User's GuideAcronis®True Imagefor Microsoft Small Business ServerCompute with confidencewww.acronis.com
Chapter 1. Introduction 1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users Acronis True Image fo
Chapter 8. Scheduling tasks Acronis True Image for Microsoft Small Business Server allows you to schedule periodic backup and archive validation tas
Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tasks
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: Day – on the specified
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta
Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is
3. Select the partitions from which space will be used to create the zone. 4. In the next window, enter the Acronis Secure Zone size or drag the sli
5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup
9.3 Changing the password for Acronis Secure Zone 1. When prompted by the wizard, select Manage Acronis Secure Zone. 2. Select Change password. 3.
you to limit the amount of CPU usage for the application to maximize the CPU’s availability for mission critical applications. Additionally, users ca
Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image for Microsoft Small Business Server on a bare
Acronis Bootable Agent full version The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from
4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to
2. Insert your Win PE distribution CD into the media drive of the computer. If you have a distribution copy on the hard disk, copy the path to it. Th
Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is no
Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected
security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consoli
1.2 Acronis True Image for Microsoft Small Business Server components Acronis True Image for Microsoft Small Business Server includes the following
The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full
6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window
Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image for Microsof
12.2 WinPopup notification To set up WinPopup notification: 1. Enable the Messenger service on both the computer executing the task and the computer
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.
An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image for Micr
If you run Acronis True Image for Microsoft Small Business Server regularly, this feature in your operating system is redundant. You can turn it off,
Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, dep
If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable m
4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: the fa
Backup server Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library f
Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and click Convert to Virtual disk.
Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too sma
14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system
14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No
Keep data – leave the old disk partitions and data intact Destroy data – destroy all data on the old disk. If you are going to sell or give away you
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,
If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system an
Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including
Along with the hard disk number, you will see disk capacity, label, partition and file system information. Different partition types, including prima
Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create
Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacit
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce
Chapter 16. Command-line mode and scripting Acronis True Image for Microsoft Small Business Server (local version) supports the command-line mode an
partitions, except for the MBR, from an image /net_user:[username] /net_password:[password] /ftp_user /ftp_password /oss_numbers /reboot /log:[file
virtual machine /log:[file name] /log_net_user:[remote user] /log_net_password:[password] list Lists available drives and partitions. With the filena
asz_delete Deletes the Acronis Secure Zone /password:[password] /oss_numbers /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[
specified or there is no basic full backup, a full backup will be created /compression:[0…9] Specify the data compression level. It ranges from 0 to
/partition:DYN1,DYN2 /file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This opt
/target_harddisk:DYN you will select unallocated space on all dynamic disks that present in the system. /target_partition:[partition number] Specif
driver to be installed. filerestore /target_folder:[target folder] Specifies a folder where folders/files will be restored (a target folder). If not
* - an FTP-server must allow passive mode for file transfers. Data recovery directly from FTP-server requires the archive to consist of files no more
/harddisk:[disk number] Specifies the hard disks to convert by numbers. For each disk, a separate virtual disk will be created. By specifying /hardd
/harddisk:X Specifies the hard disk number where the Acronis Secure Zone will be created. /partition:[partition number] Specifies partitions from whi
trueimagecmd /create /filename:"C:\Test\1.tib" /password:qwerty /harddisk:2 /reboot /raw /incremental /compression:5 /split:640 /progress:o
trueimagecmd /deploy_mbr /harddisk:1 /target_harddisk:2 /filename:ftp://server/folder/arc.tib /ftp_user:fuser /ftp_password:fpswd This will restore M
7. List trueimagecmd /list This will list available partitions. trueimagecmd /list /asz This will list contents of the latest image located in Acroni
Copyright © Acronis, Inc., 2000-2008 155 - full (base) image backup c
16.2 Scripting 16.2.1 Script execution parameters Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True Image for M
Copyright © Acronis, Inc., 2000-2008 157 Options. This tag can be use
Chapter 2. Acronis True Image for Microsoft Small Business Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirem
The Acronis Group Server uses administrator’s credentials to perform data backup tasks on the computers. You will be asked for the credentials during
18 Copyright © Acronis, Inc., 2000-2008 The earlier versions of Acro
Encryption Options Server Requires Encryption This option defines the server behavior in case the client does not support encryption. When enabled,
Copyright © Acronis, Inc., 2000-2008. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron
Acronis True Image for Microsoft Small Business Server Install Window It is recommended that you install Acronis True Image Management Console first
connecting image backups as virtual disks (see 11.2.2 Mounting an image). 2.3.2 Installation of Acronis Group Server The Acronis Group Server only
4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can creat
Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator
10. Define the computers which administrators will back up using Acronis True Image Agents. Add the computers as follows. Click Set up Administrato
2.3.4 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image for Microsoft Small Business Server. It i
If your operating system fails to load, you can run Acronis Startup Recovery Manager. However, this must be activated prior to use; see 3.4 Acronis
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc
incremental backup, as it does not have to process through a long chain of previous backups. A standalone, full backup could be an optimal solution i
In that case, you will have to either re-create the full backup or increase the size of the Acronis Secure Zone. You can back up data automatically o
ACRONIS, INC. End User License Agreement (EULA) BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE DOWNLOADED OR IS CONTAINED O
Recovery Manager. Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you s
of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup lo
The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Gen
Copyright © Acronis, Inc., 2000-2008 33 2. Next, the application writ
will usually produce the same unbootable result because the new hardware is incompatible with the most critical drivers included in the image. Using
recovered system, you can prepare the system with Sysprep, image it and restore, if need be, using Acronis Universal Restore. 3.7.4 Limitations in u
following diagram illustrates ways of access to tape devices for networks with (I) and without (II) backup server. The devices must be locally attac
metadata saved on the tape and the database will be recreated on the new host using the new host RSM. This operation is performed at first access to
3.8.2 Backing up to a tape device through Acronis Backup Server To enable backup to a tape device in the local network: 1. Install Acronis Backup Se
4. If the tape contains data, its contents will be overwritten on prompt. You have an option to disable prompts, see 6.3.14 Additional settings. 5.
• One (1) instance of the Hardware installed Software in one physical operating system environment; and • Up to four (4) instances of the Hardware
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managi
To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main w
5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account cr
7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed.
The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery
Copyright © Acronis, Inc., 2000-2008 45 Browse logs of Acronis True I
46 Copyright © Acronis, Inc., 2000-2008 Other Tools Create bootable
Cancelled – the task has been cancelled on the remote computer Offline - the remote computer is not connected to the network or is switched off Inacc
6. Hide computers that you do not wish to browse or make a hidden computer visible. To hide a computer, select it, then select on the sidebar Compute
backing up to a backup server, choose Personal Backup Location or tape drive and enter backup server administrator’s credentials. For more informatio
BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY. Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY
When distribution is complete, the group task appears in Group Tasks Management window. If you connect to any computer included into the group, you w
When managing a group task, enter the same username and password you entered when created the task. 4.4.4 Acronis Group Server options Acronis Group
When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entere
The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (th
Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas
To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy
If you opted for picking the user name out of the domain user list, you will skip the above window and proceed to the other windows where you will s
backup location, quotas and time limits like common users are and uses the administrator profile for both remotely and locally controlled backups. 4.
To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window
You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the li
Table of Contents Chapter 1. Introduction ...10 1.1 Acronis® T
If maximum number of connections is set, then some agents or local Acronis True Image for Microsoft Small Business Server versions may be unable to a
Chapter 5. Using Acronis True Image for Microsoft Small Business Server (local version) Acronis True Image for Microsoft Small Business Server (loca
Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity checking
Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.
64 Copyright © Acronis, Inc., 2000-2008 Run, stop, edit, clone, renam
Other Tools Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Turn on/off Windows System Restore to
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a
You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may select
3.7.5 Getting Acronis Universal Restore...35 3.8 Backing up to tape lib
You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from th
4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file
See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select wh
6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being a
You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex
net start “Microsoft Exchange Event” net start “Microsoft Exchange IMAP4” net start “Microsoft Exchange MTA Stacks” net start “Microsoft Exchange POP
6.3.6 Backup performance The three options below might have a more or less noticeable effect on the backup process speed. This depends on overall sy
6.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup. Incremental/differential backup captures only cha
You can disable preserving the files’ security settings in archives to completely eliminate this kind of problem. Then the restored files/folders wil
6.3.11 Error handling 1. Ignore bad sectors The preset is disabled. With the default setting, the program will display a pop-up window each time i
7.3 Restoring disks/partitions or files from images ...86 7.3.1 Starting the Restor
Even if a password is set for the Acronis Secure Zone, the copy archive will not be protected with the password. 6.3.13 Wake On LAN This option is
To check archive data integrity, you must have all incremental and differential backups belonging to the archive and the initial full backup. If any
Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1
7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). Fo
7.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the des
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locat
7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as
start over. If you can not determine which applications use the partition (disk), close them all. 7.3.1 Starting the Restore Data Wizard Start the R
7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offer
Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecti
12.4.1 Windows event log...124 12.4.2 SNMP notificatio
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination dis
Selecting Active for a partition without an installed operating system could prevent your server from booting. 7.3.7 Changing the restored partitio
7.3.9 Assigning a letter to the restored partition Acronis True Image for Microsoft Small Business Server will assign an unused letter to a restored
Acronis Universal Restore uses three sources for drivers: - the driver repository - a folder or folders on a network drive or CD specified in restor
You can edit the default (or set the temporary) restore options while creating a restore task as well. 7.4.1 Files to exclude from restoration The
The program does not support interactive commands, i.e. commands that require user input (for example, “pause”.) The backup process will run concurre
96 Copyright © Acronis, Inc., 2000-2008 Here you can specify a path t
Copyright © Acronis, Inc., 2000-2008 97 cannot continue without user
4. Select the type of dynamic volume that will be created: simple/spanned, striped, mirrored or RAID 5. 5. Specify amount of space that the dynamic
On completion of operations, the dynamic volumes are unformatted and have no letters assigned. You will be able to assign the letters using Windows D
Commenti su questo manuale