ACRONIS Backup & Recovery 10 Advanced Server Guida Utente

Navigare online o scaricare Guida Utente per Software di recupero ACRONIS Backup & Recovery 10 Advanced Server. Acronis Backup & Recovery 10 Advanced Server Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 404
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti

Sommario

Pagina 1 - Advanced Server

User's Guide Acronis® Backup & Recovery ™ 10 Advanced Server

Pagina 2

10 Copyright © Acronis, Inc., 2000-2009 • Using deduplication 1. Install Acronis Backup & Recovery 10 Storage Node (p. 21) and add it to t

Pagina 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 The option defines whether the agent(s) operating on the managed machine have to send the log events to th

Pagina 4

Copyright © Acronis, Inc., 2000-2009 101 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operat

Pagina 5

102 Copyright © Acronis, Inc., 2000-2009 • The backup destination (networked location or local disk) • The backup scheme (Back up now or using th

Pagina 6

Copyright © Acronis, Inc., 2000-2009 103 Error handling (p. 118): Do not show messages and dialogs while processing (silent mode) + + + + + +

Pagina 7

104 Copyright © Acronis, Inc., 2000-2009 3.4.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable

Pagina 8 - 1.2. Getting started

Copyright © Acronis, Inc., 2000-2009 105 • Exclude all system files and folders Select this check box to skip files and folders with the System at

Pagina 9 - • Viewing log

106 Copyright © Acronis, Inc., 2000-2009 The program does not support interactive commands, i.e. commands that require user input (for example, &qu

Pagina 10 - • Using deduplication

Copyright © Acronis, Inc., 2000-2009 107 Post-backup command To specify a command/executable file to be executed after the backup is completed 1.

Pagina 11

108 Copyright © Acronis, Inc., 2000-2009 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture c

Pagina 12 - Navigation tree

Copyright © Acronis, Inc., 2000-2009 109 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do n

Pagina 13 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2009 11 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace

Pagina 14

110 Copyright © Acronis, Inc., 2000-2009 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The p

Pagina 15 - "Tasks" view

Copyright © Acronis, Inc., 2000-2009 111 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable

Pagina 16 - Action pages

112 Copyright © Acronis, Inc., 2000-2009 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe

Pagina 17

Copyright © Acronis, Inc., 2000-2009 113 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba

Pagina 18 - 1.3.1. Agent for Windows

114 Copyright © Acronis, Inc., 2000-2009 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.

Pagina 19 - 1.3.2. Agent for Linux

Copyright © Acronis, Inc., 2000-2009 115 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one

Pagina 20 - VMware vCenter integration

116 Copyright © Acronis, Inc., 2000-2009 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man

Pagina 21 - 1.3.4.2. Storage Node

Copyright © Acronis, Inc., 2000-2009 117 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since

Pagina 22 - 1.3.5. Management Console

118 Copyright © Acronis, Inc., 2000-2009 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t

Pagina 23

Copyright © Acronis, Inc., 2000-2009 119 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files

Pagina 24 - 1.6. Hardware requirements

12 Copyright © Acronis, Inc., 2000-2009 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on wheth

Pagina 25

120 Copyright © Acronis, Inc., 2000-2009 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Pagina 26 - 1.7. Technical support

Copyright © Acronis, Inc., 2000-2009 121 The program will try to execute the failed task again if you select the Restart a failed task check box an

Pagina 27 - 2.1. Basic concepts

122 Copyright © Acronis, Inc., 2000-2009 If the console is connected to the management server The Use a separate tape set option has more precise d

Pagina 28

Copyright © Acronis, Inc., 2000-2009 123 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you

Pagina 29 - Backup using bootable media

124 Copyright © Acronis, Inc., 2000-2009 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro

Pagina 30

Copyright © Acronis, Inc., 2000-2009 125 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is

Pagina 31

126 Copyright © Acronis, Inc., 2000-2009 Validate backup archive before recovery + + + + + + Check file system after recovery + - + - + -

Pagina 32 - 2.3. Owners and credentials

Copyright © Acronis, Inc., 2000-2009 127 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.

Pagina 33

128 Copyright © Acronis, Inc., 2000-2009 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op

Pagina 34 - Differential backup

Copyright © Acronis, Inc., 2000-2009 129 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificati

Pagina 35 - 2.5. GFS backup scheme

Copyright © Acronis, Inc., 2000-2009 13 the history of operations logged in the local logs of the registered machines and the storage nodes. Shortc

Pagina 36

130 Copyright © Acronis, Inc., 2000-2009 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the se

Pagina 37 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2009 131 This option is not available when operating under the bootable media. The option defines whether the agent

Pagina 38 - The resulting archive: real

132 Copyright © Acronis, Inc., 2000-2009 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se

Pagina 39 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2009 133 The preset is Disabled. This option enables booting the machine into the recovered operating system withou

Pagina 40 - Tower of Hanoi by Acronis

Copyright © Acronis, Inc., 2000-2009 134 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault

Pagina 41 - 2.7. Retention rules

Copyright © Acronis, Inc., 2000-2009 135 A vault is called personal if it was created using direct connection of the console to a managed machine.

Pagina 42

136 Copyright © Acronis, Inc., 2000-2009 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach

Pagina 43 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2009 137 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contain

Pagina 44 - Backing up dynamic volumes

138 Copyright © Acronis, Inc., 2000-2009 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa

Pagina 45 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2009 139 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin

Pagina 46

14 Copyright © Acronis, Inc., 2000-2009 Actions Contains a list of common operations that can be performed on a managed machine or on a management

Pagina 47

140 Copyright © Acronis, Inc., 2000-2009 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o

Pagina 48 - Software RAID arrays

Copyright © Acronis, Inc., 2000-2009 141 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w

Pagina 49 - Hardware RAID arrays

142 Copyright © Acronis, Inc., 2000-2009 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl

Pagina 50 - 2.11. Tape support

Copyright © Acronis, Inc., 2000-2009 143 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni

Pagina 51

144 Copyright © Acronis, Inc., 2000-2009 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof

Pagina 52 - 2.12.1. Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2009 145 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to

Pagina 53 - Limitation

146 Copyright © Acronis, Inc., 2000-2009 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,

Pagina 54 - Restore)

Copyright © Acronis, Inc., 2000-2009 147 At the Delete operation, the vault content will be deleted from the storage node database without accessin

Pagina 55 - Supported operating systems

148 Copyright © Acronis, Inc., 2000-2009 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w

Pagina 56 - How to use

Copyright © Acronis, Inc., 2000-2009 149 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage

Pagina 57 - 2.13.1. Basic concepts

Copyright © Acronis, Inc., 2000-2009 15 The management console "remembers" the way the panes' borders are set. When you run the mana

Pagina 58

150 Copyright © Acronis, Inc., 2000-2009 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the

Pagina 59

Copyright © Acronis, Inc., 2000-2009 151 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,

Pagina 60 - Setting up the storage node

152 Copyright © Acronis, Inc., 2000-2009 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes

Pagina 61

Copyright © Acronis, Inc., 2000-2009 153 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o

Pagina 62

154 Copyright © Acronis, Inc., 2000-2009 • GFS Example 3 (p. 158). The Use a separate tape set option is selected. All the Always use a free tape

Pagina 63 - 2.13.3.4. Example

Copyright © Acronis, Inc., 2000-2009 155 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of

Pagina 64

156 Copyright © Acronis, Inc., 2000-2009 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the

Pagina 65

Copyright © Acronis, Inc., 2000-2009 157 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti

Pagina 66 - Policy on a group

158 Copyright © Acronis, Inc., 2000-2009 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec

Pagina 67

Copyright © Acronis, Inc., 2000-2009 159 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of

Pagina 68

16 Copyright © Acronis, Inc., 2000-2009 o By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); o By

Pagina 69

160 Copyright © Acronis, Inc., 2000-2009 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it

Pagina 70

Copyright © Acronis, Inc., 2000-2009 161 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac

Pagina 71 - Backup policy state diagram

162 Copyright © Acronis, Inc., 2000-2009 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.

Pagina 72

Copyright © Acronis, Inc., 2000-2009 163 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the

Pagina 73 - 2.13.6. Deduplication

164 Copyright © Acronis, Inc., 2000-2009 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to

Pagina 74 - Deduplication at source

Copyright © Acronis, Inc., 2000-2009 165 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress

Pagina 75 - Deduplication at target

166 Copyright © Acronis, Inc., 2000-2009 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age

Pagina 76

Copyright © Acronis, Inc., 2000-2009 167 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you access

Pagina 77 - What ratio to expect

168 Copyright © Acronis, Inc., 2000-2009 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplic

Pagina 78 - Remote connection

Copyright © Acronis, Inc., 2000-2009 169 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the

Pagina 79

Copyright © Acronis, Inc., 2000-2009 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages

Pagina 80 - Example 1

170 Copyright © Acronis, Inc., 2000-2009 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The

Pagina 81 - Example 2

Copyright © Acronis, Inc., 2000-2009 171 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac

Pagina 82 - On a domain controller

172 Copyright © Acronis, Inc., 2000-2009 There should be enough space in the vault for temporary files created during consolidation. Backups result

Pagina 83

Copyright © Acronis, Inc., 2000-2009 173 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Pagina 84

174 Copyright © Acronis, Inc., 2000-2009 The specified period of time has passed since the last successful backup completed + + The scheduler beha

Pagina 85

Copyright © Acronis, Inc., 2000-2009 175 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a

Pagina 86 - Remote Agent ports

176 Copyright © Acronis, Inc., 2000-2009 The obvious way is to add five simple schedules. If you spend one minute for examination, you can think ou

Pagina 87 - Client Encryption options

Copyright © Acronis, Inc., 2000-2009 177 Advanced scheduling settings (p. 183) are available only for machines registered on Acronis Backup & R

Pagina 88 - Server Encryption options

178 Copyright © Acronis, Inc., 2000-2009 Several weekly schedules for one task In the case when the task needs to be run on different days of the w

Pagina 89 - 2.13.8.5. SSL certificates

Copyright © Acronis, Inc., 2000-2009 179 5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a

Pagina 90 - Self-signed certificates

18 Copyright © Acronis, Inc., 2000-2009 Console The console provides Graphical User Interface and remote connection to the agents and other Acronis

Pagina 91 - Non-self-signed certificates

180 Copyright © Acronis, Inc., 2000-2009 This schedule is widely used when creating a custom backup scheme. The "Last day of every month"

Pagina 92 - 3. Options

Copyright © Acronis, Inc., 2000-2009 181 2. On: <All> <All workdays>. 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Ef

Pagina 93 - 3.1.4. Number of tasks

182 Copyright © Acronis, Inc., 2000-2009 Examples "Bad block" emergency backup One or more bad blocks that have suddenly appeared on a ha

Pagina 94 - 3.2.2. Log cleanup rules

Copyright © Acronis, Inc., 2000-2009 183 To view properties of an event, including the event source and event number 1. In Event Viewer, click the

Pagina 95 - 3.2.3. Event tracing

184 Copyright © Acronis, Inc., 2000-2009 Run the task: Daily Once at: 09:00:00 AM Distribute start time within the time window Maximum delay: 1 Hou

Pagina 96 - 3.2.5. Acronis WOL Proxy

Copyright © Acronis, Inc., 2000-2009 185 The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not m

Pagina 97

186 Copyright © Acronis, Inc., 2000-2009 (2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the user b

Pagina 98 - 3.3. Machine options

Copyright © Acronis, Inc., 2000-2009 187 As a result, (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start imme

Pagina 99 - 3.3.2. Event tracing

188 Copyright © Acronis, Inc., 2000-2009 5.6.5. Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until

Pagina 100 - Windows

Copyright © Acronis, Inc., 2000-2009 189 6. Direct management This section covers operations that can be performed directly on a managed machine b

Pagina 101 - 3.3.3. Log cleanup rules

Copyright © Acronis, Inc., 2000-2009 19 1.3.1.2. Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Ac

Pagina 102

190 Copyright © Acronis, Inc., 2000-2009 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr

Pagina 103

Copyright © Acronis, Inc., 2000-2009 191 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i

Pagina 104 - 3.4.1.1. Archive protection

192 Copyright © Acronis, Inc., 2000-2009 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 198)

Pagina 105 - 3.4.1.3. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 193 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl

Pagina 106 - Pre-backup command

194 Copyright © Acronis, Inc., 2000-2009 Need interaction Any running task can put itself into the Need interaction state when it needs human inter

Pagina 107 - Post-backup command

Copyright © Acronis, Inc., 2000-2009 195 • Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last

Pagina 108 - Pre-data capture command

196 Copyright © Acronis, Inc., 2000-2009 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 199) window, select the task you need t

Pagina 109 - • Do not create a snapshot

Copyright © Acronis, Inc., 2000-2009 197 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Pagina 110 - Volume shadow copy writers

198 Copyright © Acronis, Inc., 2000-2009 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Pagina 111 - Backup priority

Copyright © Acronis, Inc., 2000-2009 199 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Pagina 112 - Network connection speed

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Pagina 113 - 3.4.1.10. Notifications

20 Copyright © Acronis, Inc., 2000-2009 1.3.4.1. Management Server Acronis Backup & Recovery 10 Management Server is the central server that d

Pagina 114 - Windows event log

200 Copyright © Acronis, Inc., 2000-2009 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover

Pagina 115 - SNMP notifications

Copyright © Acronis, Inc., 2000-2009 201 Settings The Settings tab displays information on scheduling and the options changed against the default

Pagina 116 - 3.4.1.13. Backup splitting

202 Copyright © Acronis, Inc., 2000-2009 • Archive name - name of the archive. • Archive comments - comments on the archive (if provided). Settin

Pagina 117 - 3.4.1.15. Media components

Copyright © Acronis, Inc., 2000-2009 203 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CTR

Pagina 118 - 3.4.1.16. Error handling

204 Copyright © Acronis, Inc., 2000-2009 Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machi

Pagina 119 - 3.4.1.17. Dual destination

Copyright © Acronis, Inc., 2000-2009 205 6.2. Creating a backup plan Before creating your first backup plan (p. 383), please familiarize yourself

Pagina 120 - Skip the task execution

206 Copyright © Acronis, Inc., 2000-2009 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view

Pagina 121 - 3.4.1.20. Tape support

Copyright © Acronis, Inc., 2000-2009 207 Host (p. 223) Specify the machine that will perform the conversion. The machine has to have Acronis Back

Pagina 122 - Always use a free tape

208 Copyright © Acronis, Inc., 2000-2009 To learn more about operations available depending on the user privileges, see the Users' privileges

Pagina 123 - Reset archive bit

Copyright © Acronis, Inc., 2000-2009 209 What does a disk or volume backup store? For supported file systems, with the sector-by-sector option turn

Pagina 124 - Use FTP in Active mode

Copyright © Acronis, Inc., 2000-2009 21 1.3.4.2. Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of

Pagina 125

210 Copyright © Acronis, Inc., 2000-2009 The program will access the source data using the credentials you specify. Use this option if the plan&apo

Pagina 126 - 3.4.2.1. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 211 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de

Pagina 127 - Post-recovery command

212 Copyright © Acronis, Inc., 2000-2009 Backing up to an existing archive You can configure the backup plan to back up to an existing archive. To

Pagina 128 - 3.4.2.4. Notifications

Copyright © Acronis, Inc., 2000-2009 213 6.2.9. Backup schemes Choose one of the available backup schemes: • Back up now – to create a backup ta

Pagina 129

214 Copyright © Acronis, Inc., 2000-2009 6.2.9.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data

Pagina 130 - 3.4.2.5. Event tracing

Copyright © Acronis, Inc., 2000-2009 215 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of

Pagina 131 - 3.4.2.6. Error handling

216 Copyright © Acronis, Inc., 2000-2009 • Start backup at: 11:00 PM • Back up on: All days • Weekly/monthly: Saturday (for example) • Keep bac

Pagina 132

Copyright © Acronis, Inc., 2000-2009 217 • Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backup

Pagina 133

218 Copyright © Acronis, Inc., 2000-2009 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p

Pagina 134 - 4. Vaults

Copyright © Acronis, Inc., 2000-2009 219 Roll-back period The number of days we can go back in the archive is different on different days. The mini

Pagina 135 - 4.1. Centralized vaults

22 Copyright © Acronis, Inc., 2000-2009 Encryption A managed vault can be configured so that anything written to it is encrypted and anything read

Pagina 136 - Pie chart with legend

220 Copyright © Acronis, Inc., 2000-2009 6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C

Pagina 137 - Vault content

Copyright © Acronis, Inc., 2000-2009 221 backup for some reason. Apply the rules (only if the retention rules are set) Specifies when to apply the

Pagina 138

222 Copyright © Acronis, Inc., 2000-2009 Incremental: Schedule: Weekly, every workday, at 7:00 PM Differential: Schedule: Weekly, every Saturday, a

Pagina 139 - Vault path

Copyright © Acronis, Inc., 2000-2009 223 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Pagina 140 - Vault encryption

224 Copyright © Acronis, Inc., 2000-2009 Take into account the following considerations. Which agent is installed on the host? The resulting virtua

Pagina 141

Copyright © Acronis, Inc., 2000-2009 225 6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect th

Pagina 142 - 4.1.3. Tape libraries

226 Copyright © Acronis, Inc., 2000-2009 Data type (p. 228) Applies to: disk recovery Choose the type of data you need to recover from the selected

Pagina 143 - 4.1.3.2. Hardware

Copyright © Acronis, Inc., 2000-2009 227 Automatic drivers search Specify where the program should search for HAL, mass storage and network adapt

Pagina 144 - 4.1.3.4. RSM Media Pools

228 Copyright © Acronis, Inc., 2000-2009 To learn more about operations available depending on the user privileges, see the User privileges on a ma

Pagina 145 - Prerequisites

Copyright © Acronis, Inc., 2000-2009 229 6.3.4. Content selection The representation of this window depends on the type of data stored in the arch

Pagina 146

Copyright © Acronis, Inc., 2000-2009 23 1.4. Supported operating systems Acronis License Server • Windows 2000 Professional SP4/XP Professional SP

Pagina 147 - Recovering from tape library

230 Copyright © Acronis, Inc., 2000-2009 To specify credentials 1. Select one of the following: o Use the task credentials The program will acces

Pagina 148 - Inventory

Copyright © Acronis, Inc., 2000-2009 231 Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent fo

Pagina 149 - Labeling

232 Copyright © Acronis, Inc., 2000-2009 o Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. I

Pagina 150 - 4.1.3.7. Tape support

Copyright © Acronis, Inc., 2000-2009 233 Select the way the disk's signature contained in the MBR will be handled. The disk signature is used

Pagina 151 - Choosing a backup scheme

234 Copyright © Acronis, Inc., 2000-2009 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and

Pagina 152 - Case to analyze

Copyright © Acronis, Inc., 2000-2009 235 To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the

Pagina 153

236 Copyright © Acronis, Inc., 2000-2009 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of

Pagina 154 - GFS Example 1

Copyright © Acronis, Inc., 2000-2009 237 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.

Pagina 155

238 Copyright © Acronis, Inc., 2000-2009 • Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the

Pagina 156

Copyright © Acronis, Inc., 2000-2009 239 - If the drivers are on a vendor's disc or other removable media, turn on the Search removable media.

Pagina 157 - GFS Example 2

24 Copyright © Acronis, Inc., 2000-2009 • Various Linux distributions, including: o Red Hat Enterprise Linux 4 and 5 o CentOS 4 and 5 o Fedora

Pagina 158 - GFS Example 3

240 Copyright © Acronis, Inc., 2000-2009 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation

Pagina 159

Copyright © Acronis, Inc., 2000-2009 241 6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it wi

Pagina 160 - ToH Example 1

242 Copyright © Acronis, Inc., 2000-2009 • The system loader points to the wrong volume This may happen when system or boot volumes are not recov

Pagina 161 - ToH Example 2

Copyright © Acronis, Inc., 2000-2009 243 The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu i

Pagina 162 - ToH Example 3

244 Copyright © Acronis, Inc., 2000-2009 multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin

Pagina 163 - Tape planning

Copyright © Acronis, Inc., 2000-2009 245 • Recover the files as two or more groups. For example, if the problem occurs when recovering 1 million f

Pagina 164 - Tape planning: Example 2

246 Copyright © Acronis, Inc., 2000-2009 Note: All vaults managed by the storage node will also be removed from the management server. No archives

Pagina 165 - 4.1.3.9. What if

Copyright © Acronis, Inc., 2000-2009 247 What to validate Validate Choose an object to validate: Archive (p. 248) - in that case, you need to speci

Pagina 166 - 4.2. Personal vaults

248 Copyright © Acronis, Inc., 2000-2009 6.4.2. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field,

Pagina 167

Copyright © Acronis, Inc., 2000-2009 249 6.4.4. Location selection To select a location Enter the full path to the location in the Path field or s

Pagina 168

Copyright © Acronis, Inc., 2000-2009 25 Acronis Backup & Recovery 10 Management Console Item Minimum requirements Recommended Computer proces

Pagina 169 - 4.3. Common operations

250 Copyright © Acronis, Inc., 2000-2009 6.4.6. When to validate As validation is a resource-intensive operation, it makes sense to schedule valid

Pagina 170

Copyright © Acronis, Inc., 2000-2009 251 Backup (p. 252) Select the backup. Access credentials (p. 252) [Optional] Provide credentials for the arch

Pagina 171

252 Copyright © Acronis, Inc., 2000-2009 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Pagina 172 - To show or hide columns

Copyright © Acronis, Inc., 2000-2009 253 o Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mount

Pagina 173 - 5. Scheduling

254 Copyright © Acronis, Inc., 2000-2009 Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for f

Pagina 174 - 5.1. Daily schedule

Copyright © Acronis, Inc., 2000-2009 255 Tip. When configuring export to a deduplicating managed vault, choose a machine where the deduplication

Pagina 175 - Examples

256 Copyright © Acronis, Inc., 2000-2009 Where to export Archive (p. 258) Enter the path to the location where the new archive will be created. Be

Pagina 176 - 5.2. Weekly schedule

Copyright © Acronis, Inc., 2000-2009 257 o If the archive is stored on a network share, expand the Network folders group, then select the required

Pagina 177

258 Copyright © Acronis, Inc., 2000-2009 The program will access the location using the credentials of the task account specified in the General se

Pagina 178

Copyright © Acronis, Inc., 2000-2009 259 • To export data to a locally attached tape device, expand the Tape drives group, then click the require

Pagina 179 - 5.3. Monthly schedule

26 Copyright © Acronis, Inc., 2000-2009 Acronis License Server Item Minimum requirements Recommended System memory 128 MB 256 MB or more Instal

Pagina 180

260 Copyright © Acronis, Inc., 2000-2009 • User name. When entering the name of an Active Directory user account, be sure to also specify the doma

Pagina 181 - Parameters

Copyright © Acronis, Inc., 2000-2009 261 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.

Pagina 182

262 Copyright © Acronis, Inc., 2000-2009 • Acronis Secure Zone is always created at the end of the hard disk. When calculating the final layout of

Pagina 183 - Use Wake-On-LAN

Copyright © Acronis, Inc., 2000-2009 263 o first, it will use the unallocated space. Volumes will be moved, if necessary, but not resized. Moving

Pagina 184 - 5.6. Conditions

264 Copyright © Acronis, Inc., 2000-2009 you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pre

Pagina 185 - 5.6.1. User is idle

Copyright © Acronis, Inc., 2000-2009 265 machines with corrupted or non-supported file systems. The operations can be configured and controlled eit

Pagina 186 - 5.6.3. Fits time interval

266 Copyright © Acronis, Inc., 2000-2009 • Windows Vista SP1 and Windows Server 2008 (PE 2.1) If you already have media with PE1.x distribution, u

Pagina 187 - 5.6.4. User logged off

Copyright © Acronis, Inc., 2000-2009 267 o If not configured, the Acronis loader waits for someone to select whether to boot the operating system

Pagina 188 - Example:

268 Copyright © Acronis, Inc., 2000-2009 vga=ask Prompts for the video mode to be used by the bootable media's graphical user interface. Witho

Pagina 189 - 6. Direct management

Copyright © Acronis, Inc., 2000-2009 269 pci=nobios Disables the use of PCI BIOS; only direct hardware access methods will be allowed. You may want

Pagina 190 - Activities

Copyright © Acronis, Inc., 2000-2009 27 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders

Pagina 191 - Way of working

270 Copyright © Acronis, Inc., 2000-2009 Example The bootable agent could use one of the network adapters for communication with the management co

Pagina 192 - Backup plan execution states

Copyright © Acronis, Inc., 2000-2009 271 The drivers can be removed from the list only in groups, by removing INF files. To remove drivers: 1. Sel

Pagina 193 - Backup plan statuses

272 Copyright © Acronis, Inc., 2000-2009 Adding Acronis Plug-in to WinPE 2.x ISO To add Acronis Plug-in to WinPE 2.x ISO: 1. When adding the plug-

Pagina 194 - Task statuses

Copyright © Acronis, Inc., 2000-2009 273 If the plug-in is installed in a folder other than the default folder, change the path accordingly (check

Pagina 195 - • Validation task (p. 246)

274 Copyright © Acronis, Inc., 2000-2009 2. The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...). 3. The Lin

Pagina 196

Copyright © Acronis, Inc., 2000-2009 275 2. Click Configure iSCSI/NDAS devices (in a Linux-based media) or Run the iSCSI Setup (in a PE-based

Pagina 197

276 Copyright © Acronis, Inc., 2000-2009 cp ln scsi_id dd ls sed df lspci sg_map26 dmesg lvm sh dmraid mc sleep e2fsck mdadm ssh e2labe

Pagina 198

Copyright © Acronis, Inc., 2000-2009 277 6.10.5.1. Creating the volume structure automatically Suppose that you saved the volume structure to the

Pagina 199 - Task details

278 Copyright © Acronis, Inc., 2000-2009 To recover MD devices and logical volumes 1. Boot the machine from a Linux-based bootable media. 2. Clic

Pagina 200 - Archive

Copyright © Acronis, Inc., 2000-2009 279 The following picture illustrates this configuration. Do the following to recover data from this archive.

Pagina 201 - Backup plan details

28 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Pagina 202 - 6.1.3. Log

280 Copyright © Acronis, Inc., 2000-2009 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the manage

Pagina 203 - • Click View Details

Copyright © Acronis, Inc., 2000-2009 281 6.10.6. Acronis PXE Server Acronis PXE Server allows for booting machines to Acronis bootable components

Pagina 204 - 6.1.3.3. Log entry details

282 Copyright © Acronis, Inc., 2000-2009 On a machine that has an operating system on the hard disk, the BIOS must be configured so that the networ

Pagina 205 - 6.2. Creating a backup plan

Copyright © Acronis, Inc., 2000-2009 283 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c

Pagina 206 - Convert to VM

284 Copyright © Acronis, Inc., 2000-2009 6.11.3. Choosing the operating system for disk management On a machine with two or more operating systems

Pagina 207 - To specify credentials

Copyright © Acronis, Inc., 2000-2009 285 shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including

Pagina 208 - 6.2.4. Items to back up

286 Copyright © Acronis, Inc., 2000-2009 6.11.5.2. Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It

Pagina 209

Copyright © Acronis, Inc., 2000-2009 287 source disk data to the target disk is impossible even with the proportional resizing of the volumes, then

Pagina 210 - 6.2.6. Exclusions

288 Copyright © Acronis, Inc., 2000-2009 4. Click Commit on the toolbar and then click Proceed in the Pending Operations window. 5. Wait until th

Pagina 211 - 6.2.7. Archive

Copyright © Acronis, Inc., 2000-2009 289 system, the operating system will stop loading after such conversion or some volumes on the selected GPT d

Pagina 212

Copyright © Acronis, Inc., 2000-2009 29 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Pagina 213 - 6.2.9. Backup schemes

290 Copyright © Acronis, Inc., 2000-2009 If you need to convert a dynamic disk to basic: 1. Select the dynamic disk to convert to basic. 2. Right

Pagina 214 - 6.2.9.3. Simple scheme

Copyright © Acronis, Inc., 2000-2009 291 • Offline The offline status means that a disk is accessible in the read-only mode. To bring the selected

Pagina 215

292 Copyright © Acronis, Inc., 2000-2009 A volume created from free disk space virtually linked together by the LDM from several physical disks. Up

Pagina 216

Copyright © Acronis, Inc., 2000-2009 293 If you want to create a volume: Run the Create volume wizard by selecting Create volume on the Wizards

Pagina 217 - At a glance

294 Copyright © Acronis, Inc., 2000-2009 If need be, you will be prompted to add the necessary number of disks to your selection, according to the

Pagina 218 - Example

Copyright © Acronis, Inc., 2000-2009 295 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve

Pagina 219 - Roll-back period

296 Copyright © Acronis, Inc., 2000-2009 If there is no other active volume in the system, the pending operation of setting active volume will be a

Pagina 220

Copyright © Acronis, Inc., 2000-2009 297 If you need to change a volume label: 1. Right-click on the selected volume, and then click Change label.

Pagina 221

298 Copyright © Acronis, Inc., 2000-2009 This approach enables you to control all planned operations, double-check the intended changes, and, if ne

Pagina 222 - Resulting tasks

Copyright © Acronis, Inc., 2000-2009 299 7. Centralized management This section covers operations that can be performed centrally by using the com

Pagina 223 - 6.2.10. Archive validation

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu

Pagina 224

30 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Pagina 225 - 6.3. Recovering data

300 Copyright © Acronis, Inc., 2000-2009 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l

Pagina 226 - When to recover

Copyright © Acronis, Inc., 2000-2009 301 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover

Pagina 227 - 6.3.1. Task credentials

302 Copyright © Acronis, Inc., 2000-2009 • Use the Information pane's tabs to view detailed information about the selected policy and perfor

Pagina 228 - 6.3.3. Data type

Copyright © Acronis, Inc., 2000-2009 303 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select

Pagina 229 - 6.3.4. Content selection

304 Copyright © Acronis, Inc., 2000-2009 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de

Pagina 230 - 6.3.6.1. Disks

Copyright © Acronis, Inc., 2000-2009 305 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and

Pagina 231 - NT signature

306 Copyright © Acronis, Inc., 2000-2009 Settings The tab displays information about the backup scheme used by the policy and backup options that w

Pagina 232 - 6.3.6.2. Volumes

Copyright © Acronis, Inc., 2000-2009 307 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a

Pagina 233 - Volume properties

308 Copyright © Acronis, Inc., 2000-2009 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i

Pagina 234 - Properties

Copyright © Acronis, Inc., 2000-2009 309 Add a machine to another static group Click Add to another group. In the Add to group (p. 312) window, sp

Pagina 235 - Processors

Copyright © Acronis, Inc., 2000-2009 31 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Pagina 236 - Exclusions

310 Copyright © Acronis, Inc., 2000-2009 View tasks existing on a machine Click View tasks. The Tasks (p. 331) view will display a list of the tas

Pagina 237 - Overwriting

Copyright © Acronis, Inc., 2000-2009 311 To perform registration through a local or remote console-agent connection, you have to be connected with

Pagina 238 - 6.3.9. Universal Restore

312 Copyright © Acronis, Inc., 2000-2009 A registered machine has to be specified by its registration address, that is, you need to provide exactly

Pagina 239

Copyright © Acronis, Inc., 2000-2009 313 The machine being added becomes a member of more than one group. As a result, the backup policies applied

Pagina 240

314 Copyright © Acronis, Inc., 2000-2009 o Online - the machine is available for the management server. This means that the management server&ap

Pagina 241

Copyright © Acronis, Inc., 2000-2009 315 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Pagina 242

316 Copyright © Acronis, Inc., 2000-2009 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Pagina 243 - Windows NT/2000/XP/2003

Copyright © Acronis, Inc., 2000-2009 317 Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing

Pagina 244 - Windows Vista/2008

318 Copyright © Acronis, Inc., 2000-2009 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tas

Pagina 245

Copyright © Acronis, Inc., 2000-2009 319 Configuring the machines table By default, the table has five columns that are displayed, others are hidde

Pagina 246 - General

32 Copyright © Acronis, Inc., 2000-2009 • Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot

Pagina 247 - 6.4.1. Task credentials

320 Copyright © Acronis, Inc., 2000-2009 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma

Pagina 248 - 6.4.3. Backup selection

Copyright © Acronis, Inc., 2000-2009 321 For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windo

Pagina 249 - 6.4.4. Location selection

322 Copyright © Acronis, Inc., 2000-2009 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machine has to be specified

Pagina 250 - 6.5. Mounting an image

Copyright © Acronis, Inc., 2000-2009 323 • Type - type of the group (static, or dynamic) • Criteria (for dynamic groups only) - grouping criteria

Pagina 251 - 6.5.1. Archive selection

324 Copyright © Acronis, Inc., 2000-2009 7.1.4. Virtual machines You can centrally manage virtual machines using either of the following methods

Pagina 252 - 6.5.4. Volume selection

Copyright © Acronis, Inc., 2000-2009 325 7.1.4.1. Virtual machines on a management server Availability of virtual machines Virtual machines are d

Pagina 253 - 6.6. Managing mounted images

326 Copyright © Acronis, Inc., 2000-2009 • Host/VA Using this criterion, you can create a dynamic group of virtual machines hosted on a specified

Pagina 254

Copyright © Acronis, Inc., 2000-2009 327 5. Licenses Click Provide license. When installing the trial product version, select Use the following t

Pagina 255 - What to export

328 Copyright © Acronis, Inc., 2000-2009 The group that has the same name as the vCenter Server will be removed and the policies applied to this gr

Pagina 256 - 6.7.2. Archive selection

Copyright © Acronis, Inc., 2000-2009 329 7.1.5.1. Actions on storage nodes All the operations described here, are performed by clicking the corre

Pagina 257 - 6.7.3. Backup selection

Copyright © Acronis, Inc., 2000-2009 33 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c

Pagina 258 - 6.7.5. Location selection

330 Copyright © Acronis, Inc., 2000-2009 Refresh the list of storage nodes Click Refresh. The management console will update the list of storage n

Pagina 259 - 3. Naming the new archive

Copyright © Acronis, Inc., 2000-2009 331 o Withdrawn - the storage node was registered on another management server. As a result, it is not possib

Pagina 260 - 6.8. Acronis Secure Zone

332 Copyright © Acronis, Inc., 2000-2009 or the backup plan will run. View details of a task Click View details. In the Tasks details (p. 199) win

Pagina 261

Copyright © Acronis, Inc., 2000-2009 333 • Each storage node has a built-in service task called a compacting task. This task cannot be deleted. Thi

Pagina 262

334 Copyright © Acronis, Inc., 2000-2009 Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has loc

Pagina 263 - Activate

Copyright © Acronis, Inc., 2000-2009 335 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the correspo

Pagina 264 - 6.10. Bootable media

336 Copyright © Acronis, Inc., 2000-2009 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to f

Pagina 265 - Linux-based bootable media

Copyright © Acronis, Inc., 2000-2009 337 • Module - Blank or the number of program module where an error was occurred. It is an integer number tha

Pagina 266 - Using Bart PE

338 Copyright © Acronis, Inc., 2000-2009 Generating reports To start generating a report, select a report template in the Reports view, and then cl

Pagina 267 - Kernel parameters

Copyright © Acronis, Inc., 2000-2009 339 Filters Under Filters, choose which backup policies to include in the report. Only the backup policies th

Pagina 268

34 Copyright © Acronis, Inc., 2000-2009 Full backup A full backup stores all data selected for backup. A full backup underlies any archive and form

Pagina 269 - Network settings

340 Copyright © Acronis, Inc., 2000-2009 Report view Under Report view, choose how the report will look: • Select whether to show all items in a s

Pagina 270 - Network port

Copyright © Acronis, Inc., 2000-2009 341 • Vaults: The list of centralized managed vaults that store the archives. • Machines: The list of regist

Pagina 271 - 2.0 is 512MB

342 Copyright © Acronis, Inc., 2000-2009 7.1.8.7. Report about the task activities In this view, you can generate a report about the tasks that ex

Pagina 272

Copyright © Acronis, Inc., 2000-2009 343 To allow active content permanently in Internet Explorer 1. On the Tools menu, click Internet Options, an

Pagina 273

344 Copyright © Acronis, Inc., 2000-2009 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32

Pagina 274 - To add an iSCSI device

Copyright © Acronis, Inc., 2000-2009 345 Possible values: Any integer number between 1 and 2147483647 Default value: 10 Acronis Backup & Recove

Pagina 275 - Linux commands and utilities

346 Copyright © Acronis, Inc., 2000-2009 For example, suppose that two vaults, Vault A and Vault B, are both stored on a disk volume. Suppose furth

Pagina 276

Copyright © Acronis, Inc., 2000-2009 347 The database is stored on the storage node in a local folder whose name is specified in Database path when

Pagina 277

348 Copyright © Acronis, Inc., 2000-2009 Trace State Description: Specifies whether to record Acronis Backup & Recovery 10 Management Server&ap

Pagina 278

Copyright © Acronis, Inc., 2000-2009 349 Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered ma

Pagina 279

Copyright © Acronis, Inc., 2000-2009 35 An incremental or differential backup created after disk defragmentation might be considerably larger than

Pagina 280 - Mounting backup volumes

350 Copyright © Acronis, Inc., 2000-2009 If there are fewer worker threads than normal-priority machines, the actual interval between synchronizati

Pagina 281 - 6.10.6. Acronis PXE Server

Copyright © Acronis, Inc., 2000-2009 351 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att

Pagina 282 - 6.11. Disk management

352 Copyright © Acronis, Inc., 2000-2009 Snapshot Storage Relative Size This setting is effective only when the Snapshot Storage Absolute Size se

Pagina 283 - 6.11.1. Basic precautions

Copyright © Acronis, Inc., 2000-2009 353 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue working with full

Pagina 284 - Displaying operation results

354 Copyright © Acronis, Inc., 2000-2009 Trace Level Description: Specifies the minimum level of severity of events to be recorded into the event l

Pagina 285 - 6.11.5. Disk operations

Copyright © Acronis, Inc., 2000-2009 355 This parameter is used when creating a backup plan. Changes to this parameter do not affect already existi

Pagina 286

356 Copyright © Acronis, Inc., 2000-2009 Select one of the following: Not Configured The component will use the default TCP port number 9876. Enabl

Pagina 287 - Using advanced options

Copyright © Acronis, Inc., 2000-2009 357 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Pagina 288

358 Copyright © Acronis, Inc., 2000-2009 Each event has a level from zero to five based on the event's severity, as shown in the following tab

Pagina 289 - System disk conversion

Copyright © Acronis, Inc., 2000-2009 359 You will find the description of these parameters in the correspondent topic about configuration through t

Pagina 290

36 Copyright © Acronis, Inc., 2000-2009 GFS-related settings of the backup plan Start backup at: Back up on: This step creates the total backup sch

Pagina 291 - 6.11.6. Volume operations

360 Copyright © Acronis, Inc., 2000-2009 7.3. Creating a backup policy A backup policy can be applied to both Windows and Linux machines. To create

Pagina 292 - Create volume wizard

Copyright © Acronis, Inc., 2000-2009 361 [Optional] Enter comments to the archive. To access this option, select the Advanced view check box. How t

Pagina 293 - Select destination disks

362 Copyright © Acronis, Inc., 2000-2009 Host (p. 223) Specify the machine that will perform the conversion. The machine has to have Acronis Backup

Pagina 294 - Set the volume options

Copyright © Acronis, Inc., 2000-2009 363 7.3.2. Items to back up Specify selection rules for backing up items, selected in the Source type field o

Pagina 295 - 6.11.6.3. Set active volume

364 Copyright © Acronis, Inc., 2000-2009 All fixed volumes Type or select: [Fixed Volumes] Refers to all volumes other than removable media. Fixe

Pagina 296

Copyright © Acronis, Inc., 2000-2009 365 For instance, it is possible to set up a policy to back up volume C: on Windows machines and partition /de

Pagina 297 - 6.11.7. Pending operations

366 Copyright © Acronis, Inc., 2000-2009 To define file selection rules In the first line, select the rule from the list, or type it manually. To a

Pagina 298

Copyright © Acronis, Inc., 2000-2009 367 All user profiles existing on a machine [All Profiles Folder] Points to the folder where all user profile

Pagina 299 - 7. Centralized management

368 Copyright © Acronis, Inc., 2000-2009 • Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden at

Pagina 300

Copyright © Acronis, Inc., 2000-2009 369 • Store each machine's archive in the specified folder on the machine Enter the full path to the fol

Pagina 301 - 7.1.2. Backup policies

Copyright © Acronis, Inc., 2000-2009 37 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a

Pagina 302

370 Copyright © Acronis, Inc., 2000-2009 Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify

Pagina 303

Copyright © Acronis, Inc., 2000-2009 371 Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in

Pagina 304 - Machines selection

372 Copyright © Acronis, Inc., 2000-2009 Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday, which is left for weekly a

Pagina 305 - 7.1.2.4. Policy details

Copyright © Acronis, Inc., 2000-2009 373 Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that m

Pagina 306 - 7.1.3. Physical machines

374 Copyright © Acronis, Inc., 2000-2009 With this scheme, you will have a week to recover a previous version of a damaged file from a daily backup

Pagina 307

Copyright © Acronis, Inc., 2000-2009 375 Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in thi

Pagina 308 - Grouping actions

376 Copyright © Acronis, Inc., 2000-2009 A cleanup mechanism ensures that only the most recent backups of each level are kept. Here is how the arch

Pagina 309 - Other actions

Copyright © Acronis, Inc., 2000-2009 377 On day 14, the interval is five days. It increases on subsequent days before decreasing again, and so on.

Pagina 310 - • installing the agent

378 Copyright © Acronis, Inc., 2000-2009 then delete the last full backup with all dependent incremental/differential backups • If there is only o

Pagina 311 - Text file requirements

Copyright © Acronis, Inc., 2000-2009 379 By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it

Pagina 312

38 Copyright © Acronis, Inc., 2000-2009 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Pagina 313 - Machine details

380 Copyright © Acronis, Inc., 2000-2009 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil

Pagina 314

Copyright © Acronis, Inc., 2000-2009 381 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Pagina 315 - Plans and tasks

382 Copyright © Acronis, Inc., 2000-2009 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and

Pagina 316

Copyright © Acronis, Inc., 2000-2009 383 Backup options Configuration parameters of a backup operation (p. 382), such as pre/post backup commands

Pagina 317 - Member of

384 Copyright © Acronis, Inc., 2000-2009 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 382) inst

Pagina 318 - Inheritance order

Copyright © Acronis, Inc., 2000-2009 385 A management server has two built-in groups that contain all machines of each type: All physical machines

Pagina 319 - 7.1.3.2. Actions on groups

386 Copyright © Acronis, Inc., 2000-2009 On a machine that is not registered on the management server, a user having the privilege to back up to th

Pagina 320 - Adding multiple criteria

Copyright © Acronis, Inc., 2000-2009 387 Differential backup A differential backup stores changes to the data against the latest full backup (p.

Pagina 321

388 Copyright © Acronis, Inc., 2000-2009 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the

Pagina 322 - Group details

Copyright © Acronis, Inc., 2000-2009 389 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's cr

Pagina 323

Copyright © Acronis, Inc., 2000-2009 39 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Pagina 324 - 7.1.4. Virtual machines

390 Copyright © Acronis, Inc., 2000-2009 F Full backup A self-sufficient backup (p. 382) containing all data chosen for backup. You do not need ac

Pagina 325 - Grouping of virtual machines

Copyright © Acronis, Inc., 2000-2009 391 Managed vault A centralized vault (p. 385) managed by a storage node (p. 392). Archives (p. 382) in a mana

Pagina 326 - • Host/VA

392 Copyright © Acronis, Inc., 2000-2009 Plan See Backup plan (p. 383). Policy See Backup policy (p. 383). R Recovery point Date and time to whic

Pagina 327

Copyright © Acronis, Inc., 2000-2009 393 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Pagina 328 - 7.1.5. Storage nodes

394 Copyright © Acronis, Inc., 2000-2009 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo

Pagina 329

Copyright © Acronis, Inc., 2000-2009 395 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 390) is considered vi

Pagina 330 - Adding a storage node

Index A A policy on a machine or a group • 66 About Windows loaders • 243 Access credentials • 251, 252 Access credentials for archive location • 20

Pagina 331 - 7.1.6. Tasks

Copyright © Acronis, Inc., 2000-2009 397 Archive validation • 206, 223, 380 At Windows Event Log event • 181 Attaching a managed vault • 138, 142 B

Pagina 332

398 Copyright © Acronis, Inc., 2000-2009 Communication between Acronis Backup & Recovery 10 components • 85 Components for centralized manageme

Pagina 333 - 7.1.7. Log

Copyright © Acronis, Inc., 2000-2009 399 Drivers for Universal Restore • 267, 270 Dual destination • 52, 103, 119 Dynamic disk • 44, 381, 387, 388,

Pagina 334

3. Options ... 92 3.1. Console option

Pagina 335

40 Copyright © Acronis, Inc., 2000-2009 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Pagina 336 - Configuring the log table

400 Copyright © Acronis, Inc., 2000-2009 Inheritance order • 314, 318, 323 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 145, 148,

Pagina 337 - 7.1.8. Reporting

Copyright © Acronis, Inc., 2000-2009 401 Operations with panes • 14 Options • 92 Organizational unit criterion • 96, 320, 321 Overview • 73, 124, 1

Pagina 338 - Report view

402 Copyright © Acronis, Inc., 2000-2009 Rescan • 138, 146, 147, 148, 149, 165 Result confirmation • 260, 261 Retention rules • 41, 214, 220, 221,

Pagina 339

Copyright © Acronis, Inc., 2000-2009 403 Temporarily disabling a backup plan • 169, 199 Time since last backup • 188 Time-based alerts • 93 ToH Exa

Pagina 340

404 Copyright © Acronis, Inc., 2000-2009 WinPE (Windows Preinstallation Environment) • 381, 384, 395 Work across subnets • 282 Working under bootab

Pagina 341 - Report coverage

Copyright © Acronis, Inc., 2000-2009 41 • differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern start

Pagina 342 - 7.1.8.9. Report view

42 Copyright © Acronis, Inc., 2000-2009 to this interval and deletes all backups created before that moment. None of the backups created after this

Pagina 343

Copyright © Acronis, Inc., 2000-2009 43 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram be

Pagina 344

44 Copyright © Acronis, Inc., 2000-2009 This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you s

Pagina 345

Copyright © Acronis, Inc., 2000-2009 45 Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volume

Pagina 346

46 Copyright © Acronis, Inc., 2000-2009 o Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume D

Pagina 347

Copyright © Acronis, Inc., 2000-2009 47 You can back up data of one or more logical volumes and recover it to a previously created logical volume o

Pagina 348

48 Copyright © Acronis, Inc., 2000-2009 3-1 hdd1 Pri,Act 63 1219617 Ext3 3-2 Acronis Secure Zone Pri 12196

Pagina 349

Copyright © Acronis, Inc., 2000-2009 49 The system has RAID-1 configured on two basic volumes: sdc1, sdd1. Num Partition Flags St

Pagina 350

6.1.1. Dashboard ...

Pagina 351

50 Copyright © Acronis, Inc., 2000-2009 Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a

Pagina 352

Copyright © Acronis, Inc., 2000-2009 51 ABR10 + + + + Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 -

Pagina 353

52 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Pagina 354

Copyright © Acronis, Inc., 2000-2009 53 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone

Pagina 355 - Connection parameters

54 Copyright © Acronis, Inc., 2000-2009 2.12.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove

Pagina 356

Copyright © Acronis, Inc., 2000-2009 55 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa

Pagina 357 - Event tracing parameters

56 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th

Pagina 358

Copyright © Acronis, Inc., 2000-2009 57 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto

Pagina 359 - When to modify

58 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme

Pagina 360 - Where to back up

Copyright © Acronis, Inc., 2000-2009 59 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi

Pagina 361

6.10. Bootable media ... 264 6.10.1. H

Pagina 362 - 7.3.1. Policy credentials

60 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor

Pagina 363 - 7.3.2. Items to back up

Copyright © Acronis, Inc., 2000-2009 61 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of

Pagina 364

62 Copyright © Acronis, Inc., 2000-2009 2.13.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex

Pagina 365

Copyright © Acronis, Inc., 2000-2009 63 • Active Directory organization unit (OU) • IP address range. Multiple criteria can be specified for a dy

Pagina 366

64 Copyright © Acronis, Inc., 2000-2009 3, 4, 5, 6 - the salesmen's machines (Windows XP) from the "Sales department" AD organizatio

Pagina 367 - 7.3.4. Exclusions

Copyright © Acronis, Inc., 2000-2009 65 • edit a group, that is: o change the group name o change the group description o change the dynamic m

Pagina 368 - 7.3.5. Archive

66 Copyright © Acronis, Inc., 2000-2009 management server tracks and displays personal statuses for each machine that it works with, as well as the

Pagina 369 - 2. Naming the archives

Copyright © Acronis, Inc., 2000-2009 67 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.13.

Pagina 370 - 7.3.7.1. Back up now scheme

68 Copyright © Acronis, Inc., 2000-2009 2.13.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machin

Pagina 371 - 7.3.7.3. Simple scheme

Copyright © Acronis, Inc., 2000-2009 69 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Pagina 372

Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A

Pagina 373

70 Copyright © Acronis, Inc., 2000-2009 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited

Pagina 374

Copyright © Acronis, Inc., 2000-2009 71 You may change grouping conditions or the machine may change its properties so that the machine leaves one

Pagina 375

72 Copyright © Acronis, Inc., 2000-2009 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is

Pagina 376

Copyright © Acronis, Inc., 2000-2009 73 "Deploying, Deployed". When the deployment completes on both machines, the state will be "De

Pagina 377

74 Copyright © Acronis, Inc., 2000-2009 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du

Pagina 378

Copyright © Acronis, Inc., 2000-2009 75 Before sending the item to the vault, the agent queries the deduplication database to determine whether the

Pagina 379

76 Copyright © Acronis, Inc., 2000-2009 • When performing incremental backups of data that does not change itself, but changes its location. Suc

Pagina 380 - 7.3.8. Archive validation

Copyright © Acronis, Inc., 2000-2009 77 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou

Pagina 381 - Glossary

78 Copyright © Acronis, Inc., 2000-2009 • If you protected the archive with a password Files that were not deduplicated are stored in the archive

Pagina 382

Copyright © Acronis, Inc., 2000-2009 79 2.13.7.2. Privileges for local connection Windows Local connection on a machine running Windows can be est

Pagina 383 - Backup policy (Policy)

8 Copyright © Acronis, Inc., 2000-2009 Overview of all configured and running operations with color-coding for successful and failed operations •

Pagina 384 - Built-in group

80 Copyright © Acronis, Inc., 2000-2009 2.13.7.4. Privileges for remote connection in Linux Remote connections to a machine running Linux—includin

Pagina 385 - Centralized vault

Copyright © Acronis, Inc., 2000-2009 81 Example 2 The above authentication policy might not work on Linux distributions with kernel version 2.4—inc

Pagina 386 - Deduplication

82 Copyright © Acronis, Inc., 2000-2009 Management Console; they have the same management rights on the registered machines as users with administr

Pagina 387 - Disk group

Copyright © Acronis, Inc., 2000-2009 83 A regular user, such as a member of the Users group on the storage node, can: • Create archives in any cen

Pagina 388 - Dynamic group

84 Copyright © Acronis, Inc., 2000-2009 2.13.7.8. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Back

Pagina 389 - Encrypted vault

Copyright © Acronis, Inc., 2000-2009 85 2.13.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron

Pagina 390

86 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node

Pagina 391 - Physical machine

Copyright © Acronis, Inc., 2000-2009 87 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable

Pagina 392

88 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS

Pagina 393 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2009 89 2.13.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network

Pagina 394 - Validation rules

Copyright © Acronis, Inc., 2000-2009 9 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installi

Pagina 395 - Virtual machine

90 Copyright © Acronis, Inc., 2000-2009 In Windows, the certificate path and the server certificate's file name are specified in the registry

Pagina 396

Copyright © Acronis, Inc., 2000-2009 91 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr

Pagina 397

Copyright © Acronis, Inc., 2000-2009 92 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph

Pagina 398

Copyright © Acronis, Inc., 2000-2009 93 The option defines whether to display the pop-up messages about task run results: successful completion, fa

Pagina 399

94 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem

Pagina 400

Copyright © Acronis, Inc., 2000-2009 95 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the

Pagina 401

96 Copyright © Acronis, Inc., 2000-2009 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr

Pagina 402

Copyright © Acronis, Inc., 2000-2009 97 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is installe

Pagina 403

98 Copyright © Acronis, Inc., 2000-2009 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information

Pagina 404

Copyright © Acronis, Inc., 2000-2009 99 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the ma

Commenti su questo manuale

Nessun commento