Manuel d'utilisation / d'entretien du produit Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u du fabricant Acronis
Aller à la page of 410
Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 A d v a n c e d S e r v e r User's Guide.
Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc.
Table of contents 1 Introducing Acro nis® Back up & Recover y™ 10 ........................................................................ 8 1.1 Acronis Backup & Rec overy 10 overview ........................................................
2. 14 .4 Po li cie s o n m ac hin es and gr oup s ................................................................................................................. 64 2. 14 .5 B ac kup po li cy's st ate an d s ta tuse s ..........................
5.7 Conditions ................................................................ .............................................................. 179 5. 7. 1 Us er is i dle ................................ ................................................
6. 7. 1 T ask c re dent ia ls ........................................................................................................................................... 25 4 6. 7. 2 Ar ch ive se lec ti on .............................................
8. 1. 1 Wh at is Ac ron is Ba c ku p & Re cov er y 10 O nli ne? ....................................................................................... 379 8. 1. 2 Wh at da ta ca n I b ack up a nd r ec ov er? ......................................
8 Copyright © Acronis, Inc., 2000 - 2010 1 I ntr od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba cku p & R eco ve ry 10 o ver vie w Based on Acronis’ paten ted disk im.
9 Copyright © Acronis, Inc., 2000 - 2010 Controlling user righ ts to p erform operations and access backups Running services wi th minimal user rights Restricted rem ote access t o a backup agen t Se.
10 Copyright © Acronis, Inc., 2000 - 2010 4. Start the consol e. Create the bootable media. 5. Connect the cons ole to the manage m ent ser v er. The simplified w ay of cent ralized management Backup Using the Back up c o ntrol, select the ma chine which y o u want t o back up and then create a backup plan (p.
11 Copyright © Acronis, Inc., 2000 - 2010 Creating a backup policy rather than ba c kup plans Set up a centralized bac kup policy and apply it to th e All machines group . This way you will deploy backup plans on each machine with a single action.
12 Copyright © Acronis, Inc., 2000 - 2010 Key elements of the console wo rkspace Na me D esc rip tio n Navigation pane Contains the Navigation tree and th e Shortcuts bar and lets you navigate to the different views (see the Navigation pan e (p. 12 ) section.
13 Copyright © Acronis, Inc., 2000 - 2010 [Management ser v er nam e] . Root of the tree also called a Welcome view. Displays th e name of the manage m ent server the console is currently c onnected to. Use this view f or quick access to the main operati ons, available on the manage ment server.
14 Copyright © Acronis, Inc., 2000 - 2010 actions bar will b e named a s 'System ba c kup' action s and will hav e the set of actions typical t o backup plans. All actions can als o be acc essed in the respective men u items. A menu item appe ars o n the m enu bar when you select an it em in any of the navigati o n views .
15 Copyright © Acronis, Inc., 2000 - 2010 Help Contains a list of help to pics. Differ ent views and action pag es of Acronis Bac kup & Recovery 10 provided with lis ts of specif ic help topics.
16 Copyright © Acronis, Inc., 2000 - 2010 "Tasks" view Common way of worki ng with views Generally, ever y view con tains a table of items, a tabl e toolbar with buttons, and the Information panel.
17 Copyright © Acronis, Inc., 2000 - 2010 Action page - Create backup plan Using controls and specifying s ettings The action pages off er tw o ways of r epresentation: ba sic and advanced. The basic repr esentation hides such fields as cr edentials, comments, etc.
18 Copyright © Acronis, Inc., 2000 - 2010 Navigation butto ns 1. 3 Ac ron is Ba cku p & R eco ve ry 1 0 c om po ne nt s This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionali ty .
19 Copyright © Acronis, Inc., 2000 - 2010 File backup File -level data protecti o n is based on backing up files and folders r esiding on the machine wher e the agent is installed or o n a ne tw ork shar e. Files can be recovered to their o riginal l ocation or to another place.
20 Copyright © Acronis, Inc., 2000 - 2010 recovered to th eir original location or to another place. It is possible to recover all files and directories that w ere backed up or select which of them to recover.
21 Copyright © Acronis, Inc., 2000 - 2010 VMware vCenter integ ration This feature provides the capability to view vir tual machines managed by a VMware vCenter Server in the manage m ent ser v er GU.
22 Copyright © Acronis, Inc., 2000 - 2010 Deduplication A managed vault can be configured as a deduplicating vault. This means that iden tical data will be backed up to this vault o nl y once to min imize th e network usage durin g backup and storage space taken by the archiv es.
23 Copyright © Acronis, Inc., 2000 - 2010 The media builder that installs on Windows can creat e bootable media based o n either Windows Preinstallation Envir onment, or Linux kernel. The Univ ersal Restore (p. 19 ) add-on enables you to create bootable m edia with t he restore to dissi milar hardware functionalit y.
24 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 - the Stand ard, Enterprise, Small Busin ess Server , Fo undati o n editions (x86, x64) Windows Server 2 008 R2 - the Standard, .
25 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 - the Stand ard, Enterprise, Small Busin ess Server , Fo undati o n editions (x86, x64) Windows Server 2 008 R2 - the Standard, .
26 Copyright © Acronis, Inc., 2000 - 2010 Management Console 30 MB 950 MB 450 MB Screen resolution 1024*768 pixels or higher Management Server 40 MB 250 MB 400 MB for SQL Express Server 250 MB 400 MB.
27 Copyright © Acronis, Inc., 2000 - 2010 2 Un de rs ta n din g Acr on is B ack up & Re co ver y 10 This section attempts to give its readers a clear under standing of the product so that t hey can use the product in vari ous circumstanc es without step- by -step instructions.
28 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates the notions discuss ed above. For more definiti ons please refer to the Glossary.
29 Copyright © Acronis, Inc., 2000 - 2010 Backup using bootable media You can boot the m achine u sing the bootable media, configure the backup operation in the same way as a simple backup plan and execute the o peratio n.
30 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates data recovery und er the operating system (online). No bac kup can proceed on the machin e while the recovery opera tion is taking place. If requ ired, you can connect the console to an o ther ma chine and configure a recover y o perati o n on that m achin e.
31 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to rec ov er dat a to bare metal, you boot th e machine using the bootable media and config ure the recovery operation in the sa me way as the recovery task . The following diagram illustrates the recovery using the bootable media.
32 Copyright © Acronis, Inc., 2000 - 2010 Members of the Ad ministrators group also can : View and manage ba ckup plans and tasks owned b y any user o n the m achine.
33 Copyright © Acronis, Inc., 2000 - 2010 Manual start You can skip the P l an's (Ta sk) cr edentia ls step. Every time you start th e task, th e task will run under the credentials with which you are currently l o gged on. Any person that has ad ministrative privil eges on the machine can al so start the task.
34 Copyright © Acronis, Inc., 2000 - 2010 you need to roll bac k the system to its initial st ate this initial state d o es not c hange often, so there is no n ee d for regular backup.
35 Copyright © Acronis, Inc., 2000 - 2010 Recovery time Minimal Medium Maximal 2. 5 GF S b ac ku p s ch eme This section covers im plem entation of the Grandfather-Father-Son (GFS) backup scheme in Acronis Backup & Recover y 10. With this backup sche me you are not allowed to ba ck up more often than once a day.
36 Copyright © Acronis, Inc., 2000 - 2010 Weekly/Monthl y This step forms the dail y, weekly and monthly c y cles in the schedule. Select a day of the we ek fr o m the da y s selec ted in the previous ste p. Each 1 st, 2nd and 3rd backup created o n this day o f the week will be considered as a we ek ly backup .
37 Copyright © Acronis, Inc., 2000 - 2010 backups’ retenti o n peri od cannot be less than the weekly backups’ retenti o n peri od. It is usually set several time s lo nger.
38 Copyright © Acronis, Inc., 2000 - 2010 The resulting archive: real In reality, the arch ive content will somewhat diff er from the ideal sche me. When using the incre mental and differential backup methods, you cannot delet e a backup as soon as the scheme requires if later backups are based o n this backup .
39 Copyright © Acronis, Inc., 2000 - 2010 2. 6 To wer o f H ano i bac ku p s ch em e The need to have frequ ent backups always conflicts wi th the cost of keeping such backups for a long time. The Tower o f Hanoi ( To H) backup sche me is a useful compr o mise.
40 Copyright © Acronis, Inc., 2000 - 2010 Tower of Hanoi by Acroni s The Tower of Hanoi backup scheme is generall y too complex to mentall y calculate the next medi a to be used. But Acronis Backup & Recovery 10 pro v ides y o u with automa tion of the scheme usage.
41 Copyright © Acronis, Inc., 2000 - 2010 For information ab out using Tower of Hanoi f o r tape li braries, see Using the Tower of Hanoi tape rotation scheme (p. 1 55 ). 2. 7 Re ten tio n rul es The backups produced b y a backup plan make an archi v e.
42 Copyright © Acronis, Inc., 2000 - 2010 There is a certain ris k that all but one backup will be deleted if the maximu m archive size is set improperly (too small) or a regular backup turns o ut to be t o o large.
43 Copyright © Acronis, Inc., 2000 - 2010 Retain the backup until all dependent backups become sub j ect to de letion The outdated backup w ill b e kept until all bac kups that depend on it also b ecome outdated. Then all the chain will be d eleted at once during the reg ular cleanup .
44 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 can back up and recover dynami c volumes and, with min o r limitati o ns, basic GPT volumes. Backing up dynamic v olumes Dynamic and basi c GPT v o lumes are bac ked up in the same way as basic MBR v olumes.
45 Copyright © Acronis, Inc., 2000 - 2010 Ba ck ed up (so ur ce) : Re cov er ed to: Dy na mic vo lu me Ba si c M BR vol um e Ba si c G PT vol um e Dy na mic vo lu me Dynamic volume Type as of the tar.
46 Copyright © Acronis, Inc., 2000 - 2010 Backup (GUI) In Acronis Backup & Re cov ery 10 GUI, logical volume s appear under Dynamic & GPT Vo l umes at th e end of the list of v o lumes a v ailable for bac kup. To back up all availab le disks, specif y all logical volumes plus basic volumes not belonging to them.
47 Copyright © Acronis, Inc., 2000 - 2010 When recovering MD devices under bootab le media, t he structure of MD devices c an be automatically cr eat ed if it h as been saved in the backup (p. 47 ). For detailed infor mation about recovering MD de vices under bootable media, s ee Recovering MD de v ices and logical volumes (p.
48 Copyright © Acronis, Inc., 2000 - 2010 Num Partition Fla gs Start Size Ty pe ---- -------------------- -------- --- ---------- ---------- -------- --- Disk 1 (sda): 1-1 sd a1 Pri,Act 63 208813 E x.
49 Copyright © Acronis, Inc., 2000 - 2010 2. 11 Ta pe s upp or t Acronis Backup & Rec overy 10 supports tape libraries, autoload ers, SCSI and USB tape drives as storage devices.
50 Copyright © Acronis, Inc., 2000 - 2010 Backup to a locally attached tape device When creating a bac kup plan, you are able to selec t the locally attached tape d evice as the backup destination. An arch ive name i s not needed when backing up to a tape.
51 Copyright © Acronis, Inc., 2000 - 2010 The value may be "In forma tio n", "Warnin g", 'Error" and "Unkno wn". "Unknown" is sent only in the test message. Text description o f the e vent Object identifier (OID): 1.
52 Copyright © Acronis, Inc., 2000 - 2010 Should the disk exp erience a physical failur e, the zone and the archives located th ere will be lost. That's why Acr onis Secure Zone sh ould not be the only locati on w here a ba ckup is stored.
53 Copyright © Acronis, Inc., 2000 - 2010 to start the bootabl e rescue utili ty . This f eature has the trade name "Acr onis Startup Recovery Manager".
54 Copyright © Acronis, Inc., 2000 - 2010 The Universal Rest o re techn o logy provid es an efficient soluti on for hardware-independent s y stem recovery by replacing t he c rucial Hardware Abstractio n Layer (HAL) and mass storage device drivers. Universal Restor e is applica ble for: 1.
55 Copyright © Acronis, Inc., 2000 - 2010 Getting Universal Restore Universal Restor e comes fr ee with Acronis Backup & R e covery 10 Ad v anced Serv er SBS Edition and Acronis Backup & Rec overy 10 Advanced Ser v er Virtual Edition.
56 Copyright © Acronis, Inc., 2000 - 2010 multimedia files. So me of these storage volu mes can be extremely large a s compared to the system and so practicall y all the recovery tim e will be dedicated to recovering th e files, which might be used m uch later on, if in any near future at al l.
57 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 4 . 1 B a s i c c o nc e p t s Applying backup policies and tracking their execution To protect data o n a single machine, you install on the machine an agent (p. 399) or multiple agents for various data types you want to protect.
58 Copyright © Acronis, Inc., 2000 - 2010 More than one st orage node, each managing a nu mber of vaults, can b e set up and controlled centrally from the Acr onis Backup & Recovery 10 M anag em ent Ser v er. For more detailed in formation about storage n odes please refer to Acronis Backup & Reco v ery 10 Storage Node (p.
59 Copyright © Acronis, Inc., 2000 - 2010 When installing the agents, register each of the m achin es on the management server. To do so, enter the server's n ame or IP address and the ser ver's administrator credentials in the appropriate wind ow of the installation wizard.
60 Copyright © Acronis, Inc., 2000 - 2010 2. Create a static gr o up name d, say, S_1. Add all the servers t o this group . (A storage node can be added in case the m anaged v ault is not on the local n ode's drives. Otherwise the arch ive st o rage will be backed up t o itself).
61 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 2. 3 P rot ec tin g th e vir tu al ma ch in es Acronis Backup & Rec overy 10 Agent for ESX/ES Xi prov ides the flexibilit y to protect virtual mac.
62 Copyright © Acronis, Inc., 2000 - 2010 IP address range. Multiple criteria can be specified for a dyna m ic group . For example, a set o f criteri a "OS equals Windows 2000, OS equals Win.
63 Copyright © Acronis, Inc., 2000 - 2010 3, 4, 5, 6 - the sales men's machines (Windows XP) from the "Sales depart m ent" AD organization unit. An example of group hierarchy The backup policy on the server has to differ fr om that on the wo rkstati ons.
64 Copyright © Acronis, Inc., 2000 - 2010 edit a group, that is: change the group nam e change the group descrip tion change the dynami c membership criteria transform a stati c g.
65 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 1 A po li cy o n a ma chi ne or a g rou p In the diagrams bel ow, each numbered scheme illus trates the result of the respe ctively numbered action.
66 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 2 Op er at io ns wi th a ma ch in e This section is a si m plified i llustration of what happens with the policies on a machine when the machine is mo ved, copied, or del eted from a group.
67 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 4. 3 In he ri ta nc e o f pol ic ies Policy inheritance can be easily understood if w e assume that a machine can be a memb er of only one group besides t he All machines group. Let's s tart from this simplified app roach.
68 Copyright © Acronis, Inc., 2000 - 2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1 -> G2 .
69 Copyright © Acronis, Inc., 2000 - 2010 another policy. In this c ase, the first policy's state o n t he m achi ne will be Revoki ng and the sec o nd policy's state will b e Deplo yi ng . The p o licies can app ear in the GUI simultane o usly or on e after another.
70 Copyright © Acronis, Inc., 2000 - 2010 The policy gets th e Warnin g status on Windo ws machines that have eithe r a D: or F: volume, unless an event that will r esult in an error occurs.
71 Copyright © Acronis, Inc., 2000 - 2010 This status is defined as the most severe status o f the policy on the machines inc luded in the group and its child groups. If the policy is currently not appli ed to any machine, its status is "O K".
72 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at s our ce Performed on a m anaged m achine during backup. Acronis Backup & Recovery 1 0 Agent uses th e storage node t o determine what data can be deduplicated, and d o es not transfer the data whose duplicates are alread y present in the vault.
73 Copyright © Acronis, Inc., 2000 - 2010 Deduplication at target After backup to a dedu plicating vault is compl et ed, th e storage node runs the inde xing task to deduplicate data in the vault as follows: 1.
74 Copyright © Acronis, Inc., 2000 - 2010 The deduplicated items tha t have changed ar e not identical anymore and therefore will not be deduplicated.
75 Copyright © Acronis, Inc., 2000 - 2010 Similarly, in case o f thre e machines, the ratio beco mes 1.5:1; for four machine s, it is 1.6:1. It approaches 2:1 as more su ch machines are backed up to the sam e vault. This means that you can buy, say, a 10-TB st o rage devic e instead of a 20-TB one.
76 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 4 . 7 P r i v i l e g e s f o r c e n t r a l i z e d m a n a ge m e n t This section describes the users' privileges that are required to manage .
77 Copyright © Acronis, Inc., 2000 - 2010 2. Click Manage thi s m achine . To a llo w a n on- ro ot us er to st ar t the c on so le As a root user, add t he name o f the n o n-root user w hom you want to allow to s tart the c o nsole, to the file /etc /sudoers — for exa m ple, by usin g the visudo command.
78 Copyright © Acronis, Inc., 2000 - 2010 Remote connection as a non-root user Since accessing the sy ste m as the r oot user should be restricted, th e root user can create an authentication poli cy to en able remote management under non-root credentials.
79 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 7. 5 A cro ni s s ec ur it y gr ou ps On a machine runnin g Windows, Acronis securi ty gro ups determine who can ma nage the machine remotely and act as Acronis Backup & Recovery 1 0 Man agement Server ad ministrator.
80 Copyright © Acronis, Inc., 2000 - 2010 Tip: To ensure proper g roup names, you should install Acronis compon ents in a domain controller after you have set up the d omain controller itself.
81 Copyright © Acronis, Inc., 2000 - 2010 For users whom y o u want t o act as stor age node administrators, add t heir accounts to the Administrators gr o up.
82 Copyright © Acronis, Inc., 2000 - 2010 If you choose t o specify an existin g user acc ount for the man agement server service, this account will be added to the Acron is Centrali zed Admins group au tomatically.
83 Copyright © Acronis, Inc., 2000 - 2010 2. 14. 8. 2 C lie nt an d s er ve r a ppl ic at ion s There are two sta ke holders of the secure communicati o n process : Client appli cation , or client , is an application that tries to establish connection.
84 Copyright © Acronis, Inc., 2000 - 2010 4. For the new com m unicati on settings to tak e effect, restart all running Acr onis components — preferably, by r est arting Windows.
85 Copyright © Acronis, Inc., 2000 - 2010 Authentication pa r ameters Selecting the Trust s elf-sig ned certificates check box allows the client to connect to the ser ver applications that use self -.
86 Copyright © Acronis, Inc., 2000 - 2010 The use of SSL certificat es is enabled. The server will use SSL certificates if their use is enabled on the cli ent application, and will not us e them otherwise. Always use The use of SSL certificat es is enabled.
87 Copyright © Acronis, Inc., 2000 - 2010 Self-signed cert i ficates , such as ce rtificates auto m atically genera ted during the installation of an Acronis componen t.
88 Copyright © Acronis, Inc., 2000 - 2010 4. Restart Windows, or restart the runnin g Acronis services. Non -self-signed certificates You have the option to use trusted third-party certificates o r c.
89 Copyright © Acronis, Inc., 2000 - 2010 3 O p ti on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is app licable to both stand-alone and a dv anced edi tio ns of Acronis Backup & Rec overy 10.
90 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for all results. To make a settin g fo r each result (successful completion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box.
91 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backup & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents.
92 Copyright © Acronis, Inc., 2000 - 2010 This parameter can als o be set by using Acronis Admini strative Template (p. 344 ). 3 . 2 . 3 E v en t t r a c i n g You can configure t he man agement server to log even ts in the Application Event Log of Window s, besides the manag ement server's own log.
93 Copyright © Acronis, Inc., 2000 - 2010 3 . 2 . 4 D o m a i n a c c e s s c r e de n t i a l s This option deter m ines the user name and password th at the managemen t server will use to access the domain.
94 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 6.1 VM wa re v Cen te r int egr at io n This option defines wh ether to show virtual machines managed by a V M ware vCenter Server in t he management ser v er and show the backup status o f th ese machines in the vCente r.
95 Copyright © Acronis, Inc., 2000 - 2010 Note: Acronis Backup & Recovery 10 Online supports o nly HTTP and HTTPS proxy serve rs. Proxy settings for the agent an d the manage ment ser v er are c o nfigured s eparately, even if both are installed on the s ame mach ine.
96 Copyright © Acronis, Inc., 2000 - 2010 3 . 3 . 2 E v en t t r a c i n g It is possible to dupli cate lo g ev ents gene rated by the agent(s), opera ting on the managed machine, in the Applicati o n Event Log o f Windows; o r send the ev ents t o the specified SN MP managers.
97 Copyright © Acronis, Inc., 2000 - 2010 You can override the settings set here, exclusivel y for the events that occur du ring backup or during recovery, in the D efault backup and recovery options (p.
98 Copyright © Acronis, Inc., 2000 - 2010 /etc/snmp/snmpd .conf - config uration file for the Ne t -SNMP SN M P agent /etc/snmp/snmptrap d.conf - configuration file fo r the Net -SNMP trap da emon. 3 . 3 . 3 L o g c l e a n u p r u l e s This option specifies h ow to clean up the Acronis Backup & Recovery 10 agent log .
99 Copyright © Acronis, Inc., 2000 - 2010 If you choose Yes, I want t o participate in the ACEP , informa tio n about the hardware configuration, the most and lea st used features and about any problems will be automatically collected fr om the machine and sent to Acronis on a regular basis.
100 Copyright © Acronis, Inc., 2000 - 2010 Pre/Post backup comman ds (p. 103 ) + + + + PE only PE only Pre/Post data capture commands (p. 105 ) + + + + - - Multi-volume snapshot (p. 107 ) + + - - - - File -level backup snap shot (p. 107 ) - + - + - - Use VSS (p.
101 Copyright © Acronis, Inc., 2000 - 2010 Overwrite data on a t ape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after bac.
102 Copyright © Acronis, Inc., 2000 - 2010 The AES cryptograp hic algorithm operates in the Ciph er -block chain ing (CBC) mode and uses a randomly generated key with a user-defin ed size of 128, 192 or 256 bits. The larger the key size, the longer it will take fo r the pr ogram to encrypt the archi v e and the more secure your data will b e.
103 Copyright © Acronis, Inc., 2000 - 2010 Exclusion examples Cr it eri on Ex am ple D esc rip tio n Wi nd ows an d L in ux By name F.log F Excludes all files named "F.lo g" Excludes all folders nam ed "F" By mask (*) *.log F* Excludes all files with th e .
104 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y p re/ po st co mma nds 1. Enable pre/post c o mmand s execution by checking the foll owing options: Execute before the ba c kup Execute after the backup 2.
105 Copyright © Acronis, Inc., 2000 - 2010 4. If successful execution of the command is critical f or your backup strategy, sel ect the Fail the task if the comman d execution fails check box. In case the command execution fa ils, the program will rem ove the resulting TIB file and temporary files if possible, and the task will fail.
106 Copyright © Acronis, Inc., 2000 - 2010 4. Depending on the r esult you want to obtain, select th e appropriate options as d escribed in the table below.
107 Copyright © Acronis, Inc., 2000 - 2010 fails. 3. 4. 1.5 Fi le -le ve l b ac ku p sn ap sh ot This option is effec tive only for fil e -level bac kup in Windows and Linux operating systems. This option defines wh ether to back up files one by o ne or by taking an instant data snapshot.
108 Copyright © Acronis, Inc., 2000 - 2010 transactions, at the moment of taking the data snaps hot by Acronis Backup & Recover y 10. Data consistency, in turn, ensur es that the application will be recovered in the correct state and become operational im m ediately af ter recovery.
109 Copyright © Acronis, Inc., 2000 - 2010 Maximum – the da ta will be c om pressed a s much as possible. The backup duration will be maximal. You ma y w ant t o select maximum co mpression when backing up to removable m edia to reduce the numb er of blank disks required.
110 Copyright © Acronis, Inc., 2000 - 2010 Click Writing speed stated in kilobytes per s econ d , and then enter the w ritin g speed in kilobytes per second. Ne tw or k co nn ec ti on s pe ed This option is effec tive for Win do ws and Linu x operating sy stems and bootable media.
111 Copyright © Acronis, Inc., 2000 - 2010 4. For the e-mail message to inclu de the log entries related to the backup, s elect the Add full log to the notification chec k box.
112 Copyright © Acronis, Inc., 2000 - 2010 The When user intera ction is required check box – to send notific atio n du ring the operation when user interac tio n is re quired – is always selected. Click Send test W inPopup message to check if the s ettings are correct.
113 Copyright © Acronis, Inc., 2000 - 2010 Use the setting set in the Machine options – to use the setting specified for the machin e. For more information refer to Machine options (p.
114 Copyright © Acronis, Inc., 2000 - 2010 If the destination disk ru ns out of free space while cr eating the backup, the task enters the Need interaction state. Y o u have t he abilit y to free additi onal space and retry the o per ation. If you do so, the resulting backup will be split into the parts created before and after the retry.
115 Copyright © Acronis, Inc., 2000 - 2010 3. 4. 1.1 5 M edi a com po ne nt s This option is effec tive for b oth Windows and Linux o perating systems, when the backup destination is removable m edia. When backing up to r emovable media, you can m ake this media work as regular Linux-based bootable media (p.
116 Copyright © Acronis, Inc., 2000 - 2010 Ignore bad sectors The preset is: Disab l ed . When the option is disab led , t he program will display a pop-up window each ti me it comes across a bad sector and ask f or a user decisi on as to whether to c ontinue or stop the bac kup procedure.
117 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior in case a backup task is about to st art ( the scheduled time comes or th e event specified in th e schedule occurs), but the c ondition (or any of multiple conditions) is not me t.
118 Copyright © Acronis, Inc., 2000 - 2010 This option deter m ines the program behavior when an y of the ba ckup plan's tasks fails. The preset is no t to restart a fa i led task .
119 Copyright © Acronis, Inc., 2000 - 2010 When this option is enabled, the backups, bel o nging to the policy or plan being created, will be located on a separa te tape set .
120 Copyright © Acronis, Inc., 2000 - 2010 When starting backup to a non-empty tape in a loc ally attached tape device, the program will warn that you are abou t to lose d ata o n the tape.
121 Copyright © Acronis, Inc., 2000 - 2010 For example, if the machine boots from a hard disk drive by default and y o u select this check bo x, the machine will be re started a nd the operating system wi ll start as soon as the bootable agent has finished creating the backup.
122 Copyright © Acronis, Inc., 2000 - 2010 You can also cust omize a default option itself by chan ging its value against th e pre-defined one. The new value will be us ed by default in all rec overy tasks you will cr eate later on this machine.
123 Copyright © Acronis, Inc., 2000 - 2010 Change SID after reco very Windows recovery - Windows recovery - Windows recovery - Notifications: E-mail (p. 125 ) + + + + - - Win Pop- up (p. 126 ) + + + + - - Event tracing: Windows events log (p. 127 ) + + - - - - SNMP (p.
124 Copyright © Acronis, Inc., 2000 - 2010 Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails Selected Cleared Selected Cleared Do not reco ver until the command e xecution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery only after the command is successfully executed.
125 Copyright © Acronis, Inc., 2000 - 2010 Low – to minimize resources taken by the rec overy process, leaving mor e resources to o ther processes running o n the machin e Normal – to run.
126 Copyright © Acronis, Inc., 2000 - 2010 Some Internet s ervice provid ers require authentication on the incoming mail ser ver before being allowed t o send something .
127 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ow s e ve nt lo g This option is effec tive only in Win dows operating systems. This option is not avail able when o perating under the bootable media.
128 Copyright © Acronis, Inc., 2000 - 2010 Community – type th e name of SNMP commun ity to which both the host run ning SNMP management app licatio n a nd the sending machine belong. The typical communit y is "public". Click Send test message to check if t he settings are correct.
129 Copyright © Acronis, Inc., 2000 - 2010 Check file system after recovery This option is effec tive only when r ecovering disks or volum es. When operating und er bootabl e media, this option is n ot effective for the N TFS file system. The preset is Disa bled .
130 Copyright © Acron is, Inc., 2000- 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ea se of use and administra tion, a vault is associated with the archives' metadata. Referring to this metadata ma kes for fas t and convenient operations with archi ves and backups stored in the vault.
131 Copyright © Acronis, Inc., 2000 - 2010 Way of working with the "Vaults" view Vaults (on the na v igation p ane) - top elem ent of the vaults t ree.
132 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out privileges depending on the user rights, see the User privileg es o n a st o rage node (p. 80 ) sec tio n. Unmanaged vaults An unmanaged vau lt is a centrali zed vault that is no t managed by a storag e node.
133 Copyright © Acronis, Inc., 2000 - 2010 Related sections: Operations with arch ives st o red in a vault (p. 1 64) Operations with ba ckups (p. 165) Filtering and sortin g archives (p. 167) Bars of the "Actions and tools" pane [Vault Name] The Actions bar is available when clicki ng the vault in the v aults tr ee.
134 Copyright © Acronis, Inc., 2000 - 2010 Delete a vault 1. Select the vault. 2. Click Delete . You'll be asked whether to ke ep the archives stored in t he vault, or d elete the vault along with all the arch ives. The plans and tasks that use this vault will fail.
135 Copyright © Acronis, Inc., 2000 - 2010 Storage nod e Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vaul t. Yo u ma y need to enter ac cess crede ntials for the storage node. Path (p. 135) Specify where the v ault will be created.
136 Copyright © Acronis, Inc., 2000 - 2010 Va ult d at aba se p ath To s pec if y t he pa th wh ere th e va ult 's d at ab as e w ill be c re ate d 1. In the Local folder s of the s to rage node, select the desired folder o r ent er the full path to the folder in the Path fi eld.
137 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 2.2 C rea ti ng a n u nm an age d c en tr al iz ed va ult To c re ate a n unm an age d c en tra li ze d v aul t, pe rfo rm th e fo llo win g s te ps . Vault Name Specify a unique na me for the vault. The creati o n of two centralized v aults with the same name is prohibit ed.
138 Copyright © Acronis, Inc., 2000 - 2010 To a tta ch a ma nag ed va ult to a s tor ag e no de, p erfo rm t he fo ll ow in g ste ps . Vault Storage node Select the Acronis B ackup & Recovery 10 Storag e Node that will manage the vault. Path Specify the path to the loca tio n where the archives are stored.
139 Copyright © Acronis, Inc., 2000 - 2010 by different comp o nents of o ther versi o ns of the prod uct by means of Acronis Ba ckup & Recovery 10, see the Tape co m patibility table (p. 49 ) section. Acronis Backup & Rec overy 10 enables you t o set up di stribution of backups by medi a.
140 Copyright © Acronis, Inc., 2000 - 2010 4. A tape with backups w ritte n by the storage node cannot be read on a tape device, locall y attached to a machin e, the agent is installed on, becau se of a difference in tape fo rmat.
141 Copyright © Acronis, Inc., 2000 - 2010 4. 1. 3.5 Ge tt in g sta rt ed wi th a ta pe li br ar y If you have a tap e library devic e attached to a machine with A cro nis Backup & Recovery 10 St.
142 Copyright © Acronis, Inc., 2000 - 2010 If the tape barc ode cannot be read, an other T ask s Need I nteraction window as ks you to label a tape. A cti on s on a ta pe li br ary v au lt If a tape .
143 Copyright © Acronis, Inc., 2000 - 2010 To change the set tings of the backup policy/plan to be created click Change… in the Backup options section on the Create b ackup po li cy/plan page. It opens the Backu p options win dow where the Tape support page is contained with the pre-defined values.
144 Copyright © Acronis, Inc., 2000 - 2010 Any user with access to a managed vault on a tape li brary is able to perform these operati ons. However two or more user s cannot manage a tape lib rary drive simultaneously, because some operations can tak e minutes, hours or even da ys.
145 Copyright © Acronis, Inc., 2000 - 2010 L ab el in g When a tape requir ed for data recovery is not found , the Task Need Interaction window will ask the user to bring the tape and insert it into a tape librar y s lo t. So, all the t ape car tridges need a barcode or other readable lab els.
146 Copyright © Acronis, Inc., 2000 - 2010 If you leave this option unchan ged, then the backups, belonging to the p olicy or plan being created, might be written onto tapes containing backups wri tt en by diff erent backup p o lici es and comprising of data from diff erent machines.
147 Copyright © Acronis, Inc., 2000 - 2010 cycle. The same tap e rotation enables you to ge t by wi th the minimum number of c artridges and not to be buried in used tapes. Acronis Backup & Rec overy 10 enables you t o achieve full automation of tape rot atio n whil e backing up onto tape libraries.
148 Copyright © Acronis, Inc., 2000 - 2010 capability of the tape library (number of driv es, loader s, slots and available tapes; capacity of tapes) requirements for perf orming data recovery ( maximal duration) You need to anal y ze every argument that is relevant for y our case and sele ct the main criteria for th e choice.
149 Copyright © Acronis, Inc., 2000 - 2010 backup policy/plan s tarts on Wednesday and full back ups should be created on ever y fo urth Frid ay, on Wednesday the firs t backup will be full instead o f an increm enta l one.
150 Copyright © Acronis, Inc., 2000 - 2010 The next figure d emonstrates the data backup archive at the moment. The differ ential backup is drawn as a blue rec tangle in the figure. Number 1 in the green rectangle ma rks the incre mental backup created o n Monday of the 1st week of the year.
151 Copyright © Acronis, Inc., 2000 - 2010 Below, the figure sh ows the deleted backup s as actual, bu t demons trate s tape usage during the whole year for the GFS backup scheme in combin ation with the specified tape options. A number in the green rectang le marks an incremental bac kup created on Monday of the c o rrespondin g week of the year.
152 Copyright © Acronis, Inc., 2000 - 2010 The full backup stor ed on tape 0 1 is deleted afte r the next full backup is cr eated onto both tapes 23 and 24 on Friday of t he 5 2nd week. As all backups of tape 01 have been deleted, the tap e is considered as fr ee and can be reused.
153 Copyright © Acronis, Inc., 2000 - 2010 If all the backups hav e to be kept during the year, the archive will requir e 28 tapes. As the GFS backup sche me forces automatic del etion of the outdated backup s, on the first Friday of the second year the tapes keep only the backups disp layed in the next figure.
154 Copyright © Acronis, Inc., 2000 - 2010 This figure dem o nstrates th at the GFS Example 2 tap e rotation scheme is m o re suitable fo r t he case than GFS Example 1 .
155 Copyright © Acronis, Inc., 2000 - 2010 backup deletion fre es a tap e so it can be reused. The main drawbac k is the l arge number of required ta pes that is used 5-10%.
156 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 1 Suppose, the backup plan has the following tape opti o ns: the Use a separate ta pe set option is selected the Always use a free ta.
157 Copyright © Acronis, Inc., 2000 - 2010 five-level sche m e requires up to five tapes for this case. T oH Ex am ple 2 Suppose, the backup plan has the following tape opti o ns: the Use a s.
158 Copyright © Acronis, Inc., 2000 - 2010 T oH Ex am ple 3 Imagine the backup pla n has the following tap e options: the Use a separate ta pe set option is selected the Always use a free tap.
159 Copyright © Acronis, Inc., 2000 - 2010 To simplify the tape pla nning lets discard the possibili ty that the calculated tape s might contain backups of other data.
160 Copyright © Acronis, Inc., 2000 - 2010 Total number of req uired tapes = r ound up ((2*F_GB + 12*I_GB + 11*D_GB) * C L / T_GB) + 1 = ro und up ( (2*320 + 12*16 + 11*4 0 ) * 1 / 40 0 ) + 1 = ro und u p ( 3 .
161 Copyright © Acronis, Inc., 2000 - 2010 node database has all the required information ab o ut the c o ntent of the moved tapes. So all you need to do is to perform th e inventory (p. 144) procedure for t he manag ed vault on the library where th e tapes we re placed to.
162 Copyright © Acronis, Inc., 2000 - 2010 Metadata The .meta folder is created during backup in every personal vault. This folder con tains additional information about a rchives and backups stored in the vault, such as archive o wners or the machine name.
163 Copyright © Acronis, Inc., 2000 - 2010 [Archive Name] The Actions bar is availab le when you select an arch ive in the archives tab le. Duplicates acti ons of the archi v es toolbar. [Backup Name] The Ac tion s bar is available when you expand the archive and clic k o n an y of its backups.
164 Copyright © Acronis, Inc., 2000 - 2010 4. 2. 2.1 C rea ti ng a pe rs ona l v a ult To c re ate a p ers on al v au lt 1. In the Name field, ty pe a n ame for the vault being cre ated. 2. [Optional] In the Com ments field, add a description o f the v ault.
165 Copyright © Acronis, Inc., 2000 - 2010 To Do Validate an archive Click Validate . The Validation (p. 244 ) page will be opened with the pre-s elected archive as a source. Validation of an a rchive will check all the archive's backu ps. Export an a rchive Click Export .
166 Copyright © Acronis, Inc., 2000 - 2010 Validate a backup Click Validate . The Validation (p. 244 ) page will be opened with the pre-s elected backup a s a source. Validation of a fil e backup imitates recov ering of all files from the b ackup to a dummy destination.
167 Copyright © Acronis, Inc., 2000 - 2010 4 . 3 . 4 F i lt e r i n g a n d s o rt i n g a r c h i v e s The following is a guid eline for you to filter and s ort archi v es in the ar chives table. To Do Sort backup a rchives by any column Click the column's header to sort the archives in a scending order.
168 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aun ched sy ste m atically k eeping the critical data safely protected.
169 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last success ful backup completed + + The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multip le conditions) is not met is defin ed by the Task start conditions (p.
170 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily sche dule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 day(s). 2. Once at: 06:00:0 0 PM . 3. Effective: From: not set .
171 Copyright © Acronis, Inc., 2000 - 2010 task's recurrence s is 4 hours, and bet ween the third, fourth and fifth is 2 hours. In this case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 day(s). 2. Every: 4 hours.
172 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Frida y at 10PM, s tarting from a certain date (say 05/14/2009) an d ending after six months. The schedule's param eters are thus set up as foll o ws.
173 Copyright © Acronis, Inc., 2000 - 2010 Thursday: every 3 h o urs fro m 9 AM till 9 PM Friday: twice at 1 2 PM and 9 PM (i.e. sa me as on Mon day) Saturday: once at 9 PM Sunday: once at 9 PM Combining the identical times, the following thr ee schedules can be add ed to the task: First schedule 1.
174 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run du ring the specified time inter val. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be ru n 12 times from 10 AM to 10 PM during one day .
175 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of Novemb er. By setting up this date we just define that the tas k must be discontinued in 20 1 0, aft er autu mn ends in the northern hemispher e.
176 Copyright © Acronis, Inc., 2000 - 2010 For example, you may want to set up a backup plan that will aut omatically perform an em ergency full backup of your data a s soon as Windows discovers that your hard disk drive is abo ut to fail. Parameters Log name Specifies the na me of t he l og.
177 Copyright © Acronis, Inc., 2000 - 2010 WindowsUpdateCl ient and event number 18 in to the System log; the type o f this event is Information . When creating the plan, type or select the follo win.
178 Copyright © Acronis, Inc., 2000 - 2010 Distribute start time w ithin the time window When this setting is enabled, the backup task on each registered machine will start wit h a specific delay from the start time set in the polic y. This distrib utes t he tas ks' actual start times wi thin a time interval.
179 Copyright © Acronis, Inc., 2000 - 2010 2. In How to back up , select t he Simple, Tower of Hanoi, or Cus t om scheme, an d then click Change to specify a schedu le for the scheme. 3. Under Run the task , se lect Da i ly , Weekl y , or Month l y .
180 Copyright © Acronis, Inc., 2000 - 2010 Adding multiple condi tions Multiple conditi o ns must b e met simultan eously to enable task executi on. Ex ample: It is required to run t he bac kup task .
181 Copyright © Acronis, Inc., 2000 - 2010 Event: Weekly , Ever y 1 we ek (s) on <workda ys> ; Once at 09:00:00 PM . Condition: Location 's host is available Task start conditi o ns: Skip the task execution .
182 Copyright © Acronis, Inc., 2000 - 2010 If the task start c onditions are Wait un til the cond i tio ns are met and the Run the ta s k any way after check box is clea red , the task (scheduled to run at 3:00 PM) w ill start at 6:00 PM — the tim e when the condition is met.
183 Copyright © Acronis, Inc., 2000 - 2010 (3) if the machine is never restarted, the task will neve r start. You can start the ba ckup manually, if need be, in the Ba ckup plan s and tasks view.
18 4 Copyright © Acronis, Inc., 2000 - 2010 6 D i rec t ma nag em en t This section covers o perati o ns that can be performed directly on a m anag ed machin e by using the direct console-agent co nne ction. The content of this secti o n is applicable to both stand-alone and advanced editions o f Acron is Backup & Recovery 10.
185 Copyright © Acronis, Inc., 2000 - 2010 licenses. Please make sure you h ave a valid license on Acroni s License Server. After a successful licen se check the agent will start working. Trial version of prod uct expires in X day (s) Please make sure you h ave a valid license on Acroni s License Server.
186 Copyright © Acronis, Inc., 2000 - 2010 H ow it i s d ete rmi ned Errors Highlight the date in red if at least one "Error" entry a ppeared in the log on t his date. Warnings Highlight the date in yellow if no "Error" entries appear ed and at least one "Warn ing" entry appeared in the log o n this date.
187 Copyright © Acronis, Inc., 2000 - 2010 In the backup tabl e, select the backup plan (task). Use the toolbar's but to ns t o take an action on the selected plan (task). See t he Actions on bac kup plans and tasks (p. 1 9 0) section f or details.
188 Copyright © Acronis, Inc., 2000 - 2010 A backup plan status is derived fr om the results of the last run of the plans' tasks. S tat us H ow it i s d ete rmi ned H ow to han dle 1 Error At least one task has failed.
189 Copyright © Acronis, Inc., 2000 - 2010 Need interaction Any running task can put itself into the Need interact ion state when it needs human inter action such as changing m edia or ignoring a read error.
190 Copyright © Acronis, Inc., 2000 - 2010 centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to read th e warnings - > [optionally] Perform actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" No action is required.
191 Copyright © Acronis, Inc., 2000 - 2010 Run a plan/ta sk Backup plan Click Run . In the Run Backup Plan (p. 194 ) windo w, select the task you n eed to be run. Running the back up plan starts the selected task of th at plan immediately in spite of its schedule an d conditions.
192 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 199 ), except for the following limitat ions : It is not always possible to u se all scheme options, when editing a backu p plan if the created archive is not e mpty (i.
193 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks.
194 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If req uired, you can hide the displayed c o lumns and show hid den ones. To s how o r hi de co lum ns 1.
195 Copyright © Acronis, Inc., 2000 - 2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Maste.
196 Copyright © Acronis, Inc., 2000 - 2010 Progress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progress, elapsed time and other parame te rs.
197 Copyright © Acronis, Inc., 2000 - 2010 Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule.
198 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry . 2. Do one of the follow ing Click View Details . Th e log entry's details will be di splayed in a separate window. Expand th e Information panel, by clicking the chevron.
199 Copyright © Acronis, Inc., 2000 - 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r hi de co lum ns 1.
200 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g ste ps . General Plan name [Optional] Enter a uniq ue name for the backup pla n. A consci o us name let s you id entify the plan among others. Plan's credentials (p.
201 Copyright © Acronis, Inc., 2000 - 2010 [Optional] Provide credentials for the location if the pl an account does not have access permissions to the l ocation. To access this opti o n, sele ct the Advanced v i ew check box. Archive comments [Optional] Enter c omments on the archive.
202 Copyright © Acronis, Inc., 2000 - 2010 Virtualization server (p. 222) Here you select the resulting virtual machine type an d location. Available options depen d o n the host you selec te d in the pre vious step. Storage (p. 222) Choose the storage o n the virtualization server or the folder to place th e virtual machine files in.
203 Copyright © Acronis, Inc., 2000 - 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed.
204 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the ma chine goes into hibernation (hiberfil.s ys) are not backed up. After rec overy, the files will be re-cre ate d in the appropriate place with t he zero size.
205 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 6 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folder s, as well as files with specific extensions, to be stored in the archiv e.
206 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F.
207 Copyright © Acronis, Inc., 2000 - 2010 To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you s elect.
208 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 211) to the arc hive name. If you do not select the Name ba c kup files us ing the archive name.
209 Copyright © Acronis, Inc., 2000 - 2010 Your script can m o ve older backups based on the date stamp. See also “The *Dat e+ variable” (p. 211 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hi n a da y Consider the follo wing scenario: You want to perfor m hourl y backups of your server's c ritical files every day.
210 Copyright © Acronis, Inc., 2000 - 2010 You want to swap th e drive s each Monday, so that on e drive contains backups of the current week (Monda y through Sund ay), and the other dri ve those of the previous wee k.
211 Copyright © Acronis, Inc., 2000 - 2010 6. 2. 8.2 T he [D AT E] va ri ab le If you specify the [DATE] variable in the arch ive name, the file name of each backup will include that backup’s creation da te. When using this variable, th e first backup o f a ne w day will b e a full backup.
212 Copyright © Acronis, Inc., 2000 - 2010 The program will ac ces s th e so urce dat a using the credentials of the backup plan account specified in the Gen eral section. Use the followin g creden tials The program will ac cess the source data usi ng the cre dentials you specify.
213 Copyright © Acronis, Inc., 2000 - 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 33 ). 6. 2. 10. 2 Ba ck u p la t er s ch eme With the Back up later scheme, the backup will b e performed only once, at the da te and time you specify.
214 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups.
215 Copyright © Acronis, Inc., 2000 - 2010 Keep monthly ba ckups indefinitely. Backup scheme para meters can then be s et up as foll o ws. Start backup at: 11: 00 PM Back up on: All days .
216 Copyright © Acronis, Inc., 2000 - 2010 Have a weekl y summary o f file chan ges since las t mo nth (Fri day weekly differential backup ). Have a monthly ful l backup of your f iles. Moreover, assu m e that yo u w ant to r etain access t o all backup s, including the daily ones, f or at least six months.
217 Copyright © Acronis, Inc., 2000 - 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p.
218 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an go ba ck Ro ll - bac k pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 day.
219 Copyright © Acronis, Inc., 2000 - 2010 Incremental Specifies on what schedule an d under which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full backup is created instead of the in cremental backup .
220 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche me yields a full backup perfor m ed e v ery Friday nig ht. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param et ers excep t Schedu l e in Full ba c kup a re left e mpty.
221 Copyright © Acronis, Inc., 2000 - 2010 Finally, we create r etention rules for the archive: let us retain only backups that ar e no older than six months, and let the cleanup be performed after ea ch backup task and also on the last day of every month.
222 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 1 1 A r c h i v e v al i da t i o n Set up the validati o n task to check if the bac ked up data is recoverabl e. If t he bac kup could not pass the validation successfull y, the validation task fail s and the backup plan gets the Error status.
223 Copyright © Acronis, Inc., 2000 - 2010 Which agent is installed on the host? The resulting virtual machine type and locati on depend on the agen t that resides o n the sele cte d host.
224 Copyright © Acronis, Inc., 2000 - 2010 If the managed machin e's operating system fails to start or you ne ed to r ecove r data to bare metal , boot the machin e from the bootable media (p. 401) or using Acronis Startup Recover y Manager (p.
225 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 228) [Optional] Provide credentials for the archive lo cation if the ta sk account does not have the right to access it.
226 Copyright © Acronis, Inc., 2000 - 2010 After any of the settings is cha nged against the default value , a new line that displays the newly set value appears. T he setting status changes from Default to Cu stom . Sho uld you modify the settin g again, the lin e will disp lay the new value unless th e new value is the default one.
227 Copyright © Acronis, Inc., 2000 - 2010 If the archive is loc ated on removable me dia, e.g. DVDs, first insert the last D VD an d then insert the d iscs in order starting from the first o ne when the p rogram prompts.
228 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 4.1 D isk s/ vo lu m es sel ect io n To s el ect a b ac ku p an d dis ks/ vol ume s to re cov er : 1. Select one of the su ccessive backups by its crea tio n d ate and time. Thu s, you ca n revert the disk data to a certain moment in tim e.
229 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the location using t he creden tials you specify. Use this op tio n if the task account does no t have acces s permissions to the l ocation. You might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault.
230 Copyright © Acronis, Inc., 2000 - 2010 Disk #: Disk # (MODEL ) (p. 232 ) Select the destinati on disk for each of the source disk s. NT signature (p. 23 0 ) Select the way the r ecovered disk's signature w ill be h andled. The disk signature i s used by Windows and the Lin ux kernel version 2.
231 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 6.2 Vo lu me s Available volume destinations depend on the agents o perating o n the machine. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows or Agent for Linux is installed.
232 Copyright © Acronis, Inc., 2000 - 2010 M BR de s tin at io n To s pec if y a de s ti na tio n dis k: 1. Select the disk t o recover t he MBR to. 2. Click OK . Vo lu me de st in at ion To s pec if y a de s ti na tio n v ol um e: 1. Select a volume o r unalloca ted space where you want the sel ected volume to be recover ed to.
233 Copyright © Acronis, Inc., 2000 - 2010 set as active. If you recover a sys tem volume to anoth er hard disk with its own volumes and operating system , you will most likely need o nly the d ata. In this case, you can re co ver the volume as logical to access the data only.
234 Copyright © Acronis, Inc., 2000 - 2010 Storage Initial settin g : the default s to rage of t he virtualiz ation server if the new m achine i s c reated o n the virtualization ser v er. Other wise the current user's documents folder. This is the place wher e the new virtual machin e will be creat ed.
235 Copyright © Acronis, Inc., 2000 - 2010 Re co ver y ex cl u sio ns Set up exclusions fo r the sp ecific files you do not wish to recover. Use the Add , Edit , Remove and Remove All buttons t o create t he list o f file ma sks. Files whose names match any of the masks will be skipped du ring recove ry.
236 Copyright © Acronis, Inc., 2000 - 2010 Do not overwrite ex isting file - this will give the fil e on the hard disk priority o ver the file in t he backup. If you allow files to be overwritten, you still have an op tion to prevent over writing of specific files by excluding (p.
237 Copyright © Acronis, Inc., 2000 - 2010 DVD supplied by th e hardware vendor o r downl o ad th e drivers from the v endor’s Web site. The driver files sh ould have the *.inf, *.s ys or *.oem extensions. If you d ownload the drivers in the *. exe, *.
238 Copyright © Acronis, Inc., 2000 - 2010 Drivers for a virtual m achine When recovering a system to a new virtual ma chine, the Universal Restore te chnolog y is applied in the background, becaus e the program knows what drivers are required for the s upported virtual machines.
239 Copyright © Acronis, Inc., 2000 - 2010 8. [Optionally] Re view the Virtua l machine settin gs (p. 233 ) and m ake changes if necessary. Here you can change the path to the ne w virtual machine. The same type o f machines with the sam e name cannot be created in the same folder.
240 Copyright © Acronis, Inc., 2000 - 2010 Windows was r ecovered to a dynamic volume that cannot be boota ble Solution : Reco v er Windo ws to a basic, simple or mirr o red volu m e.
2 41 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 11. 1 Ho w to r ea ct iva te GR UB a nd ch an ge it s con fi gu ra ti on Generally, you sh o uld refer t o the boot l oader manual pages for the appr opriate procedure. Ther e is also the corresp o nding Kno wledge Base article on the Acronis Web site.
242 Copyright © Acronis, Inc., 2000 - 2010 9. Specify the disk on which GRUB is l ocated — typically, the bo ot or root partition : root (hd0,0) 10. Install GRUB. For example, to inst all GRUB in the master bo o t record ( MBR) of the first disk, run the following com m and: setup (hd0) 11.
243 Copyright © Acronis, Inc., 2000 - 2010 If the recovery r equires the machine to be r ebooted (usually, when the v o lumes t o recover incl ude the boot partiti on), follow these guid elines: .
244 Copyright © Acronis, Inc., 2000 - 2010 6 . 3 . 1 4 R e c o v e r i n g t h e s t or a ge n o d e In addition to backing up data to centralized vaults managed by Acronis Backup & Recover y 10 Storage Node, y o u may wa nt to perform a disk backup of the machine where the storage n ode itself is installed.
245 Copyright © Acronis, Inc., 2000 - 2010 You can access th e Validat ion page from the Vaults (p . 1 30) view. Rig ht-click the object to v alidate (archive, backup o r vault) a nd select Validate from the context m enu. The Va lida tion page will be opened with the pre-s elected object as a source.
246 Copyright © Acronis, Inc., 2000 - 2010 User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain) Password . The passw ord for the account. 2. Click OK .
247 Copyright © Acronis, Inc., 2000 - 2010 To access a managed vault, type the following string in the Path fi eld: bsp://node_ad dress/vault_name/ To access an unmanag ed centralized vault, type the f ull path to the vault's folde r. 2.
248 Copyright © Acronis, Inc., 2000 - 2010 Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section. Use the followin g creden tials The program will ac cess the location using t he creden tials you specify.
249 Copyright © Acronis, Inc., 2000 - 2010 "Band aid" da tabase recovery solution : mount up an i m age that c o ntains an SQL databa se fro m a recently failed machine. This will give access to the database until the failed machine is recovered.
250 Copyright © Acronis, Inc., 2000 - 2010 If the archive is st o red on a n FTP or SFTP ser v er, t ype the server na m e or add ress in the Path field as follows: ftp://ftp_server:p ort _number or sftp://sftp_ server:port number If the port number is n ot specified, port 21 is used for FTP and port 22 is used for SF TP.
251 Copyright © Acronis, Inc., 2000 - 2010 User name . When ent ering the name of an Active D irector y user account, be sure to also specify the domain name (DOMAINUsername or Us ername@domain) Password . The passw ord for the account. 2. Click OK .
252 Copyright © Acronis, Inc., 2000 - 2010 6. 7 Ex por tin g arc hiv es a nd b ack ups The export operati on creates a copy of an archi v e or a self-sufficient part copy of an archive in the location you specify. The original archive re m ains untouched .
253 Copyright © Acronis, Inc., 2000 - 2010 The resulting ar chive's options The exported archi ve inher its t he opti o ns of th e original archive , i ncluding encryp tio n and th e password. When exporting a password-protected arch ive, you are prompted for the password.
254 Copyright © Acronis, Inc., 2000 - 2010 [Optional] The exp o rt task will run on behalf of the us er who is creating the ta sk. You can change the task credentia ls if necessary. To acc ess this option, select the Advanced v iew check box. Wh at to export Export Select an object to e xport : Archive (p.
.
256 Copyright © Acronis, Inc., 2000 - 2010 6 . 7 . 3 B a c k u p s e l e c t i o n To s pec if y a b ack up( s) t o e xpo rt 1. At the top of the window, select t he respec tive check box(es). To ensure that you ch oose the right backup, click on the backup and look at the bo ttom table that displays the volumes contained in the selected backup.
257 Copyright © Acronis, Inc., 2000 - 2010 To export data t o a networ k share, expand the Network folde rs group, select the required networked machi ne and then click the shared folder. If the ne twork share requires access credentials, the pr o gra m will ask f or them.
258 Copyright © Acronis, Inc., 2000 - 2010 6 . 7 . 6 A c c e s s c r e d e n t i al s f o r d e s t i n a t i o n Specify credentials required for access to the lo cation where the resulting archi ve will be stored. The user whose nam e is specifi ed will be considered as th e archive owner.
259 Copyright © Acronis, Inc., 2000 - 2010 [Optional] Protec t the Acronis Secur e Zone fro m unauthorized access with a password. The prompt for the pa ssword appear at any operati o n relatin g to the zone. After you configure the required settings, click OK.
260 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.4 Re su lt c onf ir ma t io n The Result confir mation window displays the expecte d partition layout accordin g to the settings y ou have chosen. Click OK , if you are satisfied with the lay o ut and th e Acronis Secure Zone crea tio n wil l start.
261 Copyright © Acronis, Inc., 2000 - 2010 2. Select volumes fr om which free space will be us ed to increase the Acronis Secure Zone. 3. Specify the ne w size of the z o ne by: dragging the slid er and s electing any size between the current and maxi mum values.
262 Copyright © Acronis, Inc., 2000 - 2010 Activate Enables the boot tim e prompt "Press F11 for Acronis Startup Recovery Manager … " (if you do not have the GRUB bo o t load er) or adds the "Acronis Startup Recovery Manag er" item to GRUB' s menu (if you have GRUB).
263 Copyright © Acronis, Inc., 2000 - 2010 Linux-based bootable media Linux-based media c o ntains Acronis Backup & Recovery 10 Bo o table Ag ent based on Linux kernel. The agent can boot and perform operations on any PC -compatible hard ware, including bare metal and machines with co rrupted or n on -supported fil e systems.
264 Copyright © Acronis, Inc., 2000 - 2010 Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2 .1) Windows 7 (PE 3. 0) If you already hav e media with PE1.
265 Copyright © Acronis, Inc., 2000 - 2010 Universal Restor e can be e nabled if Acronis Backup & Rec ov ery 10 Universal Restore is installed on the machin e where the media is creat ed. 3. [optional] The tim eo ut inte rval for the boot menu plus the c omponent that will automatically start on timeout.
266 Copyright © Acronis, Inc., 2000 - 2010 noapic Disables Advanced P rogra mmable Interrupt Controller (A PIC). You may want to u se this parameter when e xperiencing problems with a particu lar hardware configuratio n. vga=ask Prompts for the video mode t o be used by the bootabl e media's grap hical user interface.
267 Copyright © Acronis, Inc., 2000 - 2010 pci=nobios Disables the use of P CI BIOS; only direct hardwar e access meth ods will be allowed. You m ay want to use this param et er whe n the bootable media fails t o start, which m ay be caus ed by the BIOS .
268 Copyright © Acronis, Inc., 2000 - 2010 Example The bootable agent co uld u se one of the network adapters for co m munication with the management console through the production network. Auto m atic c o nfiguration co uld be done for this c onnection.
269 Copyright © Acronis, Inc., 2000 - 2010 To r emo ve dr ive rs : 1. Select the INF file. 2. Click Remove . 6. 10. 1. 2 A ddi ng t he Ac ro nis P lu g-i n to Wi nP E 1.x Acronis Plug-in for WinPE can be added to: Windows PE 200 4 (1.5) (Wind ows XP Professional wit h Service Pack 2) Windows PE 200 5 (1.
270 Copyright © Acronis, Inc., 2000 - 2010 2. Start the Bootabl e Media Buil der either from the management console, by select ing T ools > Create Bootable Med i a or, as a separate c o mponent. 3. Select Bootable med i a typ e: Windows PE . When creating a ne w PE ISO: Select Create W indows PE 2.
271 Copyright © Acronis, Inc., 2000 - 2010 5. Run the following c omman d: export_license.bat 6. Copy the contents o f the c urrent folder — by default: C:Program Fil es Acronis Bootable ComponentsWinPE — to th e %BartPE f older%pluginsAcronis. 7.
272 Copyright © Acronis, Inc., 2000 - 2010 5. There is no Navigat ion tree in the media GUI. Us e the Navigation menu ite m to navig ate between views. 6. Backup to Acronis Se cure Zone is not possible. 7. Tasks cannot be sch eduled; in fact, tasks are not created at all.
273 Copyright © Acronis, Inc., 2000 - 2010 7. If prompted, specify the user name and password to access the iSCSI d evice. To a dd an ND AS de vic e 1. In a Lin ux -based bootable m edia, run the management console. 2. Click Configure iSCSI/NDAS devices .
274 Copyright © Acronis, Inc., 2000 - 2010 echo mknod swapon egrep mkswap s ysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 .
275 Copyright © Acronis, Inc., 2000 - 2010 To c re ate t he vo lu me st ruc tu re by us ing t he ma nag eme nt c ons ol e 1. Boot the machine fr om a Linux-based bootable medi a. 2. Click Acronis Bo otable Agent . Then, click Run man agement console .
276 Copyright © Acronis, Inc., 2000 - 2010 7. Return to the m anagement co nsole b y pressing CTRL+ALT+F1, o r by runnin g the command: /bin/product (Do not reboot the machine at this point. Otherwise, you will hav e to creat e the volume structure again.
277 Copyright © Acronis, Inc., 2000 - 2010 lvm pvcreate /dev/m d0 /dev/md1 lvm vgcreate my_vol group /dev/md0 /dev/md 1 lvm vgdisplay The output of the lvm vgdisplay co mmand will cont ain lines similar to the follow ing: --- Volume group --- VG Name my_volgroup .
278 Copyright © Acronis, Inc., 2000 - 2010 Num Idx Partition F lags Start Size T ype ---- --- --------- ----- ----- --------- ------ Disk 1: Table 0 Ta ble Disk 2: Table 0 Ta ble ... Dynamic & GPT Volum es: DYN1 4 my_volgroup -my_logvol 12 533760 Ext2 You will need the v olume's index, given in the Idx colu m n, in the nex t step.
279 Copyright © Acronis, Inc., 2000 - 2010 6. 10. 6. 2 S ett in g up a ma ch ine to b oot f ro m P XE For bare metal, i t is enough that the machine’s BIOS su pports network booting.
280 Copyright © Acronis, Inc., 2000 - 2010 6. 11 Di sk ma na gem ent Acronis Disk Dire ctor L ite is a tool for preparing a mac hine disk/volume configuration for recovering the volume images saved by the Acronis Backup & Recovery 10 software.
281 Copyright © Acronis, Inc., 2000 - 2010 Running Acronis Disk Director Lite from a bootable m edia You can run Acronis D isk Director Lite on a bar e metal, on a machine that cannot boot or on a non- Windows machine. T o do so, b oo t the ma chine from a bootable media (p.
282 Copyright © Acronis, Inc., 2000 - 2010 Displaying operation r esults The results of any disk or volume operation, yo u have just plann ed, are immediately displa yed in the Disk management v iew of the console.
283 Copyright © Acronis, Inc., 2000 - 2010 If you decide to change the disk settings it can be don e later using the standa rd Acronis Disk Director Lite disk tools. 6. 11. 5. 2 Ba sic d isk c lo nin g Sometimes it is n ecessary to transfer all the disk data onto a ne w disk.
284 Copyright © Acronis, Inc., 2000 - 2010 data loss , then the user will be allowed to proc ee d. If d ue to the size limitations safe transf er of all the source disk data t o the target disk is im.
285 Copyright © Acronis, Inc., 2000 - 2010 5. Wait until the task is finished. 6. 11. 5. 3 D isk c on v ers io n: MB R t o GP T You would want to co nvert an MBR basic disk to a GPT basic disk in the f o llowing cases: If you need m ore than 4 primary volumes on one disk.
286 Copyright © Acronis, Inc., 2000 - 2010 Please note, a volume, belonging to a GPT disk to c onvert, will be a logical on e after the operation and is irreversible. 3. By clicking OK , you'll add a pending operation of G P T to MBR disk conversion.
287 Copyright © Acronis, Inc., 2000 - 2010 You will be advised ab out the changes that will happen to the system if the chosen disk is converted from d y namic in to basic.
288 Copyright © Acronis, Inc., 2000 - 2010 the following Micr o soft kn owledge base article: http: // technet. microsoft.com/en- us/library/cc73 2026.aspx. 6 . 1 1 . 6 V o l u m e o p e r a t i o n s Acronis Disk Dire ctor L ite i ncludes the following oper ations that can be perf ormed on volumes: Create Volume (p.
289 Copyright © Acronis, Inc., 2000 - 2010 A volume, als o someti mes called RAID 0 , c o nsisting of equal sized stripes of data, written across each disk in the volume; it m eans that to create a striped volume, a us er will need two or mor e dynamic disks.
290 Copyright © Acronis, Inc., 2000 - 2010 Striped Mirrored RAID-5 You will obtain a brief description of every type o f volume for better underst anding of the advantages and limit ations of each possible v olume ar chitecture.
291 Copyright © Acronis, Inc., 2000 - 2010 minimum and the maximum values or click o n the sp ecial handle, and hold and drag the borders of the disk's picture with t he cursor. The maximum value normally includes the most p o ssible un allo cated spac e.
292 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 2 D ele te vo lu me This version of Ac r onis Disk Director Lite has reduced functionality because it is ma inly a tool for preparing bare-metal systems for recovering p r eviousl y s aved volum e images.
293 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 6. 4 C han ge v olu me l ett er Windows operating systems assign letters (C:, D:, et c) to hard disk v o lumes at startup . These lett ers are used by applicati ons and operating systems t o locate files and folders in th e volumes.
294 Copyright © Acronis, Inc., 2000 - 2010 to save additional space which is being lost due to the cluster size on the FA T16 or FAT32 file sy stems as a quick and m ore or less reliab le way of destr oy ing data, residing in this volume If y ou wa nt to fo rm at a vo lum e: 1.
295 Copyright © Acronis, Inc., 2000 - 2010 Quitting Acronis Dis k Director Lite with o ut commi tt ing the pending operations effectively cancels them, so if you try to exit Disk management without committing t he pend ing operations, you will receive the appr opriate warning.
296 Copyright © Acronis, Inc., 2000 - 2010 7 C ent ra li zed ma na ge me nt This section covers o perati o ns that can be performed centrally by usin g the components for centralized manage ment. The content of this se ctio n i s o nly app licable to advanced editions o f Acronis Backup & Rec overy 10.
297 Copyright © Acronis, Inc., 2000 - 2010 Vaults with low free space : X View vaults The alert is displayed if at lea st one centralized vault has less than 10% free space.
298 Copyright © Acronis, Inc., 2000 - 2010 Statistics for the s elected date are displayed t o t he rig ht of the chart. All the sta tis tics fields are interactive, i.e. if yo u click any field, the Log view will be open ed with the log entries pre-filt ered by this field.
299 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 2.1 Ba cku p pol ic y dep lo ym en t sta te s A backup policy depl oyment state is a combination of the policy deployment state s on all machines the policy is appli ed to.
300 Copyright © Acronis, Inc., 2000 - 2010 In the Log view, apply the Error filter i f there are too many log e ntries. You can also sort the "e rror" entries by backu p plans, managed entities o r machines. 2. Once the reason o f the fail ure is clear, do one or more of t he foll owing: Remove the reason o f the f ailure.
301 Copyright © Acronis, Inc., 2000 - 2010 Edit a policy Click Edit . Editing policies is perfor med in the same way a s creating (p . 357 ). Once the policy i s edited, the management s erver updates the policy on a ll machines the policy was deployed to.
302 Copyright © Acronis, Inc., 2000 - 2010 To Do Sort backup p olicies by any column Click the column's header to sort the back up policies in ascending ord er.
303 Copyright © Acronis, Inc., 2000 - 2010 Actions To Do View details of the machine (group). Click View details . In the Machine d etails (p. 310 )/ Group d etails (p. 319) windo w, examine all information on the selected machine (or th e selected group ).
304 Copyright © Acronis, Inc., 2000 - 2010 Static groups Static groups contain machines manually added t o the gro up by the admin istrator. A static member re mains in the grou p until the administrator removes the member from the group or deletes the corr esponding manag ed machine from the managem ent server.
305 Copyright © Acronis, Inc., 2000 - 2010 In the Add m achine (p. 307 ) window, se lect the machine th at needs to be added to the man agement server. Import machines from Active Directory Click Impor t machines from Active Directory . In the Impo rt machines from Active Director y (p.
306 Copyright © Acronis, Inc., 2000 - 2010 Remove a machine fro m the current static group Click Remove fr om group . The backup policies applied to the group will be re voked from the machine automatically. Deleting the selected machine from the manag ement server To Do Delete a machine from the management server Click Delete mach ine from AMS .
307 Copyright © Acronis, Inc., 2000 - 2010 A ddi ng a m ach in e to th e m an ag em en t s er ver To be able to deplo y backup policies from Acronis Backup & Recovery 10 Manag ement Server to a managed machine and perform other centralized management operations, y ou need t o register the machine on the m anage m ent ser v er.
.
309 Copyright © Acronis, Inc., 2000 - 2010 Synchronization com mand line tool Acronis Backup & Rec overy 10 Management Ser ver has a command line too l that enables you to create a batch file and schedule the synchronizati o n task usin g Windows scheduler.
310 Copyright © Acronis, Inc., 2000 - 2010 M ovi ng a ma ch in e t o an ot he r g ro up To m ov e t he se lec te d m ac hi ne to a not her gr ou p 1. In the group tree , se lect the group th e machine will be moved t o . 2. Click OK . The machine being moved leaves one gr o up and bec omes a member of another group.
311 Copyright © Acronis, Inc., 2000 - 2010 Unknown - this sta tus is displayed until the first c onnection between the management se rver and the machine is established after adding the m achi ne or starting the management server's servic e.
312 Copyright © Acronis, Inc., 2000 - 2010 Plans and tasks Displays a list of the plan s (both local and centraliz ed) and tasks existing on the se lected machine. Operations The following is a guid eline for you to perfor m operati o ns with backup plans and tasks.
313 Copyright © Acronis, Inc., 2000 - 2010 recovery task (from the disk b ackup): The target volum e will be deleted and its space unallocated – y ou will get the same result if th e recovery is unsuccessful. To recov er the "lost" volume, you will hav e to r un the task once again.
314 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks.
315 Copyright © Acronis, Inc., 2000 - 2010 This opens Log view with pre-filtered log ent ries of the selected group. Remove machine from a group. Click Remove . The centralized plans, which were dep loyed to the parent grou p, will no longer affect this machine.
316 Copyright © Acronis, Inc., 2000 - 2010 To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items that are tic ke d off correspond to the c olumn headers presented in the table. 2. Click the items y o u want t o be displayed/hidden.
317 Copyright © Acronis, Inc., 2000 - 2010 Refresh a list of groups Click Refresh . The management con sole will update the list of grou ps from the management server with the most recent in formation.
318 Copyright © Acronis, Inc., 2000 - 2010 IP range: 192.168.17.0 - 192.168.1 7.55 will add to the sa me group all the machin es whose operating syste m is Windo ws 2000 or Windows 2003 and bel ong to the SERVERS organ izational unit and w hose I P addr esses are within the rang e 192.
319 Copyright © Acronis, Inc., 2000 - 2010 when the machine w as initially added to the manag ement server. Otherwise, the machine will n o t be added to the group.
320 Copyright © Acronis, Inc., 2000 - 2010 To Do View details of a policy Click View details . In the Policy d etails (p. 302 ) windo w, examine all information related t o the selected backup policy . View tasks of a policy Click View tasks . The Tasks (p.
321 Copyright © Acronis, Inc., 2000 - 2010 Adding a virtua l machine a s a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on th e virtual machine and register (p. 3 0 7) it on th e managem ent server. The machine will be treated as a physical on e.
322 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 4.1 Vi rt ua l m ach in es on a m ana gem en t se rv er Availability of virtual machines Virtual machines are displayed as available when both the agent is available f o r t he m anag ement server and the mach ines are available for the agen t.
323 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 4.2 VM wa re v Cen te r int egr at io n If you are using V M ware v Sphere, it is rec ommended that you integrate the management server with your vCenter S erver. To i nt eg ra te the m ana gem en t s er ver w ith a VM war e vCe nte r Ser ve r: 1.
324 Copyright © Acronis, Inc., 2000 - 2010 For a vCenter Server , a list of ESX/ESXi hosts and clus ters obtained from the v Cen ter Server will be displayed.
325 Copyright © Acronis, Inc., 2000 - 2010 To be able to dedup licate backups, an agent needs a s eparately sold license for d eduplication. If you have imp o rted such lic enses into the license serv er, you can select the Enable deduplication. . . check box to let th e agents acqu ire these licenses.
326 Copyright © Acronis, Inc., 2000 - 2010 Creating a cluster of serve rs that already have agents It is recommended that you remove Agents f o r ESX/ESXi fro m all bu t one of the servers. Retain t he agent whose VA resid es on the shared storage. Restar t the VA so that it becomes aw are of the cluster.
327 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 5.1 A cti on s on st or ag e n ode s All the operations des cribed here, are perfor m ed by cl icking the corresponding b utto ns on th e toolbar. The opera tions can be also accessed from the Storage nodes bar ( o n the Actions and tools pane) and from the Sto r a ge node s item of the main m enu.
328 Copyright © Acronis, Inc., 2000 - 2010 storage nodes The management con sole will update the list of storage nod es from the management server with th e most recent information .
329 Copyright © Acronis, Inc., 2000 - 2010 Archives - the total number of archives stored in all th e vaults managed by the storage node Backups - the total nu m ber of backups stored within th e archives in all the vaults managed by the storage node.
330 Copyright © Acronis, Inc., 2000 - 2010 View a task's log Click View log . The Log (p. 331 ) vi ew will display a list of th e log entries related to the selected task. Run a task Click Run . The task will be executed i mmediately in spit e of its schedu le.
331 Copyright © Acronis, Inc., 2000 - 2010 Refresh tasks table Click Refresh . The management con sole will update the l ist of tasks existing on the machines with the most recent infor mation.
332 Copyright © Acronis, Inc., 2000 - 2010 personal vaults, ex ecuting a recovery task, will g enerate events logged in t he loca l event log. Physically, a loc al event log is a collection o f XML fil es stored on the machine. Th e managed machine local event log is ac cessible when the console is co nnected t o the machine.
333 Copyright © Acronis, Inc., 2000 - 2010 To Do Select a single log entry Click on it. Select multiple log entries non -contiguous : hold down CTRL and click the log entries one by on e contiguou s : select a single log entry, th en hold down SHIFT and click another entry.
334 Copyright © Acronis, Inc., 2000 - 2010 Filter log entries by the original backup p lan or managed entity typ e Under the Backu p plan (or Managed en tity type ) column h eader, select the backup plan or the type of managed entity from the list.
335 Copyright © Acronis, Inc., 2000 - 2010 ------------------- -------- Log Entry Details ------------- -------------- Type: Information Date and time: DD.
336 Copyright © Acronis, Inc., 2000 - 2010 the tables. You can expo rt the re port to an XML file and open it later using Microsoft Excel or Microsoft Access. 7. 1. 8.1 Re po r t a bo ut t he ma ch in es In this view, you c an gener ate a report about the m achines that ar e regis te red o n the manage ment server.
337 Copyright © Acronis, Inc., 2000 - 2010 Schedule : The type s of the backup policies' schedules — Manual and/or Schedule d . Manual schedule means that th e corresponding centralized b ackup plan runs only when y ou start i t manually. Owner : The list o f users wh o created the backup policies.
338 Copyright © Acronis, Inc., 2000 - 2010 Filters Under Filters , choos e which tasks to include in th e report. Onl y t he task s t hat m eet all filter crite ria are included. Origin : The types of origin of the tasks — Centralized , Local , and/or Local without ba c kup plan .
339 Copyright © Acronis, Inc., 2000 - 2010 Report view Under Report vie w , choos e how the report will look: Select whether t o show all items in a single table or to group them by a par ticular column. Specify which table co lu mns to show, and in which order.
340 Copyright © Acronis, Inc., 2000 - 2010 Backup policie s (centralize d tasks only): The backup policies o n which the tasks are based. The default setting means all backup policies that ever exi sted during the report peri od. Machines : The lis t of machi nes on which the tasks exis t.
341 Copyright © Acronis, Inc., 2000 - 2010 By using the grap hical user interface (GUI) By modifying the Windows registry In Linux, instead of using the administrati ve template and m odifying the registry, parameters are configured by editing t he c o rrespondin g configuration files.
342 Copyright © Acronis, Inc., 2000 - 2010 http://msdn2.micr oso ft.com/ en-us/library/aa3741 77.aspx 7. 2. 1.2 A cro ni s Bac ku p & R ec ov er y 10 S tor ag e N od e The following are the parameters of Acronis Backup & Recover y 10 Storage Nod e that can be set by using Acronis Ad m inistrati ve Template.
343 Copyright © Acronis, Inc., 2000 - 2010 In this case, the co m ponen t's connection to the storag e no de will fail. If the component is an Acronis Backup & Rec overy 10 Agent, the corre sponding backup or recov ery task will stop with the Failed status.
344 Copyright © Acronis, Inc., 2000 - 2010 When the amount o f free s pace in a vault is equal to the value in Vault Free Spa ce Error Limit or less, an erro r is re co rded in t he storag e node's l og. Backups performed to the v ault will keep failing until the vault' s free space is above the limit.
345 Copyright © Acronis, Inc., 2000 - 2010 Possible values: 0 (Internal event), 1 (Debuggin g information), 2 (Information) , 3 (Warni ng), 4 (Error), or 5 (Critic al error) Default value: 0 (all ent.
346 Copyright © Acronis, Inc., 2000 - 2010 Trace Level Description: Specifi es the minimu m level of se v erity o f events f o r sending SN MP notifications about them. Only n otifications about events of levels greater than or equal t o Trace Level will be sent.
347 Copyright © Acronis, Inc., 2000 - 2010 Each worker perf o rms sync hronization for exactly one m achine a t a time. A connected machine to be synchronized waits f or an available worker. For this reason, the actual number of w o rkers will never exceed the maxi m um number o f conn ections (see Maximum Connect ions described pre v iously).
348 Copyright © Acronis, Inc., 2000 - 2010 When connecting t o a regis tered machine, Acronis Backup & Rec overy 10 Manag ement Server first uses th e machine's network nam e — provided that the machine was added to the management ser v er by na me.
349 Copyright © Acronis, Inc., 2000 - 2010 Snapsho t Storage Absolute Size Description: Specifi es the initial size of the snapsho t storage, in megabytes. Possible values: An y intege r number between 0 and 214 7 483647 Default value: 0 If this setting is 0 , th e management server uses the Snap shot Storage Relati v e S i ze setting.
350 Copyright © Acronis, Inc., 2000 - 2010 If Acronis License Ser ver is unavailable, Acronis Ba ckup & Recovery 10 will c ontinue working with full functionality fo r th e number of days specified in Maximum Time Witho ut License Server , as counted fr om the moment of installat ion o r fro m the last successful chec k.
351 Copyright © Acronis, Inc., 2000 - 2010 Default value: 4 ( o nly error s and critical errors will be record ed — if Trace State is set to True ) SNMP Specifies the types o f the a gent's events to send notifications about by means of Simple Network Management Pr o tocol (SN MP).
352 Copyright © Acronis, Inc., 2000 - 2010 You can specify a l o cal fold er o n an y volume, inclu ding a volume you are bac king up. Snapsho t Storage Absolute Size De scription: Spe cifies the initial size of the snap shot storage, in megaby te s.
353 Copyright © Acronis, Inc., 2000 - 2010 The component will us e the default settings, which is to use encryption if po ssible and to trust self-signed SS L certificates (see the following option).
354 Copyright © Acronis, Inc., 2000 - 2010 Disabled Encryption is disabled ; any connection to a client application which requires encryption will not be establish ed. Required Data transfer will be performed only if encr y ption is e nabled on the client applic atio n (see "Client Encrypti o n options"); it will be encrypted.
355 Copyright © Acronis, Inc., 2000 - 2010 File Trace Mini mal Level Description: Specifi es the minimum severity le v el of event s to be recorded in the file. Only even ts of levels greater than or eq ual to File Tra c e Minimal Level will be r ecorded.
356 Copyright © Acronis, Inc., 2000 - 2010 7 . 2 . 3 P a r a m e t e r s s e t t h r o u gh W i n d o ws r e g i s t r y The following are the parameters of Acronis Backup & Recover y 10 Storag e Node that can be set only by editing the regist ry.
357 Copyright © Acronis, Inc., 2000 - 2010 Registry key: HKEY_LOCAL_MACHINE SOFTWARE Acronis ASN ConfigurationStorageN ode Databas ePath TapesDataba sePath Description: Specifi es the folder where Acronis Backu p & Recovery 10 Storage N ode stores its tape vaults database.
358 Copyright © Acronis, Inc., 2000 - 2010 Exclusions (p. 365) [Optional] Set up ex clusions for the specific types o f fil es you do not wish to back up. To access this option, se lect the Advanced view check box. Where to back up Archive (p. 366) Specify the path to the loca tio n, where the backup archive will be stored, and t he archive name.
359 Copyright © Acronis, Inc., 2000 - 2010 By setting up regular conversion, you obtain a copy of your server or workstati on on a virtual machine which can b e readily powered on in case the o riginal ma chine fails.
360 Copyright © Acronis, Inc., 2000 - 2010 2. Click OK . To learn more ab out Acronis service credential s, see the Rights for Acronis servi ces (p. 81 ) sec tio n. To learn more ab out operations available depend ing on the user privileges, s ee the User privileges o n a managed machi ne (p.
361 Copyright © Acronis, Inc., 2000 - 2010 Boot volume Type or select: [BO OT] Refers to the registered ma chine's boot volume. The boot volume contain s the Windows folder and the suppo rting files for the Windows operating sy stem (typically located in the Windo wsSystem32 fold er).
362 Copyright © Acronis, Inc., 2000 - 2010 Linux A volume backup s to res all files a nd folders o f the sel ected volume independent o f their attributes, a boot re cord a nd the file system super block. A disk backup stor es all disk volumes as well as the zero track with th e master boot record.
363 Copyright © Acronis, Inc., 2000 - 2010 In general, the standard name for a Linux partition c onsists of three components : Disk type; hd f or IDE drives, sd for SCSI drives, md for software RAID drives (for example, dyna mic volumes); Disk number; a f o r the first disk, b for the second disk, etc.
364 Copyright © Acronis, Inc., 2000 - 2010 Windows Full path Point to the folders an d files to be bac ked up. If you specified a path t o a file or folder explicitl y, the policy will back up t his ite m on each machine where this e xact path will be found.
365 Copyright © Acronis, Inc., 2000 - 2010 Linux To i ncl ude I n th e Fi les a nd fol ders co lu mn, ty pe or sel ec t: Text file file.txt on the volume /dev/hda3 mounted on /home/usr/docs /dev/hda3/file.
366 Copyright © Acronis, Inc., 2000 - 2010 Exclude all system f il es an d folders This option is effec tive only for fil e systems that are sup po rted by Wind ows.
367 Copyright © Acronis, Inc., 2000 - 2010 1. Selecting the archiv es destination Choose where to st o re ma chines' archives: Store all machines' arch ives in a single location To back up data to Acr onis Online Backup Storage , c lick Log in and spe cify the credentials t o log in to the online st o rage .
368 Copyright © Acronis, Inc., 2000 - 2010 FINDEPT2_SYSTE M _BACKU P_Archive1 FINDEPT3_SYSTE M _BACKU P_Archive1 2. Click OK. The name looks lik e ArchiveN, where N is a sequen ce number. If the program fin ds that the archive Archive1 is alr eady stored i n the location, it w ill auto m atically sugg est the name Archive2.
369 Copyright © Acronis, Inc., 2000 - 2010 backup levels, you automatically obtain the rollba ck period – the guaranteed nu m ber of sessi ons that you can go bac k at any t ime. The aut o matic cl eanup mechanism maintains the required rollback period b y deleting the expired backups and ke eping the most recent back ups of each level.
370 Copyright © Acronis, Inc., 2000 - 2010 Custom retention peri ods for backups of each type Description Let us suppose that w e wa nt to set up a backup plan that will r egularly produce a series o f daily ( D ), weekly (W), and monthly (M) backups.
371 Copyright © Acronis, Inc., 2000 - 2010 Keep backup s: Specifies how long you want the backups to be stored in the archi ve. A term can be set in ho urs, d ays, weeks, months, or yea rs. For monthly backups, you can al so select Keep indefinitely if you want them t o be saved forever.
372 Copyright © Acronis, Inc., 2000 - 2010 Limited storage If you do not want to arran ge a vast amount of space t o store a hug e archive, y o u ma y set up a GFS scheme so as t o make y our backups m ore short-lived, at the same time ensuring that your information can be r ecovered in case of an accid ental data loss.
373 Copyright © Acronis, Inc., 2000 - 2010 Here, daily incre m ental bac kups will be created on Tue sdays and Thursdays, with wee kly and monthly backups perf ormed on Fridays. Note that , in order to choose Friday in the Wee kly/monthly field, you need t o first sele ct it in the Back up on field.
374 Copyright © Acronis, Inc., 2000 - 2010 Recur: Every 1 da y Frequency: Once at 6 PM Number of levels : 4 This is how the first 14 days (or 14 sessions) of this s cheme's schedule look.
375 Copyright © Acronis, Inc., 2000 - 2010 A new level 3 differential backup has not yet been cr eated, so the backup of da y five is st ill stor ed. Since it depends on the full backup of day one, that ba ckup is available as well. This enables us to go as far back as 11 days, which is the best-case scenario.
376 Copyright © Acronis, Inc., 2000 - 2010 The archive will be clean ed up only du ring backup and only if there is not eno ugh space to create a n ew backup.
377 Copyright © Acronis, Inc., 2000 - 2010 Retention rules: D elete backups older than 12 mo nths Apply the rule s: After backing up By default, a one-y ear-old fu ll backup will not be delet ed until all increm ental backups that depend on it become subjec t to deletion too.
378 Copyright © Acronis, Inc., 2000 - 2010 In the first of the pr ev ious examples, we set up a sched ule o nly for full backups. H ow ever , the scheme will still r esult in three backup tasks, enab.
379 Copyright © Acronis, Inc., 2000 - 2010 8 O n lin e bac ku p This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Onli ne Backup Storage. Acronis Backup & Re covery 10 Online might b e unav ailable in your region.
380 Copyright © Acronis, Inc., 2000 - 2010 8 . 1 . 2 W h a t d at a c a n I b a c k u p a n d r e c o v er ? You can back up fil es, vo lu m es, disks, o r the entire ph ysical machine as often as you wish. Unlike most online backup so lutio ns, Acronis Backup & Recovery 10 Onli ne enables bare metal recovery directly from the online storage.
381 Copyright © Acronis, Inc., 2000 - 2010 Host-based bac kup is available only for paid lice nses of VMware ESXi. Choose the below approach if yo ur ESXi Server uses a free license. Install Acronis software into the guest system The machine will be treated as a physical one.
382 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 6.4 Wh at i f a n et wo rk con n ect io n is lo st du rin g on lin e ba ck up or r ec ov er y? The software will tr y to reach the online storag e every 30 seconds. Aft er five unsuccessful attempts the backup or rec o very tas k will fail.
383 Copyright © Acronis, Inc., 2000 - 2010 The hard disk drive is sent back to you but it is not possib le to recover from it. How ev er, reco v ery from a locally att ached device is possible with the Large scale recovery (p. 38 7 ) option. 8. 1. 7.
384 Copyright © Acronis, Inc., 2000 - 2010 8. 1. 7.8 Ho w to p er fo r m in it ia l s ee din g? 1. Decide on the media (p. 383 ) that you will send . 2. Attach the media t o the m achine you are going to back up . Alternatively, you can back up to a local or network f o lder and t hen copy /move the backu p to the media.
385 Copyright © Acronis, Inc., 2000 - 2010 St ep 1 Delicately rem o ve your har d disk drive from the machi ne. St ep 2 Place the hard dri v e into a n anti-static bag to protect the drive from electrostatic discharge. If you do not have an anti-stati c bag, simply wrap the hard dri ve into aluminum foil.
386 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this company's web site, prepare and print two prepaid ship ping labels: 1. Shipping label for sending your hard drive. This lab el is placed on the top of the box.
387 Copyright © Acronis, Inc., 2000 - 2010 An order was created – The first ba ckup is about to start and the license cannot be used for any other machine. Fro m this p oint on, you can cancel the order if somethin g goes wrong. This will return the license to the pool of available licenses.
388 Copyright © Acronis, Inc., 2000 - 2010 Once you order Large Scale Recovery for a particular machine, Acronis send s you a USB hard disk drive with all of th e backup s m ade fro m this machine. Yo u can recover data dir ectly from the disk or copy the backups t o a local or ne twork folder.
389 Copyright © Acronis, Inc., 2000 - 2010 can cancel the order if something goes wrong. This will return the license t o the p o ol of availab le licenses. The order is bein g processed - Order processing in th e datacenter started. Writing data – Y o ur backu ps are being writt en o nto t he media.
390 Copyright © Acronis, Inc., 2000 - 2010 If you purchased your sub scriptions online using th e Acronis Web sit e, they are available im m ediately on your account manag ement Web page. The ne wly obtained subscriptions are listed at the Manage Subscriptions tab.
391 Copyright © Acronis, Inc., 2000 - 2010 Wh at d oes " Au to -r en ew " me an ? Auto-renewal means that when the current subscrip tion expires, th e next subscription will be automatically select ed from the available sub scription s. The next subscrip tion must be identical t o the current subscripti on.
392 Copyright © Acronis, Inc., 2000 - 2010 Windows Server 2 008 R2 - the Standard, Enterprise, S mall Business Ser v er, Datac enter, Foundation editio ns Windows MultiP o int Serve r 2 010 W.
393 Copyright © Acronis, Inc., 2000 - 2010 As soon as a subscripti on is activated, its subscripti o n period st arts. To avoid losing sub scription time, activate th e subscription only when you ar e ready to back up the ma chine. If a machine alre ady has a subscription, the new sub scription will replace the old one.
394 Copyright © Acronis, Inc., 2000 - 2010 Depending on y our settings, this ba ckup will be e ither full or incremental. But its size is not likely to be less than a full bac kup size. Therefore, it is not prac tical to reassign a subscript io n to a machin e whose first backup wa s done as an initial seeding.
395 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure p rox y s et ti ng s for an a gen t 1. Connect the cons ole to the machine fo r which yo u wa nt to configure proxy setting s. 2. In the Options m enu, located on the toolbar, click Machine option s .
396 Copyright © Acronis, Inc., 2000 - 2010 Dual destinat i on (p. 116) By using the Ba c kup perfo rmance > Network connection speed option, you can vary the transferring speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up.
397 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration code A character string f o r regist ering a subscription or lice nse that was bough t from an Acronis partner.
398 Copyright © Acronis, Inc., 2000 - 2010 9 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af te r the s y stem recovery is start ed. The system boots from the backup (p. 404) and the machin e become s operational and r eady to provide necessary services.
399 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation of loaders other tha n Windows loaders and GR UB. A gen t (A cr on is B ack up & Re cov er y 10 A ge nt ) An application that perf orms data backup and rec o very and enables other m ana gement operati o ns on the machine (p.
400 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati on (p. 399), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup strea m or data compression level. Back up options are a part of a backup plan (p.
401 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 399 ) installed o n the m achine finds da ta items using the selecti on rules. For example, if the selection rule is [A ll volumes], the entire machin e will be backed up. 5.
402 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is n o way to remove a physical machine from th e built-in group exc ept for re m oving the machine from the managem ent server.
403 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 3 99) from a backup archive (p. 399) in order to get rid o f outdated backups o r prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p.
404 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma nag em en t Any management o peratio n that is performed on a managed machine (p. 407 ) using the direc t console (p. 403)-agen t (p. 399) connection (as oppose d to centralized manageme nt (p. 402) when the operations are c o nfigured o n the manag ement server (p.
405 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Man agem ent http://support.micr o soft.c o m/kb/222 1 89/EN-US/ D yna mi c di sk A hard disk manag ed by Log ical D isk Manag er (LDM) that is availab le in Windows starting with Windows 2000.
406 Copyright © Acronis, Inc., 2000 - 2010 the administrator chang es the criteria so tha t the mac hine does not meet them a nymore. There is no way t o remove a m achine from a dynamic group manuall y e xcept fo r deleting the machine from th e management server.
407 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 399) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecove r th e data from a full backup. G GF S ( Gr and fa th er -Fa t h er-S on ) A popular backup sche me (p.
408 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d va ult A centralized vault (p. 402) managed by a storag e no de (p. 409 ). Archiv es (p. 399) in a man aged vault can be accessed as f o llows : .
409 Copyright © Acronis, Inc., 2000 - 2010 P lan Se e Backup plan (p. 4 0 0 ). P oli cy See Backup policy (p. 400 ). R Re co ver y po in t Date and time to w hich th e backed up data can be rev erte d to. Re gi st ere d ma ch in e A machine (p. 407) managed by a manage ment server (p.
410 Copyright © Acronis, Inc., 2000 - 2010 prevent access to the backup archives, even in c ase the storage medium is stolen or access ed by a malefactor, by usi ng encr y pted vaults (p. 406 ). S tor ag e nod e- sid e cl ea nu p Cleanup (p. 402) perf ormed by a storage node (p.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.