation tree o f the console connec ted to a managed machine and ex plains how to work with each vi ew. 10 .1 Ba ck up pla ns an d tas ks The Backup plans an d tasks view keeps you i nf[...]

  • Page 189

    189 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a plan/tas k Click Det a ils . In the respect ive Plan De t ails (p. 197 ) or Task De t ails (p. 19 8) wi ndo w, revie w the plan or task deta i ls. View plan' s/task's log Click Log . You will be taken to the Lo g (p. 199 ) view contain ing the list of the log entr i[...]

  • Page 190

    190 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/task Click Edi t . Backup plan editin g is perform ed in the same way as creation (p . 29 ) , except f or the follow i ng limita t ions : It is not always pos sible to use all sch eme options, when ed iting a backup pl an if the creat ed arch i ve is not empty (i.e. conta i ns backup[...]

  • Page 191

    191 Copyr i ght © Acronis , In c., 2000-20 1 1 1 Need intera ction At least one task ne eds user interactio n. Otherwise, see 2. Identify the tasks that need i ntera ction (the p r ogram wil l display what actio n is ne eded) -> Stop the tasks or enable the tasks to run ( change m edia; p rovide addit i onal spa ce on the vault; i gnore the rea[...]

  • Page 192

    192 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 2.3 Ta s k st ate s A task c an be in one of the fo llowing stat es: Idle ; Waiting ; Running ; Need i nteraction . The initial t ask state i s Idle . Onc e the task is st arted manually or t he event specified by t he s chedule oc curs , t he task enters either the Ru nning stat e or the Waiti[...]

  • Page 193

    193 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 1 . 3 E x p o r t a n d i m p o r t o f b a c k u p p l a n s The expo rt operation creates a fil e with c ompl ete c onf ig uration of the bac kup plan. You can import the file to reuse the export ed backup pl an on another machine. Centralized backup plans can be exported from a manag ement se[...]

  • Page 194

    194 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 3.1 Ed it ing th e exp ort f il e The expo rt file is an .xml file and c an be edited with a text editor. Here is how t o make some useful chan g es. How to m o dify credentials In the export fi le, the <login> tags include t he user name and the < pa sswo r d> tags include the user[...]

  • Page 195

    195 Copyr i ght © Acronis , In c., 2000-20 1 1 </lo gin> <pas sword e n crypted= "true"> XXXY YYZZZ888 </pa ssword> How to change item s to back up Replacing a directly spec ified item with another directly s pecified item Inside the <plan><target s><in clusi ons> section: 1. Delete the <ID> tag.[...]

  • Page 196

    196 Copyr i ght © Acronis , In c., 2000-20 1 1 <specific> <backup_type > disks </backup_typ e> <disk_level_ options /> <file_level_ options /> <inclusion_r ules> <rules_ty pe> disks </rules_t ype> <rules> <rule> [BOOT] </ rule> <rule> [SYSTEM] </ rule> </rules> <[...]

  • Page 197

    197 Copyr i ght © Acronis , In c., 2000-20 1 1 The default path to the dedicat ed f older is %ALLUSERSPROFI LE%AcronisBa ck u pAndReco v eryim p ort . The pat h is stored in the reg istry key HKEY_LOC AL_MACHINESOFTWAREAcronis MMS Configur a tionImport f olderPath . The ab sence o f the key means t hat the ag ent does not monitor th e ded[...]

  • Page 198

    198 Copyr i ght © Acronis , In c., 2000-20 1 1  Last finis h time - how much time has passed since the last plan o r task end.  Last r esult - the result o f the last plan or t ask run.  Type - backup plan or task type.  Owner - th e name of the user who creat ed or last mo di fied the p l an  Next s ta rt tim e - when the plan o r [...]

  • Page 199

    199 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .2 Lo g The loc al event log st ores the history of o perations performed by Acronis Bac kup & Recover y 11 on the mac hi ne. To view a plain list of log ent ri es, select Events in the D isplay drop-down l ist; to view log entries grouped by activities, select Activities . The details of the s[...]

  • Page 200

    200 Copyr i ght © Acronis , In c., 2000-20 1 1 Save all the filtered log entries to a file 1. Set filters to get a list of the log entri es that satisfy the filteri ng criter ia. 2. Click Save all to file . 3. In the opened window, spec if y a path and a na m e for the f ile. All log ent ri es in the list w i ll be saved to the specified fil e. De[...]

  • Page 201

    201 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixing issues that caused alerts To find and fi x the issue that caused th e alert , click Fix th e is sue . You wi ll be t aken to the correspo nding view,where you c an examine the issue and take the ne cessary st eps to resolve it. Optionally, y ou c an click View d etails to get more infor mation [...]

  • Page 202

    202 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 5 . 1 C u s t o m e r E x p e r i e n c e P r o g r a m This opt i on defines whet her the machine will participat e in the Acro nis Customer E xperi ence Program (ACEP). If you c hoose Yes, I want to partici p ate in the ACEP , information ab out the hardware c onfig uration, the most and least[...]

  • Page 203

    203 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts view of the Navigation pane. When the console is conn ected to the management serv er, t hi s sett i ng will also co ntrol the color sc heme of the Last backup column's value for eac h machine. Last c onnection This opt i on is effec tive when t he c onsole [...]

  • Page 204

    204 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 203 ). To con fig ur e a le rt no [...]

  • Page 205

    205 Copyr i ght © Acronis , In c., 2000-20 1 1 You can override the settings set here, exclusiv ely for th e events t hat occur during backup or during recovery, i n the D efaul t backup and recovery options. In this c ase, the settings set here wi ll be effective for operations other than backup and recovery, suc h as archive validation or cleanu[...]

  • Page 206

    206 Copyr i ght © Acronis , In c., 2000-20 1 1  /etc/snmp/snmpd.conf - co nfi guration file for the Net-SNMP SNMP agent  /etc/snmp/snmptrapd . conf - c onfiguration file for th e Net-SN MP trap daemon. 10 .5. 4.3 W ind ows ev ent l o g This opt i on is effec tive only in Windows o perating systems. This opt i on is no t availabl e when o per[...]

  • Page 207

    207 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on defines whet her the Acron is agent will connect to the Internet thro ugh a proxy server. Note: Acr onis Backu p & Recovery Onlin e sup p orts o n ly HTTP and HTTPS proxy servers . To set up p ro xy s erv er se tti ng s 1. Select t he Use a proxy s e rver check box. 2. In Address , s[...]

  • Page 208

    208 Copyr i ght © Acronis , In c., 2000-20 1 1 11 On lin e bac kup This sect i on pro v ides details about using the Acronis Backup & Recovery Online service. T his service enables you t o do online backups t o Acronis Online Backup St orage. Acr o nis Backup & Rec o very On line might be un a vailable in y ou r region. To find m ore info [...]

  • Page 209

    209 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 1 . 3 H o w l o n g w i l l m y b a ck u p s b e k e p t i n t h e o n l i n e s t o r a g e ? Your backups remai n in t he online storage unt il you delete t hem or u ntil the subscription expires. Recovering data from the online st orage is possible for 30 days following the sub scription expi[...]

  • Page 210

    210 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .1. 5.4 W hat if a n etw or k conn ec tio n i s l ost du rin g onli ne ba ckup or re cov ery ? The so ftware wil l try t o reach the online storage every 3 0 seconds. After fi ve unsuc cessful attempts the bac kup or recovery task wi ll fail. You can chan ge the number of at tempts and the interval[...]

  • Page 211

    211 Copyr i ght © Acronis , In c., 2000-20 1 1 The hard disk drive is sent bac k t o you bu t it is not possibl e to recover from it. However, recovery from a loc al ly attac hed device is possible with th e Large scale recovery (p. 215 ) o ption. 11 .1. 6.2 W hy w oul d I wan t to us e I niti al S eedin g? This service helps you save time and net[...]

  • Page 212

    212 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Decide on the media (p. 211 ) that you will send. 3. Attach the media to the machine you are going to bac k up. Alternatively, yo u can ba ck up to a local or network folder and then copy/move t he backup to the media. 4. Start A cronis Bac kup & Rec overy 11, click Create backup plan and c rea[...]

  • Page 213

    213 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 1 Delicately remo v e your h ard disk drive from the m achine. S tep 2 Place the hard drive into an anti -static bag to pro tect the drive from elect rostat i c discharge. If you do not have an anti-static bag, si mply wrap the hard drive into aluminum foil. S tep 3 Use a sturdy box that is at l[...]

  • Page 214

    214 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 4 Choose the transport company t hat you will use for shi pping. On that company's web si te, prepare and print two prepaid shipping labels: 1. Shipping label f or sending your hard dri ve. T hi s label is pl aced o n the top of the box. Yo u should send your package to one of the A cronis [...]

  • Page 215

    215 Copyr i ght © Acronis , In c., 2000-20 1 1  An order w a s cr eated – The backup is about t o start and t he license cannot be used for the same or any other machine. From t his point on, you can cancel th e order if something g oes wrong. Th i s will return the license to t he pool of available licenses .  A full backup h a s s tarted[...]

  • Page 216

    216 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e you o r der Large Scale Rec overy for a par ticular mach ine, Acron i s sends you a USB hard disk drive with all of t he bac kups made from t his machine. You can recover data directly fro m the di sk or copy the backups to a local or network folder. 11 .1. 7.2 W hy w oul d I us e Lar ge Scal e [...]

  • Page 217

    217 Copyr i ght © Acronis , In c., 2000-20 1 1 can cancel the o rder if something goes wrong. This will return t he license to the pool of availabl e licenses.  The order i s being process ed - Order processing in t he datacent er s tarted.  Writing data – Your backups are b ei ng written o nto the media. From this p oi nt o n, you cannot [...]

  • Page 218

    218 Copyr i ght © Acronis , In c., 2000-20 1 1 If you purc hased your subscriptions o nl ine using the Ac ronis Web site, t hey are available immediate ly on your ac count management We b page. The newly o btained subsc ri ptions are l isted at the Man age Subscriptions tab . 11 .1. 8.3 W hen do es my sub scri pti on be gin? Your subscription begi[...]

  • Page 219

    219 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat doe s " Aut o- rene w" mean? Auto-renewal means t hat when th e curren t subscription expires, t he next subscription will be automat i cally selected from the available subscript ions. The n ext subscription must be ident i cal to the c urrent subscription. If an identical subscriptio[...]

  • Page 220

    220 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .1. 8.8 Ca n I r evo ke a su bsc rip ti on f ro m a machi n e? You cann ot retur n an activated subscription to th e list of av ailable subsc ri ptions, but you can reassig n (p. 222 ) it to a di fferent mac hi ne in Acro ni s Backup & R ecovery 11 GUI. 11 .1. 8.9 Ca n I canc el my sub scri pt [...]

  • Page 221

    221 Copyr i ght © Acronis , In c., 2000-20 1 1 Trial subscriptions You can get on e free workstation or server sub scriptio n per ac c ount. T he storage quot a of the trial subscription i s equal t o that of the standard subsc ri ption. The subscript i on period i s limi ted t o 2 months. Obtaining a trial subsc ription is possible unt i l you bu[...]

  • Page 222

    222 Copyr i ght © Acronis , In c., 2000-20 1 1 Alternatively, you c an activate a subs cription when the console is c on nected to a machine inst ead of the management serv er. 1 1 . 4 . 2 A c t i v a t i n g s u b s cr i p t i o n s To act iv ate a su bs cri pt ion 1. Start A cronis Bac kup & Rec overy 11 . 2. In the Acti o ns pane, click Act[...]

  • Page 223

    223 Copyr i ght © Acronis , In c., 2000-20 1 1 Depending on your settings, t his backup wil l be either fu l l or incremental. But its size is n ot likely to be less than a full backup size. T herefore, it is not practical to reassi gn a subsc ri ption t o a machine whose first backup was don e as an initial seeding. Yo u will need to ei ther redo[...]

  • Page 224

    224 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .6 Li mi tati on s of t he o nl ine s to rag e Unlike other types of sto rag e available in Acronis Back up & Recovery 11, the online storage has th e following limitat i ons. Operations The fo l lowing operations are n ot possible. Backup operations:  Backing up fro m bootable media  Bac[...]

  • Page 225

    225 Copyr i ght © Acronis , In c., 2000-20 1 1 Assign a subscription to a machine Reserve a subsc ri ption fo r a particular mac hi ne. Subscri ption period does not start cou nting down until the subscription is act i vated. Assigned subs cription A subscript ion that has been assigned to a machine. Available subsc ription A subscript ion that is[...]

  • Page 226

    226 Copyr i ght © Acronis , In c., 2000-20 1 1 Storage quota The amou nt o f storage spac e that a machine c an use according to the subscription. Subsc ription Permission for a machine to use a specifi c amoun t o f space in th e onli ne sto rag e for a specific period of t ime. Subsc ription per iod The period during which the sub scription rema[...]

  • Page 227

    227 Copyr i ght © Acronis , In c., 2000-20 1 1 12 G los sary A Ac ron is A c t ive Re stor e The Acro ni s proprietary technology that brings a system online immediately aft er the system recovery is st arted. The system b oots fr om the backup (p. 233 ) and the m achine bec omes operational an d ready t o provide necessary services. The d ata req[...]

  • Page 228

    228 Copyr i ght © Acronis , In c., 2000-20 1 1 Ac ron is Uni ve rsa l R esto re The Acro ni s proprietary technology that helps b oot up Windows or Linux on dissimilar hardware o r a virtual machine . Universal Restore handles differences in devices that are critical fo r the operat i ng system start -up, su ch as storage c ontrollers, motherboard[...]

  • Page 229

    229 Copyr i ght © Acronis , In c., 2000-20 1 1 B ack up opti on s Configuration parameters of a backup o peration (p. 2 2 8), suc h as pre/post backup commands, maximum net work bandwidth al lotted fo r the backup stream or data compression level. Backup options are a part of a backup pl an (p. 229). B ack up p la n (P lan ) A set o f rules th at [...]

  • Page 230

    230 Copyr i ght © Acronis , In c., 2000-20 1 1 B oota bl e medi a A physical med i a (CD, D VD, USB flash drive o r ot her m edia supported by a machine (p. 236 ) as a bo ot device) that contains the bootable agent (p. 229 ) or Windows Preinstallation E nvi ronment (Wi nPE) (p. 240 ) with t he Acr onis Plug-i n for Wi nPE (p. 227 ). A machine c an[...]

  • Page 231

    231 Copyr i ght © Acronis , In c., 2000-20 1 1  creating and managi ng centralized vau lts (p. 231 ) for storing archives  managing sto rage nodes (p. 239 )  monitoring act i vities of the Acronis Backup & Rec overy 11 component s, creating repo rts, vi ewing the c entralized log and more. Ce ntr al iz e d ta sk A t ask (p. 239 ) pro [...]

  • Page 232

    232 Copyr i ght © Acronis , In c., 2000-20 1 1 Consolidation m i ght be n ee ded when deleting backups , either manu al ly or during cleanup (p. 231 ) . For example, the retention rul es require to d el ete a full bac kup (p. 235 ) that has expired b ut retain the next incremental (p. 236 ) one. The backup s wil l be combined i nto a si ngle full [...]

  • Page 233

    233 Copyr i ght © Acronis , In c., 2000-20 1 1  viewing the st ate, progress and properties of the centrali zed tasks (p. 231 ) exi sting on t he machine  viewing and manag ing the l og of t he agent's operat i ons  disk management operations, suc h as clone a disk, create volume, c onvert volume. A kind of d i rect management i s pe[...]

  • Page 234

    234 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic dis k A hard disk managed b y Logical Disk M anager (LDM) th at is available i n Windows st arting wi th Windows 200 0. LDM helps flexibly allocate v olumes o n a storage device for bet ter fault t ol erance, better performance or larger volume size. A dynamic disk c an use either the master[...]

  • Page 235

    235 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic vol um e Any volume loc ated on dynamic d isks (p. 233 ), or more precisely, on a d isk group (p. 233 ). Dynamic volumes can spa n multiple disks. Dynam ic volumes are usually configured depending on the desired goal:  to increase th e volume size (a span ned volume)  to reduce the acc[...]

  • Page 236

    236 Copyr i ght © Acronis , In c., 2000-20 1 1 I Im ag e The same as Disk backup (p. 233). In cr eme nta l ba cku p A bac kup (p. 228 ) that stores changes to the data ag ainst t he latest bac kup. You need ac cess to ot her backups from the same arch ive (p. 228 ) to res tore data from an i ncremental bac kup. In de xing An act i vity (p. 228 ) p[...]

  • Page 237

    237 Copyr i ght © Acronis , In c., 2000-20 1 1 M Ma ch ine A physical or virtual c omputer uniquely identif i ed by an operating system installation . Mac hi nes with multiple op erating systems (mu lti -boot syst em s) are c onsidered as multipl e machines. Ma nag ed ma chin e A mac hine (p. 236 ), either physi cal or v irtual, where at l east on[...]

  • Page 238

    238 Copyr i ght © Acronis , In c., 2000-20 1 1 P Pe rs ona l va ult A local or networked vault (p. 240 ) created using direct managem ent (p. 232 ). On ce a personal vault is created, a shortcut to it appears on the managed machine i n the Vaults list. Multiple machines c an use the same physical location; for exampl e, a network share; as a perso[...]

  • Page 239

    239 Copyr i ght © Acronis , In c., 2000-20 1 1 S S tat ic gr o u p A group of machines which a management server (p. 237 ) ad ministrator po pulates by manually adding machines t o the group. A mac hi ne remains in a static group until the administrator rem oves it from th e group or from the m anagement server. S to rage n o de (A cr oni s Ba cku[...]

  • Page 240

    240 Copyr i ght © Acronis , In c., 2000-20 1 1 Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validation of a disk backup c al culates a chec ksum for ev ery data bl ock saved in th e backup . Both procedu res are resource-intensive. While the suc cessful vali dation means a high probab [...]