AvanquestメーカーAcronis Backup & Recovery 10 Advanced Workstationの使用説明書/サービス説明書
ページ先へ移動 of 389
User's Gui de Acronis® Backup & Recovery ™ 10 Advanced Workstation.
Copyr ight © Acronis, Inc. , 2000 - 2009. All rights reserv ed. “Acronis” and “Acronis Sec ure Zone” are registered tr ademarks of Acronis, Inc. "Acro nis Comput e wit h Confi dence" , “Acr onis Startu p Reco very Manager” , “Acr onis Acti ve Rest ore ” and the Ac ronis logo a re trademarks of Acronis, Inc .
Table of Con tent s 1. Intro ducin g Acro nis ® Ba cku p & Re co ver y™ 10 ......................................................... 7 1.1. Acronis Ba ckup & Reco very 10 over view ...........................................................
3.1.3 . Tim e - bas ed al ert s ...................................................................................................................................... 82 3.1.4 . Numbe r of task s .......................................................
6.2.1 . Why is the program asking for t he password? ...................................................................................... 196 6.2.2 . Backup plan 's cred entials ..................................................................
6.10. 6. Acronis PXE S erver ................................................................................................................................... 268 6.11. Disk management ................................................................
Copyrig ht © A croni s, In c., 200 0 - 20 09 7 1. Introduc ing A cronis® Ba ckup & R eco very™ 10 1.1. Acronis Backup & Recovery 10 overview Based o n Acronis’ pat ented disk im aging an.
8 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Enterp rise le vel of secu r ity Controlling user right s to perform oper ations and acces s backups Running ser vices with m inimal use r rights Re.
Copyright © A cronis, Inc., 2000 - 2009 9 The simpli fied way of central ized manag ement • Backup Using the Back up contr o l, select th e ma chine which you want to back up and then create a backup plan ( p. 370 ) on the machine. Y ou can create bac kup plans on mult iple mac hines in turn.
10 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Creati ng a backup policy rather than bac kup plans Set up a cent ralized back up policy and appl y it to the All machines gr oup. This way yo u will deploy backup pla ns on ea ch machine wit h a single action.
Copyright © A cronis, Inc., 2000 - 2009 11 Navig ation pane Contains the Navigation tree and the Shortc uts bar and lets you navigate to the di fferen t view s (see th e Navigation pane ( p. 11 ) section .) Actions and tools pane Contains bars with a set of actions that can be pe rform ed and tools (see the Actions and Tool s pane ( p.
12 Copyrig ht © A croni s, In c., 200 0 - 20 09 • [Manage ment ser ver name] . Root of the tr ee also called a Welcome view . Displays the name of the management se rver the cons ole is currently connected to. Use this view f o r quick access to the main o perations, available on the managemen t server.
Copyright © A cronis, Inc., 2000 - 2009 13 actions bar will be named as 'System backup' ac tion s and will have the set of actions typical to backup pla ns. All acti ons can also be access ed in the respec tive menu items. A me nu item appears o n the menu bar when you sel ect an item in any o f the navigatio n views.
14 Copyrig ht © A croni s, In c., 200 0 - 20 09 Help Contains a list of help topics. Different views and action pages of Acr onis Backup & Recovery 10 provided with lists of specif ic help topics.
Copyright © A cronis, Inc., 2000 - 2009 15 "Tasks " v iew Common w ay of w orking with vi ews Generally, every view cont ains a table of items, a table toolbar with buttons, and the Informat ion panel.
16 Copyrig ht © A croni s, In c., 200 0 - 20 09 Action page - C reate backup pl an Using con trol s and s peci fying s ettings The action pages offer two ways of representation: basic and advanced. The basic representation hides suc h fields a s credentials , comm ents, etc .
Copyright © A cronis, Inc., 2000 - 2009 17 Navi gation b uttons 1.3. Acron is Backup & Recove ry 10 c omponents This section contains a list of Acronis B ackup & Recovery 1 0 components with a brief description of their functionality. Acronis Ba ckup & Reco very 10 inclu des thr ee main types of comp o nents.
18 Copyrig ht © A croni s, In c., 200 0 - 20 09 File bac kup File - level data protection is based on backing up files and folders residing on the machine where the agent is installed or on a n e twork share. Files can be recovered to th eir original location or t o another place.
Copyright © A cronis, Inc., 2000 - 2009 19 Restore handles differences in devices that are critical for Wind ows start - up, such as st orage controllers, motherboard or chipset.
20 Copyrig ht © A croni s, In c., 200 0 - 20 09 VMware vCenter i nte gration This add - o n provides the capability to v iew virtual machines managed by a VMware vCenter Server in the manage ment ser.
Copyright © A cronis, Inc., 2000 - 2009 21 This functionality cannot be disabled in a managed vault. The next t wo operations are optional. Deduplication A managed vault can b e configured as a deduplicati ng vault .
22 Copyrig ht © A croni s, In c., 200 0 - 20 09 1.3.5. Acronis W ake - On - L AN Pr oxy Acronis Wake - On - LAN Proxy ena bles Acronis Backup & Recovery 10 Management Server to wake up for bac kup machine s located in a nothe r subnet .
Copyright © A cronis, Inc., 2000 - 2009 23 1.5. Suppo rted f ile systems Acronis Backup & Recovery 10 can back up and recov er the following file systems with the fo llowing limitations : • FAT.
24 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acro nis Backup & Recover y 10 Manageme n t Serve r Item Minimum requirements Recommended Syste m memory 512 MB 1 GB or mor e Installation disk spa.
Copyrig ht © A croni s, In c., 200 0 - 20 09 25 2. Understa nding Ac ronis Backup & Reco very 1 0 This se ction att empts to gi ve its readers a clear u nder standin g of th e produ ct s o that th ey can use th e product in various circumstanc es wi thout step - by - step instr uctions .
26 Copyrig ht © A croni s, In c., 200 0 - 20 09 The following diagram illustrates the notions discussed abov e. For more definitions please refer to the Glossary.
Copyrig ht © A croni s, In c., 200 0 - 20 09 27 Backup using b ootable media You ca n boot t he machine using the bo otable me dia, co nfigure t he backup o peration i n the same way as a simple backup plan and execut e the operation.
28 Copyrig ht © A croni s, In c., 200 0 - 20 09 The following diagram illustrates data r e covery under the opera ting system (online) . No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that m achine.
Copyrig ht © A croni s, In c., 200 0 - 20 09 29 If the machine fails to boot or y ou need to recover data to bare metal, you boot the machine using the bo otable media and con figure th e rec o very op eration in th e sam e way as th e recovery t ask.
30 Copyrig ht © A croni s, In c., 200 0 - 20 09 It is wid ely accepted tha t a full back up is the sl owest t o do bu t the fas test to res tore. With Acr onis technologies, recovery from an incremental bac k up may be n o t slower than recovery fro m a full one.
Copyrig ht © A croni s, In c., 200 0 - 20 09 31 specificati ons of the de vices, the backu p/rec overy options y ou set, to name a fe w. Practice is the best guide to selecti ng the optimal b acku p sche me.
32 Copyrig ht © A croni s, In c., 200 0 - 20 09 Managin g a plan (task ) o wned by an oth er us er Having Administrator privileges on the machine, a use r can modify tasks an d loc al backup plans owned by a ny user regi ster ed in the opera ting sys tem.
Copyrig ht © A croni s, In c., 200 0 - 20 09 33 2.5. GFS ba ckup sc heme This secti on co vers imple mentation of th e Grandfather - Father - Son (GFS) backup scheme in Acro nis Backup & Recovery 10. With this b ackup schem e you are n ot allowed to ba ck up more oft en than once a day.
34 Copyrig ht © A croni s, In c., 200 0 - 20 09 Weekly/ Monthly This step fo rms the dail y, weekly and mo nthly c ycles in the s chedu le. Select a day o f the w eek from the days s elect ed in the previous s tep. Each 1st, 2nd and 3rd backup cr eated o n this day of the week wil l be considere d as a we ekly bac kup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 35 Keep backups: Mont hly This st ep defines the retention rule for monthly backups. The cleanup task w ill run after e ach monthly backup and de lete all monthly backups that are o lder than you s pecify.
36 Copyrig ht © A croni s, In c., 200 0 - 20 09 Starting from the third week, weekly backup s will be regularly deleted. Afte r 6 months, monthly backups w ill start t o be deleted. The diagram fo r weekly and monthly backups will look sim ilar to the week - based timescale.
Copyrig ht © A croni s, In c., 200 0 - 20 09 37 2.6. Tower of Han oi backup sch eme The need to have frequent backups always conflicts with the co st of keeping such backups for a long time. The Tower of Han oi (ToH) ba ckup schem e is a u seful compr omise.
38 Copyrig ht © A croni s, In c., 200 0 - 20 09 Towe r of Hano i by Ac ron is The Tow er of Han oi backup scheme i s generally too complex to mentally cal culate the ne xt media to be used. B ut Acronis Backup & Recovery 10 provides you with automation of the scheme usage .
Copyrig ht © A croni s, In c., 200 0 - 20 09 39 For information about using Tower of Hanoi for tape libraries, see Using the T ower of Hanoi tape rotation sch eme ( p. 148 ). 2.7. Reten tion ru les The backups p roduced by a backup pl an make an archive.
40 Copyrig ht © A croni s, In c., 200 0 - 20 09 There is a certain risk tha t all but one backup will be deleted if the maximum archi v e size is set improperly (too small) or a regular backup turns out to be too large.
Copyrig ht © A croni s, In c., 200 0 - 20 09 41 • Retain t he backup until all dependent backups bec ome subj ect to deleti on The o utdated backup wi ll be kept un til all ba ckups t hat de pend o n it also become o utdat ed. Then all the chain will be dele ted at once during the regular cleanup.
42 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, wit h minor limitations, basic GPT vo lumes. Backing up dyn am ic vol umes Dynamic and basic GPT vo lumes are backe d up in the s ame w ay as basic MBR vol umes.
Copyrig ht © A croni s, In c., 200 0 - 20 09 43 o If the d ata size is less than 20 GB, then one disk can hold, say, 10G B; the other will ho ld the remaining 10GB. This way, a striped volume will be created on both disks and 20GB on the second disk will remain un allo cated.
44 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.9. Tape sup port Acronis Backup & Recove ry 10 supports tape librar ies, autoloaders, SCSI and USB tape drives as storage d evices.
Copyrig ht © A croni s, In c., 200 0 - 20 09 45 Tape written on a tape device through... Backu p Serv er ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + Storage Node ABR10 - - - + 2.9.2. Using a sing le tape d rive A tape drive that is locally attached to a m anaged machine can be us e d by local backup plans as a storage device.
46 Copyrig ht © A croni s, In c., 200 0 - 20 09 Recov ery f rom a loc all y attach ed tape devi ce Before crea ting a recover y task, i nsert or mount the tape co ntaini ng the backup yo u need to reco ver. When creating a recovery task, select the tape device from the list of available locations and then select the b ackup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 47 With the new Acronis Secu re Zone behavior, you obtain the ability to: • list arc hives loca ted in the zone and ba ckups contai ned in each arc hive.
48 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.10.3. Univ ersal Restore (A cronis Back up & Recovery 10 Universal Rest ore) Acronis Backup & Recover y 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine.
Copyrig ht © A croni s, In c., 200 0 - 20 09 49 Universal Restore relies on the built - in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system star t, such as video, au dio and USB .
50 Copyrig ht © A croni s, In c., 200 0 - 20 09 Limitat ion The only supported archive location is a local drive, or more precisely, any device available through the machi ne’s BIOS. Th is may be Acroni s Secure Zone, a U SB hard d rive, a flash drive or an y internal hard drive.
Copyrig ht © A croni s, In c., 200 0 - 20 09 51 4. Configur e the sy stem r ecovery: select the system disk or volume a nd s elect the Use Acr onis Active Resto re check box. Acronis Ac tive Restore w ill ch oose for t he boot - up and subs equent recover y the fir st operati ng system f o und during the backup scan.
52 Copyrig ht © A croni s, In c., 200 0 - 20 09 Since you conne ct the console t o the manage ment s erver rather than to each machi ne and p erform all management operations through the central manag ement unit, this way of management is called centralized management ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 53 You have to pro tect each server as a whole, th e users ' data on th e works tations, and the virtu al machines.
54 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Install Acronis Backup & Recovery 1 0 Storage Node [ASN] on one of the Windows servers (9) . T he storage node enables you to organize the infrastructure for storing backup arc hives and to use the dedup lication f unctionality .
Copyrig ht © A croni s, In c., 200 0 - 20 09 55 3. Apply the policy to the S_1 grou p. Make sure t hat the policy ha s been su ccessfully de ployed to each of th e servers. The p olicy deploymen t state h as to chan ge fr om Deploying to D eployed and its status has to be OK .
56 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.2 .3 . Protecti ng the vi rtu al machi nes Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in .
Copyrig ht © A croni s, In c., 200 0 - 20 09 57 Deployi ng a p olicy transfers the established c orrespondence to the machines. Physically, a bundle of tasks i s created on each machine according t o the configurat ion prov ided by the po licy. Revoki ng a policy is the reve rse action to the aggregate of applying and deploying.
58 Copyrig ht © A croni s, In c., 200 0 - 20 09 The same poli cy on a group and on a ma chine 1. The same policy can be applied t o a group and to a machine . Nothing cha nges on the machine at the seco nd applicatio n of th e same policy, but th e s erver re members tha t the p olicy has been applied twice.
Copyrig ht © A croni s, In c., 200 0 - 20 09 59 2.11.4 .3 . Inherit ance of policies Policy inheritance can be easily understo od if we assume that a machine can b e a member of only one group be sides the All machi nes group. Let's start from this simplified approach.
60 Copyrig ht © A croni s, In c., 200 0 - 20 09 Besides the A ll machine s group, we have the cus tom G1 group in the r oot and t he custom G2 group, whic h is G1's child. The "green " policy, applied to the All machi nes group, is inh erited by all machine s.
Copyrig ht © A croni s, In c., 200 0 - 20 09 61 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines - > #4 G1 - .
62 Copyrig ht © A croni s, In c., 200 0 - 20 09 You may cha nge grouping co nditio ns or the machine may change its pro perties so t hat the machine leaves o ne gro up and is inc luded int o ano ther. T his may resul t in revo king on e policy and deplo ying another policy.
Copyrig ht © A croni s, In c., 200 0 - 20 09 63 Examples Assume, the sel ection rule s tates that th e polic y has to bac k up volumes D: a nd F:. The policy is applied t o bot h Linux and Windows machines.
64 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.5 .4 . Policy s tatus on a gr oup To see this p aramet er, select Machines in the tr ee, then select the g ro up, and then select the Ba ckup polic ies tab on the Infor mation pane .
Copyrig ht © A croni s, In c., 200 0 - 20 09 65 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a duplicate of an already stored one , its content is not tr ansferred over the network.
66 Copyrig ht © A croni s, In c., 200 0 - 20 09 Before sen ding th e item to th e vault, th e agen t queries the dedupl ication datab ase to dete rmine whether the ite m's hash va lue is the same as that of a n alread y stor ed item. If so, th e agen t sends only t he item' s hash v alue; otherwise, it sen ds th e ite m itsel f.
Copyrig ht © A croni s, In c., 200 0 - 20 09 67 • When per forming inc remental backups o f data that do es not change i tself, but chang es it s locat ion . Such is the case when multiple pieces of data circulat e over the net wo rk or within one system .
68 Copyrig ht © A croni s, In c., 200 0 - 20 09 What r atio to ex pec t Although , in some situat ions, the deduplica tion ratio may be ver y high (in the previous example, increasing the number of machines would lead to ratios of 3:1, 4:1, etc.), a reasona bl e expecta tion for a typical environment is a r atio between 1.
Copyrig ht © A croni s, In c., 200 0 - 20 09 69 File - leve l deduplication re strict i on s During a file backup to an archive in a deduplicating vault, deduplication of a file is not performed in t.
70 Copyrig ht © A croni s, In c., 200 0 - 20 09 3. To specify cr edentials for c o nnecti on, click Options and then t ype the user name and passw ord in the User name and Passwo rd boxes respecti v ely. In Window s, if you leave the User name box empty, t he credentia ls under whic h the console is runni ng will be used.
Copyrig ht © A croni s, In c., 200 0 - 20 09 71 A user who is a member of this g roup is a manage ment server administrat or. Management server administrators can connect to the management server by .
72 Copyrig ht © A croni s, In c., 200 0 - 20 09 Users with these additional privileges are also called st o rage node administrators. Recommend ations on user accounts To allow users to access the centralized vaults m anaged by a st orage node, you m ust ensure tha t those user s have a right to ac cess the s torage node fr om the network.
Copyrig ht © A croni s, In c., 200 0 - 20 09 73 2.11.7 .7 . Rights fo r Acroni s servi ces The Acronis Backup & Recov ery 10 Ag ent for Windo ws, Acr onis Backup & Re covery 1 0 Manag emen t Server, and Acronis Backup & Recovery 10 Storage No de components run as services.
74 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.8. Communicatio n betwe en Acronis Ba ckup & Recov ery 10 components This se ction des cribes how Acronis Backup & Rec overy 10 comp onents co mmunicate wi th each other using sec ure authent ication and enc ryption.
Copyrig ht © A croni s, In c., 200 0 - 20 09 75 Acronis Backup & Recovery 1 0 Managemen t Server Yes Yes Acronis Backup & Recovery 1 0 Storage Nod e Yes Yes Acronis PXE Ser ver No Yes Acronis Backup & Recovery 1 0 Bootable Agent Yes Y es 2.
76 Copyrig ht © A croni s, In c., 200 0 - 20 09 Enabled The comp onent wi ll us e the sp ecified port; type the p ort number in the Serv er TCP Po rt box . Disabl ed The same as Not config ured . For details about the network port and instructions on how t o specify it in Linux and a bootable environmen t, see Network port configuration ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 77 Always us e The use of SS L certificates is enabled. The conn ection wil l be establi shed only if th e use of SS L certificates is enabled on the ser ver application. Disabl ed The same as Not config ured .
78 Copyrig ht © A croni s, In c., 200 0 - 20 09 2.11.8 .4 . Network po rt configura tion Acroni s Backup & Recovery 10 components use the 9876/TCP ne twork communica tion port by default. The server listens to this port for incoming connection. This port is also used as def ault by t he Acronis client.
Copyrig ht © A croni s, In c., 200 0 - 20 09 79 In Windows, the certificate path and the ser ver certificate's file name are specifi ed in the registry key HKEY_LOCAL_MACHINE SOFTWARE Acronis Encryption Server . The defau lt path is %System Drive% P rogram Files Common Files Acro ni s Agent.
80 Copyrig ht © A croni s, In c., 200 0 - 20 09 Non - self - signed c ertifi cates You have the option to use trusted th ird - party certificates or certificates created by your organization's CA as an alt ernative to self - signed cert ificates, by using Acronis Certificate C ommand - line Utility.
Copyrig ht © A croni s, In c., 200 0 - 20 09 81 3. Options This se ction cov ers Acro nis Backup & R ecovery 10 opt ions that can be conf igured using G raphical User Interf ace. Th e conten t o f this sec tion is app lica ble to both sta nd - alone and advanced e ditions o f Acroni s Backup & Recove ry 10.
82 Copyrig ht © A croni s, In c., 200 0 - 20 09 The option d efin es whet her to display th e pop - up messa ges ab o ut task r un results: suc cessful completion, failure or success with warnings. When displaying of pop - up mes sages is dis abled, y ou can review the task executi o n state s and results in t he Tasks v iew .
Copyrig ht © A croni s, In c., 200 0 - 20 09 83 3.1.5. Fo n t s This opti on is effe ctive wh en the console is c onnected to a manag ed machine or to the managemen t server. The option defines the fonts to be us ed in the Graphical User Interfac e of Acronis Backup & Re covery 10.
84 Copyrig ht © A croni s, In c., 200 0 - 20 09 entries. Yo u can s elect the amount of log en tries t o retain. Th e defau lt 95 % setti ng will ke ep most of the log.
Copyrig ht © A croni s, In c., 200 0 - 20 09 85 To set up sending SNM P messages 1. Select the Send messages to SNMP server chec k box. 2. Specify the appropriate options as f ollows: o Types of events to send – choose the t ypes of e vents: A ll events , Errors and w arnings , o r Errors o nly .
86 Copyrig ht © A croni s, In c., 200 0 - 20 09 b. Click Add , an d then enter the na me or IP a ddress o f t he mach ine wh ere the A cronis W OL Proxy is installed. Provide a ccess credentials for the machin e. c. Repeat th is step if th ere ar e several Acron is WO L Prox ies.
Copyrig ht © A croni s, In c., 200 0 - 20 09 87 On the vCent er Server side When int e gration is enabled, the vCenter Server will store and show information about w hen and how succe ssful each vir tual machi ne was backed up. The same informa tion is display ed in the Status and the L ast backup columns on the manag ement server.
88 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.3.2. Event tracing It is po ssible to dupl icate log events gene rated by the agent( s), ope rating on the manage d machi ne , i n the Applic atio n Event Log o f Windows ; or send the events to the specif ied SNMP mana gers.
Copyrig ht © A croni s, In c., 200 0 - 20 09 89 The option d efin es wheth er the agent(s) operating on the man aged machi ne ha ve to sen d the l og events to th e specified Sim ple Netw o rk Manag ement Protocol (SN MP) manage rs. You can choo se the types of events to be sent.
90 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Click OK. You might be asked for lmm ib2.dll that can be found on the installation disc of y our operating system. Linux To rece ive SNMP messages o n a machine running Linux, the net - snmp (f o r RHEL and SUSE) or th e snmpd (fo r Debian) pa ckage has to be ins talled .
Copyrig ht © A croni s, In c., 200 0 - 20 09 91 • The type o f the d ata b eing backed up (disk , file) • The back up destinat ion (netwo rked locatio n or local disk) • The back up scheme (Back up now or using the sc heduler) The following table summa rizes the availability of the back up options.
92 Copyrig ht © A croni s, In c., 200 0 - 20 09 media media Error handli ng ( p. 107 ): Do not show messag es and dialogs whil e processing (silen t mode) + + + + Re - attempt if an e rror occurs + + + + Ignore bad sectors + + + + Dual des tinat ion ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 93 3.4.1 .1. Archive pro tection This o ption is effe ctive for Window s and Linux ope rating systems and boo table medi a. This option is effe ctive for both di sk - level and file - level backup. The pres et is: D isabled.
94 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Excl ude all system fil es and folders Select this check box to skip files and folders with the System attribute. If a folde r is System, all of its conten ts — including f iles that are not System — will be ex cluded.
Copyrig ht © A croni s, In c., 200 0 - 20 09 95 The progra m does not su pport intera ctive com ma nds, i.e. commands t hat require use r input (for example, "pau se").
96 Copyrig ht © A croni s, In c., 200 0 - 20 09 Post - backup co mma nd To specify a command/ex ecutable file to be executed after the ba ckup is completed 1. In the Command field, type a command or browse t o a batch file. 2. In the Wor king direct ory field, specify a path to a directory where the command/batch file will be executed.
Copyrig ht © A croni s, In c., 200 0 - 20 09 97 o Select th e existin g co mmand or the b atch fil e from the d rop - down list 3. Click OK . Pre - data c apture comma nd To specify a command/batch file to be executed before data capture 1. In the Command fie ld, type a command or browse to a batch file.
98 Copyrig ht © A croni s, In c., 200 0 - 20 09 Check box Sele ct io n Fail the ta sk if the command execution fail s Select ed Cleared Select ed Cleared Do not ba ck up unt il t he command exec ution is complete Select ed Sele cted Cleared Cleared Result Preset Continue the backup on ly aft er the comma nd i s successfully executed .
Copyrig ht © A croni s, In c., 200 0 - 20 09 99 The option d etermines wh ether to tak e snapsh ots of multiple volum es at the sa me ti me or one b y one. The pres et is: Enable. When this opti on is set to Enable , snapshots of all volumes being backed up will be created simultaneously.
100 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.1 .8. Compressi on leve l This o ption is effe ctive for Window s and Linux ope rating systems and boo table medi a. The o ption defines t he level of compr ession appl ied to the dat a being backed up.
Copyrig ht © A croni s, In c., 200 0 - 20 09 101 • Norm al – to run t he backup proc ess with norma l speed, allocat ing resources on a par with other processes • High – t o maxi mize the b acku p proce ss speed by taki ng resources fro m other processes .
102 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.1 .10 . Notifica tions Acroni s Backup & Recovery 10 provides t he abilit y of no tifying use rs about bac kup co mpletion through e - mail or the messaging service. E- mai l This o ption is effe ctive for Window s and Linux ope rating systems .
Copyrig ht © A croni s, In c., 200 0 - 20 09 103 • Passwo rd – enter the pass word. 6. Click Send test e - mail m ess age to check if the s ettings are correct. Messenge r servi ce (W inPopup) This o ption is e ffect ive for Window s and Linu x operating sy stems on t he sen ding machine a nd only for Wi ndows on the receiv ing machine.
104 Copyrig ht © A croni s, In c., 200 0 - 20 09 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one of the following: • Use the sett ing set in the Machine opti ons – to use the setting speci fied f or the mach ine.
Copyrig ht © A croni s, In c., 200 0 - 20 09 105 • Do not send SNMP notifi cati ons – to disable sending the l og event s of the backup oper atio ns to SNMP managers. 3.4.1 .12 . Fast incremen tal/di ffere ntia l b ackup The o ption is effect ive in Windows an d Linux operat ing systems and boo table media.
106 Copyrig ht © A croni s, In c., 200 0 - 20 09 to multiple C Ds or DVDs later on . You might als o want to spli t the backup destined to an FTP server , since data recovery directly from an FTP server requires the backup to be split in to files no more than 2G B in size.
Copyrig ht © A croni s, In c., 200 0 - 20 09 107 Select the check boxes fo r the compone nts you want to put on the boota ble media: • One - Click Resto re is the minimal additio n to a disk backup stored on removable me dia, allowing for easy recovery from this backup.
108 Copyrig ht © A croni s, In c., 200 0 - 20 09 the data will be ba cked up and you will be abl e to mount the re sulting di sk backup and ext ract valid files to another disk.
Copyrig ht © A croni s, In c., 200 0 - 20 09 109 The pres et is: Wait until the conditions are m et. Wait until the conditions are met With thi s setting, the scheduler sta rts monitori ng the condi tions and la unches the tas k as soon as the conditions are m et.
110 Copyrig ht © A croni s, In c., 200 0 - 20 09 The progra m will try to ex ecute the failed ta sk again if you select the Rest art a failed t ask check box and speci fy the number of attempts and the ti me inte rval between the attempts .
Copyrig ht © A croni s, In c., 200 0 - 20 09 111 If the cons ole i s conn ec ted to th e mana gem ent s erve r The U se a separat e tape set o ptio n has more prec ise definit ions. So f or the backup policy to be created you can use a sepa rate tape set for all machines or for each sing le machine.
112 Copyrig ht © A croni s, In c., 200 0 - 20 09 When start ing backup to a non - empty tape in a locally at tached tape device, the program will warn that you ar e about to l ose data on the t ape.
Copyrig ht © A croni s, In c., 200 0 - 20 09 113 When the o ption is enabled, Ac ronis Backup & Recovery 10 will restart t he machine after the backup proce ss is completed.
114 Copyrig ht © A croni s, In c., 200 0 - 20 09 3.4.2. Default recovery options Each Acronis agent has its own default re covery options. Once an agent is installed, the default optio ns have pre - defined values, which are referred to as presets in the documenta tion.
Copyrig ht © A croni s, In c., 200 0 - 20 09 115 Validate ba ckup arch ive before r ecov ery + + + + Check fil e sy stem a fter recover y + - + - Reboo t machi ne automatic ally if it is required for recovery + + - - Chan ge SID aft er reco very Windows recover y - Windows recover y - Notification s: E- mail ( p.
116 Copyrig ht © A croni s, In c., 200 0 - 20 09 Pre - recover y command To specify a command/batch file to be executed before the recov ery proc ess st art s 1. In the Command fie ld, type a command or browse to a batch file. The progra m does not support interac tive commands , i.
Copyrig ht © A croni s, In c., 200 0 - 20 09 117 3.4.2 .2. Recove ry priority This o ption is effe ctive for both W indows and Linux operating sy stems. This option is not available when o perating under the bootable media. The priori ty of a process running in a system de termines the amount of CPU and sys tem resources allocated to that process.
118 Copyrig ht © A croni s, In c., 200 0 - 20 09 To configure e - ma il notification 1. Select the Send e - mail notifi cations check b ox to activ ate notifi cations . 2. In the E- mail addres ses fi eld, ty pe the e - mail address to which notifications will be sent.
Copyrig ht © A croni s, In c., 200 0 - 20 09 119 The Messenger service is not started by default in the M icrosoft Windows Server 2003 family. Change the servic e Startup m ode t o Automa tic and s tart the servic e. To configure WinPopup notificati ons: 1.
120 Copyrig ht © A croni s, In c., 200 0 - 20 09 This option is not available when o perating under the bootable media. The option d efin es wheth er the agent(s) oper ating on the managed machine hav e to send the lo g events of the recovery operations to the specified Simple Network Management Protocol (SNMP) managers.
Copyrig ht © A croni s, In c., 200 0 - 20 09 121 When a recoverable error occurs, the program re - attempts to perform th e unsuccessful ope ration. You can set th e time in terval an d the numb er of att empts.
122 Copyrig ht © A croni s, In c., 200 0 - 20 09 The pres et is Disabled . This option ena bles boot ing the machine into th e recovered operatin g syste m without user interaction. Change SID af ter the recovery is finished The pres et is Disabled .
Copyrig ht © A croni s, In c., 200 0 - 20 09 123 4. Vaults A vault is a location for storing backup archives. F or ease of use and admin istration, a vault is associated with the archives' metadata. Referring to this metadata m akes for fast and convenien t opera tions with ar chives and backups s tored in the vault.
124 Copyrig ht © A croni s, In c., 200 0 - 20 09 A vault is called personal if it was crea ted using direct connec tion of the console to a man aged machine. Personal vaults ar e specific for each manag ed machine. Way of wo rki ng wit h th e "Vaul ts" view Vaults (on the navi gation pane) - top element o f the vaults tree.
Copyrig ht © A croni s, In c., 200 0 - 20 09 125 Acces sing managed v aults To be able t o back up to a managed v ault, a user must have an account on the mac hine where t he storage node is installed. The scope of a user's privileges in a v ault depends on the user's rights on the storage node.
126 Copyrig ht © A croni s, In c., 200 0 - 20 09 • [for managed vaults only ] encryption state (Yes, No) Vault c onten t The Vault c ontent sect ion contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault.
Copyrig ht © A croni s, In c., 200 0 - 20 09 127 passw ord (if the vault is encrypted) and infor mation i n the Comment s field. • The Edit unma naged v au lt page lets you edit the vault's nam e and inf orma tion in the Comme nts field. Validate a vaul t 1 Select the vault.
128 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.1.2 .1. Creati ng a m anag ed central i zed vault To create a managed centralized vault, perform the following steps Vault Name Spec ify a unique name for the vault. Creation of two c e ntralized vaults with the same name is prohibit ed.
Copyrig ht © A croni s, In c., 200 0 - 20 09 129 o on the hard drives local to the storage node o on a network share o on a Storage Area N etwork (SAN) o on a Netw ork Attached Storag e (NAS) o on a tape library locally att ached to the storage node.
130 Copyrig ht © A croni s, In c., 200 0 - 20 09 o AES 1 28 – the vault co ntents will be encrypte d using the Adv anced St andard Encry ption ( AES) algorithm with a 128 - bit key o AES 19 2 – t.
Copyrig ht © A croni s, In c., 200 0 - 20 09 131 To create a new folder for the vault, click Creat e folder . A vault can be cr eated in an empty fol der only. 2. Click OK . 4.1.2 .3. Attachi ng a manage d vault A vault managed b y a storage n ode can b e attached to another storage n ode.
132 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.1.3 .1. Overvie w Acroni s Backup & Recovery 10 provide s full support o f a tape li brary through Acro nis Backup & Recovery 1 0 Storag e Node. The storage no d e sho uld be installed on the machine a tape library is attached to.
Copyrig ht © A croni s, In c., 200 0 - 20 09 133 If all cartridges in a tape library have barcodes, the library is ready to b e automatically managed by software.
134 Copyrig ht © A croni s, In c., 200 0 - 20 09 If a tape was used previous ly, the RSM tries to det ect the registered ap plicati on the tape is concerned to. If the applica tion is n ot found, the RS M will m ove the ta pe in to the Unrecognized pool.
Copyrig ht © A croni s, In c., 200 0 - 20 09 135 Fill the library slots wit h tape cartridges. If a tape does not get a barco de or its barcode is c orrupted, you can define the tape lab el for identification purpos es later.
136 Copyrig ht © A croni s, In c., 200 0 - 20 09 At the Delete operation, t he vault cont ent will be deleted f rom the stor age node dat abase w ithout acces sing th e tapes.
Copyrig ht © A croni s, In c., 200 0 - 20 09 137 The program f inds the tapes a nd inserts them au tomatical ly in the right order. The T as k N eed Inter action win dow come s up if a require d tape is not fou nd. Keep in mind that a data recover y operation may req uire access to a number of tapes.
138 Copyrig ht © A croni s, In c., 200 0 - 20 09 To launch th e procedu re select the tape l ibrary vault in th e Na vigat ion pane of the con sole, cl ick Mana ge tapes a nd then cl ick Start i nventory on t he Tape Management w indow. When inventorying is comp leted a user has the list o f tapes currently loaded into the library.
Copyrig ht © A croni s, In c., 200 0 - 20 09 139 Tapes fr om th e Free or the Imported poo l can be renamed on co ndition th at the user account used to run the storage node se rvice ( ASN U ser ) has wr ite permissions for th ese pools. These permissions are not assigned to ASN User during installation, so you might ne ed to add them m anually.
140 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Ask for u ser int eract ion - the backup task wil l enter the Need Interacti on state and wait for the tape, with the required label, t o be loaded into the ta pe library device.
Copyrig ht © A croni s, In c., 200 0 - 20 09 141 Simple backup scheme is disabled, because backup co nsolidation is impossible for archives located on tapes. Acronis Backup & Recovery 10 provides automation of tape rotation for Grandfather - Father - Son , Tower of Hanoi , and Custo m back up schemes.
142 Copyrig ht © A croni s, In c., 200 0 - 20 09 • the full size of the data t o protect is approximately 3 2 0 GB • the approximate size of dai ly changes of data is ab out 16 GB • the approximate size o f weekly changes of data is no more than 40 GB • tape capacity is 400 GB.
Copyrig ht © A croni s, In c., 200 0 - 20 09 143 • GFS Exampl e 3 ( p. 1 47 ). The Use a s eparate ta pe set option is selec ted. All the Alwa ys use a f ree tape options are s elected. It req uires 28 tapes in r o tation. These examp les dem o nstrate h ow the nu mber of tap es requir ed for automa ted rotation depend s on the tape options.
144 Copyrig ht © A croni s, In c., 200 0 - 20 09 • four incre m ental b ackups on the 4 th week. The next f ull backup (320 Gb) sho uld be writt en on F riday of the 4th week. However tape 02 has o nly 104 Gb of fre e space at the mo ment. S o after the ta pe reaches th e end, the recor ding continues fro m the begin ning of fr ee tape 03.
Copyrig ht © A croni s, In c., 200 0 - 20 09 145 The next figu re sh ows the actual u sage of th e tapes with f ree spac e instead o f the d eleted b ackups on the first Friday of the following year. At the time the diffe rential backup (blue rectangle) is written onto ta pe 24.
146 Copyrig ht © A croni s, In c., 200 0 - 20 09 GFS Example 2 Suppose , the backup p lan has the foll owing tape o ptions: • the Us e a separate tape s et option is sele cted • the Alw ays use a.
Copyrig ht © A croni s, In c., 200 0 - 20 09 147 As the GFS backup sc heme fo rces a utomatic de letion of the o utdated back ups, o n the firs t Friday of the secon d year the tapes keep only the backu ps disp layed in the next figu re.
148 Copyrig ht © A croni s, In c., 200 0 - 20 09 These options define the tape rotation scheme that is classical for GFS. The figu re shows the beginning o f the ro tatio n scheme that uses 8 ta pes .
Copyrig ht © A croni s, In c., 200 0 - 20 09 149 go back in the archive) i s 8 wee ks. T ape rotati on for the second case includes 128 daily sessions, i.e. it allows the roll - back period equal 6 4 days. The rol l - back period is always h alf the number of sessions.
150 Copyrig ht © A croni s, In c., 200 0 - 20 09 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac kups are d eleted a utoma tically. In the n ext figure th e deleted backup s are drawn as dark - gray rectan gles.
Copyrig ht © A croni s, In c., 200 0 - 20 09 151 The first figure s hows the t apes’ usage for the ToH sc heme combined with the a bove mentioned tape optio ns. The recurr ing part o f the s cheme co ntains sixteen backup se ssions. T he figure displays the backup a rchive sta te at the m oment wh en th e 17th s ession i s finish ed.
152 Copyrig ht © A croni s, In c., 200 0 - 20 09 The figur e shows tape rotati on for th e ToH scheme wi th these option s. Ma xim al number of tapes used in the rotation is seven that is more than in classical five - level ToH scheme. Two additional tapes used for: 1.
Copyrig ht © A croni s, In c., 200 0 - 20 09 153 • tape rotati on scheme ( freq uen cy of backups, re tention rules) • tape - appe nd option s • require ments to suppo rt off - site tape cartridge archives. There is no common f ormula to calculate a number of tapes required in all p ossible combinations of above listed consid eration s.
154 Copyrig ht © A croni s, In c., 200 0 - 20 09 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compre ssion leve l provides CL average reduction.
Copyrig ht © A croni s, In c., 200 0 - 20 09 155 • What if I need to us e a tape from t he tape library in the local tape de vice and vice v ersa? Acronis agents create backups on tapes in a format that differs from the format used by the storage n ode.
156 Copyrig ht © A croni s, In c., 200 0 - 20 09 name. I f you a cciden tally delete the .me ta fold er, it will be automa tically recr eated n ext time you access th e vault. But s ome informati on like o wner n ames and ma chine na mes may be l ost.
Copyrig ht © A croni s, In c., 200 0 - 20 09 157 • [Archiv e Name] The Ac tio ns bar is av ailable when you select an archive in the archives t able. Duplicates actions of the archives toolbar. • [Back up Name] The Actio ns bar is available when you expa nd the archive and click on an y of its backups.
158 Copyrig ht © A croni s, In c., 200 0 - 20 09 4.2.2 .1. Creating a person al vaul t To create a personal vaul t 1. In the Nam e fie ld, type a name for the vault being cre ated. 2. [Optio nal] In the C omm ents field, add a descript ion of the vault.
Copyrig ht © A croni s, In c., 200 0 - 20 09 159 All the operations described below are perf ormed by cl icking t he corre sponding butt ons o n the toolbar.
160 Copyrig ht © A croni s, In c., 200 0 - 20 09 Recover a disk/volume as a virtual machine Right - click t he disk backu p, then select Recover as virtual machine . The Recover data (p . 214 ) p age wi ll be o pen ed with the p re - selected backup as a source .
Copyrig ht © A croni s, In c., 200 0 - 20 09 161 There s hould be eno ugh space in t he vau lt fo r temporary files created during consolidation. Backups resulting from consolidation always have maximum compressi on. 4.3.4. Filtering and s orting archives The following is a guideline for you to filter and sort archives in the archives table.
Copyrig ht © A croni s, In c., 200 0 - 20 09 162 5. Scheduli ng Acronis scheduler helps the administrator adapt backup plans to the com pany’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically ke eping the critical data safely protected.
Copyrig ht © A croni s, In c., 200 0 - 20 09 163 The schedul er behavio r, in case the event oc curs but the condi tion (or any of mult iple con ditions) i s no t met is defi ned by the T ask start conditions ( p.
164 Copyrig ht © A croni s, In c., 200 0 - 20 09 Run the tas k every da y at 6PM. The schedule's paramet ers are thus set up as follows. 1. E ve ry: 1 day(s). 2. Once at: 06:00: 00 PM . 3. Effective: From: not set . The task wi ll be started on th e current day, if it has been cr eated before 6PM.
Copyrig ht © A croni s, In c., 200 0 - 20 09 165 Firs t daily s chedule 1. Ev e ry: 3 day(s). 2. Ev ery : 4 ho u rs . From: 08:0 0:00 AM Until: 12:00: 00 PM . 3. Effective: From: 09/20 /2009 . To: not set . Second dai ly s chedule 1. E ve ry: 3 day(s).
166 Copyrig ht © A croni s, In c., 200 0 - 20 09 Examp les "One day in t he week" schedule Run the task every Friday at 10PM, starting from a certain date (say 05/14 /2009) and ending after six mo nt hs . The schedu le's p aramet ers are thus s et up as fo llo ws.
Copyrig ht © A croni s, In c., 200 0 - 20 09 167 • Tuesday: every 3 hour s from 9 AM till 9 PM • Wednesday: every 3 hours from 9 AM till 9 PM • Thursday: every 3 hours fro m 9 AM till 9 PM • Friday: twice at 12 PM and 9 PM (i.
168 Copyrig ht © A croni s, In c., 200 0 - 20 09 In the During the day execute the ta sk... area, select one o f th e followi ng: Once at: <...> Set up the ti me at whi ch t he task will be run once . Every: <... > From: <...> Until: <.
Copyrig ht © A croni s, In c., 200 0 - 20 09 169 3. Ev ery : 6 hou rs . From: 12:0 0:00 AM Until: 06:00: 00 PM . 4. Effective: From: 0 8/30 /2009 . Actuall y the task will be sta rted o n the firs t workd ay of September . By s etting up this d ate we just defi ne that th e task must be started in 2009 .
170 Copyrig ht © A croni s, In c., 200 0 - 20 09 From: 11/01 /2009 . To: not set . 5.4. Advance d sche duling sett ings The following advanced settings are available when setting up a daily, weekly, or monthly schedule in a backup po licy.
Copyrig ht © A croni s, In c., 200 0 - 20 09 171 Seco nd ma chin e: Eve ry day a t 09:00 :00 AM Third machin e: Ever y da y at 0 9:59:59 AM Example 2 Suppose that you are deplo ying a backup po licy .
172 Copyrig ht © A croni s, In c., 200 0 - 20 09 Event s ource Specifies the event source, which typically indicates the program or the system component that caused t he event — fo r ex am pl e: di sk Event type Specifies th e event typ e: Error , Warning , Inf ormati on , Audit succ ess , o r Audit failure .
Copyrig ht © A croni s, In c., 200 0 - 20 09 173 • Event type : Informati on • Event ID : 18 Tip: To set up a similar backup plan for mac hines running Micr o soft Windows XP, replace the text in E vent source with Windows Update Agent and leave the remainin g fields the same.
174 Copyrig ht © A croni s, In c., 200 0 - 20 09 Example: It is require d to run the backup t ask after free space on the managed mac hine is changed by at lea st 1 GB, but only if all users ar e logged off and more than 12 hou rs have passed s ince the last backup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 175 • Ev ent: Weekly , Eve ry 1 week( s) on <workd ays> ; On ce at 09:00 :00 P M . • Condition: Loc ation's host is av ailable • Task start condi tions: Skip the task execution .
176 Copyrig ht © A croni s, In c., 200 0 - 20 09 • If the ta sk star t conditi ons are Skip the task e xec ution , the task will ne ver run. • If the task start conditions are Wait until t he con.
Copyrig ht © A croni s, In c., 200 0 - 20 09 177 (2) if the free space changes by more than 1GB a fter 12 hours pa ss since the last back up successf ul completi on, th e backup ta sk will start immediately. (3) if the free spac e never changes b y more than 1GB, the t ask will ne ver start.
Copyrig ht © A croni s, In c., 200 0 - 20 09 178 6. Direct mana ge ment This sec tion co vers o peratio ns that can be per formed direct ly on a managed mach ine by using the direct console - agent conne ction. T he co ntent of this sectio n is applic able to both st and - alone and advanced editions of Acronis Backup & Recovery 10.
Copyrig ht © A croni s, In c., 200 0 - 20 09 179 serve r and run Acronis Licens e Ser ver to manag e licenses. Pleas e make sure yo u ha ve a valid licen se on Acronis Licens e Ser ver. license key data was not c orrupted. After a success ful license ch eck th e agent will start working.
180 Co pyright © Acr onis, Inc., 2000 - 2009 How it is determ ined Errors Highlight t he date i n red if at least one " Error" entry appear ed in the log on this date. Warni ngs Highlight th e date in yello w if no "Err or" entries appeared and at le ast one "Warni ng" entry appe ared in t he log on t his date.
Copyrig ht © A croni s, In c., 200 0 - 20 09 181 unneeded columns a nd show the hidden o nes. See the Filtering and sorting backup plans and tasks ( p. 187 ) section for details. • In the bac kup ta ble, s elect the backu p plan ( task). • Use the to o lbar's b uttons t o take an action on th e selected plan (task).
182 Co pyright © Acr onis, Inc., 2000 - 2009 Backup pl an statuse s A backup pla n can have one of the following s tatuses: Err or; Warning; O K . A backup pla n status is de rived from t he results o f the last run o f the plans' tas ks. State How it is determ ined How to handle 1 Error At leas t one task has failed.
Copyrig ht © A croni s, In c., 200 0 - 20 09 183 Need inter action Any running t ask can p ut itself i nto the N eed interac tion state wh en it ne eds human intera ction such as changing media or ign oring a read error.
184 Co pyright © Acr onis, Inc., 2000 - 2009 • Edit the bac kup policy o n the manage m ent serve r in case a centralized p lan has failed 2 Warni ng L ast r esult is "Succ eeded wi th warning" View the l og t o read the war ni ngs - > [o ption ally ] Perfo rm actions to prev ent the future warnings or fai lure.
Copyrig ht © A croni s, In c., 200 0 - 20 09 185 Run a plan/ta sk Click Backup pl an Run . In the Run Ba ckup P lan ( p. 188 ) window, s ele ct the t ask you need to be run. Running the backup pla n starts the se lected task of t hat plan im media tely in spite of its s chedule and c onditions .
186 Co pyright © Acr onis, Inc., 2000 - 2009 Edit a p lan/task Click Backup pl an Edit . Backup plan e diting is per formed i n the same way as creation ( p. 194 ), excep t for the followin g lim itatio ns : It is not always possibl e to use al l schem e options , when editing a backup pla n if the cre ated archive is not empty (i.
Copyrig ht © A croni s, In c., 200 0 - 20 09 187 Delete a plan /task Click Backup pl an Delete . What will happen i f I delete t he backup plan? The pla n's de letion delet es all its t asks.
188 Co pyright © Acr onis, Inc., 2000 - 2009 Configuring backup plans and the tasks table By default, the table has six columns that are display ed, others are hidden. If required, you can hide the displ ayed colum ns and show h idden ones. To show or hide columns 1.
Copyrig ht © A croni s, In c., 200 0 - 20 09 189 Recovery (disk ) Disk backup recovery Recover y (fi le) File an d fold er rec overy Recover y (vo lume ) Recover y of vo lume s fro m a disk back up R.
190 Co pyright © Acr onis, Inc., 2000 - 2009 Settings The Settings tab displays informati o n on scheduling and t he optio ns changed against the default values. Progre ss The Progress tab is available while the task is running. It is common f or all types of tasks.
Copyrig ht © A croni s, In c., 200 0 - 20 09 191 • Archiv e name - name of the archive. • Archi ve co mments - c omments on th e archive (if provided). Settings The Settin gs tab displays th e following information: • Backup sc heme - the selec ted backup sch eme and all its settings wi th schedules.
192 Co pyright © Acr onis, Inc., 2000 - 2009 To Do Select a single lo g entry Click on it. Select multiple lo g entries • non - contiguous : hold dow n CTRL and c lick th e log entries one b y one • contiguous : s ele ct a si ngle log e ntry, then hold dow n SHIFT an d click anot her entry .
Copyrig ht © A croni s, In c., 200 0 - 20 09 193 Filter log entri es by task, manage d entity, machin e, cod e, own er Type the required val ue (task nam e, machine n ame, owner name, etc.
194 Co pyright © Acr onis, Inc., 2000 - 2009 6.2. Crea ting a back up plan Before creating your first backu p plan ( p. 370 ), please familiarize yo urself with the basic con cepts ( p. 25 ) used in Acronis Backup & Recovery 10 . To create a backup plan, perfo rm the following st eps.
Copyrig ht © A croni s, In c., 200 0 - 20 09 195 Archi ve co mments [Optional] Enter comm ents on th e arch ive. T o acces s this option, sel ect the Advanced view check b ox.
196 Co pyright © Acr onis, Inc., 2000 - 2009 Host ( p. 213 ) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent fo r Windows, Age nt for ESX/ESXi o r Agent for Hyper - V installed. Virtual ization s erver ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 197 6.2.3. Source type Select the type of data you want to be backed up o n the managed m achine. The list of available data types depends on the agents r unning on t he machine: Files Available if the Acronis Bac k up & Recovery 10 Ag ent for Windows (or for Linux) is installed.
198 Co pyright © Acr onis, Inc., 2000 - 2009 What does a disk or volume bac kup stor e? For supported file sys tems, with the sect or - by - sector o ption turne d off, a disk o r volume backup stores only th ose sectors t hat contain da ta. This reduces t he resul ting back up size and spee ds up the backup and r ecovery o perations.
Copyrig ht © A croni s, In c., 200 0 - 20 09 199 The program will access the source data using the credentials you specify. Use this optio n if the plan's account doe s not have access permissio ns to the data.
200 Co pyright © Acr onis, Inc., 2000 - 2009 6.2.7. Archive Specify where the arch ive will be s to red an d the n ame of the ar chive. 1. Selecti ng the desti nation Enter th e full pa th to the destination in the Path field, or select the de sired destina tion in the folders tree.
Copyrig ht © A croni s, In c., 200 0 - 20 09 201 Backing up to an existi ng archive You can config ure the bac kup plan to back up to an existing arch ive. To do so, select the a rchive i n the archives table or type the archive n ame in the Name field.
202 Co pyright © Acr onis, Inc., 2000 - 2009 6.2.9. Backup sche mes Choose one of th e avail able b ackup sch emes: • Back up now – to create a b ackup task for manual start and run the task immediately after its creation. • Back up later – to create a backup task fo r manual start OR schedule o ne - time t ask executi on in the futu re.
Copyrig ht © A croni s, In c., 200 0 - 20 09 203 6.2.9 .3. Simple sc heme With the simp le backup schem e you just sche dule when and how o ften to back up data a nd set the retention rule. At the first t im e a full backup will be created. The next bac kups will be incremental.
204 Co pyright © Acr onis, Inc., 2000 - 2009 Param eters You ca n set up the foll owing parameters o f a Grandfather - Father - Son (GFS) scheme. Start bac kup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifie s the days on which t o perform a backup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 205 • Weekly /monthly : Saturday (for e xample) • Keep ba ckups: o Daily: 1 week o Weekly: 1 mont h o Monthl y: indefin ite ly As a result, an archive of daily, weekly, and monthly backups will be created.
206 Co pyright © Acr onis, Inc., 2000 - 2009 Moreover, assume that you want to retain ac cess to all backups, including the daily ones, for at least six mont hs.
Copyrig ht © A croni s, In c., 200 0 - 20 09 207 Param eters You can set up the followin g parameters of a T ower of Hanoi schem e. Schedule Set up a daily ( p .
208 Co pyright © Acr onis, Inc., 2000 - 2009 Roll - back peri od The number of days we can go back in the archive is different on different days. The minimum number of days we are g uaranteed to have is call ed the roll - back period. The following table shows f ull backup and roll - back periods fo r schemes of various levels.
Copyrig ht © A croni s, In c., 200 0 - 20 09 209 6.2.9 .6. Custom back up sche me At a glan ce • Custom schedule and co nditions for backups of eac h type • Custom schedule and r etention rul es Par am eter s Para met er Mean ing Full backup Specifies on what sche dule and under w hich condi tions t o per form a f ull backup.
210 Co pyright © Acr onis, Inc., 2000 - 2009 might e nd up with no backups if the prog ram is not able to create the new backup for some rea son. Apply the rules (only if the re tention r ules are set ) Speci fies whe n to apply the retenti on ru les ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 211 Monthly full, we ekly di fferential, a nd daily incre mental backups pl us cleanup This example demonstrates the us e of all options available in the Cus tom schem e.
212 Co pyright © Acr onis, Inc., 2000 - 2009 • Full backu p, runs ever y Frida y at 1 0:00 PM • Increment al back up, runs manually • Differential backup, runs manually You can r un any o f these backup tasks b y selec ting i t from the list of tas ks in the Backup plans and tasks section in th e left pane.
Copyrig ht © A croni s, In c., 200 0 - 20 09 213 task manually after powering off the machine. Any changes made to the machine while it was powered on, will be overwri tten. 6.2.11 .2 . Selec ting a host that w ill pe rform conve rsio n Specify the machine that will perform the conversion.
214 Co pyright © Acr onis, Inc., 2000 - 2009 Virtual machines created on a Hyper - V server or w orkstati on type machines (V Mware Worksta tion, Microsoft Virtual PC o r Parallels Wo rkstation) use as much disk space as the original data oc cupies.
Copyrig ht © A croni s, In c., 200 0 - 20 09 215 Task c redenti als ( p. 217 ) [Optional] The task will run on behalf of the user wh o is creating the task. You ca n change the task accou nt cred entials if necessa ry. T o access th is op tion, sel ect the Ad vanced vie w check box .
216 Co pyright © Acr onis, Inc., 2000 - 2009 [Optional] Acronis U niver sal Rest ore Applies to: Windows OS and system volume recovery Univers al Rest or e ( p. 227 ) Use the A cronis Universal Restor e when you n eed to rec over and boot up Windows on dissimilar hardware.
Copyrig ht © A croni s, In c., 200 0 - 20 09 217 2. Click OK . To learn more abo ut using credent ial s in Acronis Backu p & Recover y 10, see the Owners and credentials ( p. 31 ) section. To learn more about operations available depending o n the user privileges, see the User pri vileges on a m anaged machi ne ( p.
218 Co pyright © Acr onis, Inc., 2000 - 2009 • Di sks - to recover d isks • Volumes - to rec over volumes • Files - to recover specific files and f o lders 6.3.4. Content se lection The rep resentatio n of this window depends on the type o f data stored i n the archive.
Copyrig ht © A croni s, In c., 200 0 - 20 09 219 6.3.5. Access cred entials for location Specify th e credentials r equired for a ccess to the l ocati on where the backup ar chive is st ored.
22 0 Co pyright © Acr onis, Inc., 2000 - 2009 The new virtual machine will be configured automatically, the source machine configuration being co pied whe re po ssible. The configu ratio n is displa yed in t he Vir tual Machi ne Setti ngs ( p. 224 ) secti on.
Copyrig ht © A croni s, In c., 200 0 - 20 09 221 • Create new The program will generate a new NT signature for the target hard dis k drive. • Recov er from backup The program will repla ce the NT signature of the target hard disk wit h one from the dis k backup.
222 Co pyright © Acr onis, Inc., 2000 - 2009 Recover [Di sk #] MBR t o: [If the Mast er Boot Recor d is select ed for reco very] Disk # ( p. 222 ) Choose th e disk to reco v er the Ma ster Boot Rec o rd to. NT signatur e: ( p. 220 ) Select the wa y the disk's signatu re contained in the MBR will be hand led.
Copyrig ht © A croni s, In c., 200 0 - 20 09 223 Prope rtie s Type A basic MBR disk can contain up to four primary volumes or up to three p rimary volumes and multiple logical drives. By default, the pro gram selec ts the ori ginal vo lume's t ype.
224 Co pyright © Acr onis, Inc., 2000 - 2009 To select the virtualization server the new virtual machine will be creat ed o n 1. Choose the P lace on the virtualizat ion server t hat I select o ption. 2. In the left part of the window, select the virtualizati on server.
Copyrig ht © A croni s, In c., 200 0 - 20 09 225 This is the number of pr ocessor s of the n ew virtual mach ine. In most cases it is set to one. The res ult of ass ignment of mo re than one pr ocessor to the machine i s not gua ranteed.
226 Co pyright © Acr onis, Inc., 2000 - 2009 Exclusion exampl es Criterion Example Desc r ipt ion By name File1.log Exclud es all files na med File1.l og. By path C: Finance test.log Excludes th e fil e named t est. log locat ed in t he fold er C: Finance Mask (*) *.
Copyrig ht © A croni s, In c., 200 0 - 20 09 227 • Passwo rd . The password for t he account. 2. Click OK . 6.3.8. When to r ecov er Select when to star t the recov ery task: • Recov er now - the recovery task will be st arted immediately after you click the final OK .
228 Co pyright © Acr onis, Inc., 2000 - 2009 - If the driv ers are on a vendor's disc or other removable media, turn on the Search rem ovable media . - If the drivers are located in a networked folder or on the bootable media, specif y the path to the folder in the Searc h folder field.
Copyrig ht © A croni s, In c., 200 0 - 20 09 229 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMwar e Workstati o n machi ne can be con verted to the open virtualiz ation f ormat (OVF ) using the VMwar e OVF t ool .
230 Co pyright © Acr onis, Inc., 2000 - 2009 6.3.11. Bootability troubleshooting If a syste m was bootable a t the time of backup, you exp ect that it will boot af ter reco ver y.
Copyrig ht © A croni s, In c., 200 0 - 20 09 231 • The syst em loader point s to the wrong vol ume This may h appen when system or boot volumes are n ot recovered t o their o rigina l location. Soluti on : Modification of the boot.ini or th e boot bcd files fixes this for Windows loaders.
232 Co pyright © Acr onis, Inc., 2000 - 2009 The lines start ing with title , root , kernel , and i nitrd res pectively d etermine: o The title of the menu ite m . o The devic e on which the Linux kernel is located — typically, this is the boo t partition or the root partition, such as ro ot (h d0,0) in this exa mple.
Copyrig ht © A croni s, In c., 200 0 - 20 09 233 multi(0)disk(0)rdis k(0)partition(1) WINDOWS= "Microsoft Windows XP Professi onal" /noexecute=optin /f astdetect Windows Vista/2008 A part of the l oader resides in the partit ion boot sect or, the rest is in the files bootmgr, b oot bcd.
234 Co pyright © Acr onis, Inc., 2000 - 2009 bootable environment to a spare hard d rive can guarantee success of the recovery. At least ensure that th e backup can be succe ssfully validated usi ng the boo table media.
Copyrig ht © A croni s, In c., 200 0 - 20 09 235 To specify credentials 1. Select one of the following : o Run under the c urrent us er The task wi ll run u nder the cr edentials wi th which the u ser who sta rts the tasks is logged on.
236 Co pyright © Acr onis, Inc., 2000 - 2009 According to the or iginal FTP specifi cation, credentials required for access to FTP servers are transf erred through a netw ork as pl aintext. This means that the user name and passwor d can be intercepted by an eavesdropper us ing a packet snif fer.
Copyrig ht © A croni s, In c., 200 0 - 20 09 237 6.4.5. Access cred entials for source Specify th e credentials r equired for a ccess to the l ocati on where the backup ar chive is st ored.
238 Co pyright © Acr onis, Inc., 2000 - 2009 Mount ing volumes in the r ead/w rite mode e nables you to modi fy the backup cont ent, t hat is, sa ve , move, create, delete files or fo lders, and run executab le s consisting of one file.
Copyrig ht © A croni s, In c., 200 0 - 20 09 239 o If the arch ive is s to red on a network shar e, expan d the Network f olders group, th en select the require d networked machine and t hen cli ck the s hared fold er. If the network share require s access credentials, the program will ask fo r them.
240 Co pyright © Acr onis, Inc., 2000 - 2009 Specify: • User nam e . When enteri ng the na me of an Activ e Direct ory user acc ount, be sur e to also specify the domain name ( DOMAIN Username or Username@domain) • Passwo rd . The password for t he account.
Copyrig ht © A croni s, In c., 200 0 - 20 09 241 To unmount an image, sele ct it in the table and click Unmount . To unmo unt all the mounted vo lumes, click Unmount all . 6.7. Exp ort ing a rch ives and backups The export o perati on crea tes a copy of an arc hive or a self - sufficient part copy of an archive in the location you specify.
242 Co pyright © Acr onis, Inc., 2000 - 2009 The res ulting archive's options The exported archive inherits th e options of the original archive, including encryption and the password. When exporting a password - protected archive, you are prompted for the pa ssword.
Copyrig ht © A croni s, In c., 200 0 - 20 09 243 Task c redenti als ( p. 243 ) [Optional] The export task will run on b ehalf of the u ser who is creating the task. You can change th e task cr edentia ls if necess ary. To a ccess this opti on, select th e Advanced v iew check b ox.
244 Co pyright © Acr onis, Inc., 2000 - 2009 To learn more about u sin g credenti als i n Acr onis Ba ckup & Rec overy 1 0, see the Owne rs and credentials ( p. 31 ) section. To learn more about operations available depending o n the user privileges, see the User pri vileges on a man aged m achine ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 245 6.7.3. Backup select ion To specify a backup(s) to export 1. At the top of the window, select the respecti ve check box(e s). To en sure that yo u choose the ri ght backup , click on the backup an d loo k at the bott om table that display s the volumes contained in t he selecte d backup.
246 Co pyright © Acr onis, Inc., 2000 - 2009 • To export data to a network share, expan d the Network fol ders group, s elect t he requir ed networked machine and then click the sha red f older. I f the ne twork sh ar e requires access credentials, the program will ask f o r them.
Copyrig ht © A croni s, In c., 200 0 - 20 09 247 In any o f the abo ve cas es, prov ide an a rchive name that is unique to the destination folde r or vault. If you need t o redo the exp ort using the same archive name, first delete the ar chiv e that resulted from the pre vious exp ort operati on.
248 Co pyright © Acr onis, Inc., 2000 - 2009 Size ( p. 24 8 ) Specify the exact size of th e zone. Moving or r esizing of locked volu mes, suc h as th e volum e conta ining the currently ac tive operating system, requ ires a r eboot. Settings Password ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 249 2. In the Ent er the passwor d field, type a new pass word. 3. In the C onfi rm the passwor d field, re - type the passwo rd. 4. Click OK . To disable password 1. Choose Do not use . 2. Click OK . 6.8.
250 Co pyright © Acr onis, Inc., 2000 - 2009 • examine back up content • moun t a volume backup to copy files fro m the backup to a physical dis k • safely delete archives and backups from the archives. To learn more ab out operati ons with vaults, see the Vaults ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 251 If you select several volumes, the space will b e distributed proportionally to each partition. If you do not sel ect any volume , the freed sp ace b ecomes u nal located. After you click OK , Acr onis Backup & Reco v ery 10 will start del eting the zone.
252 Co pyright © Acr onis, Inc., 2000 - 2009 • recover an operating syste m that cannot start • acces s and back up the data t hat has surv ived in a corrupted sy stem • deploy an o p erating s.
Copyrig ht © A croni s, In c., 200 0 - 20 09 253 Linux- based boo tabl e medi a Start th e Boota ble Medi a Builder either from th e manag ement c onsole, b y selecting Tools > Create Bootable Medi a or, as a separate co mponent.
254 Co pyright © Acr onis, Inc., 2000 - 2009 It is recom m ended that you famili arize you rself w ith the hel p document ation supp lied wit h Windo ws AIK. To a ccess th e documen tation, s elect Microsoft Windows AIK - > Documentat ion from the start menu.
Copyrig ht © A croni s, In c., 200 0 - 20 09 255 Kernel para meters This wi ndow lets you spec ify one or more parameters of the Linux kernel. They will be automatically applied w hen the boot able medi a starts. These parameters are typically used when experiencing problems while working with the bootable media.
256 Co pyright © Acr onis, Inc., 2000 - 2009 nodma Disables direct memo ry access (DMA) for all IDE h ard disk drives. Prevents the kernel from freezing on some hardware. nofw Disables the FireWire (IEEE1394) interfac e support. nopcmci a Disables detection of PCMCIA hardware.
Copyrig ht © A croni s, In c., 200 0 - 20 09 257 Pre - confi guring mul tiple network co nnections You can pre - configure TCP/IP set tings for up t o ten n etwork i nterfac e card s. To ensure th at ea ch NIC will be assigned the appropriate settings, create the media on the server for which the media is customized .
258 Co pyright © Acr onis, Inc., 2000 - 2009 • to get the mass - storage drivers that you explicitly specify from the media. This is necessary when the target hardware has a specific mass storage controller (such as a SCSI, RAID, o r Fiber Channel adapter) for the hard disk.
Copyrig ht © A croni s, In c., 200 0 - 20 09 259 7. Burn the . ISO to CD or DVD using a third - party tool or copy to a flash drive. Once a machine boots into t he WinPE, Acronis Backup & Recovery 10 starts aut omat ically. 6.10.1 .3 . Adding the Acroni s Plug - in to W i nPE 2.
260 Co pyright © Acr onis, Inc., 2000 - 2009 8. Burn the . ISO to CD or DVD using a third - party tool or copy to a flash drive. Once a machi ne boots into WinPE, Acronis Backup & R ecovery 10 starts aut omatically. To create a PE im age (ISO file) from the resulting WIM file: • replace the default boot.
Copyrig ht © A croni s, In c., 200 0 - 20 09 261 6.10.2. Connecting to a machine boote d from me dia Once a machine b oots from bootable m edia, the machin e terminal displays a st artup window with the IP address(es) obtained fro m DHCP or set accordin g to the pre - configured v alues.
262 Co pyright © Acr onis, Inc., 2000 - 2009 1. In the boot menu, pre ss F11. 2. Add to t he command prompt the following comm and: v ga= a sk , and t hen proceed wit h booting. 3. From the list of suppo rted video modes, choo se the appropriat e one by typing it s numbe r (for example, 3 18 ) , and then press E NTER.
Copyrig ht © A croni s, In c., 200 0 - 20 09 263 6.10.4. List of commands a nd utilitie s av a ila ble in Linux - based boot able medi a Linux - based bootable media contains the f ollow ing commands and comma nd line utilit ies, which you can use when running a command shell .
264 Co pyright © Acr onis, Inc., 2000 - 2009 gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount gunzip pktsetup uuidgen hal t poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.
Copyrig ht © A croni s, In c., 200 0 - 20 09 265 Under the arc hive conten ts, Acronis Backup & Recov ery 10 will display a message saying that it detected i nforma tion about the volume struc ture. 4. Click Det ails in t he area with that mess age.
266 Co pyright © Acr onis, Inc., 2000 - 2009 8. Click Recover , the n specify the path to the archiv e and any o ther re quired par ameters, a nd then click OK . Note: This pr ocedure does not work w hen connected to A cronis Backup & Recovery 10 Bo otable Agent r emotely, because the comma nd shell is not available in t his cas e.
Copyrig ht © A croni s, In c., 200 0 - 20 09 267 --- Volume group --- VG Name my_volg roup ... VG Access read/wr ite VG Status resizab le ... VG Size 1.
268 Co pyright © Acr onis, Inc., 2000 - 2009 ... Dynamic & GPT Volum es: DYN1 4 my_volgrou p - my_logvol 1253 3760 Ext2 You will need the volu me's i ndex, given in the Idx colu mn, in th e next step. 2. Use the -- mount command, specif ying the vol ume's index in t he -i parameter.
Copyrig ht © A croni s, In c., 200 0 - 20 09 269 6.10.6 .2 . Settin g up a mac hine to bo ot from PXE For bare metal, i t is enough that th e machine’s BI OS su pports ne twork booting .
270 Co pyright © Acr onis, Inc., 2000 - 2009 6.11. Disk managem ent Acronis Disk Director Lite is a tool for preparing a m achine disk/volume configuration f or recovering the volu m e images saved by the A cronis Backup & Rec overy 10 software.
Copyrig ht © A croni s, In c., 200 0 - 20 09 271 Running Acronis Disk Di rector Lite f rom a bo otable media You can run Acronis Disk Director Lite on a bare meta l, on a machine tha t cannot boot or on a non - Window s machine. To do so, boot the machine from a bootable media ( p.
272 Co pyright © Acr onis, Inc., 2000 - 2009 Displaying ope ration resul ts The results of any disk o r volume operation, you have just planned, are immediately displayed in the Disk m anagement vie w of the console.
Copyrig ht © A croni s, In c., 200 0 - 20 09 273 After the initialization, all the disk space remains unallocated and so still impossible to be used for program installation or file storage. To be able t o use it, proceed normally t o the Cre ate volum e opera tion.
274 Co pyright © Acr onis, Inc., 2000 - 2009 If the destin ation is s maller, then the As is optio n of cloning will be unavailable and proportional resizing of the sou rce disk volumes will be mandatory.
Copyrig ht © A croni s, In c., 200 0 - 20 09 275 If you need to leave an NT signature: 1. Click to clear the Copy NT signatur e check box, if nece ss ary. 2. Click to clear the Turn off the machine af ter the cloning oper ation check box, if necessa ry.
276 Co pyright © Acr onis, Inc., 2000 - 2009 If you n eed t o c onv ert a GPT dis k to MBR : 1. Select a G PT disk t o convert t o MBR. 2. Right - click on the selected volume, an d then cli ck Conv ert t o MBR in the contex t menu. You will receive a warning windo w, stating that you are about to c onvert GPT into MBR.
Copyrig ht © A croni s, In c., 200 0 - 20 09 277 In contrast to Windows Disk Manage r the program ensures bo otability of an offline operating system on the disk aft er the operati on. 6.11.5 .6 . Disk con version : dynamic to basi c You wo uld want to convert dynam ic disk s back to basi c one s, e.
278 Co pyright © Acr onis, Inc., 2000 - 2009 One of the following disk statuses always app ears in the graphical view of the d isk next to the disk's nam e: • Online The online s tatus means that a disk is accessible in the read - write mode. This is the normal dis k status.
Copyrig ht © A croni s, In c., 200 0 - 20 09 279 Types of dy n amic vo lumes Simple Vol ume A volume created from fre e space on a single physical disk. It c an consist of one region on the disk or several regions, virtually united by the Logical Dis k Manager (LDM).
280 Co pyright © Acr onis, Inc., 2000 - 2009 Create vol ume wi zard The Creat e volum e wizard lets you create any type of volume (including system and active), select a file system, label, assign a letter, and als o provides other disk manage m ent functions.
Copyrig ht © A croni s, In c., 200 0 - 20 09 281 o Sele ct three d estinati on dis ks to cr eate th e volu me on. After you choose the disk s, the wizard will cal culate the maximum size of t he resu.
282 Co pyright © Acr onis, Inc., 2000 - 2009 If you are creating a basi c vo lume, which can be made into a syste m volume, this page will be different, giving you the opportun ity to sel ect the volume Type — Primary ( Ac tiv e Pri mary ) o r Logic al .
Copyrig ht © A croni s, In c., 200 0 - 20 09 283 6.11.6 .3 . Set acti ve volume If you have several primar y volumes, you must specify one t o be the boot volume.
284 Co pyright © Acr onis, Inc., 2000 - 2009 6.11.6 .5 . Change vo lume labe l The volume label is an optional attribute. It is a name assigned to a volume for easier recogniti on. For example, on e volume could be called S YSTEM — a volume with an operating sys tem, or PROGRAM — an application volume, DATA — a data volume, etc.
Copyrig ht © A croni s, In c., 200 0 - 20 09 285 The new volume structure w ill be graphically represen ted in the Disk management v iew . If you set a 64K c luster size for FAT16/FAT32 or an 8KB -6 4KB cluster si ze for NT FS, Windows can mount t he volume, but some programs (e.
Copyrig ht © A croni s, In c., 200 0 - 20 09 286 7. Centralize d ma nagement This sec tion c overs op erations th at can be per for med centr ally b y using the components for centra lized manage ment. The c ontent of t his sectio n is onl y applica ble to adva nced edit ions of Acroni s Backup & Recove ry 10.
Copyrig ht © A croni s, In c., 200 0 - 20 09 287 Vaults with low free space: X View vaults The alert is displa yed if at least one ce ntralized vaul t has less th an 10% fr ee space.
288 Copyrig ht © A croni s, In c., 200 0 - 20 09 Acti vitie s The stac ked column char t lets y ou explore th e daily history o f the Ac ronis Ba ckup & Rec overy 10 agents' a ctivities . The histo ry is based on the log entri es, collected fr om the regi stered mach ines and from the management server.
Copyrig ht © A croni s, In c., 200 0 - 20 09 289 • Use the Informati on pane's tabs to view deta iled i nformati on about th e selected policy a nd perform additional operations, such as revoke the policy, v iew details of t he machine (group) the policy is appli ed to , etc.
290 Copyrig ht © A croni s, In c., 200 0 - 20 09 o Select the policy and click View tas ks . Check th e tasks that hav e Faile d as t heir last result : select a task and th en cli ck Vie w log .
Copyrig ht © A croni s, In c., 200 0 - 20 09 291 To Do Create a bac kup policy Click Create backup policy . The pro cedure of creat ing a backup po licy is described in - depth in the Creating a backup policy ( p. 346 ) section . Apply polic y to machines or group s Click Apply to .
292 Copyrig ht © A croni s, In c., 200 0 - 20 09 The Acronis B ackup & Recover y 10 Managem ent Ser ver will d eploy the p olicy t o the select ed machine s and machines belonging to the selecte d groups. Filtering and s orting backu p policies The following is a guideline for you to filter and sort b ackup policies.
Copyrig ht © A croni s, In c., 200 0 - 20 09 293 Settings The tab displays inform ation abou t the bac kup schem e used by the po licy and bac kup opt ions t hat were modified against the default settings. Applied to The tab displays a list of machines and groups the s elected policy is applied to.
294 Copyrig ht © A croni s, In c., 200 0 - 20 09 The main goal of grouping is protecti on of multiple machines with one policy. Once a machin e appears i n a group, the policy a pplied to t he group is applie d to the machine and the new tasks are created by the policy on the machine.
Copyrig ht © A croni s, In c., 200 0 - 20 09 295 7.1.3 .1. Actions on m achine s Registering machines on the management server Once th e machin e is ad ded or imp orted t o the All phys ical mac hines gro up, it be comes registered on the management server.
296 Copyrig ht © A croni s, In c., 200 0 - 20 09 Add a machi ne to anot her static group Click Add to an other group . In the A dd to grou p ( p. 299 ) window , specif y the group to copy the sele cted machine to. The backup poli cies appli ed to the groups the machine is a member o f wil l be ap plied to th e machi n e.
Copyrig ht © A croni s, In c., 200 0 - 20 09 297 View tasks existin g on a machine Click View tasks . T he Tasks ( p . 318 ) view w ill displa y a list of the ta sks, existin g on the mach ine. View log entrie s of a machine Click View lo g . The Log ( p.
298 Copyrig ht © A croni s, In c., 200 0 - 20 09 To perform registration through a local or rem ote console - agent connect ion, you ha ve to be connected with the mana gement server ad ministra to r's creden tials or provid e the manage ment server administrator's cr ed entials.
Copyrig ht © A croni s, In c., 200 0 - 20 09 299 A regis tered machine has to be specified by its r egistration address, that i s, you need to provide exactly the same host name, ful ly qualif ied domain name (FQDN), or IP address as was specifi ed when the machine was initially added to the manage ment serv er.
300 Copyrig ht © A croni s, In c., 200 0 - 20 09 The machi ne being adde d becomes a membe r of more tha n one group. As a r esult, the backup policies applied to the first group will r emain on the machine, and the backup p olicies applie d to t he seco nd, third, etc.
Copyrig ht © A croni s, In c., 200 0 - 20 09 301 o Online - the machi ne is a vailable f or the manag ement ser v er. This m eans th at the manageme nt server's last con nection to the machine was succes sful. Conne ction is establish ed every 2 minu tes.
302 Copyrig ht © A croni s, In c., 200 0 - 20 09 Filter ing and sortin g Filtering and sorting of the backup policies is performed in the same way as for the Bac kup polic ies view. See the Fil tering and sorting bac kup policies ( p. 292 ) section f o r detail s.
Copyrig ht © A croni s, In c., 200 0 - 20 09 303 Stop a plan/task Click Backup pl an Stop . Stopping the running backup plan sto ps all i ts tas k s. Thus , all the tas k operations will be a bort ed.
304 Copyrig ht © A croni s, In c., 200 0 - 20 09 Only tasks that do not belong to a backup plan, such as a recovery task, can be modif i ed by dire ct edit ing. When you ne ed to mo dify a tas k belonging to a local bac kup plan, edi t the bac kup plan.
Copyrig ht © A croni s, In c., 200 0 - 20 09 305 View ta sks r el ated to a group Click View tasks . You will be tak en to the Ta sks vie w with pre - filter ed task s re lated to th e selec ted backup g roup. View log related to a group Click View lo g .
306 Copyrig ht © A croni s, In c., 200 0 - 20 09 Configuring the machi nes table By default, the table has fi v e columns that a re displayed, others are hidd en. If require d, you ca n hide the show n columns and show the hidden one s. To show or hide columns 1.
Copyrig ht © A croni s, In c., 200 0 - 20 09 307 Refresh a li st of gro ups Click Refresh . The mana gem ent co nsole will upd ate t he list o f group s fro m the ma nage ment server with t he most r ecent in format ion.
308 Copyrig ht © A croni s, In c., 200 0 - 20 09 For example, the following set of criteria Operating system: Windows Ser ver 2008 Operating system: Windows Ser ver 2003 Organizational unit: SERVERS IP range: 192.
Copyrig ht © A croni s, In c., 200 0 - 20 09 309 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machi ne has to be sp ecified by its regi stration add ress, th at is, y.
310 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Type - type of the group (static, or dy namic) • Criteria (for dynamic group s only) - grouping criteria • Comments - the group description (i.
Copyrig ht © A croni s, In c., 200 0 - 20 09 311 7.1.4. Virtual ma chines You can centrally manage v irtual machines using eithe r of the following meth ods or both: Adding a virtual machi ne as a physical m achine Install Acronis Backup & Recovery 10 Agent for Wind ows or Agent for Linux on the virtual machine and register ( p.
312 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.4 .1. Virtual machines o n a manage ment se rver Availab ility of virtu al mac hines Virtual machines are displayed as available when both the agent i s available for the manag ement server and the machines are available for the ag e nt.
Copyrig ht © A croni s, In c., 200 0 - 20 09 313 • Host /V A Using this criterion, you can create a dynamic gr oup of virtual machines hosted on a specified virtualization server or manag ed by the specified virt ual appliance.
314 Copyrig ht © A croni s, In c., 200 0 - 20 09 5. Li c en ses Clic k Provi de licens e . When insta lling th e trial product ver sion, select Use t he followin g trial licen se k ey and ente r the trial license key. Deduplication is always enabled in the trial version.
Copyrig ht © A croni s, In c., 200 0 - 20 09 315 The group th at ha s the sa me name as the vCenter Server will be removed and the polici es applied to this group or its child groups will be r e voked. Virtual machines remain in the All vi rtual m achines group and in othe r groups if thei r host is managed by Agent for ESX/ESXi.
316 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.5 .1. Action s on storage nodes All the op erations describ ed here, are perf ormed by clicki ng th e correspond ing bu ttons on th e toolbar. The operations can be also accessed from the Storag e nodes bar (on the Ac tions and tool s pane) and f rom the Stor age nodes item of the main menu.
Copyrig ht © A croni s, In c., 200 0 - 20 09 317 Refresh the li st of storage nodes Click Refresh . The mana gem ent co nsole will upd ate t he list o f storag e nod es fro m the manag ement serv er with t he mo st re cent in for mation .
318 Copyrig ht © A croni s, In c., 200 0 - 20 09 o Withdraw n - the storage n ode was register ed on ano ther manag emen t server. As a result, it is not possi ble t o control the n ode fro m the cur rent management ser ver.
Copyrig ht © A croni s, In c., 200 0 - 20 09 319 or the bac kup plan wil l run. View details of a task Click View d eta ils . In the Tas ks details ( p. 18 8 ) win dow, ex amine a ll info rma tio n rela ted to the selecte d task. View a task's log Click View lo g .
320 Copyrig ht © A croni s, In c., 200 0 - 20 09 tasks owned by othe r use rs. • Each storage node has a built - in service task call ed a co mpa cting task. This task ca nnot be del eted. This is a built - in compacting task Refresh tasks tabl e Click Refresh .
Copyrig ht © A croni s, In c., 200 0 - 20 09 321 Local and cen tralized l ogging in Acr onis Back up & Recov ery 10 Acronis Backup & Recover y 10 has local and c entralized logs of events. Local even t log A local event log holds information about A cronis Backup & Rec overy 10 operations on a managed machine .
322 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.7 .1. Actions on l og entri es All the op erations desc ribed below ar e performed by cli cking the corr esponding items on the log toolbar .
Copyrig ht © A croni s, In c., 200 0 - 20 09 323 To Do Display log entri es for a given time period 1 In the From field, select the d ate startin g from which t o disp lay the log en tries. 2 In the To fie ld, select the date up to whic h to displ ay the log entries .
324 Copyrig ht © A croni s, In c., 200 0 - 20 09 • Machine - T he name of the mac hine where the eve nt has occurred (i f any) • Code - Blank or the pro gram error code if the event type is error. Error code is an integer number that may b e used by Ac ronis support service to solve the probl em.
Copyrig ht © A croni s, In c., 200 0 - 20 09 325 Reports about vaults' statistics and task act ivities are interval - based and provide historical information for the spe cified time interval that can last from days to years, depending on the amount of dat a kept in the databases .
326 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.1.8 .2. Report abo ut the backup policies In this view, y o u can gen erate a report ab out the backup policies exis ting on the managemen t server . This repo rt consi sts of one or more tab les. Filter s Under Filters , choose which back up polic ies to include in t he repo rt.
Copyrig ht © A croni s, In c., 200 0 - 20 09 327 With the default filter setting s, the report includes all backup plans from all machines. Report view Under R ep or t vi ew , choose how the rep ort will look: • Select whether to show all it ems in a single table or to group them by a par ticular column.
328 Copyrig ht © A croni s, In c., 200 0 - 20 09 Filter s Under Fi lter s , c hoo se w h ich archives to include in the report. Only the archiv es that meet all fil ter criteria are included. • Vaults : The list of centraliz ed managed vaults that st ore the archives.
Copyrig ht © A croni s, In c., 200 0 - 20 09 329 • Specify which table co lumns to show, a nd in which order . • Select which diagrams to in clude in the report.
.
Copyrig ht © A croni s, In c., 200 0 - 20 09 331 7.2.1 .1. How to lo ad Acronis Administ rative Template The Adm inistrative Template, provided b y Acronis, enables th e fi ne - tuning of some secu rity related feature s, including e ncrypted co mmunicat ion settings.
332 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.2.1 .2. Acron is Backup & Recov ery 10 Storag e Node The following are the parameters of Acronis Backup & Recovery 10 Storage N ode that can be set b y using Acronis Administrative Templat e.
Copyrig ht © A croni s, In c., 200 0 - 20 09 333 Vault Free Space Warni ng Percentag e Descriptio n: Specifies the amount of free space in a managed vault, as a percentage o f its total size, below which a w arning is recorded in the st orage node's log.
334 Copyrig ht © A croni s, In c., 200 0 - 20 09 D efault value: 10 If the amount of free spac e on the disk con taining a man aged vault's database is l ess than the value of Vault Dat abase Free Space Error Limit , an error is recorded in the st orage node's log.
Copyrig ht © A croni s, In c., 200 0 - 20 09 335 For detail s o n ho w the centrali zed even t log is c leaned up, see Log cleanup rules ( p. 83 ). Windows Even t L og Specifies wh en to record Acronis Backup & Rec overy 1 0 Manag ement Ser ver's events i nto th e Applicat ion even t log in Windows.
336 Copyrig ht © A croni s, In c., 200 0 - 20 09 Possibl e values: Any string 0 t o 32765 characters long Default v alue: public Synchr onization Specifies h ow Acronis B ackup & Rec o very 1 0 M.
Copyrig ht © A croni s, In c., 200 0 - 20 09 337 Acronis Backup & Recover y 10 Management Server t ries to perform synchronization f or each normal - priority machine once in the n umber of seco nds give n by Pe riod , by using an available worker thr ead (see Maximum Workers desc ribed previo usly).
338 Copyrig ht © A croni s, In c., 200 0 - 20 09 We reco mmend settin g Sec on d C onnect ion Ate mpt to Tr ue only in networks whic h ofte n experi ence prob lems wit h their DNS s ervers, and provide d that t he machine s' IP addr esses change inf requent ly — as in cases of fi xed IP addresses or long DHC P lease times.
Copyrig ht © A croni s, In c., 200 0 - 20 09 339 Default v alue: 0 If this setting is 0 , th e man agement server uses the Snapshot Storage Rel ative Size setting .
340 Copyrig ht © A croni s, In c., 200 0 - 20 09 Default v alue: 30 If Acronis License Server is unavailable, Acronis Backu p & Recovery 10 will cont inue working with full functionality for t he.
Copyrig ht © A croni s, In c., 200 0 - 20 09 341 Default v alue: False Trace Le vel Descriptio n: Specifies th e minimu m level of severit y o f events t o be recorded into th e event log. Only events of lev els gr eater th an or eq ual t o the v alue in Tra c e Lev el will be reco rded.
342 Copyrig ht © A croni s, In c., 200 0 - 20 09 You may want to increase the initial size of the snapshot storage — or to place it on a different volu me — when experiencing pro blem s with back ing up data that changes extensive ly during backup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 343 Specifies the port that the component will use for incoming an d outgoing communication with othe r Acronis compone nts. Select one of the foll owing: Not C onfigure d The com ponent will use t he default TCP po rt number 9876 .
344 Copyrig ht © A croni s, In c., 200 0 - 20 09 Always us e The use of SS L certificates i s enabled . The conn ection wil l be establ ished only if t he use of SS L certificates is enabled on the ser ver application. Disabl ed The same as Not config ured .
Copyrig ht © A croni s, In c., 200 0 - 20 09 345 Eac h event has a level fro m zero to five based on the event's severity, as shown in the f ollowing table: Level Name Descr iption 0 Unknow n Ev.
346 Copyrig ht © A croni s, In c., 200 0 - 20 09 You will find the descripti o n of these parameters in the correspo ndent topic abou t configuratio n through th e admin istra tive template.
Copyrig ht © A croni s, In c., 200 0 - 20 09 347 General Policy name [Optio nal] Enter a unique name for the backup pol icy. A conscio us name lets you ident ify the policy among the other s. Source t ype Select the type of items to back up: Disk /volum es or F iles .
34 8 Copyright © Acr onis , In c., 200 0 - 20 09 Use well - known optimi zed backup schem es, such as Grand father - Father - Son and Tower of Hanoi, c reate a custom ba ckup scheme or back up data onc e.
Copyrig ht © A croni s, In c., 200 0 - 20 09 349 Storag e ( p. 213 ) Choose the storage on the virtualization server or the fo lder to place the virtual machine files in.
350 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.2 .1. Volumes to back up se lect ion rules Define volume selection rules, according to which the volume s will be backed up on t he machines the policy will be applied to. To define volume selection rules In the first line, select the ru le from the list, or type i t manually.
Copyrig ht © A croni s, In c., 200 0 - 20 09 351 First partition on the first SCSI hard disk of a Linux machi ne Type or select: /dev/sda1 s da1 is the standard de vice name fo r the firs t partit ion of the first S C SI hard dis k drive. Fo r mo re deta ils, see N ote o n Lin ux machin es.
352 Copyrig ht © A croni s, In c., 200 0 - 20 09 /dev/ hda2, and /dev/h da3, respe ctively. To perform a disk backu p of the, say, th ird partitio n, one can type /dev/ hda3 in the row of the Volumes to bac k up selecti on rules dialo g box. Furthermo re, a L inux par tition c an be mo unted anywhe re inside the tr ee.
Copyrig ht © A croni s, In c., 200 0 - 20 09 353 Point to the folders and files to be backed up. If you specified a path to a file o r folder explicitly, the policy will back up thi s item on each machine where this e xact path will be found. To include In the Files and folders column, type or select: File Text.
354 Copyrig ht © A croni s, In c., 200 0 - 20 09 The roo t user 's hom e directory /root Directory for all u ser - related programs /usr D irector y for syste m configuratio n files /etc 7.3.3. Access cred entials for source Specify credentials required for access to the data you are going t o back up.
Copyrig ht © A croni s, In c., 200 0 - 20 09 355 You can use one or m ore wildcard characters * an d ? in a file mask: The aste risk ( *) substitutes for zero or more characters in a file name; for exa mple, the file mas k Doc*.txt yi elds files suc h as D o c.
356 Copyrig ht © A croni s, In c., 200 0 - 20 09 The program generates a common name for the new archives and d isplays it in the Name field. The name looks like [PolicyName]_[MachineNa me]_Archive1. If you are not satisfied with the automatically generated name, construct an o ther name.
Copyrig ht © A croni s, In c., 200 0 - 20 09 357 7.3.7. Backup scheme selection Choose one of th e avail able b ackup sch emes: • Back up now – to create a b ackup task for manual start and run the task immediately after its creation.
358 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.7 .3. Simple sc heme With the simp le backup schem e you just sche dule when and how o ften to back up data a nd set the retention rule. At the first t im e a full backup will be created. T he next backups w ill be increme ntal.
Copyrig ht © A croni s, In c., 200 0 - 20 09 359 • Daily ("Son") ba ck ups are in cremental. Param eters You can set up the followin g parameters of a Grandfat her - Father - Son (GFS) scheme. Start bac kup at: Specifies when to start a backup.
360 Copyrig ht © A croni s, In c., 200 0 - 20 09 Backup s cheme parameters ca n then be set up as fo llows. • Start backu p at: 11:00 PM • Back up o n: All days • Weekly /monthly : Saturday (fo.
Copyrig ht © A croni s, In c., 200 0 - 20 09 361 • Track changes to the fin ancial statement s, spreadsheets, etc. per formed on Tuesd ays and Thursdays (daily increment al backup). • Have a weekly summary o f file changes since last m onth (Friday weekly differenti al backup).
362 Copyrig ht © A croni s, In c., 200 0 - 20 09 • One backup of each level is sto red at a time • Higher density of mo re recent back ups Param eters You can set up the followin g parameters of a T ower of Hanoi schem e. Schedule Se t up a daily ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 363 Roll - back peri od T he number of days we can go back in the archive is different on different days. The minimum number of days we are g uaranteed to have is call ed the roll - back period. The following table shows f ull backup and roll - back periods f or schemes of various levels.
364 Copyrig ht © A croni s, In c., 200 0 - 20 09 7.3.7 .6. Custom back up sche me At a glan ce • Custom schedule and co nditions for backups of eac h type • Custom schedule and r etention rul es Param eters Para met er Mean ing Fu ll bac kup Spec ifies on w hat sc hedule a nd under which c onditions to pe rform a f ull backup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 365 might e nd up with no backups if the prog ram is not able to create the new backup for some rea son. Apply the rules (only if the re tention r ules are set ) Speci fies whe n to apply the retenti on ru les ( p.
366 Copyrig ht © A croni s, In c., 200 0 - 20 09 Monthly full, we ekly di fferential, a nd daily incre mental backups pl us cleanup This example demonstrates the us e of all options available in the Cus tom scheme. Suppose that we need a sch eme that will produce monthly full backups, w eekly differential backups , and daily i ncrement al backups.
Copyrig ht © A croni s, In c., 200 0 - 20 09 367 • Full backup, runs every Frid ay at 10:00 PM • Incremen tal backup, runs manually • Differential backup, runs manually You can r un any o f these backup tasks b y selec ting i t from the list of tas ks in the Backup plans and tasks section in th e left pane.
Copyrig ht © A croni s, In c., 200 0 - 20 09 368 Glossa ry A Acronis A ctive Resto re The Acronis proprietary technology that brings a system online immediatel y after the system recover y is start ed. The sys tem boots fr om the backup ( p. 374 ) and th e machine b ecome s operat ional and ready to provide necessary services.
Copyrig ht © A croni s, In c., 200 0 - 20 09 369 Agent (Acro nis Bac kup & Reco very 10 Age nt) An applicat ion t hat perf orms dat a backup an d recovery and enabl es ot her manageme nt operat ions on the machi ne ( p. 377 ), such as task manage m ent and operations with hard disks.
370 Copyrig ht © A croni s, In c., 200 0 - 20 09 Backup o ptions Configuration parameters of a backup o peratio n ( p. 369 ) , such as pre/pos t backup co mmands, maximum ne twork bandwidth a llot ted for the backup st ream or data compressio n level.
Copyrig ht © A croni s, In c., 200 0 - 20 09 371 3. The mana gement server deploys the policy t o the ma chin es. 4. On e ach mac hine, the ag ent ( p. 3 69 ) installed on the machine finds data items using the selection rules. For example, if the s e lection rule is [All volumes ], the entire machine will b e backed up.
372 Copyrig ht © A croni s, In c., 200 0 - 20 09 A management server has two built - in gr oups that contain all machines of each type: All phys ic al machine s ( p. 378 ), All virtual machines ( p. 381 ). Built - in groups cannot be delete d, moved to other groups or ma nually modif ied.
Copyrig ht © A croni s, In c., 200 0 - 20 09 373 On a mach ine tha t is not reg istered on the man agem ent server, a user having the pri vilege to back up to the centralized vault can do so by specify ing the full path to the vault.
374 Copyrig ht © A croni s, In c., 200 0 - 20 09 Differ ential backup A differential backup stores chang es to the data ag ainst the latest full backup ( p. 377 ) . You need access to the corresponding full backup to recover the data from a differential ba c kup.
Copyrig ht © A croni s, In c., 200 0 - 20 09 375 and the foreign disks so that they form a single entity. A foreign gr oup is imported as is (will have th e original name) if no disk gr o up exists on the machine.
376 Copyrig ht © A croni s, In c., 200 0 - 20 09 • IP address range. A machine remains in a d ynamic group as l ong as the mach ine mee ts the group 's criteria .
Copyrig ht © A croni s, In c., 200 0 - 20 09 377 F Full back up A self - sufficient backup ( p. 3 69 ) containing all data chosen for b ackup. You do not need access to any othe r backup to recove r the data from a ful l backup. G GFS (Grand fathe r - Father - Son) A popular backup sc heme ( p.
378 Copyrig ht © A croni s, In c., 200 0 - 20 09 Man ag ed vaul t A centralized vault ( p. 372 ) managed by a storag e node ( p. 379 ). Ar c hiv es ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 379 Plan See Backup pla n ( p. 37 0 ). Policy See Backup policy ( p. 370 ). R Recovery point Date and t ime to which t he backed up data can be revert ed to . Regi stered machine A m achine ( p. 3 77 ) managed by a management s erver ( p.
380 Copyrig ht © A croni s, In c., 200 0 - 20 09 • preve nt access to the ba ckup archives , even in case the sto rage medium i s stolen or acces sed by a malefactor, by using encrypted vaul ts ( p. 37 6 ). Stora ge node - side cleanup Cleanup ( p.
Copyrig ht © A croni s, In c., 200 0 - 20 09 381 U Univers al Resto re (A cronis B ackup & Reco very 10 Uni versal Re store) The Acro nis pro prietary techno logy that helps bo ot up Windo ws o n di ssimilar hardware or a virtual machine.
382 Copyrig ht © A croni s, In c., 200 0 - 20 09 Virtual mach ine On Acronis Backup & Rec overy 10 Manage ment Server, a machine ( p. 377 ) is considered virtua l if it can be bac ked up from the vir tualizat ion host witho ut install ing an agent ( p.
Index A A policy on a machine or a group • 57 About Windows loaders • 232 Access credentials • 238, 239 Access credentials for archive location • 194, 201 Access credentials for destination .
384 Copyright © Acr onis , In c., 2000 - 2009 At W ind ows Event Log ev ent • 171 Attaching a managed vault • 127, 131 B Back up later scheme • 202, 357 Back up now scheme • 202, 357 Backing .
Copyrig ht © A croni s, In c., 200 0 - 20 09 385 Components for centralized management • 19 Compression level • 91, 100 Condition s • 108, 173 Configuring Acronis Backup & Recov ery 10 comp.
386 Copyright © Acr onis , In c., 2000 - 2009 Drivers for Universal Restore • 254, 257 Dual destination • 46, 92, 108 Dynamic disk • 41, 368, 374, 375, 376 Dynamic group • 372, 37 5 Dynamic v.
Copyrig ht © A croni s, In c., 200 0 - 20 09 387 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 134, 137, 154 Items to back up • 194, 1 97, 347, 349 K Kernel parameters • 2.
388 Copyright © Acr onis , In c., 2000 - 2009 Organizational unit criterion • 85, 307, 308 Overview • 64, 113, 124, 128, 132, 315 Overwriting • 226 Owners and credentials • 31, 155, 217, 235,.
Copyrig ht © A croni s, In c., 200 0 - 20 09 389 Running Acronis Disk Director Lite • 270 S Scheduling • 108, 162, 2 03, 212, 237, 358, 367 Secure communication • 74 Select destination disks .
デバイスAvanquest Acronis Backup & Recovery 10 Advanced Workstationの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Avanquest Acronis Backup & Recovery 10 Advanced Workstationをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはAvanquest Acronis Backup & Recovery 10 Advanced Workstationの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Avanquest Acronis Backup & Recovery 10 Advanced Workstationの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Avanquest Acronis Backup & Recovery 10 Advanced Workstationで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Avanquest Acronis Backup & Recovery 10 Advanced Workstationを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はAvanquest Acronis Backup & Recovery 10 Advanced Workstationの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Avanquest Acronis Backup & Recovery 10 Advanced Workstationに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちAvanquest Acronis Backup & Recovery 10 Advanced Workstationデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。