Acronis Backup & Recovery 11 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Acronis Backup & Recovery 11. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Acronis Backup & Recovery 11 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Acronis Backup & Recovery 11 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Acronis Backup & Recovery 11, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Acronis Backup & Recovery 11 должна находится:
- информация относительно технических данных устройства Acronis Backup & Recovery 11
- название производителя и год производства оборудования Acronis Backup & Recovery 11
- правила обслуживания, настройки и ухода за оборудованием Acronis Backup & Recovery 11
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Acronis Backup & Recovery 11 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Acronis Backup & Recovery 11 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Acronis, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Acronis Backup & Recovery 11, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Acronis Backup & Recovery 11, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Acronis Backup & Recovery 11. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    A c r o n i s B a c k u p & R e c o v e r y 1 1 Update 0 User Guide Applies to th e followin g edit i ons:  Advanc ed Server  Virtual E dition  Advanc ed Server SBS Edition  Advanc ed Workstation  Server f o r Linux  Server f o r Window s  Workstati o n[...]

  • Страница 2

    2 Copyr i ght © Acronis , In c., 2000-20 1 1 Copyright © Acronis, Inc . , 2000-2011. All rights reserve d.           [...]

  • Страница 3

    3 Copyr i ght © Acronis , In c., 2000-20 1 1 Table o f conten ts 1 Introducing Acro nis Backup & Rec o very 11 ................................ ................................................ 9 1.1 What's new in Acron i s Backup & Recovery 1 1 ....................................................................... 9 1.2 Acronis Bac k[...]

  • Страница 4

    4 Copyr i ght © Acronis , In c., 2000-20 1 1 4 .3 .2 T he [D AT E] va ria b le ................................................................................................................................ 69 4 .3 .3 Ba ck up s pl it ti ng an d s i mp lif ie d fi le na m ing .......................................................................[...]

  • Страница 5

    5 Copyr i ght © Acronis , In c., 2000-20 1 1 5 .1 .5 W he n t o rec ov er ................................ ................................................................................................... 133 5 .1 .6 T as k cre de nt ia ls ...........................................................................................................[...]

  • Страница 6

    6 Copyr i ght © Acronis , In c., 2000-20 1 1 7 .1 .1 A rch iv e s el ect io n ................................................................................................................................ ... 212 7 .1 .2 Ba ck up s ele ct io n .......................................................................................................[...]

  • Страница 7

    7 Copyr i ght © Acronis , In c., 2000-20 1 1 9 .6 .3 Di sk co n ver si on : MBR t o G PT ................................ ............................................................................... 247 9 .6 .4 Di sk co n ver si on : GPT t o MB R ...................................................................................................[...]

  • Страница 8

    8 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1. 3 .4 Ba ck up p lan s an d ta sk s ................................................................................................ ......................... 313 1 1. 3 .5 S to rag e no des .............................................................................................................[...]

  • Страница 9

    9 Copyr i ght © Acronis , In c., 2000-20 1 1 1 In tro duc in g Acro n is Back up & Rec ove ry 1 1 1. 1 Wh at 's n ew in Ac ro nis B a ck up & Re cov er y 11 Acronis Bac kup & Recovery 11 builds on t he su ccess that Acro nis Backup & Recovery 1 0 has established by bring i ng enterprise-class capabili ti es to the small busine[...]

  • Страница 10

    10 Copyr i ght © Acronis , In c., 2000-20 1 1 Using boo table media, you c an apply Acronis Universal Restore to an operating system without performing the rec overy.  Linux L VM support (p. 36 ) LVM stru cture i s saved in a backup and can be recovered.  Acronis Un iversal Restore for Li n ux systems (p. 137) Recover L inux systems to dissi[...]

  • Страница 11

    11 Copyr i ght © Acronis , In c., 2000-20 1 1 When installing an agent, you can enter the license key i nstead of specifyi ng the l icense server. As soon as the machine is registered on th e managem ent server, the key will be added t o the li st of licenses hand l ed by t he server.  The managemen t server w eb page for components i nstallati[...]

  • Страница 12

    12 Copyr i ght © Acronis , In c., 2000-20 1 1 Console The c onsole provides Graphical User Interfac e and remote c onne ction to the agent s and other Acronis Bac kup & Recovery 11 component s. Usage of the co nsole is not licensed. Bootable media builder With boo table media builder, you c an create bootab le m edia in order t o use the ag en[...]

  • Страница 13

    13 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 2.1 .1 U ni ver sal R esto re The Universal Restore ad d-on enables you to use the restore t o dissim ilar hardware func tionali ty on the mac hi ne where t he agent is installed and c reate bootable media with this fu nctio nality. Universa l Restore han dl es differences in d ev ices that are crit[...]

  • Страница 14

    14 Copyr i ght © Acronis , In c., 2000-20 1 1  For o ff-loaded bac kup, Agent for VMware vSphere ESX(i) (Windows) can be installed on a machine running Windows . Acronis Bac kup & Recovery 11 Agent for VM ware vSph ere ESX(i) is referred as A gent for ESX(i) later in this do cument. 1 . 2 . 4 A g e n t f o r H y p e r - V Acronis Bac kup &a[...]

  • Страница 15

    15 Copyr i ght © Acronis , In c., 2000-20 1 1 The st orage nodes enable creat i ng highly scalable and flexi ble, in terms of the hardware suppor t, storage infrast ruct ure. Up to 5 0 sto rage nodes can be set up, ea ch being able to manage up to 20 vaults. The ad ministrator c ontrols the storage n odes centrally from t he Acronis Backup & R[...]

  • Страница 16

    16 Copyr i ght © Acronis , In c., 2000-20 1 1 The c onsole has two distributions: for installation on Windows and install ation o n Linux. While bot h distributions enab l e conn ection to any Acro ni s Backup & Recovery 1 1 agent and Acronis Bac kup & Recovery 11 Management Server, we reco m m end t hat you use the conso le for Windows if[...]

  • Страница 17

    17 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 4 Te ch ni ca l S upp or t Maintenance and Support Program If you need assi stance with your Acronis product , please go to http://www.acronis.com/support/ Product Updates You can download the latest updates fo r all your registered Acronis soft ware product s from our website at any time after logg[...]

  • Страница 18

    18 Copyr i ght © Acronis , In c., 2000-20 1 1 2 G ett ing st ar ted Step 1. Installation These brief installation i nstruct i ons enable yo u to st art u si ng the pro duc t qu i ckly. For th e complete d escription o f installation methods an d procedures, please refer to t he Installation document ation. Before installation, make sure that:  [...]

  • Страница 19

    19 Copyr i ght © Acronis , In c., 2000-20 1 1 a. Run t he setup program and c l ick Install Acr onis Backup & Recovery 1 1 . b. After ac cepting the t erm s of the license a greem ent, select t he Connect to remote machines check box. c. Follow th e on-screen instruc tions. Step 2. Running Run Acro ni s Backup & Recovery 1 1 Management Con[...]

  • Страница 20

    20 Copyr i ght © Acronis , In c., 2000-20 1 1 To save your mac h ine to a fi le: Under Where to back up , c l ick Location , an d select the location where the backup will be saved. Click OK t o confirm your sel ection. Click OK at the bot tom of the window to start the backup. Tip. Using the bo otable media, you c an do off-li ne ("cold"[...]

  • Страница 21

    21 Copyr i ght © Acronis , In c., 2000-20 1 1 Administering t h e manag ement server  Use the Machines w ith agents view t o manage machines registered on the management server. To effec tiv ely work w i th a l arge number of mach i nes, organize t hem into groups (p. 300 ).  Use the Virtual m achines (p. 312 ) view to manage supported vi rt[...]

  • Страница 22

    22 Copyr i ght © Acronis , In c., 2000-20 1 1 Key elements of the console wo rkspac e Na me D es cri pti on Navigati o n pane Contains the Navig at i o n tree and th e Shortcut s ba r . Lets you navi g ate to the different views. For deta il s, see Navigati on pane ( p. 22 ). Main area Here you configu r e and m onitor bac k up, recovery and othe [...]

  • Страница 23

    23 Copyr i ght © Acronis , In c., 2000-20 1 1  Mounted i mages . This no de is displaye d if at least one volume is mount ed. Use this view to manage mounted i mages. Views for a management serve r When th e console is connect ed to a management serv er, the fo l lowing vi ews are avai lable in t he navigation tree. The Short l ist displays [...]

  • Страница 24

    24 Copyr i ght © Acronis , In c., 2000-20 1 1 Operations with pane Ho w to ex pa nd/ min im iz e p an es By default, the Navigation pane appears expanded. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( ). T he pane wi ll be min i mized and the c hevron changes its direction ( ). Clic[...]

  • Страница 25

    25 Copyr i ght © Acronis , In c., 2000-20 1 1  In the information pan el (collapsed by d efaul t), v iew the item's detail s. To expan d the panel, cli ck the arro w mark ( ).  Perform act i ons on the selected item. Th ere are several ways of performing the same action on selected items:  By clicking the buttons o n the table too l [...]

  • Страница 26

    26 Copyr i ght © Acronis , In c., 2000-20 1 1 Action p a ge - Create backup pla n Using controls and specifying s ettings Use active co ntrols to specify a bac kup plan or recovery t ask settings and paramet ers. By default, such fi elds as credent i als, opt i ons, comment s, an d some others are hidden. Most settings are configured by cli cking [...]

  • Страница 27

    27 Copyr i ght © Acronis , In c., 2000-20 1 1 Navigati o n b uttons 2 . 1 . 3 C o n s o l e o p t i o n s The c onsole options define the way information is repr ese nted in the Grap hi cal User Interfac e of Acronis Bac kup & Recovery 11. To access the conso l e options, select Options > C o nsole options from the t op menu. 2. 1.3 .1 Al e[...]

  • Страница 28

    28 Copyr i ght © Acronis , In c., 2000-20 1 1 To make a selection, choose the font fr om the respec ti v e co mbo-box and set the fon t's pro per ties. You can preview the fo nt's appearanc e by clicking B rowse to the ri ght. 2. 1.3 .4 Po p-u p m essa g es These o ptions are effective when the console is c onne cted to a managed mac hi [...]

  • Страница 29

    29 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Enabled for all results. To make a sett i ng for eac h result (succ essful c ompletion, fai lure or suc cess with warnings) individually, sel ect o r clear the respective c heck box. 2. 1.3 .5 S tart up pa ge This opt i on defines whet her to show the Welc o me screen or the Dashboard vi[...]

  • Страница 30

    30 Copyr i ght © Acronis , In c., 2000-20 1 1 3 U nde rst and ing Ac ron is Bac kup & Rec ov ery 1 1 This sect i on at tempts to gi ve its readers a clear unders tanding of the product so t ha t they can use the pro duc t in various circumst ances without step- by - step inst ructions. 3. 1 O wne rs an d cre de ntia ls This sect i on explains [...]

  • Страница 31

    31 Copyr i ght © Acronis , In c., 2000-20 1 1 1. In the P lan parameters (or Task parameter s ) section, cli ck Show plan 's cr ed entials, c o mments , label (or S how task c redentials ). 2. Click Pl a n's (Task) cre d entials . 3. Enter the credent i als under which the pl an (task) will run. Scheduled or p ostponed start The plan (ta[...]

  • Страница 32

    32 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 3 F ul l , i ncr e me nta l a nd d i ffe ren tia l ba ck ups Acronis Bac kup & Recovery 11 provides the capabili ty to use popular backup schemes, such as Grandfather-Fa ther-Son and Tower of Hanoi, as well as to create cus tom bac kup s chemes. All bac kup schemes are b ased on full, increment [...]

  • Страница 33

    33 Copyr i ght © Acronis , In c., 2000-20 1 1 Differential backup A differential backup stores changes to t he data against th e latest full backup . Yo u need access to the c orresponding full backup to recover the data from a d i fferential backup. A d i fferent i al backup i s most useful when:  you are interested in sav ing only the most re[...]

  • Страница 34

    34 Copyr i ght © Acronis , In c., 2000-20 1 1 Linux A volume backup stores all files and folders of the select ed volume independent of their attribut es; a boot record an d the file system super block. A disk backup sto res all disk volumes as we l l as the zero track wi th the master boo t reco rd. 3. 5 A bo ut dy na mic a nd log ic al v o l ume[...]

  • Страница 35

    35 Copyr i ght © Acronis , In c., 2000-20 1 1 When reco v ering a dynamic volu me to disk group unall ocat ed space, the so ftware preserves the volume's original type and size. If the disk group configuration does not allow for t he origi nal volume type, the volume will be reco v ered as a si mple or spanned volume. I f this volume does not[...]

  • Страница 36

    36 Copyr i ght © Acronis , In c., 2000-20 1 1 3 . 5 . 2 B a c k u p a n d r e c o v e r y o f l o g i c a l v o l u m e s a n d MD d e v i c e s ( L i n u x ) This sect i on explains how y ou wou l d back up and rec o ver volumes managed by Linux Logical Volume Manager (LVM ), called logical volumes; and multiple -disk (MD) devices, c al led Linux[...]

  • Страница 37

    37 Copyr i ght © Acronis , In c., 2000-20 1 1 For det ai led instruct i ons on h ow to recover l ogical volumes, see Recovering MD devices and logi cal volumes (p. 38 ). 3. 5.2 .2 B ack ing up MD dev ic es MD d ev ices, kno wn as Linux Software RAID, c ombine s everal volumes and m ake sol i d block devices ( /dev/md0, /dev/md1, ... , /d ev/md31 )[...]

  • Страница 38

    38 Copyr i ght © Acronis , In c., 2000-20 1 1 automat i cally assembled follow i ng the reboot. To v iew or ch ang e the partition type, use a disk partitioning ut i lity suc h as fdisk .  Otherwise (suc h as in the sec ond example), perfo rm the recovery from boo table media. No reboot wi ll be required in t hat c ase. In boo table media, you [...]

  • Страница 39

    39 Copyr i ght © Acronis , In c., 2000-20 1 1 To crea t e t he vo lum e str uc tur e manu al ly 1. Boot the machine fro m a L inux-based bootable media. 2. Click Acronis Ba ckup & Rec ov ery 11 . T hen, cli ck Run managemen t console . 3. On t he toolbar, click Actions , and then click Start s hell . Al ternative l y, you can press CTRL+ALT+F2[...]

  • Страница 40

    40 Copyr i ght © Acronis , In c., 2000-20 1 1 Th e following picture illust rates this co nfiguration. Do t he followi ng to recover data from t hi s archive. Step 1: Cr eating the volume structure 1. Boot the machine fro m a L inux-based bootable media. 2. In the management con sol e, press C TRL+ALT+F2 . 3. Run t he followi ng commands to create[...]

  • Страница 41

    41 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In Archive , click Change and then specify the name of the archive. 3. In Backup , click Cha ng e and then select t he backup from which y ou want to recover dat a. 4. In Data type , selec t Volumes . 5. In Items to recover , select the c heck box next to my_volgroup -my_l o gvol . 6. Under Where to[...]

  • Страница 42

    42 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 6 C omp at ib il ity wi th e ncry pt io n s of tw ar e Acronis Bac kup & Recovery 11 fully retains its func tion ality when interac ting with fil e -level encryption software. Disk-level encryption software encrypt s data on the fly. This is why data contained in t he backup is not encrypted. Di[...]

  • Страница 43

    43 Copyr i ght © Acronis , In c., 2000-20 1 1 You can recover an encrypted system part i tion by u si n g boot abl e media only. If the rec overed system fails to bo ot , rebu ild Master Boot Record as described in t he f ollowi ng     Restoring Wind[...]

  • Страница 44

    44 Copyr i ght © Acronis , In c., 2000-20 1 1 OID: 1. 3.6.1.4.1.2476 9. 100.20 0.2.0 Value: "? 00000000"[...]

  • Страница 45

    45 Copyr i ght © Acronis , In c., 2000-20 1 1 4 Ba cku p 4. 1 B ac k u p now Use the Back up now featu re to co nfi gure and ru n a one-tim e backup in a few simple steps. The backup process will start immediately aft er you perform the requ i red steps and click OK . For a l ong-time backup strategy that includes schedu l es and c onditions, time[...]

  • Страница 46

    46 Copyr i ght © Acronis , In c., 2000-20 1 1 To access these settings, cli ck Show backup fil e naming, acce ss credentials, archive com ments . File n aming (p. 65 ) [Opt i onal] Select t he Name backup files usi n g the archive n ame, as in Acronis T rue Im ag e Echo, rather th an auto-generated n ames check box if you want to use simpli fied f[...]

  • Страница 47

    47 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Configure parameters o f the backup operat i on, such as pre/post backup commands, maxi mum network bandwi dth al located for t he backup stream or t he backup archive co mpression level. If you d o not hing in t his section, the default values (p. 95 ) will be used. After any o f the sett[...]

  • Страница 48

    48 Copyr i ght © Acronis , In c., 2000-20 1 1 In order t o recover your operat i ng system along with all the settings and applications, you have to perform a disk bac kup. Virtual machines Available if Acro ni s Backup & Recovery 1 1 Agent for E S X(i) or Acronis Bac kup & Recovery 11 Hyper-V is installed. Select t hi s opt i on to bac k [...]

  • Страница 49

    49 Copyr i ght © Acronis , In c., 2000-20 1 1  Use the following cr edentials The pro g ram will access t he source dat a using the c red entials you specify. Use this opt i on if t he plan's acco unt does n o t have access permissions t o the data. Specify:  User na me . When ent eri ng the n am e of an Ac tive Direc tory user account,[...]

  • Страница 50

    50 Copyr i ght © Acronis , In c., 2000-20 1 1 C ri ter i on E xa mpl e D es cri pti on W i ndow s an d Li nu x By name F.log F Excludes a l l files named "F.log" Excludes a l l folders named "F" By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith &q[...]

  • Страница 51

    51 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . Warning: Acc ordi n g to t h e ori g inal FTP spec i fic ation, cred entials require d for access to FTP servers are transferred throu gh a network a s pl aintext. Th is me a ns th a t th e user na me and password can be i nter cepted b y an eavesdr opper using a packet sniffer. 4 . 2 . 5[...]

  • Страница 52

    52 Copyr i ght © Acronis , In c., 2000-20 1 1 To access this set ting , click Show backup type, 2 nd l o cation, vali d ation, c o nvert to virtual machine . Select t he backup type.  Full - sel ected by default for all backup loc ations (except for Ac ronis Online Backup St orage).  Increm enta l . At the fi rst t i me a full backup wil l b[...]

  • Страница 53

    53 Copyr i ght © Acronis , In c., 2000-20 1 1 Start back up at Specifies when to start a backup. The default v alue is 12:0 0 PM. Back u p on Specifies t he days on whi ch to perfor m a backu p. The defau lt value is Workdays . Weekly/M onth l y Specifies which of the days selected in the Back u p on field you want to reserve for weekly and monthl[...]

  • Страница 54

    54 Copyr i ght © Acronis , In c., 2000-20 1 1  Keep backup s:  Daily: 1 w eek  Weekly: 1 month  Mont hl y: indefinitely As a result, an archive of dai ly, weekly, and m onthly bac kups will be c reated. Daily backups will be available for seven days since creation. For instan ce, a daily backup o f Sunday, January 1, will be available [...]

  • Страница 55

    55 Copyr i ght © Acronis , In c., 2000-20 1 1  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Fr iday  Keep backup s:  Daily: 6 m on ths  Weekly: 6 months  Mont hl y: 5 y ears Here, daily incre mental backups will be creat ed on Tue sdays and Thursdays, with week ly and monthly bac kups perfo[...]

  • Страница 56

    56 Copyr i ght © Acronis , In c., 2000-20 1 1 Dif ferential backu p schedule Specifies on what schedule and under which conditions to p er form a differ ential backup. If the arch i ve conta i ns no fu ll backups at the time of the task run, a full backup i s created instead of the dif ferential backup . Clean u p archive Specifies ho w to get rid[...]

  • Страница 57

    57 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples Weekly full backu p The fo l lowing scheme yields a fu ll backup p erformed every Friday night. Full backup : Schedule: Weekl y , every Fri d ay , at 10:00 PM Here, all parameters exc ept Schedule in Full ba ckup are l eft empty. Al l backup s in the arch i ve are kept indefinitely (no archive[...]

  • Страница 58

    58 Copyr i ght © Acronis , In c., 2000-20 1 1 Finally, we create retent i on rules for the arc hi ve: let us retain o nl y backups tha t are no older th an six months, and let the cleanup be performed aft er each backup task and also on the l ast day o f every month. Retention rules : Delete backups o l der than 6 months Apply the rules : After ba[...]

  • Страница 59

    59 Copyr i ght © Acronis , In c., 2000-20 1 1  Recur: Every 1 day  Frequency: Once at 6 PM Number o f levels : 4 Backup type : Fu l l/Differentia l /Increment al This is how the first 14 days (or 14 sessions) o f this scheme's schedule look. Sh aded numbers denot e backup l evels. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1[...]

  • Страница 60

    60 Copyr i ght © Acronis , In c., 2000-20 1 1 A new level 3 differential backup has not yet b een crea ted, so the b ackup of day fi ve is still stored. Since it depends on the full backup of day on e, that backup is available as we l l. Th is enables us t o go as far b ack as 11 days, which is t he best- case scenar i o. The fo l lowing day, howe[...]

  • Страница 61

    61 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Selecting the destination In the P ath field, enter the full path to the d estination, or select t he desired destination i n the location tree as described in " Sel ecting bac kup destinations" (p. 61 ). 2. Using the archives table To assist you wi th choosing th e rig ht dest i nation, t[...]

  • Страница 62

    62 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Onli ne backup storage To back up da ta to Acronis O nline Backup Sto rage, c lick Log i n and spe c ify the cred enti als to log in to the onl ine storage. Then, expand the Online b a ckup sto ra ge group and se l ect the account . Prior to ba cki n g up to the onl i ne sto[...]

  • Страница 63

    63 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Stora ge nodes When you need to back up data to a stora ge node that i s no t registe r ed on t he managem ent serve r, or when operat ing on a mach ine booted wit h bootab l e media:  To access a managed vault, type the following st ring in the Path fie l d: bsp://n o de[...]

  • Страница 64

    64 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . To learn more abou t operations av ailable depending on the user privileges, see the Users' privileges on a m anaged machine (p. 31 ) sec tion. 4 . 2 . 9 L a b e l ( P r e s e r v i n g m a c h i n e p r o p e r t i e s i n a b a c k u p ) Any time data on a machine is bac ke d up, i[...]

  • Страница 65

    65 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows XP All Editions winXPP roGuest Windows XP All Editions (64 bit ) winXPP ro64Guest Windows Se rver 2003, Al l Editions winNetStanda rdGuest Windows Se rver 2003, Al l Editions (64 bit) winNetStanda rd64Guest Windows 200 8 winLonghor nG ues t Windows 200 8 (64 bit) winLonghor n64Guest Windows Vi [...]

  • Страница 66

    66 Copyr i ght © Acronis , In c., 2000-20 1 1 This behavior is useful when you rotat e USB hard drives and want each drive to keep a single full backup (p. 67 ) or all backups created during a week (p. 67 ). But you might end up with no backups i f a full bac kup to your only drive fails. This behavior c an be suppressed by adding the [Date] vari [...]

  • Страница 67

    67 Copyr i ght © Acronis , In c., 2000-20 1 1 Result:  The bac kups of January 1, 201 1 , January 2, 20 11, and s o on, are st ored respectively as MyMach i ne-1.1.2011.t ib, MyM achine-1.2. 2011 . tib, and so on.  Your script can move older bac kups based on the date stamp. See also  [...]

  • Страница 68

    68 Copyr i ght © Acronis , In c., 2000-20 1 1  You want to back up to the arc hiv e MyMachine on an external h ard disk drive .  You have two such drives. Either of them has drive letter D in the operating system when attac hed to the mac hi ne.  You want to swap the drives each Monday , so that one drive c ontai ns backup s of the curren[...]

  • Страница 69

    69 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 3 . 2 T h e [ D A T E ] v a r i a b l e If you spec i fy the [DATE] variable in t he archive name, t he fil e name of each backup wi ll include that   When using th i s variable, the first bac kup of a n ew day wil l be a fu l l b[...]

  • Страница 70

    70 Copyr i ght © Acronis , In c., 2000-20 1 1 The sc heduler uses local time of the machine th e bac k up plan exists on. Befo re creat i ng a sch edul e, be sure t h        Schedule To define when a task has[...]

  • Страница 71

    71 Copyr i ght © Acronis , In c., 2000-20 1 1 What- ifs  What if an event o ccurs (and a con d ition, if a n y, is me t) whil e the previous task run has not completed? The event will be ignored.  What if an event o ccurs while the sc h eduler i s waiting for the con dition required by the previous event? The event will be ignored.  What [...]

  • Страница 72

    72 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: not s et . The t ask wil l be start ed on the current day, if it has b ee n creat ed before 6PM . If you have c reated the task aft er 6 PM, the task will be s tarted for the fi rst t i me on the next day a t 6 PM. To: no t set . T he task will be performed for an indefinite nu m [...]

  • Страница 73

    73 Copyr i ght © Acronis , In c., 2000-20 1 1 To: no t set . Second dail y schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 0 3:00:00 PM Until: 07 :00:00 PM . 3. Effect i ve: From: 0 9/20/2009 . To: no t set . 4 . 4 . 2 W e e k l y s c h e d u l e Weekly sc hedule i s effect i ve in Windows and Linux operating systems . To sp eci fy a w eek[...]

  • Страница 74

    74 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: 0 5/13/2009 . The t ask wil l be start ed on the nea rest Friday at 10 PM. To: 1 1/13/200 9 . The task will be performed for the last time on this date, bu t the task it self will still be availabl e in th e Tasks view after th is date. (If th i s date were not a Friday, th e task[...]

  • Страница 75

    75 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Every: 9 hours From: 1 2:00:00 PM Until: 09 :00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Second sched u le 1. Every 1 week(s) on: Tu e , Wed , T hu . 2. Every 3 hours From 09 : 00:00 AM u ntil 09:00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Third schedule 1. Every: 1 wee[...]

  • Страница 76

    76 Copyr i ght © Acronis , In c., 2000-20 1 1 Advanced sc heduli ng settings (p. 79 ) are availab l e only for machines registered on A cronis Bac kup & Recovery 11 Management Server. To specify these settings, c l ick Cha nge in the Adv a nced settings area. All the settings you made are di splayed in the Result field at the bo ttom o f the w[...]

  • Страница 77

    77 Copyr i ght © Acronis , In c., 2000-20 1 1  During nort hern spring and aut umn, the task runs every 12 hours on all workdays.  During nort hern summer, the task runs every first and fifteenth o f every month at 10 PM. Thus, the following three sc hedules are added to the task. Firs t s chedule 1. Mont hs: December , January , Fe bruary .[...]

  • Страница 78

    78 Copyr i ght © Acronis , In c., 2000-20 1 1 Event type Specifies the ev ent t y pe: Error , Warning , Info rmation , Audit success , o r Audit fa ilure . Event ID Specifies the ev ent number, which typically identifies the particular kind of events among events from th e same source. For example, an Error event with E vent source disk an d E ven[...]

  • Страница 79

    79 Copyr i ght © Acronis , In c., 2000-20 1 1 How to view events in Event viewe r T o ope n a l og i n E ve nt Vi ewe r 1. On t he Desktop or in the Start menu, right-click My Computer , and t hen click Manage . 2. In the C ompu ter M a nagement console, expan d System To ols , an d then expand Event Viewer . 3. In Event Vi ewer , click the n am e[...]

  • Страница 80

    80 Copyr i ght © Acronis , In c., 2000-20 1 1 Distribute start time within the tim e window When th i s setting is enabled, the backup task on each registered machine w ill start wi th a specifi c delay from th e start time set in th e backup plan. T hi s distributes the tasks' actual st art times wi thin a time interval. You m ay want t o us[...]

  • Страница 81

    81 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy a dv an ced s et ti ng s 1. Connect to the manag ement server or to a mac hi ne regi stered on i t, and then start creat i ng a backup pl an. 2. In How to back up , select t he Simpl e, T ower of Hanoi, or Custom scheme, and then c li ck Schedule to specify a schedule for the scheme. 3. Un[...]

  • Страница 82

    82 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4.7 .1 U se r i s i dle Applies to: Windows "User is idle" means t hat a screen saver is running on the managed mac hine or t he machine is locked. Example: Run t he backup task on the manag ed machine every d ay at 9PM, preferably when the user is idle. If the user i s still active by 11P[...]

  • Страница 83

    83 Copyr i ght © Acronis , In c., 2000-20 1 1 Example A company uses different locations on the same network-attac hed s torage for backing up users data and servers. Th e workday st arts at 8AM and end s a t 5 PM. Users' data should be backed up as soon as the users log off, but not earl ier than 4 : 30 PM and not later t han 10 PM. Every da[...]

  • Страница 84

    84 Copyr i ght © Acronis , In c., 2000-20 1 1  Task st art conditions: Wait until th e conditions are met , Run the task anyway after 3 hour(s). As a result, (1) If all users are l ogged o ff at 8PM, t he backup task will start at 8PM. (2) If t he last u ser logs off b etween 8PM and 11PM, the backup task will start im mediately aft er the user[...]

  • Страница 85

    85 Copyr i ght © Acronis , In c., 2000-20 1 1 The fo l lowing picture illustrat es this example. Usage sc enarios  Reliable d isaster recovery (p. 90 ) Store y our bac kups both on-site (fo r imm ediate reco very) and off-site (t o secure the backups from local st orage fail ure or a natural disaster).  Keeping only the latest r ecovery poin[...]

  • Страница 86

    86 Copyr i ght © Acronis , In c., 2000-20 1 1  A local folder o n a fixed or removable drive  A network folder  An FTP o r SFTP server  Acronis Bac kup & Recovery 11 Storage Node  Acronis Secu re Zone You can cop y or move a bac kup to any of these l ocations:  A local folder o n a fixed or removable drive  A network folde[...]

  • Страница 87

    87 Copyr i ght © Acronis , In c., 2000-20 1 1 If allowed by the backup sch eme, you can al so spec i fy when to aut omatically delete t he backups from each of the locations. 4 . 5 . 3 S e t t i n g u p r e t e n t i o n o f b a c k u p s You can set ret ention rules for backups when creating a backup plan (p. 45 ). The available retention rules d[...]

  • Страница 88

    88 Copyr i ght © Acronis , In c., 2000-20 1 1 You can cho ose to apply the ret ention rules before c re ating a backup, af ter c reating a bac kup , on a schedule, or combine th ese options. For the second an d next loc ations, creating a bac kup means copying or movi ng a bac kup there from the previous locat i on. 4 . 5 . 4 R e t e n t i o n r u[...]

  • Страница 89

    89 Copyr i ght © Acronis , In c., 2000-20 1 1 The o utda ted bac kup will be kept until all backups t hat depend o n it also become out da ted. Then, all the chain wil l be deleted at once during the reg ular cleanup. If you chose moving outdat ed ba ckups to the n ex t location, th e ba ckup will b e cop i ed there without delay. Only its deletio[...]

  • Страница 90

    90 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 5.6 .1 Ex am ple 1. Rep li cati ng bac kup s t o a n etwo rk f old er Consider the fo l lowing scenar i o:  You want to perform a full backup of your machine manually.  You want to store the backups i n Acronis Secu re Zone (p. 170 ) on the mach i ne.  You want to store a copy of the backup[...]

  • Страница 91

    91 Copyr i ght © Acronis , In c., 2000-20 1 1 the P ath fi eld. Under Rete ntion rules , select Move backups older than 1 week . Then, specify the tape d evice in the 2 n d location field. Make sure that the tape device is ready t o work. The preparation steps are described i n the "Backing up a m achine t o a directly at tac hed t ape device[...]

  • Страница 92

    92 Copyr i ght © Acronis , In c., 2000-20 1 1 Restric tion s  Conversion is not avai lable on machines running Linux.  Conversion of a backup from t he f ollowing locat i ons is not available: CD, DVD, tape devices and Acronis On l ine Backup St orage.  If you have set up copying or moving backup s to o ther locations (p. 84 ), you can no[...]

  • Страница 93

    93 Copyr i ght © Acronis , In c., 2000-20 1 1 or Hyper-V virtual mac hi ne is bac ked up at a hypervisor level), the task wil l be creat ed on the machine where t he agent is. The t arget virtual machine must be powered off b y the time of conversion, otherwise the conversion task will fail. If this hap pens, you c an restart the conversion t ask [...]

  • Страница 94

    94 Copyr i ght © Acronis , In c., 2000-20 1 1 Storage space Disks of t he resulting virtual machine will use as much storage spa ce as the ori ginal data oc cupies. Assuming that the original disk size is 100 GB and t he d isk stores 1 0 GB of data, th e corresponding virtual disk w i ll oc cupy ab ou t 10 GB. VM ware calls this format " thin[...]

  • Страница 95

    95 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7 De f a ult ba ck up opt i ons Each Acronis agent has i ts own default b a ckup opt ions. Onc e an agent is installed, the default op tions have pre-defined value s, which are referred to as presets in the document ation. When c reating a backup pl an, y ou can either use a default o ption , or ove[...]

  • Страница 96

    96 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up HDD writing spee d (p. 100 ) Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Network c[...]

  • Страница 97

    97 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Pre/Post ba ckup comman ds (p. 110 ) + + + + PE only PE only Pre/Post data capture commands (p. 112 ) + [...]

  • Страница 98

    98 Copyr i ght © Acronis , In c., 2000-20 1 1 When th e Reset archive bit check box is selected, A cronis Backup & Recovery 11 will reset the archive bits o f all files being b acked u p. Acronis Bac kup & Reco very 11 itself does no t use the archive bit value. When perform ing incremental o r differential backup, it det ermines whether a[...]

  • Страница 99

    99 Copyr i ght © Acronis , In c., 2000-20 1 1  When you specify an already ex isting archive as the destinat i on of the backup plan.  When you edi t a backup plan t hat has already resulted in a backup. The preset is: Disabled. To pro te ct the a rch iv e f ro m u nau tho ri ze d a cc ess 1. Select t he Set password for the a rchive check b[...]

  • Страница 100

    100 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 4 B a c k u p p e r f o r m a n c e Use this group of options to spec i fy the am ount of network and syst em resourc es to allocate to the backup process. Bac kup performance options mi ght have a m ore or l es s not i ceable effect on the speed of the ba ckup process. T hi s depends on the o[...]

  • Страница 101

    101 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7.4 .3 Ne tw ork con ne c t ion sp eed This opt i on is effec tive for Windows and Linux operat i ng systems an d boo table media. This opt i on is available when a loc ation on the n etwor k (network sha re, managed vault or an FTP/SFTP server) is selected as the backup destination. The o ption de[...]

  • Страница 102

    102 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixed size Enter the desired file size or sel ect it fro m the drop-down list. The bac kup wil l then b e spli t into multiple files of t he specified size. T hi s comes in handy when creating a bac kup that you plan to burn to multiple CDs or DVD s later on. You mig ht also want to split the ba ckup [...]

  • Страница 103

    103 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding informatio n to a DRP tem plate You can append additional information to a DRP template i f you are we ll familiar with XML and HTML. T he default path s to the DRP template are:  %ProgramFil es% AcronisBackupA nd Recover y drp.xsl - in 32-bit Windows  %ProgramFil es(x86)%AcronisBack[...]

  • Страница 104

    104 Copyr i ght © Acronis , In c., 2000-20 1 1 Ignore bad sectors The preset is: Disabled . When th e option is disabled, the program will display a pop-up window each time it c omes across a bad sec tor and ask for a user d ecision as t o whether to cont i nue or stop the ba ckup pro cedure. In order t o ba ck up the valid information o n a rapid[...]

  • Страница 105

    105 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on is no t availabl e when o perating under the boot able medi a. This opt i on defines whet her the agent(s) o perating on the managed mach i ne have to log events of the bac kup operations in the A pplication E vent Log of Windows (t o see this log, ru n eventv wr.exe or select Control Pa[...]

  • Страница 106

    106 Copyr i ght © Acronis , In c., 2000-20 1 1 plan has t o run under the acc o unt with the A dministrator or Ba ckup O perat or privileges. If a snapshot cannot be taken, the backup will fail.  Create a snapshot if it is possible Back up fil es directly if t aking a snapshot is not possible.  Do not create a snapshot Always bac k up files [...]

  • Страница 107

    107 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on defines ho w to take and to work with a snapshot o f a logical volume. Use of snapsho ts ensures a t i me-consistent backup of volumes whose dat a may change during t he backup process. The preset is: Acronis Backup & Recovery 11 Tip: We rec o mme n d ch a nging t h e pres et only if[...]

  • Страница 108

    108 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r a file -level bac kup of a data sour ce that inc ludes mounted v olumes or clust er shared volumes. This opt i on is effec tive only when yo u select for backu p a fo lder that is higher in t he folder hierarchy than th[...]

  • Страница 109

    109 Copyr i ght © Acronis , In c., 2000-20 1 1 When th i s option i s set to Disable , the volumes' sna ps hots will be taken one after the other. As a result, if the d ata spans ac ross several volumes, t he re sulting backup m ay be no t consistent. 4 . 7 . 1 7 N o t i f i c a t i o n s Acronis Bac kup & Recovery 11 provides the abi lit[...]

  • Страница 110

    110 Copyr i ght © Acronis , In c., 2000-20 1 1  Pass word  ent er the password. d. Click OK . 11. Click Send test e -mail message to check if t he settings are c orrect. 4. 7.1 7.2 Me sse ng er ser vic e ( Win Po pup) This opt i on is effec tive for Windows and Linux operat i ng systems o n the sending machine an d only for Windows on the re[...]

  • Страница 111

    111 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram does n ot support interac tive commands, i.e. commands that require user i nput (for example, "pau se"). To sp eci fy p re /p ost c omm and s 1. Enable pre/post commands execu tion by checking the following opt i ons:  Execute b efore the backup  Execute a fter the backup[...]

  • Страница 112

    112 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Ar g uments field, spec i fy the command execution arguments, if required. 4. Select t he Fail the task if the c o mmand exec u tion fails check bo x if successful execu tion of the command is critical for you. The co m mand is considered failed if its exit code is not equal to zero. If the [...]

  • Страница 113

    113 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the Worki n g direc to ry field, specify a p ath to a directory where t he command/batch file will be execut ed. 3. In the Ar g uments     ?[...]

  • Страница 114

    114 Copyr i ght © Acronis , In c., 2000-20 1 1 successful ly executed. Delete the TIB file and temporary files and fail the tas k if the command execution fails. execution f ai lure or success . command execution result. * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 4 . 7 . 2 0 R e p l i ca t i o n / c l e a n u p i [...]

  • Страница 115

    115 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption applies to backing up to a sto rag e node. Eject tape The preset is: Disabled . When th i s check box is selected, the software will ejec t tapes after a successful bac kup and/or when a tape i s full. Always use a free tape By default, the software tries t o write a ba ckup onto a tape c [...]

  • Страница 116

    116 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram will try to execute the fai led task again if you sel ect t he Restart a failed tas k check box and spec i fy the n umber of attempts and th e time interval bet ween the attempts. The program stops trying as soo n as an attempt completes suc cessfull y OR the spec i fied number of attemp[...]

  • Страница 117

    11 7 Cop yright © Acr o nis, In c., 200 0 -2011 Time d iagram: Wait until con ditio n s are met Skip the task execution Delaying a b ackup might be un acceptable, for example, when you need to back up data strict l y at the specified time . Then it makes sense t o skip the bac kup ra ther than wai t for the co nditions, especial ly if the event s [...]

  • Страница 118

    118 Copyr i ght © Acronis , In c., 2000-20 1 1  Software - Acronis VSS Pr ovider VSS will use Acronis VSS Provi der for taking snapshots.  Software - Sy stem p rovider VSS will use the sy stem provider (M i crosoft Software Shadow Copy pro vi der) for t aki ng snapshot s.  Software - A software provider VSS will use any avai l able so ftw[...]

  • Страница 119

    119 Copyr i ght © Acronis , In c., 2000-20 1 1 5 Re cov er y When it c omes to data rec overy, first consider the mos t functional method : connect the console t o the managed m a chine running t he operating system and c reate the recovery task. If the mac hi ne's operating sys tem fails to start or you need to recover data to bare m etal , [...]

  • Страница 120

    120 Copyr i ght © Acronis , In c., 2000-20 1 1 Select dat a to recover. Access c redentials (p. 125 ) [Opt i onal] Provide credent i als for t he archive location i f the task accou n t does not have the right to access it. To access t his op tion, click Show access cred entials . Where to recover This sect i on app ears after the requi red bac ku[...]

  • Страница 121

    121 Copyr i ght © Acronis , In c., 2000-20 1 1 [Optional] Universal Re s tore for Wind ows/Linux Applies to: sy stem disk or vo l ume recovery. Using Acronis Univers a l Restore req uires a separate license. Universal Restore for Windows/Linux (p. 134 ) Use Acronis Un i versal Resto re when you need to recover and boo t up an operat i ng systems o[...]

  • Страница 122

    122 Copyr i ght © Acronis , In c., 2000-20 1 1  You are recovering custo m or non-Windows boo t load ers (such as L I LO and GRUB).  The disk geometry i s different t o that s tored in t he backup. There are probably other t i mes when you m ay need to recover the MBR, but the ab ove are the most common. When reco v ering the M BR of one dis[...]

  • Страница 123

    123 Copyr i ght © Acronis , In c., 2000-20 1 1 Lo ca ti on D et ai l s FTP, SF TP If the arch i ve is stored on an FTP or SFTP ser ver , type the server na m e or address in the Path field as follows: ftp://ftp_se rver:port _n umber or sftp : //sf t p_serve r:po rt number If the port nu m ber is not specified, port 21 i s used for FTP a nd port 22[...]

  • Страница 124

    124 Copyr i ght © Acronis , In c., 2000-20 1 1  In the search string, type t he information that helps t o i dentify the requi red dat a items (this can be a mac hi ne name, a file or folder name, or a disk label) and t he n click Search . You can use the asterisks (*) and question marks (?) wildcards. As a result, in the Search window, y ou wi[...]

  • Страница 125

    125 Copyr i ght © Acronis , In c., 2000-20 1 1 Solution: To be able to bro wse such dat a , connect direct ly to a machine, sel ect the required personal vault and then select Data view . 5 . 1 . 2 A c c e s s c r e d e n t i a l s f o r l o c a t i o n Specify th e credentials required for access to the locat ion where t he backup is stored. To s[...]

  • Страница 126

    126 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 1.4 .1 S ele ctin g targ et dis ks Available disk o r volume destinations depend on the agents operat i ng on t he machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 11 Agent fo r Windows or A gen t for Li nu x is installed. The select ed disks wil l be recovered[...]

  • Страница 127

    127 Copyr i ght © Acronis , In c., 2000-20 1 1 D isk d esti nat ion To sp eci fy a d est ina ti on di sk : 1. Select a di sk where you want the select ed disk to rec o ver to. Th e destination disk's space should be at l east t he same size as the uncompressed i mage data. 2. Click OK . All the data store d o n the targ et disk will be replac[...]

  • Страница 128

    128 Copyr i ght © Acronis , In c., 2000-20 1 1 Also, you have to map the volumes manually if t hey are Linux logical volumes, or Linux soft ware RAI D (MD d ev ices). For more information on recovering logical volumes and MD devices, see Recovering MD d ev ices and logical volumes (p . 38 ). The au tomatic mapping is performed as follows. 1. If th[...]

  • Страница 129

    129 Copyr i ght © Acronis , In c., 2000-20 1 1 Available when the Acronis Backup & Recovery 11 Agent fo r Hyper-V or Agent fo r ESX(i) is installed. On select i ng this, you specify the v irtualization server and the target v irtual machine. Then you proceed to the reg ular volume mappin g proc edure described below. Please b e aware t ha t t [...]

  • Страница 130

    130 Copyr i ght © Acronis , In c., 2000-20 1 1 Be careful ! To be on the saf e side, it is advisable t o a ssi gn unique nam es to the volumes. The L i nux-style boot abl e media shows loc al disks and volumes as unmount ed (sda1, sda 2.. .). Ch ang in g v olu me p ro pert i es S iz e an d l ocat i o n When reco v ering a volume to a basic MBR d i[...]

  • Страница 131

    131 Copyr i ght © Acronis , In c., 2000-20 1 1 Vo lu me ( pa rtit ion ) a li gnm ent Acronis Bac kup & Recovery 11 automat i cally eliminates v olume misalignment  a situation, when volume clusters are not aligned with disk sect ors. The misalignment occurs when recoveri ng volumes created wi th t he Cyl inder/Head/Secto r (CH S) addressi n[...]

  • Страница 132

    132 Copyr i ght © Acronis , In c., 2000-20 1 1 Files and folders wi l l be recovered to the same path(s) as they are in t he ba ckup. Fo r example, if you h av e backed up all fil es and folders in C: DocumentsF i nanceReports , the files will be recovered to t he same path. If t he folder does not exist, it will be created automat i cally. ?[...]

  • Страница 133

    133 Copyr i ght © Acronis , In c., 2000-20 1 1 By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith "F" (such as folders F, F1 and f iles F .l og, F1. log) By mask ( ?) F?? ?.l og Excludes a l l .log files with names cons i stin g of four symbols and s ta r ti[...]

  • Страница 134

    134 Copyr i ght © Acronis , In c., 2000-20 1 1 To learn more abou t using credent i als in Acronis Backup & Recovery 1 1 , see t he Owners and credent ials (p. 30 ) section. To learn more abou t operations av ailable depending on the user privileges, see the User privileges on a managed mach ine section. 5. 2 A cro ni s U niv e rsa l R es tor [...]

  • Страница 135

    135 Copyr i ght © Acronis , In c., 2000-20 1 1 Sometimes Universa l Restore i s applied i n the background bec ause the soft war e knows what dri vers or modules are required for the suppor ted virtual mac hi nes. These c ases are as follows:  recovering a system to a new virtual machine  recovering a system to any virtual mach i ne by means[...]

  • Страница 136

    136 Copyr i ght © Acronis , In c., 2000-20 1 1 Universal Restore settings Automatic driver search Specify where t he program will search for the Hardware Abst raction Layer (HAL), HDD controller driver and net work adapter driver(s):  If the d rivers are on a vendor's disc or ot her removable media, turn on the Searc h rem o vable media . [...]

  • Страница 137

    137 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 2.2 .2 U ni ver sal R esto re i n Linu x When Universal Resto re is applied to a Linux operat i ng system, i t updat es a temporary fi le system known as the initial RAM disk (initrd). T hi s ensures t hat the operating system can boot on the new hardware. Universal Restore ad ds modules for th e n[...]

  • Страница 138

    138 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 3 . 1 R e c o v e r i n g v o l u m e s Let's assume you backed up the system an d boot volumes (or t he entire machine) and want to recover t hese volumes to a d ifferent platform. The ability of the recovered system to boo t up depends on the foll owing facto rs:  Source operatin g syste[...]

  • Страница 139

    139 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: non- convertible Solution Recover the oper ati ng system to an MB R disk. 2. Perform th e recovery under the bootable media. or After recove ry, turn off the UEFI m ode in BIOS. Otherwise, the[...]

  • Страница 140

    140 Copyr i ght © Acronis , In c., 2000-20 1 1  The plus (+ ) sign on a green background means t hat the sourc e disk wil l be recovered wi thout any limitations.  The plus (+ ) sign on a yellow background means that the so urce d isk will be rec overed with some limitations. To overcome such limitations, you mi ght need to perform some addi[...]

  • Страница 141

    141 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB UEFI OS: convertible + The target di sk wi ll be initialized as MBR . The recove red disk OS will be automati[...]

  • Страница 142

    142 Copyr i ght © Acronis , In c., 2000-20 1 1 Customers familiar w ith Acronis Reco v ery for M i crosoft E xchange can no te that t hi s product uses Active Restore to achieve immediate availabil ity of an Exchange information store after star ting the recovery. Whi le based on the same tech nolog y, rec ove ry of the Information Store p roceeds[...]

  • Страница 143

    143 Copyr i ght © Acronis , In c., 2000-20 1 1 If your op erating syste m and i ts loader reside on d i ffere nt volumes, al ways include bot h volumes i n the backup. The volumes must also be rec overed toget h er; other wise the re is a high risk that the operat i ng system wi ll not start. 2. Create boot able medi a. 3. If a system failure oc c[...]

  • Страница 144

    144 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. Micros o ft V i rtual PC does not s u pport disks t h at are larg er than 127 GB . Acro n is enab l es yo u to cr ea te a Virtual PC machi n e wit h l a rger disks s o th at you can attac h the disks to a M i crosoft Hyper -V virtu a l m a chine. To con ve rt a d is k b a ckup to a v irt ua l ma [...]

  • Страница 145

    145 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 5 . 1 V i r t u a l m a c h i n e t y p e / v i r t u a l i z a t i o n s e r v e r s e l e c t i o n The new vi rtual machine c an be creat ed either on a virtualization server (t hi s requires Acron i s Backup & Rec overy 11 Agent for Hy per-V or Agent fo r ESX(i) to be installed) or i n any[...]

  • Страница 146

    146 Copyr i ght © Acronis , In c., 2000-20 1 1 When adding a n ew virtual disk, al ong with interfac e and capacity, you c an specify its fo rmat.  Thin format. The disk occ upies as much st orage space as the dat a it stores. T hi s saves th e s torage space. To enable thin format , select t he Thin provisioning (for ESX), or Dynamically expa [...]

  • Страница 147

    147 Copyr i ght © Acronis , In c., 2000-20 1 1 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompt s whether you want to rec over the MBR along with t he system volume. Opt for no t re covering, on l y if you do not want the system to b e bo otable. Solution : Recover t he volume once again alon g[...]

  • Страница 148

    148 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Mount the system yo u are rec overi ng: mkdir /mnt/system/ mount - t ext3 / dev/sda2 /mnt/system/ # root partition mount - t ext3 / dev/sda1 /m nt/system/ boot/ # bo ot partiti on 3. Mount the proc and dev fil e systems to the system you are rec overi ng: mount - t proc n one /mnt/system/proc/ moun[...]

  • Страница 149

    149 Copyr i ght © Acronis , In c., 2000-20 1 1 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure th e bootloader by usi ng too l s and documentation fro m the Linux d i stribution t hat you use. For exampl e, in D ebi an and U buntu, you may need t o edit some c ommented lines in t[...]

  • Страница 150

    150 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba[...]

  • Страница 151

    151 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 1 A d d i t i o n a l s e t t i n g s Specify th e additional settings for the recovery operat i on by selecting or clearing the fo l lowing check boxes. Validate backup archiv e before recovery The preset is Disabled . This opt i on defines whet her to vali date a backup to ensure that the ba[...]

  • Страница 152

    152 Copyr i ght © Acronis , In c., 2000-20 1 1 Set current date and time for recov ered files This opt i on is effec tive only when rec overi ng files. The preset is Enabled .       ?[...]

  • Страница 153

    153 Copyr i ght © Acronis , In c., 2000-20 1 1 To sel ect w het he r t o se nd th e rec ov ery op er ati on s e ven t s t o the SN MP ma na ge rs : Choose one of the followi ng:  Use the setting set i n the Machine o ptions  to use the setting spec i fied for t he machine. For more information refer to Machine options.  Send SNMP n otific[...]

  • Страница 154

    154 Copyr i ght © Acronis , In c., 2000-20 1 1 If the file NTFS permi ssions were preserved during backup (p. 106 ), you c an choose whether to recover t he permissi ons or l et th e fil es inherit the N TFS permissions from the folder to which they are reco vered. 5 . 7 . 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r re[...]

  • Страница 155

    155 Copyr i ght © Acronis , In c., 2000-20 1 1 8. In the P assword field, enter the password. 9. Click Additional e-mail pa rameter s... to co nfi gure the additional e-mail parameters as follows: a. From - type the e-mail address of th e user from whom the message will be sent. If you leave this field empty, messages will be co nstructed as if t [...]

  • Страница 156

    156 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption enables you to define t he commands t o be automatically executed before and after the data rec overy. Example of h ow you can use t he pre/post co m mands:  Launc h the Ch e ckdisk co m mand in ord er to find an d fix logical file sy stem errors, physical errors or bad sectors to be st[...]

  • Страница 157

    157 Copyr i ght © Acronis , In c., 2000-20 1 1 * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 5. 7.7 .2 Po st -rec ove ry co mman d To sp eci fy a com ma nd/ exe cu tab le fi le to b e exe cut ed a fte r th e rec o ve ry is co mpl et ed 1. In the C ommand field, type a command or browse to a batch file. 2. In the Work[...]

  • Страница 158

    158 Copyr i ght © Acronis , In c., 2000-20 1 1 6 S tor in g t he bac k ed u p da ta 6. 1 Va ul ts A vault is a loc ation for st oring backup arc hi ves. For ease o f use and administration, a vault i s associated wi th t he archives' metadata. Referring t o this metadata makes for fast and convenient operations wi th arc hi ves and bac kups s[...]

  • Страница 159

    159 Copyr i ght © Acronis , In c., 2000-20 1 1 'Vaults ' view Vaults (on the navi gation pane) - t op item of the vaults tree. Click this item t o display centralized an d personal vaults. To perform actions o n any vault, use the toolbar that i s located at the t op of t he Vaults view. For cent ral ized vaults, see the Actions on centr[...]

  • Страница 160

    160 Copyr i ght © Acronis , In c., 2000-20 1 1 6 . 1 . 2 C e n t r a l i z e d v a u l t s A centralized vault is a net worked location allott ed by the management server adm i nistrator to serve as sto rage for t he ba ckup archive s. A centralized vau lt can be managed by a sto rage node or be unmanaged. The t otal number and si ze of archives s[...]

  • Страница 161

    161 Copyr i ght © Acronis , In c., 2000-20 1 1 All the operations described here are performed by c l ic ki ng the c orresponding buttons o n the vaults toolbar. T hese operations c an be also acc essed from t he [Vault name] actions item of t he main menu. The fo l lowing is a guideline for you to perform operations with c entrali zed vaults. To [...]

  • Страница 162

    162 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Delete a vault 1. Select the vault. 2. Click Dele t e . The vault w ill be delet ed along with a ll the archiv es stor ed in there. The plans and tasks that use this vault will fa i l. Change use r credent ials for accessin g a vau lt Click Chang e user . Changing use r credentia l s is availabl[...]

  • Страница 163

    163 Copyr i ght © Acronis , In c., 2000-20 1 1 The dedu pl ication d atabase stores the hash values of al l items stored i n the v ault  except fo r those that can no t be dedu pl icated, suc h as encrypted files. If the vault i s creat ed on the disk local t o the storage nod e, the deduplication dat abase is placed t o the same vault (the Pl [...]

  • Страница 164

    164 Copyr i ght © Acronis , In c., 2000-20 1 1 Va ult pa th To sp eci fy t h e pa th w her e the ma nag ed va ul t w ill be cr ea te d 1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree. Managed vaults can be organized:  On the hard drives local to the storage nod e.  On a network share. ?[...]

  • Страница 165

    165 Copyr i ght © Acronis , In c., 2000-20 1 1 The AES cryptographic algorithm operat es in the C ipher-block c hai ning (CBC) mode and uses a randomly generated key with a user-defined size o f 128, 192 or 25 6 bits. The larger t he key size, the longer it will t ake for the pro g ram to en crypt the archives stored in t he vault and the more sec[...]

  • Страница 166

    166 Copyr i ght © Acronis , In c., 2000-20 1 1 If no o bjects were foun d, delete the name and enter another one. If several objec ts for the entered name we re found , select one of them and click OK , or click Cancel and specify another name. At first, the software tries t o find the entered names in the l ist of loc al users and groups on the m[...]

  • Страница 167

    167 Copyr i ght © Acronis , In c., 2000-20 1 1 At ta chi ng a m ana g ed va ult A vault managed by a storage node can b e a ttach ed to another storage no de. You might need to do so when retiri ng the st orage node hardware, when the storage nod e is lost or when balancing loads between st orage nodes. As a result, t he first node stops managing [...]

  • Страница 168

    168 Copyr i ght © Acronis , In c., 2000-20 1 1 Zone is con si dered as a personal vault available to al l users th at can log on t he system. Personal vaults are c reated automat i cally when backing up any of th e above locations. Personal vaults c an be used by local backup plans or local tasks. Centralized bac kup plans cannot use personal vaul[...]

  • Страница 169

    169 Copyr i ght © Acronis , In c., 2000-20 1 1 Validate a vault Click Validate . You will be taken to the Val idation (p. 211 ) page, wh ere this vault is already pre-selecte d as a source . The vault va l idation c hecks all the arc hives sto red in the vault. Delete a vau lt Click Dele t e . The deletin g operat ion actua lly remov es only a sho[...]

  • Страница 170

    170 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Make sure that none of the b ackup plans uses vault A while m erging, or disable th e gi ven plans. See Actions on backup plans and tasks (p. 2 58). 2. Move t he content of vault A folder t o vault B manually by means of a third-party file manager. 3. Edit the backup pl ans th at use vault A : redi[...]

  • Страница 171

    171 Copyr i ght © Acronis , In c., 2000-20 1 1 After you configure the required settings, cli ck O K. In the Resul t co nfi rmation (p. 172 ) window, review the expect ed layout and cli ck O K t o start c reati ng the zon e. 6. 2.1 .1 Ac ron is Se cu re Zo ne Dis k The Acro ni s Secure Z one c an be located on any fixed h ard drive. Acronis Sec ur[...]

  • Страница 172

    172 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 2.1 .4 R es ult co nfi rma tio n The Res u lt confirmati on wi ndow displa ys the expect ed partition layout ac cording t o the sett i ngs you have cho sen. Click OK , if you are satisfied with the layout and the Acronis Sec ure Zone creation will start. How the set t ings you make will be processe[...]

  • Страница 173

    173 Copyr i ght © Acronis , In c., 2000-20 1 1  If there is n ot enough un allocated space, the program will take free spa ce from the sel ected volumes, propo rtionall y reducing t he volumes' size. Re si zing of loc ke d part i tions requires a reboot. Reducing a system volum e to t he mi n imum s iz e mi ght prevent t h e mach i ne&apos[...]

  • Страница 174

    1 74 Cop yright © Acronis, In c., 200 0 -2011 An autoloader is a p articular case of tape libraries. It c ontains one drive, several slots, a changer and a barc ode reader (optional). A s ta nd-a l on e tape drive (al so called streamer ) contains one slot and can hold only one tap e a t a time. 6 . 3 . 2 O v e r v i e w o f t a p e s u p p o r t [...]

  • Страница 175

    175 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Add the reg istry key described bel ow. Sp ecify the new locat ion path in the registry value TapesDatabase Path . Registry key: HKEY_L OCAL_MACH I NESOFTWAREAc ronis ARSMSet tings Registry value: Tapes DatabasePat h Possible data val u es: Any string 0 to 327 65 characters l ong. Description: [...]

  • Страница 176

    176 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.2 .5 Pa ral l el op erat ion s Acronis Bac kup & Recovery 11 can simultaneously perf orm operations with v arious co m ponents of a tape d evice. During an op eration that uses a drive (backing up, reco v ering, rescanning (p. 186 ), or erasing (p. 185 )), you can launch an operation t hat us[...]

  • Страница 177

    177 Copyr i ght © Acronis , In c., 2000-20 1 1 ABR11 Bootable Media ABR11 Agent for Windows ABR11 Agent for Linux ABR11 Storage Node Ta pe wr it te n on a l oca ll y a tt ac he d ta pe de vi ce (t ap e d ri ve or ta pe li br ar y) by .. . Bootable M edia 9.1 + + + + Echo + + + + ABR10 + + + + ABR11 + + + + Agent for Windows 9.1 + + + + Echo + + + [...]

  • Страница 178

    178 Copyr i ght © Acronis , In c., 2000-20 1 1 Backing up On t he Actions menu, click Back up now or Create backup plan . Confi g ure (p. 45 ) th e backup settings. When spec i fying t he backup dest i nation, sel ect t he tape d evice. Results  The resulting b ackups wi ll be loc ated in an aut omatically created personal vault (p. 189 ). To a[...]

  • Страница 179

    179 Copyr i ght © Acronis , In c., 2000-20 1 1 6. In the N a vigation tree, c l ick Storage nodes . Select the storage n ode t o which your tape device is attac hed, and then click Cre a te vault . Proceed as descr ibed in the "Creating a m anaged centralized vault" (p. 162 ) section. In the Tape pool step, sel ect the pool you decided t[...]

  • Страница 180

    180 Copyr i ght © Acronis , In c., 2000-20 1 1 5. If any of the detected backups c on tinue on o ther tap es that have not been rescanned yet, l oad these t apes as prompted a nd rescan them. 6. After th at, you can select t he required backup. If the backup is located on a stora g e node 1. Connect the console to the management server. 2. Detect [...]

  • Страница 181

    181 Copyr i ght © Acronis , In c., 2000-20 1 1 15. Click OK t o s tart the recovery. 16. If any of the required tapes are n ot loaded for some reason, the software will show you a message with the identifier of th e needed tape. Load the tap e, and click Retry to c on tinue the recovery. 6. 3.3 .5 R ec ove ri ng un der bo otab le med ia fr om a ta[...]

  • Страница 182

    182 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .2 Ta p e p oo l s Acronis Bac kup & Recovery 11 uses tape p ools that are logical groups of tapes. The software contains the fo l lowing predefined t ape pools: Unrecognized tap es , I mported tapes , Free tapes , and Acronis . Also, you can create your o wn custom po ols. Predefined pools[...]

  • Страница 183

    183 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .3 O p era ti ons wit h p ool s Cr eat in g a p ool To crea t e a po ol : 1. In the N a vigation tree, c l ick Tape managem en t . If connect ed to the management server, select the st orage node to which y our tape device is attached. 2. Click New poo l . 3. Specify th e pool name. 4. [Opt i o[...]

  • Страница 184

    184 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Select t he required pool and click Remove . 3. Select t he pool to which the t apes of the pool being deleted will be moved after the deletion. 4. Click OK t o delete the pool. 6. 3.4 .4 O p era ti ons wit h tap es R ena mi ng When a n ew tape i s detec ted by the s oftware, it i s automaticall y [...]

  • Страница 185

    185 Copyr i ght © Acronis , In c., 2000-20 1 1  You need to take several tapes out of a tape devi ce simultaneously .  Your tape dev ice does not have a mail slot and t he tapes to be taken o ut are locat ed in slots of non-det achable magazine(s). You need to move tapes on e by one to slots of one slot magazine and then t ake the magazi ne [...]

  • Страница 186

    186 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o s tart the operation. R es cann in g The informat i on abo ut the c o ntents of t apes is st ored in a dedicated database. The rescanning operation reads the content s of tapes and u pda tes the database i f the information in it mi smatches the dat a s tored o n tapes. The arc hives d[...]

  • Страница 187

    187 Copyr i ght © Acronis , In c., 2000-20 1 1 Result. T he selected tap es are moved to the pool associated with the sel ected vault. The b a ckups stored on the t apes can be fo und in th i s vault. A backup spread over several tapes will not appear in the vault until all of th ese tapes are rescanned. In ve nto ryi ng The invento ryi ng operati[...]

  • Страница 188

    188 Copyr i ght © Acronis , In c., 2000-20 1 1 Combination of fast an d full inventorying Full inventory i ng of an entire tape device may t ake a long time. If you need t o inventory only a few tapes, proceed as follows: 1. Perform the fast inventorying of t he tape device. 2. Click th e Unrecognized tapes pool. Find the tapes you want t o invent[...]

  • Страница 189

    189 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat to d o if I re mov ed a t ap e b y mis ta ke? Unlike an erased (p. 185 ) tape, the data from a remove d tape i s not physically deleted. Hence, you can make backups stored on such tape available again. To do so: 1. Load the tape int o your tape device. 2. Perform the fast inventorying (p. 187 ) [...]

  • Страница 190

    190 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. If you back u p multipl e machines t o a tape library with multiple drives, assoc iate the vaul t with the who l e library. This wil l allow you t o back up the m achines simul taneousl y via different dri ves. If you assoc i ate a v ault or sev eral vaults with o ne drive, backups will be queued[...]

  • Страница 191

    191 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .2 Ex am ple 2. Bac kin g u p t o ta p es o n a w e ek ly r o ta tio nal ba sis Consider the fo l lowing scenar i o:  You want to back up several machines to a tap e devi ce at tached to Acronis Backup & Recovery 11 Storage Node.  You want to create full backup s on Fridays and i ncre[...]

  • Страница 192

    192 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .3 Ex am ple 3. Dis k- to -di sk- to tap e wi th se ndin g tap es to an off- sit e st ora ge Consider the fo l lowing scenar i o:  You want to back up a machine t o a hard di sk and replicat e each backup to t he locally attach ed tape d evice.  You want to eject tapes wi th each bac kup [...]

  • Страница 193

    193 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Perform the fast inventorying (p. 187 ) with the Mov e newly detected tapes f rom the 'Unrecognized ta p es' or ' Imported tapes' pools to the 'Fr ee tapes' pool chec k box select ed. Result . The l oaded t apes are in the Free tapes po ol. If some of them are sent to [...]

  • Страница 194

    194 Copyr i ght © Acronis , In c., 2000-20 1 1 Up to 50 storage nodes c an be set up. 6 . 4 . 2 S u p p o r t e d t y p e s o f s t o r a g e A managed vault c an be organized:  On t he hard drives local to t he storage nod e  On a network share  On a St orage Area Network (SAN)  On a Network Attached St orage (NAS)  On a tape libra[...]

  • Страница 195

    195 Copyr i ght © Acronis , In c., 2000-20 1 1  The mac hi ne where t he storage node i s planned to be installed meet s the system requirements described in t he installation document ation .  You downloaded the setup p rogram of Ac ronis Backup & Recovery 11. Setting up the storag e node 1. Install Acronis Backup & Recovery 1 1 Sto[...]

  • Страница 196

    196 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Select t he storage node; th en, perform t he required operations as described i n "Actions o n storage no des" (p. 197 ). 6 . 4 . 5 U s e r p r i v i l e g e s o n a s t o r a g e n o d e User acco unts can have the different s cope of user's privileges on Acronis Bac kup & Re c[...]

  • Страница 197

    197 Copyr i ght © Acronis , In c., 2000-20 1 1 However, if UserA i s a memb er of the Administrato rs group on the mac hi ne, t hi s user can additionally ac cess the archives creat ed from this machine by UserB  even though UserA's accou nt on t he storage node is a regular one. 6 . 4 . 6 O p e r a t i o n s w i t h s t o r a g e n o d e [...]

  • Страница 198

    198 Copyr i ght © Acronis , In c., 2000-20 1 1 Refresh th e list of storage nodes Click Refresh . The manage ment conso l e will update the list of sto r age nodes from the managem ent serve r with the most r ecent in format i on. The list of storag e nodes is refreshed auto m atically based on even ts. Howeve r , the data m ay not be retrieved im[...]

  • Страница 199

    199 Copyr i ght © Acronis , In c., 2000-20 1 1  Withdrawn - the storage node was registered on ano t her management server . As a result, it is not possibl e to c ontrol t he node from t he current management server .  Archives - the total number of archives stored i n all the vaults managed by the storage no de.  Backups - the total numb[...]

  • Страница 200

    200 Copyr i ght © Acronis , In c., 2000-20 1 1 Parameters related to compac ting As backups are deleted from a d edupli cating vault, its dedupli cation data store (p. 205) may contain unused dat a blocks (items) th at are no l onger referred to fro m any backup. T he storage node processes the dat a store to delete the u nused items. This operat [...]

  • Страница 201

    201 Copyr i ght © Acronis , In c., 2000-20 1 1 The C o mpacting Trigger Threshold parameter enables you to set up a balance between t he extra space requ i red to store unused i tems and the compacting frequency. The l arger the value o f this parameter, the fewer unused i tems are allowed in t he data sto re, but compac ting wil l likely be more [...]

  • Страница 202

    202 Copyr i ght © Acronis , In c., 2000-20 1 1 Fast Operation C on nection Limit Description: Specifi es the maximum number of si multaneous co nnec tions to t he st orage node for purposes o ther than backup, rec overy, and operations with arc hi ves. Possible values: A ny integer number between 1 and 2 147483647 Default value: 10 Components o f [...]

  • Страница 203

    203 Copyr i ght © Acronis , In c., 2000-20 1 1 The C h eck Hash Va lue On Ser v er Si d e parameter determines whether the storage node must ensure th at the hash value matc hes the data block. Such check puts an additional load on th e storage no de. Normally, suc h check i s not necessary. You can set this parameter to True to make th e deduplic[...]

  • Страница 204

    204 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the am ount of free space in a managed vault, in megabytes, below which an error is recorded i n the storage node's log and any backup to the vault bec omes prohibited. Possible values: A ny integer number bet ween 0 and 21474 83647 Default value: 50 When th e amount of fr[...]

  • Страница 205

    205 Copyr i ght © Acronis , In c., 2000-20 1 1 deduplicati ng vault . The D edupli cation add-on t o the agent must be installed on any mach i ne that backs u p to such vault. Without the add -on backing up t o the vault i s not possible. The dedu pl ication is p erformed on data blocks. T he block size is 4 KB for dis k -level backups and 1 B to [...]

  • Страница 206

    206 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e the backup pr ocess is c ompl eted, the v ault c onta ins the resulting backup and the temporary file with the unique data blocks. T he temporary file will be pro cessed on the next stage. The ba ckup (TIB file) cont ai ns hash values and the data that cannot be d edupli cated. Furt her processi[...]

  • Страница 207

    207 Copyr i ght © Acronis , In c., 2000-20 1 1 Compac ting After one or more backup s or archives have been del eted fro m the vaul t  either manually or during cleanup  the dat a store may c on tain blocks whi ch are no longer referred to from any arch i ve. Such blocks are d el eted by t he compacting task, which is a sc heduled task perfo[...]

  • Страница 208

    208 Copyr i ght © Acronis , In c., 2000-20 1 1 To increase deduplicat i on performanc e, follow the rec ommendations b el ow. Place the deduplication databas e and dedupl icating va ult on separate physical devices To increase th e speed o f access to a deduplication dat abase, the dat abase and t he vault must b e located on separate physical dev[...]

  • Страница 209

    209 Copyr i ght © Acronis , In c., 2000-20 1 1 64 -bit opera ting sys tem For o ptimal deduplication performance, install t he sto r ag e node i n a 6 4 -bi t o pera ting system. The machine should n ot run applications t hat require much system resourc es; for example, Database Management Syst em s (DBMS) or Enterpr i se Resource Planning (E RP )[...]

  • Страница 210

    210 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip: The al l ocati o n unit si ze on most NTFS and ext3 volumes is 4 KB. This al l ows f o r block-le v el de duplicat i on. Other exam p les o f all o cation u nit sizes allowing f o r block-lev el dedu p licati o n incl u de 8 KB, 16 KB, and 64 KB. File-level backup Deduplication of a file is not p[...]

  • Страница 211

    211 Copyr i ght © Acronis , In c., 2000-20 1 1 7 Op er ati ons wi th a rchiv es and ba ckup s 7. 1 Va l ida ti ng ar chi ve s a nd ba ck ups Validation is an o peration that checks t he possibili ty of data rec overy from a backup. Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validatio[...]

  • Страница 212

    212 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. When to validate Start validation (p. 213 ) Specify when and ho w often to perform validation. Task para meters Task name [Opt i onal] Ent er a unique name fo r the val idat[...]

  • Страница 213

    213 Copyr i ght © Acronis , In c., 2000-20 1 1  To select a cent ral ized vault, ex pand t he Centrali zed group and click th e appropriat e vault.  To select a personal vault, expand the Personal group and cli ck t he appropriate vault.  To select a l ocal folder (C D/DVD d rive, or loc al ly attached t ape device), expand the Local fold[...]

  • Страница 214

    214 Copyr i ght © Acronis , In c., 2000-20 1 1 Ch oo se on e o f th e f o llo win g :  Now - to start t he val idation t ask rig ht aft er its creation, t ha t is, aft er clicking OK on the Validation page .  Later - to start t he one-time validation task, at the date and time you specify. Specify th e appropriate parameters as follows:  [...]

  • Страница 215

    215 Copyr i ght © Acronis , In c., 2000-20 1 1  Your choice o f backups belonging t o the same arch i ve - the resul ting archive will c ontain only the specified backup s. Consolidat i on is performed as required, so the resulting archive may co ntain full, incremental an d differential bac kups.  An entire v ault that can be exported by us[...]

  • Страница 216

    216 Copyr i ght © Acronis , In c., 2000-20 1 1 personal vaults, locally att ached tape dev ices, removable media and , in the ad v anced produ ct versions, managed an d unmanaged c entralized vaults. When th e console is connect ed to a management server , two export methods are available:  Export from a manag ed vault . The export is performed[...]

  • Страница 217

    217 Copyr i ght © Acronis , In c., 2000-20 1 1 Backups - you n ee d to specify the archive first, and then select t he desired backup(s) in this archive. Browse Select t he Archive (p. 217) or the Backups (p. 217 ) . Show access credentials (p. 217 ) [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have e[...]

  • Страница 218

    218 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy cr ede nt ia ls 1. Select o ne of the following:  Use the curre nt user credentials The so ftware wil l access the location usi ng the credentials of th e current u ser.  Use the following cr edentials The pro g ram will access t he location using t he credential s you spec ify. Use[...]

  • Страница 219

    219 Copyr i ght © Acronis , In c., 2000-20 1 1  To export data t o a locally att ac hed tap e devi ce, expan d the Tape drives group, t hen click the required device. I n stan d- al one editions of A cronis Backup & Recovery 11, t ape devices are available only if you have upgraded from Acro ni s Back up & Rec overy 10. For information [...]

  • Страница 220

    220 Copyr i ght © Acronis , In c., 2000-20 1 1  Pass word . The passwor d for the account. 2. Click OK . Acc o rding to the original FTP s p ecif i catio n , crede ntials requir ed for acces s to FTP servers are transferr ed through a n etwork as plaintext . This me ans that the user name and pa ssw ord can be intercept ed by an eavesdro pp er [...]

  • Страница 221

    221 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 1 A r c h i v e s e l e c t i o n Selecting the archive 1. Enter the full path to the l ocation in t he Path field, or sel ect the desired folder in th e folders tree.  If the arc hive is stored in Acro ni s Online Bac kup St orag e, click Log in and specify the credent ials to log in t o t[...]

  • Страница 222

    222 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 2 B a c k u p s e l e c t i o n To sel ect a ba ck up : 1. Select o ne of the backups by its creation date/time. 2. To assist you wi th choosing th e rig ht bac kup , th e bottom table d isplays the volume s contained in the select ed backup. To obtain info rmation on a vo lume, right-click it[...]

  • Страница 223

    223 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 5 M a n a g i n g m o u n t e d i m a g e s Onc e a volume is mount ed, you can b r owse files and folders co ntained in the backup usi ng a file manager and c opy the desired files to any destination. Th us, if you need to take out only a few fi les and folders from a volume backup, you do no[...]

  • Страница 224

    224 Copyr i ght © Acronis , In c., 2000-20 1 1 source. Validation of an a r chive will check all the a rc hive's backups . Export an archiv e Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted archive as a sou rce. The expo r t of an archive cr eates a dupl ic at e of th e arch i ve w i th all its backups in t[...]

  • Страница 225

    225 Copyr i ght © Acronis , In c., 2000-20 1 1 data block sav ed in the backup . Export a backup Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted backup as a source . The expo r t of a backup c r eates a new archiv e with a se l f -sufficient c opy of the backup in the locat i on you speci fy. Convert a ba ckup t[...]

  • Страница 226

    226 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 4 . 4 D e l e t i n g a r c h i v e s a n d b a ck u p s The Backups del etion window disp l ays the same tab as for the vaults view, but with check boxes for each arc hive and backup. The arc hiv e or b ackup you have cho sen to delete has th e check mark. Review th e archive or bac kup that you [...]

  • Страница 227

    227 Copyr i ght © Acronis , In c., 2000-20 1 1 8 Bo ot ab le med ia Bootable media Bootab l e media is physical media (C D, D VD, U SB drive or other m edia support ed by a machine BIO S as a bo ot device) th at boots on any PC-compatible machine and enables you to ru n Acronis Bac kup & Recovery 11 Agent either in a L i nux-based environment [...]

  • Страница 228

    228 Copyr i ght © Acronis , In c., 2000-20 1 1 PE -based bootable media does n ot support UEFI. 8. 1 Ho w to c rea te bo ota bl e med ia To enable creat ing physical media, t he machine must have a CD/DVD recording drive or allow a flash drive to b e attached. To enable PXE or WDS/RIS configuration, the machine must h av e a net work connec tion. [...]

  • Страница 229

    229 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// www.microsoft . com/downloads/detai l s.aspx?fa m ilyid=696DD 665 -9F76 - 4177 -A 811-39C26 D3B3B3 4&displayl ang=en You can find system requirements for installation b y follow ing the abo v e links. 2. [optional] Burn the WAIK to DV D or copy t o a flash d ri ve. 3. Install the M i cros[...]

  • Страница 230

    230 Copyr i ght © Acronis , In c., 2000-20 1 1  build an ISO i mage of a b ootab le disc to burn it later on a blank d isc  upload t he selected co mponents to Acronis PXE Server  upload t he selected co mponents to a WDS/RIS. 8. [optional] Wi ndows system drivers to be used by Acronis Universal Restore (p. 232 ). T hi s window appears on[...]

  • Страница 231

    231 Copyr i ght © Acronis , In c., 2000-20 1 1 nousb2 Disables USB 2.0 sup port. USB 1.1 devices st i ll work wit h this parameter. This p arame ter allows you t o use some USB drives in th e U SB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard d isk drives. Prevents t he kernel from fre[...]

  • Страница 232

    232 Copyr i ght © Acronis , In c., 2000-20 1 1 Pre-configuring multiple netwo rk connection s You can pre-con fi gure TCP/I P settings fo r up to ten network interface cards. To ensu re that each NIC will be assigned th e appropriate sett i ngs, c reate the media on the serv er for whic h the media is custo m ized. When you sel ect an existing NIC[...]

  • Страница 233

    233 Copyr i ght © Acronis , In c., 2000-20 1 1  to get the mass-storage drivers t hat you explicitly specify fro m the m edia. This is necessary when the t arget hardware has a spe cific mass storage cont ro ll er (such as a SCSI, RAID, o r Fi ber Channel adapter) for t he hard disk. For more i nformation p l ease refer to Univ ersal Restore. T[...]

  • Страница 234

    234 Copyr i ght © Acronis , In c., 2000-20 1 1 8 . 1 . 3 A d d i n g t h e A c r o n i s P l u g - i n t o W i n P E 2. x o r 3 . 0 Bootab l e Media Builder provides t hree methods of integrating Acron i s Backup & Recovery 11 with WinPE 2.x or 3.0:  Adding the Acro ni s Plug-in to the exi sting PE ISO. T his c omes in handy when you have t[...]

  • Страница 235

    235 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e a mac hine boots into WinPE, Acronis Backup & Recovery 11 starts automatic al ly. To crea t e a PE i mag e (ISO fil e) fr om th e resu lt ing W IM f ile :  replace th e default boot .wim file in your Windo ws PE fo l der with t he newly created WIM fi le. For the ab ove example, t ype: co[...]

  • Страница 236

    236 Copyr i ght © Acronis , In c., 2000-20 1 1 Remote connection To connect to the m achine remot el y, select Connect -> M a nage a remote machine in the console menu and specify one of the mac hine's IP addresses. P rovi de the user name and password if these have been configured when creat i ng the boo table media. Local c o nnection Ac[...]

  • Страница 237

    237 Copyr i ght © Acronis , In c., 2000-20 1 1 3. From t he list of suppor ted video mod es, choose the ap propriate one b y typing its number (for example, 318 ), an d then press ENT ER. If you do not wish t o follow this procedure every time you bo ot from media on a given hardware configuration, re-create th e bootable media with t he a ppropri[...]

  • Страница 238

    238 Copyr i ght © Acronis , In c., 2000-20 1 1  acronis  asamba  lash Linux commands and utilities busybox ifco nfig rm cat init rmmod cdre cord insmod route chmod iscs iadm scp chown kill scsi_id chroot kpartx sed cp ln sg_m ap26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod[...]

  • Страница 239

    239 Copyr i ght © Acronis , In c., 2000-20 1 1 8. 5 A cro ni s Sta rtu p Re cov ery Man age r Acronis St artup Recovery Manager is a modificat i on of the boot abl e agent (p. 368), residi ng on the system disk in Windows, or on t he /boot partition in Linux and co nfi gured to start at boot time on pressing F11. It el iminates t he need fo r a se[...]

  • Страница 240

    240 Copyr i ght © Acronis , In c., 2000-20 1 1 Bootab l e compon ents are u ploaded to Acro nis PXE Server using Acronis Boo table Media Builder. To upload bo otable component s , start th e Bootable Media Bu i lder (either from t he management conso le, by select i ng Tools > Cr ea te bootable media or as a separate component) and fol low the [...]

  • Страница 241

    241 Copyr i ght © Acronis , In c., 2000-20 1 1 If the h ardware has multiple network interfac e cards, make sure t hat the card suppor ted by the BIO S has th e network cable plugged in. 8 . 6 . 3 W o r k a c r o s s s u b n e t s To enable the Acronis PXE Serve r to work in another subnet (acro ss the switch ), configure the swi tch to relay the [...]

  • Страница 242

    242 Copyr i ght © Acronis , In c., 2000-20 1 1 9 D isk m ana gem ent Acronis Disk D irector Lite is a tool for prepa ri ng a machine disk/volume co nfi guration fo r recovering the volume ima g es saved by t he Acronis Backup & Recovery 11 software. Sometimes after the volume has been backed up and i ts image placed int o a safe storage, the m[...]

  • Страница 243

    243 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Back up the disk on whi ch volumes will b e created or managed. Havin g your most i mportant data backed up to ano ther hard disk, network share o r rem ovable media will allo w you to wor k on disk volumes b ei ng reassured th at your dat a is safe. 2. Test y our disk t o make sure it i s fully fu[...]

  • Страница 244

    244 Copyr i ght © Acronis , In c., 2000-20 1 1 The t op part of the view co ntains a disks and v olumes table enabling data sorting and c ol umns custo m ization and toolbar. The table presents th e numbers of t he disks, as well as assigned letter, label, type, capacity, free spac e size, used space size, fi le system, and status fo r each volume[...]

  • Страница 245

    245 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis Disk D irector Lite wil l detect that the disk is u n usable by the syst em and n ee ds to be initialized. The Dis k management view will show t he newly detected hardware as a gray block with a grayed icon, thus indicating t hat the di sk is unusable by the sy stem. I f you ne ed to in it ia [...]

  • Страница 246

    246 Copyr i ght © Acronis , In c., 2000-20 1 1           ?[...]

  • Страница 247

    247 Copyr i ght © Acronis , In c., 2000-20 1 1 I f you ne ed to co p y th e NT si gna tu re: 1. Select t he Copy NT signature      system on the hard disk, uninsta[...]

  • Страница 248

    248 Copyr i ght © Acronis , In c., 2000-20 1 1 1. MBR disk c onversi on: dynami c to basic (p. 249) using t he Convert to basic operat i on. 2. Basic disk c onversi on: M BR to GPT using the Convert to G PT operation. 3. GPT disk c onversi on: b asi c t o dynamic (p. 248 ) using t he Convert to dynamic operation. 9 . 6 . 4 D i s k c o n v e r s i [...]

  • Страница 249

    249 Copyr i ght © Acronis , In c., 2000-20 1 1 Sys tem disk conversion Acronis Disk D irector Lite does not require an operat i ng system rebo ot after basic to dynamic conversion o f the disk, if: 1. There is a si ngle Windows 2008 /Vi sta op erating syste m installed on the di sk. 2. The mac hi ne runs this operating system. Basic to dynamic c o[...]

  • Страница 250

    250 Copyr i ght © Acronis , In c., 2000-20 1 1  safe co nversion of a dynami c disk t o basic when it co n t ains volumes with data for simp l e and mirrored volumes  in multiboot systems, boot ability of a syst em that was offline during t he operation 9 . 6 . 7 C h a n g i n g d i s k st a t u s Changing disk st atus is effec tive for Wind[...]

  • Страница 251

    251 Copyr i ght © Acronis , In c., 2000-20 1 1  Store coll ections of simi lar files separately  for exam ple, an MP3 c ollection or vi deo files on a separate volume;  Store backups (images) of oth er volumes/disks on a spec i al volume;  Install a new op erating system (or swap file) on a new volume;  Add new hard ware to a mac hi[...]

  • Страница 252

    252 Copyr i ght © Acronis , In c., 2000-20 1 1 data it self. If a physical disk fai l s, t he portion of the RA ID -5 volume t hat was on that failed disk can be re-creat ed from the rem aining data and the parity. A RAID-5 volume provides re liability and is able t o overcome t he physical disk size limit ations with a higher than mirrored disk- [...]

  • Страница 253

    253 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a S triped volume:  Select t wo or more dest i nation disks to create the v olum e on. To create a RA ID-5 volume:  Select t hree destination disks t o create the volume o n. After you choose the disks, t he wizard will calculat e th e maximum size of the resulting volume, depending on[...]

  • Страница 254

    254 Copyr i ght © Acronis , In c., 2000-20 1 1 In setting t he cluster size you can ch oose between any number in t he preset amount for each file system. Note, t he program suggests the cluster size best sui ted t o the volume with the chosen file system. If you are creating a basic volume, whi ch c an be made into a syst em volume, t hi s page w[...]

  • Страница 255

    255 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 3 S e t a c t i v e v o l u m e If you have several pri mary volumes, you must specify one to be the boot vol ume. For t hi s, you can set a v olume to become active. A disk can have only one ac tive volume, so if you set a volume as active, the volume, which was ac tive before, wi ll be au to[...]

  • Страница 256

    256 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 5 C h a n g e v o l u m e l a b e l The volume label i s an optional at tribute. It is a name a ssi gned to a volume for easier recognition. Fo r example, one volume c ould be called SYST EM  a volum e with an operating system, o r PROGRAM  an applicat i on volume, D A TA  a data v ol[...]

  • Страница 257

    257 Copyr i ght © Acronis , In c., 2000-20 1 1 If you set a 64K cl uster size for FAT16/F AT32 or an 8KB-64KB cluster size f o r NTFS, W indows ca n mo u nt the volume, b ut s o me pro g rams (e.g. Setup pro grams) might ca lculate its disk s pa ce incorr ectly. 9. 8 P end i ng op er ati on s All operat i ons, whi ch were prepared by the user in m[...]

  • Страница 258

    258 Copyr i ght © Acronis , In c., 2000-20 1 1 10 Ad mi nis ter ing a man ag e d mac hin e This sect i on desc ri bes the v iews that are avail able through the navigation tree o f the console connec ted to a managed machine and ex plains how to work with each vi ew. 10 .1 Ba ck up pla ns an d tas ks The Backup plans an d tasks view keeps you i nf[...]

  • Страница 259

    259 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a plan/tas k Click Det a ils . In the respect ive Plan De t ails (p. 267 ) or Task De t ails (p. 26 8) wi ndo w, revie w the plan or task deta i ls. View plan' s/task's log Click Log . You will be taken to the Lo g (p. 269 ) view contain ing the list of the log entr i[...]

  • Страница 260

    260 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/task Click Edi t . Backup plan editin g is perform ed in the same way as creation (p . 45 ) , except f or the follow i ng limita t ions : It is not always pos sible to use all sch eme options, when ed iting a backup pl an if the creat ed arch i ve is not empty (i.e. conta i ns backup[...]

  • Страница 261

    261 Copyr i ght © Acronis , In c., 2000-20 1 1 1 Need intera ction At least one task ne eds user interactio n. Otherwise, see 2. Identify the tasks that need i ntera ction (the p r ogram wil l display what actio n is ne eded) -> Stop the tasks or enable the tasks to run ( change m edia; p rovide addit i onal spa ce on the vault; i gnore the rea[...]

  • Страница 262

    262 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 2.3 Ta s k st ate s A task c an be in one of the fo llowing stat es: Idle ; Waiting ; Running ; Need i nteraction . The initial t ask state i s Idle . Onc e the task is st arted manually or th e event spec i fied by th e s chedule occ urs , th e task enters either the Ru nning stat e or the Wai[...]

  • Страница 263

    263 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 1 . 3 E x p o r t a n d i m p o r t o f b a c k u p p l a n s The expo rt operation creates a fil e with c ompl ete c onf ig uration of the bac kup plan. You can import the file to reuse the export ed backup pl an on another machine. Centralized backup plans can be exported from a manag ement se[...]

  • Страница 264

    264 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 3.1 Ed it ing th e exp ort f il e The expo rt file is an .xml file and c an be edited with a text editor. Here is how t o make some useful chan g es. How to m o dify credentials In the export fi le, the <login> tags include t he user name and the < pa sswo r d> tags include the user[...]

  • Страница 265

    265 Copyr i ght © Acronis , In c., 2000-20 1 1 </lo gin> <pas sword e n crypted= "true"> XXXY YYZZZ888 </pa ssword> How to change item s to back up Replacing a directly spec ified item with another directly s pecified item Inside the <plan><target s><in clusi ons> section: 1. Delete the <ID> tag.[...]

  • Страница 266

    266 Copyr i ght © Acronis , In c., 2000-20 1 1 <specific> <backup_type > disks </backup_typ e> <disk_level_ options /> <file_level_ options /> <inclusion_r ules> <rules_ty pe> disks </rules_t ype> <rules> <rule> [BOOT] </ rule> <rule> [SYSTEM] </ rule> </rules> <[...]

  • Страница 267

    267 Copyr i ght © Acronis , In c., 2000-20 1 1 The default path to the dedicat ed f older is %ALLUSERSPROFI LE%AcronisBa ck u pAndReco v eryim p ort . The pat h is stored in the reg istry key HKEY_LOC AL_MACHINESOFTWAREAcronis MMS Configur a tionImport f olderPath . The ab sence o f the key means t hat the ag ent does not monitor th e ded[...]

  • Страница 268

    268 Copyr i ght © Acronis , In c., 2000-20 1 1  Last finis h time - how much time has passed since the last plan o r task end.  Last r esult - the result o f the last plan or t ask run.  Type - backup plan or task type.  Owner - th e name of the user who creat ed or last mo di fied the p l an  Next s ta rt tim e - when the plan o r [...]

  • Страница 269

    269 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .2 Lo g The loc al event log st ores the history of o perations performed by Acronis Bac kup & Recovery 11 o n the mac hi ne. To view a plain list of log ent ri es, select Events in the D isplay drop-down l ist; to view log entries grouped by activities, select Activities . The details of the s[...]

  • Страница 270

    270 Copyr i ght © Acronis , In c., 2000-20 1 1 Save all the filtered log entries to a file 1. Set filters to get a list of the log entri es that satisfy the filteri ng criteria. 2. Click Save all to file . 3. In the opened window, spec if y a path and a na m e for the f ile. All log ent ri es in the list w i ll be saved t o the spec if ied f ile. [...]

  • Страница 271

    271 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixing issues that caused ale rts To find and fi x the issue that caused th e alert , click Fix th e is sue . You wi ll be t aken to the correspo nding view,where you c an examine the issue and take t he ne cessary steps to resolve it. Optionally, y ou c an click View d etails to get more infor mation[...]

  • Страница 272

    272 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 5 . 1 C u s t o m e r E x p e r i e n c e P r o g r a m This opt i on defines whet her the machine will participa te in th e Acronis Customer Experienc e Program (ACEP). If you c hoose Yes, I want to partici p ate in the ACEP , information ab out the hardware c onfig uration, the most and least [...]

  • Страница 273

    273 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts view of the Navigation pane. When the c onsole is connected to the management serv er, t hi s sett i ng will also co ntrol the color sc heme of the Last backup column's value for eac h machine. Last c onnection This opt i on is effec tive when t he c onsole [...]

  • Страница 274

    274 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]

  • Страница 275

    275 Copyr i ght © Acronis , In c., 2000-20 1 1 You can override the set tings set here, ex clusively for the events th at occ ur during backup or during recovery, i n the D efaul t backup and recovery options. In this c ase, the settings set here wi ll be effective for operations oth er than bac kup and recovery, suc h as archive vali dation or cl[...]

  • Страница 276

    276 Copyr i ght © Acronis , In c., 2000-20 1 1  /etc/snmp/snmpd.conf - co nfi guration file for the Net-SNMP SNMP agent  /etc/snmp/snmptrapd . conf - c onfiguration file for th e Net-SN MP trap daemon. 10 .5. 4.3 W ind ows ev ent l o g This opt i on is effec tive only in Windows o perating systems. This opt i on is no t availabl e when o per[...]

  • Страница 277

    277 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to use this option, you must be l ogged on as a member of the Administrators g roup on the mac hi ne. You have the opportunity to register the mac hi ne on the management server when i nsta l ling an Acronis Bac kup & Recovery 11 agent. If the m achine is no t registered, selecting Cent[...]

  • Страница 278

    278 Copyr i ght © Acronis , In c., 2000-20 1 1  Google Chr o me. In Options , click Under th e Hood . Under Netw o rk , click Change proxy s ettings .[...]

  • Страница 279

    279 Copyr i ght © Acronis , In c., 2000-20 1 1 11 Ce nt ral ize d m ana gem ent This sect i on c overs operations that can be performed centrally by using the components fo r centralized manage ment. The c ontent of this section i s only applicable t o advanced editions of Acronis Bac kup & Recovery 11. 11 .1 Un der st and ing cen tra liz ed m[...]

  • Страница 280

    280 Copyr i ght © Acronis , In c., 2000-20 1 1 Organizing a manag ed archive storage What sho uld the capacity o f your cent ral ized vault be? What if tran sferri ng size able backups t o the vault will c ause networ k congestion? D oes backup o f a n online prod uction server affect t he server performance? To ensure that the cen tralized backup[...]

  • Страница 281

    281 Copyr i ght © Acronis , In c., 2000-20 1 1 3. To specify creden tials for c on nection, c lick Options and then type the u ser name and password in the Us er name and Password boxes respec tivel y. In Windows, if you leave the User na me box empty, the c redentials under which the co ns ole is running will be used. 4. To save the password for [...]

  • Страница 282

    282 Copyr i ght © Acronis , In c., 2000-20 1 1 For informat i on abou t Acronis security g roups and t hei r default mem bers, see Acronis security groups (p. 283 ). 11 .1. 2.4 Pr ivi l eges fo r rem o t e con nect i o n in Li nux Remote c onnections to a machine running L i nux  i ncluding those performed by the roo t user  are established [...]

  • Страница 283

    283 Copyr i ght © Acronis , In c., 2000-20 1 1 Example 2 The ab ove auth entication policy might not work on Linux distributions with kernel version 2.4      because the p am_succeed_if.so modul e is not sup ported there. In this c ase, you can use the fo l lowing authentic[...]

  • Страница 284

    284 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to c onne ct to the management serv er remotely , an admi nistrator of the management server must also b e a member of the A cronis Remot e Users group. No user  even a me mber of the A dministrators group  can b e an administrator o f the management serv er without being a member of [...]

  • Страница 285

    285 Copyr i ght © Acronis , In c., 2000-20 1 1 New accounts If you c hoose to create dedicated user accounts for the services, th e setup program wil l create the following user ac counts:  For t he service of Acronis Bac kup & Rec overy 1 1 Agent fo r Windows and Acro nis Backup & Recovery 11 Agent for VMware vSphere ESX(i) (Windows), [...]

  • Страница 286

    286 Copyr i ght © Acronis , In c., 2000-20 1 1 In addition, there are two Acronis services which ru n under a syst em acc oun t:  The Acr on is Scheduler 2 Servi ce provides scheduling fo r Acronis compon ents' tasks. It runs und er the L ocal System account and cannot run u nder a different ac count.  The Acr o nis Rem o te Agent Servi[...]

  • Страница 287

    287 Copyr i ght © Acronis , In c., 2000-20 1 1 C omp on en t na me C an be cl ien t C an be s erv er Acronis Backup & Recover y 11 Management Console Yes No Acronis Backup & Recover y 11 Agent Yes Yes Acronis Backup & Recover y 11 Management Server Yes Yes Acronis Backup & Recover y 11 Storag e Node Yes Yes Acronis PXE Ser ver No Y[...]

  • Страница 288

    288 Copyr i ght © Acronis , In c., 2000-20 1 1 the Acro ni s client. Du ring component installation you mig ht b e asked to c onfirm the port opening o r to open the po r t manually, in case y ou are usi ng a firewall other than Windows Firewall. After installation, you can c h ange the ports a t any time to mat ch your p referabl e values or fo r[...]

  • Страница 289

    289 Copyr i ght © Acronis , In c., 2000-20 1 1 For self-signed cert ificates, the c ertifi cate thumbprint (also known as fingerprint or hash) is used for future host identification: if a client has p rev iously connec ted to a server by using a self -signed certificat e and tries to establish c onnection again, the server checks whet her the cert[...]

  • Страница 290

    290 Copyr i ght © Acronis , In c., 2000-20 1 1  When selecting what data to back up, you can either s el ect items on the registered mac hi nes directly or use the selection rul es. For more i nformation, see "Selecting data to ba ck up" (p. 290 ).  When spec ifying where t o store mach i nes' arch ives, you can select to stor[...]

  • Страница 291

    291 Copyr i ght © Acronis , In c., 2000-20 1 1 Selecting a c heck box for a mac hi ne means bac ki ng up all the machine's disks. To select individual disks and/or v olumes, expand the m achine item an d select check boxes next to t he disks and/or volumes . Notes for p hysical m achines, their dis ks and volumes  If your o perating system[...]

  • Страница 292

    292 Copyr i ght © Acronis , In c., 2000-20 1 1 Point t o t he folders and files to be ba cked up . If you specified a pat h to a file or folder explicitly, t he plan will back up this item on each machine where this exact path will be foun d. To i nc l ude I n th e Fi l es and f ol de rs co lum n, t yp e or se le ct : File Text.do c in folder D: [...]

  • Страница 293

    293 Copyr i ght © Acronis , In c., 2000-20 1 1 The root user's home directory /root Directory for all user-related prog ram s /usr Directory for system configurat i on fi l es /etc 1 1 . 2 . 3 S e l e c t i o n r u l e s f o r v o l u m e s Define volume se l ection ru l es, ac cording to which the volumes on the mac hines included in the cen[...]

  • Страница 294

    294 Copyr i ght © Acronis , In c., 2000-20 1 1 Boot volu me Type or sel ec t: [ B OOT] Refers to the re g iste red machin e's boot volume. The boot volu me contains th e W indows folder and the suppo rting files for th e Windows op erating sys tem ( typ i cally located in the Wi ndowsSystem32 folder ) . It may or may not be the same as the s[...]

  • Страница 295

    295 Copyr i ght © Acronis , In c., 2000-20 1 1 Note on Li nu x machines You can include bo th Windows and Linux volumes (partitions) in on e centrali zed backup plan. For example, i t is possible to set up a cent rali zed backup plan to back up volume C: on Windows machines and partition /dev/hda1 on Linux machines. Unlike Windows, there is no c l[...]

  • Страница 296

    296 Copyr i ght © Acronis , In c., 2000-20 1 1 /dev/vg_mymachine/lv_root /dev/vg_mymachine/lv_bin To see the l ist of logical volumes on a machine, run the lvdisplay ut ili ty. In our exam p l e, t he out pu t would be similar to the fo l lowing: --- Logical volume --- LV Name /dev/vg_mymachine/l v_root VG Name vg_mymachine … --- Logical volume [...]

  • Страница 297

    297 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to create Acronis Secu re Z one in ad v ance o n each mac hi ne the cen tralized plan is created for. For information on how to c reate Acronis Secure Zone, see t he C reating Acronis Secure Zone (p. 170 ) section. 2. Naming the archives Data from each machine wi ll be bac ked up to a separa [...]

  • Страница 298

    298 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 2 . 6 W h a t i f a m a c h i n e d o e s n o t h a v e d a t a m e e t i n g t h e s e l e c t i o n r u l e s A centralized b ackup plan can be deployed to a machi ne that does not have data meeting the selection rules. No erro r or warning will be lo gged during the plan deployment because it[...]

  • Страница 299

    299 Copyr i ght © Acronis , In c., 2000-20 1 1 from th e regi stered machines and fro m the m anagement server. The c hart shows the n umber of log entries of each t ype ( Su cceeded , With warnings , Failed ) for a part i cular day. Statistic s for the selected date are displaye d to the right o f the ch art. Al l the st atistics fields are inter[...]

  • Страница 300

    300 Copyr i ght © Acronis , In c., 2000-20 1 1  Select a m achine (or group) to perform ac tions on it. See "Actions on machines" (p. 301) and "Actions on groups" (p. 308 ).  To view detailed information about the selected m achine or group and perform additional operations (such as run/stop t asks, import/export backup p[...]

  • Страница 301

    301 Copyr i ght © Acronis , In c., 2000-20 1 1 Example: T he accounting depart m ent fo rm s a separate Act i ve Directory organizational unit (OU). You si mply specify the ac counting O U as the group m e mbership criterion and create t he centralized b ackup pl an for i t. If a new ac countant is hired, the new machine will be added to the group[...]

  • Страница 302

    302 Copyr i ght © Acronis , In c., 2000-20 1 1 deleted fro m the m achine . If the machi ne is not ava i lable at the m oment, these actions will be per formed on the ma c hine as soon as the mach ine becomes ava il ab l e to th e manage m ent serv er. Grouping actions To Do Create a cus tom static or dynamic group Click Cre at e gr oup . In the C[...]

  • Страница 303

    303 Copyr i ght © Acronis , In c., 2000-20 1 1 Other actions To Do View deta i led i nformat i on on a ma chine Click Det a ils . In the Machi ne details (p . 306 ) window, exa mine infor mati o n on the ma chine. View log entries of a machine Click L og . The Log (p. 324 ) view will di splay a l i st of the machine' s l o g entries . Update [...]

  • Страница 304

    304 Copyr i ght © Acronis , In c., 2000-20 1 1 Select t he Sav e passw o rd check box to store t he pass word fo r futu re connections. 5. Click Next , and then click Proceed . Initiating registration on the machine side The registrat i on proc edure can be initiated on the machine side. 1. Connect the console to the machine where Acro ni s Backup[...]

  • Страница 305

    305 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the P ath field, enter a path to the .txt or . csv file, or click Browse and select the file in the Browse window. 4. Under Logon setti ngs , specify t he user name and p assword of a user who is a member of the Administrato rs group on all machines th at are listed in the file. 5. Click OK t o [...]

  • Страница 306

    306 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o add machines. Onc e the machines app ear in th e group, the centralized backup plans created for the group (if any) are deployed t o the mach ines. If any of t he selected machines is not av ailable or reachable at the moment, the action will be kept in t he management server as pendin[...]

  • Страница 307

    307 Copyr i ght © Acronis , In c., 2000-20 1 1  Installed a gents - full name of A cronis agents, installed on the machine.  Proces sor - the type of CPU used in t he managed machine.  CPU clock - c l ock rate of the C PU.  RAM - m emory size.  Descri ption - th e machine's description ( taken from the Computer desc ription in [...]

  • Страница 308

    308 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 2.3 Ac ti ons on gr oup s Actions are avai lable when y ou select the Machines with agents vi ew i n the N av igation tree. You sel ect a g roup in the Navigation tree o r in the Machines wi th agents view to perform an action on t he group. The fo l lowing is a guideline to perform ac tions on[...]

  • Страница 309

    309 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Move one c ustom group to another Click Move to . In the Move t o gro up (p. 311 ) window, sp ecify a group that will be a new parent of the sele cted group. Delete a custom group Click Dele t e . Deletion of a pa r ent g r oup wi l l delete i ts chi ld groups as w ell. Centrali z ed backup plan[...]

  • Страница 310

    310 Copyr i ght © Acronis , In c., 2000-20 1 1 Operating system: Windows Server 2 008 Operating syst em : Windows Server 2003 will add t o the same group all the m achines whose operating system is W indows 20 00 OR Windows 200 3. b) Entries of different criteria are c ombined by logical multipli cation (AND) For example, consider the fo l lowing [...]

  • Страница 311

    311 Copyr i ght © Acronis , In c., 2000-20 1 1 A registered machin e has to be specified by its registration address, that is, you need t o provide exactly t he same host name, full y qualified domain na me (FQDN), or I P address as was specified when th e machine was i nitially added t o the management server. Otherwise, the machine will not be a[...]

  • Страница 312

    312 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a backup plan Click Det a ils . In the Backup plans and tasks window, exa mine all infor m ati on related to the selected ba ckup plan. View log o f a back up plan Click Log . The Log vie w wil l display a list of the l og ent r ies related to the selected backu p plan. Run a b[...]

  • Страница 313

    313 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding a virtu al machine as a virtual machi n e On Ac ronis Backup & Recovery 11 Management Server, a machine is considered virtual i f it c an be backed up from t he virtualization host without inst alli ng an agent on the machine. This is po ssi ble when using th e Acronis Backup & Recovery[...]

  • Страница 314

    314 Copyr i ght © Acronis , In c., 2000-20 1 1  To review detailed informat i on on the sel ected plan (task), use t he information panel at the bott om of the wi ndow. The pan el is collapsed by defaul t. To expand the panel, c l ick the arrow mark ( ). The con tent of the panel is also duplicat ed in the Plan details (p. 267 ) and Task detail[...]

  • Страница 315

    315 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/tas k Click Edi t . Centralized backup pla n The editing of centra lized backu p plans is performe d in th e same way as creating . Once the plan is ed ited, the m ana g ement serv er updates the plan on all machin es the plan was deployed to . Task The editing of tasks is performe d[...]

  • Страница 316

    316 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 3 . 6 L i c e n s e s The L icenses view enables you to m anage licenses stored on Acronis Lic ense Server. The l icense server can be either integrated with A cronis Backup & Recovery 11 Management Server, or installed as a separat e component . Acces sing the Licenses view To access the Li[...]

  • Страница 317

    317 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Acti on s menu, sel ect C h ange licens e server . 4. Specify th e name or IP address of the machine with th e license server . 5. Click OK . After ch ang ing the license server, the management server deploys the new license server's IP address to the registered mac hines and they st ar[...]

  • Страница 318

    318 Copyr i ght © Acronis , In c., 2000-20 1 1 LicenseServerCmdLine .exe supports t he followi ng para meters: --status <IP -ad dress or ho stname> Displays the t otal number of l icenses and t he number of available licenses for eac h Acronis produc t. --import <IP -ad dress or ho stname> <l icense key > Adds a new l icense key [...]

  • Страница 319

    319 Copyr i ght © Acronis , In c., 2000-20 1 1 A predefined report template is preset so that you can generate a repo rt with one click. To start generating a report , select a report template in the Repo rts view, an d then c l ick Generate on the toolbar. The repo rt will con tain the information sel ected, grouped and sorted a ccording to th e [...]

  • Страница 320

    320 Copyr i ght © Acronis , In c., 2000-20 1 1  Origin : The types of origin of t he ba ckup plans  Local and/or Ce n tralized .  Machines : The list of machines on which the backup plans exis t.  Backed up data ty pe : Th e types of backed up data  Machines/Disks/Volum es and/or Files .  Deployment state : The deployment stat es[...]

  • Страница 321

    321 Copyr i ght © Acronis , In c., 2000-20 1 1  Select whet her to show all items in a sing l e table or to group them by a particular column.  Specify which table columns to show, and in which order.  Specify how to sort the table. 11 .3. 7.4 R ep ort ab out th e a rch ive s a nd b ac kup s In this view, you can generate a report about t[...]

  • Страница 322

    322 Copyr i ght © Acronis , In c., 2000-20 1 1 With th e default filter settings, the report includes informat ion about all centralized manage d vaults plus the combined total. Report view Under Report view , choose ho w the report will look:  Specify which table columns to show, and in which order.  Select which diag rams to i nclude in t [...]

  • Страница 323

    323 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 7.8 R ep ort v iew In order fo r your web bro wse r to correct ly display dates and other information i n generated repo rts , enable act i ve cont ent (JavaScript). You can all ow act i ve cont ent to run t emporar i ly for t he currently displayed webpa ge, or enable i t permanent l y. To all[...]

  • Страница 324

    324 Copyr i ght © Acronis , In c., 2000-20 1 1 To export en tire table cont en ts to a *.txt or *.csv file, click Save all to fil e . Alerts view on the management s erver When th e console is connect ed to the management server, the Alerts view displays a l erts c ol lected from bot h the registered machines and t he management server. Alerts col[...]

  • Страница 325

    325 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Select a s i ngle a c tivity Select Activi t ies in the Dis play drop-down list and click an a cti vity. The Informa t ion pane wi l l show l og ent r ies for the se lected activ i ty. Select a s i ngle log entry Click on it. Select m ultiple lo g entries  non-contig u ous : ho ld down C TRL [...]

  • Страница 326

    326 Copyr i ght © Acronis , In c., 2000-20 1 1 To copy the d etail s, c l ick the Copy to clipboard button . Log entry data fields A log entry c ontains the fo l lowing data fields:  Type - Type o f event (Error; Warning; I nformation).  Date and time - Date and time when t he event took place.  Backup plan - T he backup plan t he event r[...]

  • Страница 327

    327 Copyr i ght © Acronis , In c., 2000-20 1 1 You al so have t he abili ty to delete proxies from th e list. Please keep i n mind th at an y chan ge to this option affects the entire management server. If you de lete a proxy from the list, the Wake - On -LAN funct i onality in the corresponding subnet wi ll be disabl ed for all cent ral ized back[...]

  • Страница 328

    328 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts sec tion of the Dashbo ard . When t he console is c onnected to the management serv er, t hi s sett i ng will also c ontrol the color scheme o f the Last c onnect column's value for eac h machine. 11 .3. 10.3 Do main a cce ss cre den tia ls This opt i on det[...]

  • Страница 329

    329 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]

  • Страница 330

    330 Copyr i ght © Acronis , In c., 2000-20 1 1 To disable this opt i on, clear t he Log events check box. S NMP not ifi cat ion s This opt i on defines whet her the management server h as to send it s own log events t o the specified Simple Network Management Protoc ol (SNMP) manag ers. You can choose the t y pes of events t o be sent. For det ai [...]

  • Страница 331

    331 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Maximum log si ze: 1 GB . On cleanup , keep 95% of the maximum log size . When th e option is enabled, the program compares the act ual log size with the maximum size aft er every 100 l og entries. On ce t h e maximum log size is ex ceeded, t he pr ogram deletes th e oldest log entries.[...]

  • Страница 332

    332 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 4 . 1 P a r a m e t e r s s e t t h r o u g h a d m i n i s t r a t i v e t e m p l a t e The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 component s that can be set by using Acronis Adm i nistrative Template. For informatio n on how to apply the administrative template[...]

  • Страница 333

    333 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// msdn2.microsoft.c om/en-us/library/aa374 177.aspx 11 .4. 1.2 Ac ron is Ba ckup & Re cov ery 11 Ag ent f or Wind ow s The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 Agent that can be set by using Acronis Administrat iv e Temp la te. Lice n sing Specifies how o ft[...]

  • Страница 334

    334 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 11 will cont i nue working with full func tionali ty for the number of days specified in Maximum T ime W ithout License S erver , as count ed fr om the m oment o f installation or from the last successful check. [...]

  • Страница 335

    335 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), or 5 (Critical error) Default value: 4 (only errors and critical errors will be sent  if Trace State is set t o True ) SNMP Specifies the types of the ag ent's events to send notificat i on[...]

  • Страница 336

    336 Copyr i ght © Acronis , In c., 2000-20 1 1 An empty st ri ng means the folder %AllUsersProfile%Application DataAcron isBackupAndRecovery MMS Temp. You can specify a l ocal folder on any volume, including a volume you are bac king up. Snapshot St o rage Absolu te Size Description: Specifi es the i nitial size of the snapshot storage, in me[...]

  • Страница 337

    337 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the password for aut hen tication wi th t he proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Important. The password can be viewed by any user w ho has access to the admi nistrative template, such as to an administrator of the [...]

  • Страница 338

    338 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es whether to record Acronis Bac ku p & Rec overy 11 Management Serve r's events into the event log. Possible values: T rue or Fa lse Default value: Fal se Trace Le v el Description: Specifi es the m inimum level o f severi ty of ev ents t o be recorded into the ev ent lo[...]

  • Страница 339

    339 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 200 If the t otal number of online registered machines d oes not exceed the value in Maximum Con nections , c onnections to those m achines are always kept , and the management serv er periodical l y performs sync hronization wi th eac h machine. Otherwise, i t c onnects to a number o f[...]

  • Страница 340

    340 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: T rue or Fa lse Default value: Fal se By default, Acronis Backup & Recovery 11 Management Server c onnec ts t o registered machines to perform synchronizat i on  in particular, t o retrieve data such as backup l ogs. This appro ach is known as a po l ling mechanism . If Real Ti[...]

  • Страница 341

    341 Copyr i ght © Acronis , In c., 2000-20 1 1 Specifies the l ocation and initial size of the snapshot storage  a temporary file that i s used when backing up data by taking a snapsho t. This file is delete d as soon as the backup is c omplete. With th e default settings, t he snapshot st orage is created in t he temporary files folder of the [...]

  • Страница 342

    342 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the name or IP address of the proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Proxy Ser v er P ort Description: Specifi es the port number o f the proxy server Possible values: A ny integer number between 0 and 65 535 Default v[...]

  • Страница 343

    343 Copyr i ght © Acronis , In c., 2000-20 1 1 The c omponent wil l use the default settings, whic h is to use encryption if possible and to trust sel f-signed SSL c ertifi cates (se e the foll owing option). Enabled Enc ryption is enab l ed. In Encryption , select one of the foll owing: Enabled Data transfer will be enc rypted if encrypt i on is [...]

  • Страница 344

    344 Copyr i ght © Acronis , In c., 2000-20 1 1 Disabled Enc ryption is disabled; any connection t o a client ap pl ication which requires encryption will not be established. Required Data transfer will be perfo rm ed only if enc ryption is enabled on the client application (see "Client Enc ryption options" ); it will be encrypt ed. Authe[...]

  • Страница 345

    345 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the minimum sever i ty level o f events to b e recorded in the file. Only events of levels great er than or equal to File Trace Mi n imal Level will be recorded. Possible values: A ny severity l evel from Unkn o wn throu g h Cri tical , or Blocked to not record any events Defau[...]

  • Страница 346

    346 Copyr i ght © Acronis , In c., 2000-20 1 1 12 On lin e bac kup This sect i on pro v ides details about using the Acronis Backup & Recovery Online service. T his service enables you t o do online backups t o Acronis Online Backup St orage. Acr o nis Backup & Rec o very On line might be un a vailable in y ou r region. To find m ore info [...]

  • Страница 347

    347 Copyr i ght © Acronis , In c., 2000-20 1 1 directly from the o nl ine storage. Files c an be recovered from disk -lev el bac kups as well as from file-level bac kups. For informat i on abou t backing up v irtual machines see "How to back up virtual machines to the online storage? (p. 347 )" 1 2 . 1 . 3 H o w l o n g w i l l m y b a c[...]

  • Страница 348

    348 Copyr i ght © Acronis , In c., 2000-20 1 1 Install Acronis software into the guest syst e m The mac hi ne will be treated as a physical one. Y ou wil l need a separa te server or workst ation subscription for this machine. This app roach comes in handy when:  the mac hi ne is not hos ted o n a virtualization server  the virtualization pr[...]

  • Страница 349

    349 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 6.5 W hat ha ppen s if I ru n out of spa ce? When a mac hi ne's bac kups are about to exceed the storage space allowed by its subsc ri ption, you receive an e-mail n otification wi th an al ert. In addition, you can see this alert on t he account management web page near the m achine. This[...]

  • Страница 350

    350 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 7.3 Is I niti al S eedi ng a pa id s ervi ce? Ye s, you need to buy one Initial Seeding l icense per ma chine. 12 .1. 7.4 W hat typ es of h ard dri ve can I us e f or Ini tia l S eedi ng? Acronis ac cepts hard disk drives of t he followi ng interf ace types: I DE, ATA, SA TA, USB connected driv[...]

  • Страница 351

    351 Copyr i ght © Acronis , In c., 2000-20 1 1  In Backup scheme , select Initial seeding . Specify t he s aid media as the b ackup destination.  [Opt i onal, bu t strongly recommended] Enable backup encryption in Backup options > Archive protec tion . The bac kup starts immediately after you click the fi nal OK . 5. [Opt i onal] If you w[...]

  • Страница 352

    352 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 1 Delicately remo v e your hard di sk drive from t he machine. S tep 2 Place the hard drive into an anti -static bag to pro tect the drive from electrostat ic discharge. If y ou do not have an anti-static bag, si mply wrap the hard drive into aluminum foil. S tep 3 Use a sturdy box that is at l [...]

  • Страница 353

    353 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 4 Choose the transport company t hat you will use for shi pping. On that company's web si te, prepare and print two prepaid shipping labels: 1. Shipping l abel for se nding your hard driv e. T his label is pl aced o n the top of the box. Y ou should send your package to one of the A cronis [...]

  • Страница 354

    354 Copyr i ght © Acronis , In c., 2000-20 1 1  An order w a s cr eated  The backup is about t o start and t he license cannot be used for the same or any other machine. From t his point on, you can cancel th e order if something goes wron g . This will return the license to the po ol of available licenses.  A full backup h a s s tarted ?[...]

  • Страница 355

    355 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e you o r der Large Scale Rec overy for a par ticular machine, Ac ronis sends yo u a USB hard disk drive with all of t he bac kups made from t his machine. You can recover data directly fro m the di sk or copy the backups to a local or network folder. 12 .1. 8.2 W hy w oul d I us e Lar ge Scal e R[...]

  • Страница 356

    356 Copyr i ght © Acronis , In c., 2000-20 1 1 can cancel the o rder if something goes wrong. This will return t he l icense to t he pool of available licenses.  The order i s being process ed - Order processing in t he datacent er s tarted.  Writing data  Your backups are b ei ng written o nto the media. From this p oi nt o n, you cannot[...]

  • Страница 357

    357 Copyr i ght © Acronis , In c., 2000-20 1 1 If you purc hased your subscriptions o nl ine using the Ac ronis Web site, t hey are available immediate ly on your ac count management Web page. The newl y o btained subscriptions are li sted at the Man age Subscriptions tab . 12 .1. 9.3 W hen do es my sub scri pti on be gin? Your subscription begins[...]

  • Страница 358

    358 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat doe s " Aut o- rene w" mean? Auto-renewal means t hat when th e curren t subscription expires, t he next subscription will be automat i cally selected from the available subscript ions. The n ext subscription must be ident i cal to the c urrent subscription. If an identical subscriptio[...]

  • Страница 359

    359 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 9.8 Ca n I r evo ke a su bsc rip ti on f ro m a machi n e? You cann ot retur n an activated subscription to th e list of av ailable subsc ri ptions, but you can reassig n (p. 361 ) it to a di fferent mac hi ne in Acro ni s Backup & R ecovery 11 GUI . 12 .1. 9.9 Ca n I canc el my sub scri pt[...]

  • Страница 360

    360 Copyr i ght © Acronis , In c., 2000-20 1 1  Windows Server 20 08/2008 R2 (x64) with Hy per- V.  Microsoft Hyper-V Server 2008 / 2008 R2 . If your bac kups are likely to exceed the storage quota f or this type of subscription, you may want to use a sub scription with larger storage quota. For example, you c an use a server subscription or[...]

  • Страница 361

    361 Copyr i ght © Acronis , In c., 2000-20 1 1 To act iv ate s ubs cri pt io n s 1. Connect the console to the management server. 2. In the Acti on s pane, click Activate online backu p subsc riptions . 3. Specify th e credentials to l og in to the onli ne storage. 4. Select t he machine and then c l ick Select s u bscription . 5. From Available s[...]

  • Страница 362

    362 Copyr i ght © Acronis , In c., 2000-20 1 1 Depending on your settings, t his backup wil l be either fu l l or incremental. But its size is not l ikely to be less than a full backup size. T herefore, it is not practical to reassi gn a subsc ri ption t o a machine whose first backup was done as an initial seeding. You wi ll need to either redo t[...]

  • Страница 363

    363 Copyr i ght © Acronis , In c., 2000-20 1 1 To con fig ur e p ro xy se tti ng s f or an ag en t 1. Connect the console to the mac hi ne for whi ch you want to c onfig ure proxy set tings. 2. In the Opti o ns menu, l ocated on the toolbar, click Machine options . 3. Click Online b ackup prox y . 4. Enter the proxy server settings. For detailed i[...]

  • Страница 364

    364 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup and recovery options Some bac kup and recovery options are not supported by online backups. For example, Backup splitting (p. 101 ). By using the Backup perf ormance > Network con nection speed opt ion, you can vary the tran sferri ng speed as kilobytes p er second, but not as a per centage.[...]

  • Страница 365

    365 Copyr i ght © Acronis , In c., 2000-20 1 1 Permission for a machine to use an extra service of Ac r onis Backup & Recovery Online. You can buy Initial Seeding lic enses and/or Large Scale Recovery licenses . Reassign a subs cription Assign a sub scription that is already ac tivated, to a d iffe rent mach i ne. Registration code A charac te[...]

  • Страница 366

    366 Copyr i ght © Acronis , In c., 2000-20 1 1 13 G los sary A Ac ron is A c t ive Re stor e The Acro ni s proprietary technology that brings a system online immediately aft er the system recovery is st arted. The system b oots fr om the backup (p. 372 ) and the m achine bec omes operational an d ready t o provide necessary services. T he data req[...]

  • Страница 367

    367 Copyr i ght © Acronis , In c., 2000-20 1 1 Ac ron is Uni ve rsa l R est ore The Acro ni s proprietary technology that helps b oot up Windows or Linux on dissimilar hardware o r a virtual machine . Universal Restore handles differences in devices that are critical fo r the operat i ng system start -up, su ch as storage c ontrollers, motherboard[...]

  • Страница 368

    368 Copyr i ght © Acronis , In c., 2000-20 1 1 B ack up opti on s Configuration parameters of a backup o peration (p. 3 6 7), suc h as pre/post backup commands, maximum net work bandwidth all otted for the backup stream o r data compression level. Backup options are a part of a backup pl an (p. 368). B ack up p la n (P lan ) A set o f rules th at [...]

  • Страница 369

    369 Copyr i ght © Acronis , In c., 2000-20 1 1 B oota bl e medi a A physical med i a (CD, D VD, USB flash drive o r ot her m edia supported by a machine (p. 375 ) as a bo ot device) that contains the bootable agent (p. 368 ) or Windows Preinstallat ion Environment (Wi nPE) (p. 379 ) with t he Acr onis Plug-i n for Wi nPE (p. 366 ). A machine c an [...]

  • Страница 370

    370 Copyr i ght © Acronis , In c., 2000-20 1 1  creating and managi ng centralized vau lts (p. 370 ) for storing archives  managing sto rage nodes (p. 378 )  monitoring act i vities of the Acronis Bac kup & Reco v ery 11 compo nents, creating report s, viewing the c entralized log and more. Ce ntr al iz e d ta sk A t ask (p. 378 ) pro[...]

  • Страница 371

    371 Copyr i ght © Acronis , In c., 2000-20 1 1 Consolidation m i ght be n ee ded when deleting backups , either manu al ly or during cleanup (p. 370 ) . For example, the retention rul es require to delete a ful l bac kup (p. 374 ) that has expired b ut retain the next incremental (p. 375 ) one. The backup s wil l be combined i nto a si ngle full b[...]

  • Страница 372

    372 Copyr i ght © Acronis , In c., 2000-20 1 1  viewing the st ate, progress and properties of the centrali zed tasks (p. 370 ) exi sting on t he machine  viewing and manag i ng the l og of t he agent's operat ions  disk management operations, suc h as clone a disk, create volume, c onvert volume. A kind of d i rect management i s pe[...]

  • Страница 373

    37 3 Cop yright © Acr o nis, In c., 200 0 -2011 D ynam ic dis k A hard disk managed by Logical Disk Manager (LD M) that i s available in Windows st arting with Windows 200 0. LDM helps flexibly allocate v olumes o n a storage device for bet ter fault t ol erance, better performance or larger volume size. A dynamic disk c a n use either the master [...]

  • Страница 374

    374 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic vol um e Any volume loc ated on dynamic d isks (p. 372 ), or more precisely, on a d isk group (p. 372 ). Dynamic volumes can spa n multiple disks. Dynam ic volumes are usually configured depending on the desired goal:  to increase th e volume size (a span ned volume)  to reduce the acc[...]

  • Страница 375

    375 Copyr i ght © Acronis , In c., 2000-20 1 1 I Im ag e The same as Disk backup (p. 372). In cr eme nta l ba cku p A bac kup (p. 367 ) that stores changes to the data ag ainst t he latest bac kup. You need ac cess to ot her backups from the same arch ive (p. 367 ) to res tore data from an i ncremental bac kup. In de xing An act i vity (p. 367 ) p[...]

  • Страница 376

    376 Copyr i ght © Acronis , In c., 2000-20 1 1 M Ma ch ine A physical or v irtual comput er uniquely identified by an operat i ng system installation . Machines with multiple op erating systems (mu lti -boot syst em s) are c onsidered as multipl e machines. Ma nag ed ma chin e A mac hine (p. 375 ), either physical or virtual, where at l east one A[...]

  • Страница 377

    377 Copyr i ght © Acronis , In c., 2000-20 1 1 P Pe rs ona l va ult A local or networked vault (p. 379 ) created using direct managem ent (p. 371 ). On ce a personal vault is created, a shortcut to it appears on the managed machine i n the Vaults list. Multiple machines c an use the same physical location; for exampl e, a network share; as a perso[...]

  • Страница 378

    378 Copyr i ght © Acronis , In c., 2000-20 1 1 S S tat ic gr o u p A group of machines which a management server (p. 376 ) ad ministrator po pulates by manually adding machines t o the group. A mac hi ne remains in a static group until the administrator rem oves it from th e group or from the m anagement server. S to rage n o de (A cr oni s Ba cku[...]

  • Страница 379

    379 Copyr i ght © Acronis , In c., 2000-20 1 1 Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validation of a disk backup c al culates a chec ksum for ev ery data bl ock saved in th e backup . Both procedu res are resource-intensive. While the suc cessful vali dation means a high probab [...]