background image

 

 

Update 3 

Acronis® Backup & Recovery ™ 10 
Advanced Server 

User's Guide 

  

 

  
 

Summary of Contents for BACKUP AND RECOVERY 10 ADVANCED SERVER - INSTALLATION UPDATE 3

Page 1: ...Update 3 Acronis Backup Recovery 10 Advanced Server User s Guide...

Page 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Page 3: ...ckup scheme 35 2 6 Tower of Hanoi backup scheme 38 2 7 Retention rules 41 2 8 Backing up dynamic volumes Windows 43 2 9 Backing up LVM volumes and MD devices Linux 45 2 9 1 Backing up logical volumes...

Page 4: ...tracing 96 3 3 3 Log cleanup rules 98 3 3 4 Online backup proxy 98 3 3 5 Customer Experience Program 98 3 4 Default backup and recovery options 99 3 4 1 Default backup options 99 3 4 2 Default recover...

Page 5: ...data 222 6 3 1 Task credentials 225 6 3 2 Archive selection 225 6 3 3 Data type 226 6 3 4 Content selection 226 6 3 5 Access credentials for location 227 6 3 6 Destination selection 228 6 3 7 Access...

Page 6: ...or disk management 280 6 11 4 Disk management view 280 6 11 5 Disk operations 281 6 11 6 Volume operations 287 6 11 7 Pending operations 293 6 12 Collecting system information 294 7 Centralized manage...

Page 7: ...ge 379 8 1 6 Backup and recovery FAQ 380 8 1 7 Initial Seeding FAQ 381 8 1 8 Large Scale Recovery FAQ 386 8 1 9 Subscription lifecycle FAQ 388 8 2 Where do I start 390 8 3 Choosing a subscription 390...

Page 8: ...pital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication mechanism a...

Page 9: ...concepts p 27 For understanding of the GUI elements see Using the management console p 11 For how to enable non root users to start the console under Linux see Privileges for local connection p 76 Fo...

Page 10: ...lays all tasks existing on the registered machines The tasks can be filtered by machines backup plans and other parameters Refer to the context help for details Viewing log To view the centralized log...

Page 11: ...achines For more information please refer to Grouping the registered machines p 61 The comprehensive example of advanced centralized management is provided in the Setting up centralized data protectio...

Page 12: ...nected to a managed machine the following views are available in the navigation tree Machine name Root of the tree also called a Welcome view Displays the name of the machine the console is currently...

Page 13: ...ppears under the navigation tree It offers you an easy and convenient way of connection to the machines in demand by adding them as shortcuts To add a shortcut to a machine 1 Connect the console to a...

Page 14: ...tions that can be performed on a managed machine or on a management server Always the same for all views Clicking the operation opens the respective action page see the Action pages p 16 section All t...

Page 15: ...pane How to change the panes borders 1 Point to the pane s border 2 When the pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the pan...

Page 16: ...lected item There are several ways of performing the same action on selected items By clicking the buttons on the table toolbar By clicking in the items in the Item s name Actions bar on the Actions a...

Page 17: ...nfigured by clicking the respective Change links to the right Others are selected from the drop down list or typed manually in the page s fields Action page Controls Acronis Backup Recovery 10 remembe...

Page 18: ...le provides Graphical User Interface and remote connection to the agents and other Acronis Backup Recovery 10 components Usage of the console is not licensed Bootable media builder With bootable media...

Page 19: ...tioning style between MBR and GPT or changing a disk label can be performed either in the operating system or using bootable media 1 3 1 1 Universal Restore The Universal Restore add on enables you to...

Page 20: ...he network they operate independently manage different machines and use different centralized vaults for storing archives The management server s databases The management server uses three Microsoft S...

Page 21: ...Server p 407 Direct console connection to a storage node is not possible Setting up the storage infrastructure Install the storage nodes add them to the management server the procedure is similar to t...

Page 22: ...operations reduces the time required for booting multiple machines as compared to using physical bootable media 1 3 3 4 License Server The server enables you to manage licenses of Acronis products and...

Page 23: ...is Backup Recovery 10 can back up and recover the following file systems with the following limitations FAT16 32 NTFS Ext2 Ext3 Ext4 ReiserFS3 particular files cannot be recovered from disk backups lo...

Page 24: ...ows Server 2003 2003 R2 the Standard Enterprise Small Business Server editions x86 x64 Windows Vista all editions except for Vista Home Basic and Vista Home Premium x86 x64 Windows 7 all editions exce...

Page 25: ...h 64 bit distributions When using the agent on a 64 bit RedHat based distribution such as RHEL CentOS Fedora or on a 64 bit SUSE distribution make sure that the following 32 bit packages are installed...

Page 26: ...150 MB 70 MB Bootable Media Builder 70 MB 240 MB 140 MB Management Console 25 MB 100 MB 40 MB Network interface card or virtual network adapter is a common requirement for all the components Bootable...

Page 27: ...ate bootable media p 400 4 Connect the console to the managed machine 5 Create a backup plan p 399 To do so you have to specify at the very least the data to be protected and the location where the ba...

Page 28: ...28 Copyright Acronis Inc 2000 2010 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Page 29: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Page 30: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Page 31: ...e Regular users A regular user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but w...

Page 32: ...ery task are owned by the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local bac...

Page 33: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Page 34: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Page 35: ...buried in used tapes A lot of Internet sources describe varieties of the GFS tape rotation scheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acro...

Page 36: ...ekly Monthly parameter splits the total schedule into daily weekly and monthly schedules Assume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be c...

Page 37: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Page 38: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Page 39: ...scheme pattern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table show...

Page 40: ...evel is kept until a new backup has been successfully created on the level The table shows the pattern for the five level backup scheme The pattern consists of 16 sessions As a result of using increme...

Page 41: ...rchive When there is insufficient space while backing up p 217 if you accept the risk of losing the last backup 1 Delete backups older than This is a time interval counted back from the moment when th...

Page 42: ...ention rules are applied the program will delete all backups created more than 3 months or more exactly 90 days ago If after the deletion the archive size is more than 200GB and the oldest backup is o...

Page 43: ...from consolidation always have maximum compression This means that all backups in an archive may acquire the maximum compression as a result of repeated cleanup with consolidation Best practices Maint...

Page 44: ...content Recovery to disk group unallocated space When a dynamic volume is recovered to disk group unallocated space both the type and the content of the resulting volume are recovered The unallocated...

Page 45: ...need to create or increase unallocated space on an existing disk group This can be done by deleting volumes or converting basic disks to dynamic You might want to change the target volume type basic s...

Page 46: ...a previously created logical volume Such is the case when you create the structure of logical volumes manually by using the lvm utility Recovering both the structure of logical volumes and their cont...

Page 47: ...with backups check box It is selected by default Before performing the first disk backup on a source machine run the following command trueimagecmd dumpraidinfo Either operation saves the machine s l...

Page 48: ...l DYN1 volume run the following command here the name of the backup is assumed to be home backup tib trueimagecmd partition dyn1 filename home backup tib create To back up the RAID 1 volume DYN2 run t...

Page 49: ...lowing table summarizes the readability of tapes written by Acronis True Image Echo and Acronis True Image 9 1 product families in Acronis Backup Recovery 10 The table also illustrates the compatibili...

Page 50: ...an last up to several minutes Limitations 1 Multiple full backups within one archive are not supported 2 Individual files cannot be recovered from a disk backup 3 Backups cannot be deleted from a tape...

Page 51: ...stallation directory By default ProgramFiles Acronis BackupAndRecovery in Windows and usr lib Acronis BackupAndRecovery in Linux This file can be read by a MIB browser or a simple text editor such as...

Page 52: ...e created on a managed machine the zone is always present in the list of Personal vaults Centralized backup plans p 401 can use Acronis Secure Zone as well as local plans p 406 If you have used Acroni...

Page 53: ...e Image Echo After upgrade from Acronis True Image Echo to Acronis Backup Recovery 10 Acronis Startup Recovery Manager appears as deactivated regardless of its status before the upgrade You can activa...

Page 54: ...r for the hard disk you can install the appropriate driver manually bypassing the automatic driver search and install procedure 3 Installing drivers for Plug and Play devices Universal Restore relies...

Page 55: ...ive a flash drive or any internal hard drive How it works When configuring a recovery operation you select disks or volumes to recover from a backup Acronis Backup Recovery 10 scans the selected disks...

Page 56: ...uring the backup scan Do not try to recover more than one operating system using Active Restore if you want the result to be predictable When recovering a multi boot system choose only one system volu...

Page 57: ...s way of management is called centralized management p 401 Centralized management does not rule out the direct management p 402 of each machine You can connect the console to each machine and perform...

Page 58: ...e health of the data protection be sure that the backup archives do not store duplicated information and that the obsolete backups are deleted from the storage in a timely manner These goals can be ac...

Page 59: ...fore using the storage node make sure that all users that will back up to the node s vaults have Windows accounts on the node If the node is included in an Active Directory domain all the domain users...

Page 60: ...Wake on LAN On You may also want to distribute the backup start time within the time window to optimize the network usage and the storage node CPU load b Schedule incremental backup as follows Weekly...

Page 61: ...s a machine is registered p 408 on the management server the machine appears in the All machines built in group p 400 By applying a backup policy to this group you protect all the registered machines...

Page 62: ...locations and the like To make the best use of the AD OU criterion consider reproducing the Active Directory hierarchy in the management server Grouping by the IP address range enables taking account...

Page 63: ...he OU The international sales manager s laptop is not included in the OU but it has some of the data the sales machines have To back up this data the administrator has to add the laptop to G2 by force...

Page 64: ...erations with groups to which backup policies are applied will result in changing the policies on the member machines On any hierarchy change that is when moving removing creating groups adding machin...

Page 65: ...hine Policy on a group 1 A policy can be applied to a group 2 A policy can be revoked from a group 3 A policy applied to a group cannot be revoked from a machine 4 To revoke the policy from the machin...

Page 66: ...Here is the initial state two custom groups contain different machines A policy is applied to one group another policy is applied to another group The next schemes illustrate results of the specified...

Page 67: ...on machine 4 irrespectively of this machine s membership in any group Let s assume we create the G3 group in the root If no policies are applied to the group all its members are supposed to be green B...

Page 68: ...machines the agent creates a backup plan While the policy is transferred to the machine and the backup plan is being created the policy s deployment state on the machine is Deploying Once the backup...

Page 69: ...be applied to a machine that does not have data meeting the selection rules p 408 No error or warning will be logged during the policy deployment because it is assumed that the data may appear in the...

Page 70: ...rning The updating log has warnings OK The updating log does not have errors and warnings Revoking Error The revoking log has errors Warning The revoking log has warnings OK The revoking log does not...

Page 71: ...oying then change to Updating Deployed or Deployed Deploying and will normally end up with Deployed The cumulative status of a backup policy To see this parameter select Backup policies in the tree Th...

Page 72: ...centralized vault view when creating the vault Deduplication database can be created in a local folder only The size of the deduplication database is about one percent of the total size of archives in...

Page 73: ...stop the task from the Tasks view Because deletion of unused items is resource consuming the compacting task performs it only when a sufficient amount of data to delete has accumulated The threshold i...

Page 74: ...and is now idle You can view the state of the indexing task in the list of tasks on Acronis Backup Recovery 10 Management Server 2 14 6 5 Deduplication ratio The deduplication ratio shows the size of...

Page 75: ...16 KB and 64 KB If you protected the archive with a password Tip If you want to protect the data in the archive while still allowing it to be deduplicated leave the archive non password protected and...

Page 76: ...stablish a remote connection 1 On the toolbar click Connect then point to New connection and then click Manage a remote machine 2 In Machine type or select the name or IP address of the remote machine...

Page 77: ...ol UAC and which is not part of a domain only the built in Administrator user can back up data and perform disk management operations To overcome the restriction include the machine into a domain or d...

Page 78: ...the Acronis_Trusted group For example to add the existing user user_a to the group run the following command usermod G Acronis_Trusted user_a 3 Create the file etc pam d Acronisagent trusted with the...

Page 79: ...nt Console they have the same management rights on the registered machines as users with administrative privileges on those machines regardless of the contents of Acronis security groups there To be a...

Page 80: ...very 10 Storage Node depends on the user s rights on the machine where the storage node is installed A regular user such as a member of the Users group on the storage node can Create archives in any c...

Page 81: ...orage Node components run as services When installing any of these components you need to specify the account under which the component s service will run For each service you can either create a dedi...

Page 82: ...mponents This section describes how Acronis Backup Recovery 10 components communicate with each other using secure authentication and encryption This section also provides information on configuring c...

Page 83: ...figuring communication settings You can configure communication settings such as whether to encrypt transferred data for Acronis Backup Recovery 10 components installed on one or more machines by usin...

Page 84: ...rt box Disabled The same as Not configured For details about the network port and instructions on how to specify it in Linux and a bootable environment see Network port configuration p 86 Client Encry...

Page 85: ...he use of SSL certificates is enabled on the server application Disabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts...

Page 86: ...nis_agent in Linux service After the port is changed on the server side connect to the server using the Server IP port or the Server hostname port URL notation Note If you use network address translat...

Page 87: ...the list of certificates for the local machine is not displayed in the Certificates console you can use the following procedure To open the list of a machine s certificates 1 Click Start then click Ru...

Page 88: ...type certmgr msc 2 In the Certificates console double click the name of the certificate that you want to install 3 In the Details tab in the list of fields click Thumbprint 4 Select and copy the field...

Page 89: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Page 90: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Page 91: ...set is Collect logs for All events Use the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all...

Page 92: ...s and warnings Errors only To disable this option clear the Log events check box 3 2 3 2 SNMP notifications This option defines whether the management server has to send its own log events to the spec...

Page 93: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Page 94: ...ual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Server Virtual Editi...

Page 95: ...Server To be able to use this option you must be logged on as a member of the Administrators group on the machine You have the opportunity to register the machine on the management server when install...

Page 96: ...cation Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the events to be logged You can override the settings set here exc...

Page 97: ...pplication the messages will be sent to Community type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong The typical community is...

Page 98: ...ines whether the Acronis agent will connect to the Internet through a proxy server Note Acronis Backup Recovery 10 Online supports only HTTP and HTTPS proxy servers To set up proxy server settings 1 S...

Page 99: ...lt backup options Once an agent is installed the default options have pre defined values which are referred to as presets in the documentation When creating a backup plan you can either use a default...

Page 100: ...le level security p 114 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 114 Dest removable media Dest removable media Dest removabl...

Page 101: ...er Dest FTP server Dest FTP server Dest FTP server Dest FTP server Save software RAID and LVM metadata along with backups Notifications E mail p 110 Win Pop up p 111 Event tracing Windows events log p...

Page 102: ...for file systems that are supported by Windows Select this check box to skip files and folders with the Hidden attribute If a folder is Hidden all of its contents including files that are not Hidden...

Page 103: ...you selected the folder MyFolder and the file MyFile tmp outside that folder and selected to skip all tmp files In this case all tmp files in the folder MyFolder will be skipped during the backup proc...

Page 104: ...ared Result Preset Perform the backup only after the command is successfully executed Fail the task if the command execution fails Perform the backup after the command is executed despite execution fa...

Page 105: ...efore and after the data capture process which takes seconds while the entire backup procedure may take much longer depending on the amount of data to be backed up Therefore the database or applicatio...

Page 106: ...path to a directory where the command batch file will be executed 3 In the Arguments field specify the command s execution arguments if required 4 Depending on the result you want to obtain select the...

Page 107: ...p This option also applies to file level backup when the file level backup is performed by taking a snapshot The File level backup snapshot p 106 option determines whether a snapshot will be taken dur...

Page 108: ...of writers that are present in the operating system To view this list run the following command vssadmin list writers Note In Microsoft Windows Small Business Server 2003 the writer for Microsoft Exc...

Page 109: ...the backup process priority Select one of the following Low to minimize resources taken by the backup process leaving more resources to other processes running on the machine Normal to run the backup...

Page 110: ...overy 10 provides the ability of notifying users about backup completion through e mail or the messaging service E mail This option is effective for Windows and Linux operating systems This option is...

Page 111: ...pup This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine This option is not available when operating under bootable med...

Page 112: ...log events of the backup operations in the Application Event Log Specify the types of events to be logged All events log all events information warnings and errors Errors and warnings Errors only Do...

Page 113: ...rogram determines whether a file has changed or not by the file size and the date time when the file was last modified Disabling this feature will make the program compare the entire file contents to...

Page 114: ...a different machine File encryption is available in Windows using the NTFS file system with the Encrypting File System EFS To access a file or folder encryption setting select Properties General Advan...

Page 115: ...e Restore or Universal Restore If the media is being created in Windows the disk management functionality will also be available 3 4 1 16 Error handling These options are effective for Windows and Lin...

Page 116: ...ady backup on the network This comes in handy in cases of slow or busy networks and time consuming backup procedures Disconnection during the copy transfer will not affect the backup operation as oppo...

Page 117: ...box and specify the time interval The task will start as soon as the conditions are met OR the maximum time delay lapses depending on which comes first Time diagram Wait until conditions are met Skip...

Page 118: ...by some specific needs leave them unchanged An archive can occupy several tapes In such cases a so called tape set is used for keeping the data backups Tape set is a logical group of one or more tape...

Page 119: ...a separate tape set option With some of the options below enabled the program will add new tapes to the tape set every time when a full incremental or differential backup is created For each full bac...

Page 120: ...abled In Windows operating systems each file has the File is ready for archiving attribute available by selecting File Properties General Advanced Archive and Index attributes This attribute also know...

Page 121: ...n this option is enabled Acronis Backup Recovery 10 will save information about the structure of logical volumes known as LVM volumes and of Linux Software RAID devices known as MD devices to the etc...

Page 122: ...for Windows Agent for Linux Bootable media Linux based or PE based Disk recovery File recovery also from a disk backup Disk recovery File recovery also from a disk backup Disk recovery File recovery...

Page 123: ...the following options Execute before the recovery Execute after the recovery 2 Do any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file...

Page 124: ...ccess You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard 5 Click Test command to check if the command is correct A post recovery comm...

Page 125: ...check box to activate notifications 2 In the E mail addresses field type the e mail address to which notifications will be sent You can enter several addresses separated by semicolons 3 Under Send no...

Page 126: ...e messages The Messenger service is not started by default in the Microsoft Windows Server 2003 family Change the service Startup mode to Automatic and start the service To configure WinPopup notifica...

Page 127: ...nes whether the agent s operating on the managed machine have to send the log events of the recovery operations to the specified Simple Network Management Protocol SNMP managers You can choose the typ...

Page 128: ...s first For example if the network location becomes unavailable or not reachable the program will attempt to reach the location every 30 seconds but no more than 5 times The attempts will be stopped a...

Page 129: ...system without user interaction Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup Recovery 10 Agent for ESX ESXi...

Page 130: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Page 131: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Page 132: ...art is not available if the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space...

Page 133: ...the Vault name actions item of the main menu The following is a guideline for you to perform operations with centralized vaults To Do Create a managed or an unmanaged vault 1 Click Create 2 In the Typ...

Page 134: ...vaults that reside on shared storages only Refresh a vault s information Click Refresh While you are reviewing the vault content archives can be added to the vault deleted or modified Click Refresh to...

Page 135: ...cryption Anything written to the vault will be encrypted and anything read from it will be decrypted transparently by the storage node using a vault specific encryption key stored on the storage node...

Page 136: ...to the storage node This encryption has nothing to do with the archive encryption specified by the backup plan and performed by an agent If the archive is already encrypted the storage node side encr...

Page 137: ...cording to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by...

Page 138: ...verview Acronis Backup Recovery 10 provides full support of a tape library through Acronis Backup Recovery 10 Storage Node The storage node should be installed on the machine a tape library is attache...

Page 139: ...ble barcode digital value Such labels are used for tape identification in a tape library or especially in off site storage If all cartridges in a tape library have barcodes the library is ready to be...

Page 140: ...l If you fill tape library slots with unused tapes all the tapes will be included into the Free pool automatically If a tape was used previously the RSM tries to detect the registered application the...

Page 141: ...covery 10 Management Server and Acronis Backup Recovery 10 Management Console installed on local or remote machines as well as Acronis Backup Recovery 10 Storage Node installed on the machine with the...

Page 142: ...and tasks that use this vault will fail The backup archives belonging to a deleting centralized vault on a tape library will be deleted as well but these archives might be recovered by any storage nod...

Page 143: ...more tapes so it might be durational The program finds the tapes and inserts them automatically in the right order The Task Need Interaction window comes up if a required tape is not found Keep in min...

Page 144: ...igation pane of the console click Manage tapes and then click Start inventory on the Tape Management window When inventorying is completed a user has the list of tapes currently loaded into the librar...

Page 145: ...or the Imported pool can be renamed on condition that the user account used to run the storage node service ASN User has write permissions for these pools These permissions are not assigned to ASN Us...

Page 146: ...user interaction the backup task will enter the Need Interaction state and wait for the tape with the required label to be loaded into the tape library device Use a free tape the backup will be writt...

Page 147: ...ed tapes for archiving If your backup archive must provide recovery with daily resolution for the last several days weekly resolution for the last several weeks and monthly resolution for any time in...

Page 148: ...e options for the case All the below analyzed examples are a simplistic approach to a real case but provide you with a general conception of backup distribution onto tapes Legend for the case example...

Page 149: ...e For each differential backup option is cleared Imagine the first backup operation is scheduled on Friday 1st of January On that day at 11 00 PM the first full backup 320 Gb on the tape whose size is...

Page 150: ...third week four incremental backups on the 4th week The next full backup 320 Gb should be written on Friday of the 4th week However tape 02 has only 104 Gb of free space at the moment So after the tap...

Page 151: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Page 152: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Page 153: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Page 154: ...l backup option is selected the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define th...

Page 155: ...task every 1 day at 11 00 PM Repeat once Number of levels 5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbe...

Page 156: ...information about it is deleted from the storage node database The figure shows the full backup kept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and...

Page 157: ...ups deleted at the moment are drawn as dark gray rectangles The figure indicates that there are two full backups on level E because at the moment the first full backup is a base for differential backu...

Page 158: ...assical five level ToH scheme Two additional tapes used for 1 keeping an old full backup postponed deletion as it is a base for other level backups 2 keeping an old backup on a level until a new backu...

Page 159: ...e planning Example 1 Imagine the case with the following features full backup size is F_GB average size of incremental backups is I_GB average size of differential backups is D_GB compression level pr...

Page 160: ...the line of backups that consists of two sections The figure below shows the sections at the moment before the first backup will be deleted In the figure the full differential and incremental backups...

Page 161: ...vaults view of the console select the vault rescan the tape select the archive and the backup to recover data from and create the recovery task If you don t know which tape has the data to recover yo...

Page 162: ...free space of the appropriate volume occupied space total size of backup archives and their metadata if it is located in the vault Other files that may be put to this folder by a user are not counted...

Page 163: ...The Edit personal vault page lets you edit the vault s name and information in the Comments field Change user account for accessing a vault Click Change user In the appearing dialog box provide the c...

Page 164: ...t 5 Delete the old vault How can I merge two vaults Suppose you have two vaults A and B in use Both vaults are used by backup plans You decide to leave only vault B moving all the archives from vault...

Page 165: ...program duplicates your selection in the new window that has check boxes for each archive and each backup Review the selection and correct if need be then confirm the deletion 4 3 2 Operations with ba...

Page 166: ...eletion 4 3 3 Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view but with check boxes for each archive and backup The archive or backup you have cho...

Page 167: ...mn s header type the archive name the owner name or the machine name As a result you will see the list of the archives whose names owner names or machine names fully or just partly coincide with the e...

Page 168: ...rrent user specify the user s account User logoff any user current user specify the user s account Shutting down is not the same as logging off The task will not run at a system shutdown System startu...

Page 169: ...ws Every day s Set up the certain number of days you want the task to be run For example if you set Every 2 day s the task will be started on every other day In the During the day execute the task are...

Page 170: ...tive From 09 15 2009 If September 15 2009 is the current date of the task s creation and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00...

Page 171: ...the task will be run once Every From Until Set up how many times the task will be run during the specified time interval For example setting the task frequency to Every 1 hour From 10 00 00 AM until...

Page 172: ...ox automatically selects the corresponding check boxes Mon Tue Wed Thu and Fri and leaves the remaining ones unchanged 2 Once at 09 00 00 PM 3 Effective From empty If you have created the task say on...

Page 173: ...systems To specify a monthly schedule In the Schedule area select the appropriate parameter as follows Months Select a certain month s you want to run the task in Days Select specific days of the mont...

Page 174: ...empty This schedule is widely used when creating a custom backup scheme The Last day of every month schedule is added to the full backups while the differential backups are scheduled to be performed...

Page 175: ...2 On All All workdays 3 Once at 10 00 00 PM 4 Effective From 11 01 2009 To not set Second schedule 1 Months March April May September October November 2 On All All workdays 3 Every 12 hours From 12 0...

Page 176: ...a backup plan that will back up hard disk data as soon as such a situation occurs When Windows detects a bad block on a hard disk it records an event with the event source disk and the event number 7...

Page 177: ...in the Source field and the event number shown in the Event ID field When you are finished click OK to close the Event Properties dialog box 5 5 Advanced scheduling settings The following advanced se...

Page 178: ...schedule to three machines Run the task Daily Every 2 Hour s From 09 00 00 AM Until 11 00 00 AM Distribute start time within the time window Maximum delay 1 Hour s Distribution method Random Then the...

Page 179: ...is defined by the Task start conditions p 116 backup option There you can specify how important the conditions are for the backup strategy conditions are obligatory put the backup task run on hold un...

Page 180: ...start immediately after the user becomes idle 3 If the user is still active at 11PM the backup task starts anyway 5 7 2 Location s host is available Applies to Windows Linux Location s host is availab...

Page 181: ...a result 1 if the user logs off between 04 30 00 PM and 10 00 00 PM the backup task will start immediately following the logging off 2 if the user logs off at any other time the task will be skipped W...

Page 182: ...es to Windows Linux Enables to put a backup task run on hold until the specified time interval since the last successful backup completion passes Example Run the backup task at system startup but only...

Page 183: ...s view with failed tasks where you can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what act...

Page 184: ...olume if it is different 2 Create at least one bootable media p 400 Create now will launch the Bootable Media Builder p 407 No backups have been created for X days Back up now The Dashboard warns you...

Page 185: ...ails and dashboard parameter the tasks will be displayed on the Dashboard among other alerts and warnings Alternatively you can review the task execution states in the Backup plans and tasks p 185 vie...

Page 186: ...pace on the vault ignore the read error create the missing Acronis Secure Zone 2 Running At least one task is running Otherwise see 3 No action is required 3 Waiting At least one task is waiting Other...

Page 187: ...s been started yet or some of the tasks are stopped or being stopped These situations are considered as normal Task states A task can be in one of the following states Idle Waiting Running Stopping Ne...

Page 188: ...ed In this case since the task is not running stop means removing it from the queue Task state diagram Task statuses A task can have one of the following statuses Error Warning OK A task status is der...

Page 189: ...ing is a guideline for you to perform operations with backup plans and tasks To Do Create a new backup plan or a task Click New then select one of the following Backup plan p 198 Recovery task p 222 V...

Page 190: ...rations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validation exporting conversion migration The task enters t...

Page 191: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Page 192: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Page 193: ...abling a backup plan Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backu...

Page 194: ...ecure Zone ASZ management Resizing changing password deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing Deduplication...

Page 195: ...t server centralized origin Policy for backup plans with centralized origin name of the backup policy whose deployment created the backup plan Account the name of the account under which the plan runs...

Page 196: ...plicated in the Log entry details p 198 window Opening the Log with pre filtered log entries Having selected items in other administration views Dashboard Backup plans and tasks you can open the Log v...

Page 197: ...ted It will contain information about who deleted the entries and when 6 1 3 2 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries To Do Display log e...

Page 198: ...t relates to if any Task the task the event relates to if any Code the program code of the event Every type of event in the program has its own code A code is an integer number that may be used by Acr...

Page 199: ...the data items to back up A list of items to backup depends on the data type specified previously Access credentials p 203 Optional Provide credentials for the source data if the plan s account does...

Page 200: ...appears The setting status changes from Default to Custom Should you modify the setting again the line will display the new value unless the new value is the default one When the default value is set...

Page 201: ...change the scheduled start to manual 6 2 2 Backup plan s credentials Provide the credentials for the account under which the plan s tasks will run To specify credentials 1 Select one of the following...

Page 202: ...of these volumes with resize might fail 6 2 4 Items to back up The items to backup depend on the source type p 201 selected previously 6 2 4 1 Selecting disks and volumes To specify disks volumes to b...

Page 203: ...files 2 Select an item by checking the corresponding check box in the tree Selecting a check box for a folder means that all its content files and folders will be backed up That is also the case for n...

Page 204: ...ation refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files and folders whose names match any of the criteria called file ma...

Page 205: ...ck up data to a centralized vault expand the Centralized group and click the vault To back up data to a personal vault expand the Personal group and click the vault To back up data to a local folder o...

Page 206: ...ient except for some specific cases Why two or more plans should not back up to the same archive 1 Backing up different sources to the same archive makes using the archive difficult from the usability...

Page 207: ...sage examples This section provides examples of how you can use simplified file naming Example 1 Daily backup replacing the old one Consider the following scenario You want to perform a daily full bac...

Page 208: ...s with daily drive swaps Consider the following scenario You want to perform daily full backups of your machine to the file MyMachine tib on an external hard disk drive You have two such drives Either...

Page 209: ...ical files every day You want the first backup of each day to be full and to run at 01 00 AM You want the backups during working hours to be differential and to run every hour from 8 00 AM through 5 0...

Page 210: ...b incremental created on January 31 at noon MyArchive 2 1 2011 tib full created on February 1 at midnight MyArchive 2 1 2011 2 tib incremental created on February 1 at noon Example 2 Suppose that you...

Page 211: ...se the Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these d...

Page 212: ...At the first time a full backup will be created The next backups will be incremental To set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule w...

Page 213: ...d in the archive A term can be set in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup...

Page 214: ...loss Suppose that you need to Perform backups at the end of each working day Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered relatively quickly Ha...

Page 215: ...you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily backups Consider a more exotic GFS scheme Start backup at 12...

Page 216: ...ails Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 This is how the first 14 days or 14 sessions of this scheme s schedule look Shaded numbe...

Page 217: ...he following day however a new third level differential backup is created and the old full backup is deleted 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1 2 1 3 This gives us only a four day recov...

Page 218: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Page 219: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 41 Monthly full weekly differential and daily incremental backups plus c...

Page 220: ...f whether it has a schedule In the first of the previous examples we set up a schedule only for full backups However the scheme will still result in three backup tasks enabling you to manually start a...

Page 221: ...virtual machine When creating a backup plan p 198 you can set up regular conversion of a disk or volume backup to a virtual machine This section provides information that helps you make the appropria...

Page 222: ...sk will be executed by the host that you select and so will take that host s CPU resource If multiple backup plans use the same host multiple conversion tasks will be queued on that host and it may ta...

Page 223: ...en Virtual Appliance OVA The virtual appliance can then be imported to XenServer The VMware Workstation machine can be converted to the open virtualization format OVF using the VMware OVF tool With Ac...

Page 224: ...als do not enable recovery of the selected data To access this option select the Advanced view check box When to recover Recover p 235 Select when to start recovery The task can start immediately afte...

Page 225: ...ser name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK To learn...

Page 226: ...se anonymous access instead of entering credentials According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means...

Page 227: ...rtition table and partition layout Acronis Backup Recovery 10 automatically updates Windows loaders after recovery so there is no need to recover the MBR and Track 0 for Windows systems unless the MBR...

Page 228: ...d to the regular disk mapping procedure described below New virtual machine p 232 If Acronis Backup Recovery 10 Agent for Windows is installed The selected disks will be recovered to a new virtual mac...

Page 229: ...discovers the same signature on the second one automatically generates a new unique NT signature and assigns it to the second disk As a result all the volumes on the second disk will lose their lette...

Page 230: ...rce machine configuration being copied where possible The configuration is displayed in the Virtual Machine Settings p 232 section Check the settings and make changes if necessary Then you proceed to...

Page 231: ...ding values in the appropriate fields Using this feature you can redistribute the disk space between the volumes being recovered In this case you will have to recover the volume to be reduced first Ti...

Page 232: ...Windows only Assign a letter to the recovered volume Select the desired letter from a drop down list With the default AUTO selection the first unused letter will be assigned to the volume If you sele...

Page 233: ...ome cases delete the proposed disks Implementation of Xen machines is based on Microsoft Virtual PC and inherits its limitations up to 3 IDE disks and 1 processor SCSI disks are not supported Processo...

Page 234: ...F log F1 log By mask F log Excludes all log files with names consisting of four symbols and starting with F Windows By file path Finance F log Excludes files named F log from all folders with the name...

Page 235: ...will be started immediately after you click the final OK Recover later the recovery task will be started at the date and time you specify If you do not need to schedule the task and wish to start it...

Page 236: ...vers are located in a networked folder or on the bootable media specify the path to the folder in the Search folder field During recovery Universal Restore will perform the recursive search in all the...

Page 237: ...s for further usage The Citrix XenServer Open Virtual Appliance OVA can be imported to a XenServer using Citrix XenCenter The VMware Workstation machine can be converted to the open virtualization for...

Page 238: ...e the loader to point to the new devices and reactivate it Configuring GRUB is described in How to reactivate GRUB and change its configuration p 240 Tip If you want to preserve logical LVM volumes on...

Page 239: ...e disk and on the file system to which direct access is possible In other cases the user has to manually reactivate the boot loader Solution Reactivate the boot loader You might also need to fix the c...

Page 240: ...le for Fedora and Red Hat Enterprise Linux distributions for example as follows vi mnt system boot grub menu lst 6 In the menu lst file respectively grub conf find the menu item that corresponds to th...

Page 241: ...contains the loader configuration Example boot loader timeout 30 default multi 0 disk 0 rdisk 0 partition 1 WINDOWS operating systems multi 0 disk 0 rdisk 0 partition 1 WINDOWS Microsoft Windows XP P...

Page 242: ...are recovered The most likely cause of the problem is an insufficient amount of memory allocated to the recovery process by the operating system s cache manager You can either work around this proble...

Page 243: ...Add the storage node to the management server again by specifiying the machine on which the recovered storage node is installed 3 Re create the necessary managed vaults 6 4 Validating vaults archives...

Page 244: ...y the archive Backup p 246 specify the archive first and then select the desired backup in this archive Vault p 246 select a vault or other location which archives to validate Access Credentials p 246...

Page 245: ...t insert the last DVD and then insert the discs in order starting from the first one when the program prompts If the archive is stored on a network share expand the Network folders group then select t...

Page 246: ...d the Personal group and click the appropriate vault To select a local folder CD DVD drive or locally attached tape device expand the Local folders group and click the required folder To select a netw...

Page 247: ...uccessfully recovered consider starting validation right after the task creation Choose one of the following Now to start the validation task right after its creation that is after clicking OK on the...

Page 248: ...equired steps click OK to mount the volumes 6 5 1 Archive selection Selecting the archive 1 Enter the full path to the location in the Path field or select the desired folder in the folders tree If th...

Page 249: ..._address vault_name To access an unmanaged centralized vault type the full path to the vault s folder 2 In the table to the right of the tree select the archive The table displays the names of the arc...

Page 250: ...d letter to the mounted volume If required select another letter to assign from the drop down list Mount point in Linux specify the directory where you want the volume to be mounted 3 If several volum...

Page 251: ...to save the initial full backup to a detachable media Then send the media to the remote location There the backup will be exported from the media to the target storage Subsequent incremental backups...

Page 252: ...a machine where the deduplication add on to the agent is installed Otherwise the export task will fail Operations with an export task An export task starts immediately after you complete its configur...

Page 253: ...eges to access it To access this option select the Advanced view check box After you have performed all the required steps click OK to start the export task 6 7 1 Task credentials Provide credentials...

Page 254: ...a mount point such as mnt share select this mount point instead of the network share itself If the archive is stored on an FTP or SFTP server type the server name or address in the Path field as follo...

Page 255: ...ght need to provide special credentials for a network share or a storage node vault Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name...

Page 256: ...folders tree contains Local folders group to export data onto the hard drives that are local to the storage node Network folders group to export data to a network share If the network share requires a...

Page 257: ...FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer 6 8 Acronis Secure Zone Acronis Secur...

Page 258: ...your selection You will be able to set the exact zone size in the Acronis Secure Zone Size p 258 window 3 Click OK 6 8 1 2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slid...

Page 259: ...olume size Only when all volumes on the disk have 25 or less free space will the program continue decreasing the volumes proportionally As is apparent from the above setting the maximum possible zone...

Page 260: ...age click Decrease 2 Select volumes that will receive free space after the zone is decreased 3 Specify the new size of the zone by dragging the slider and selecting any size between the current and mi...

Page 261: ...system when it fails to boot boot the machine from a separate bootable rescue media use network boot from Acronis PXE Server or Microsoft Remote Installation Services RIS See the Bootable media p 261...

Page 262: ...D controllers or certain levels of RAID arrays only Media based on PE 2 x that is Windows Vista or Windows Server 2008 kernel allows for dynamic loading of the necessary device drivers 6 10 1 How to c...

Page 263: ...890 4932 81a5 5b50c657de08 DisplayLang en Automated Installation Kit AIK for Windows 7 PE 3 0 http www microsoft com downloads details aspx familyid 696DD665 9F76 4177 A811 39C26D3B3B34 displaylang en...

Page 264: ...f media to create You can create CD DVD or other bootable media such as removable USB flash drives if the hardware BIOS allows for boot from such media build an ISO image of a bootable disc to burn it...

Page 265: ...ly specified when creating the bootable media but you can remove this parameter while in the boot menu Without this parameter all startup messages will be displayed followed by a command prompt To sta...

Page 266: ...IC will be assigned the appropriate settings create the media on the server for which the media is customized When you select an existing NIC in the wizard window its settings are selected for saving...

Page 267: ...tly specify from the media This is necessary when the target hardware has a specific mass storage controller such as a SCSI RAID or Fiber Channel adapter for the hard disk For more information please...

Page 268: ...e Media Builder provides three methods of integrating Acronis Backup Recovery 10 with WinPE 2 x or 3 0 Adding the Acronis Plug in to the existing PE ISO This comes in handy when you have to add the pl...

Page 269: ...sword to access it 8 Check your settings in the summary screen and click Proceed 9 Burn the ISO to CD or DVD using a third party tool or copy to a flash drive Once a machine boots into WinPE Acronis B...

Page 270: ...onsole menu and specify one of the machine s IP addresses Provide the user name and password if these have been configured when creating the bootable media Local connection Acronis Backup Recovery 10...

Page 271: ...reate the bootable media with the appropriate mode number in our example vga 0x318 typed in the Kernel parameters window see the Bootable Media Builder p 263 section for details 6 10 3 2 Configuring i...

Page 272: ...s available in Linux based bootable media Linux based bootable media contains the following commands and command line utilities which you can use when running a command shell To start the command shel...

Page 273: ...adm and lvm utilities see Creating the volume structure manually p 274 6 10 5 1 Creating the volume structure automatically Let s assume that you saved p 47 the volume structure to the etc Acronis dir...

Page 274: ...ructure or if it is not present in the archive create the structure manually 6 10 5 2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical...

Page 275: ...d disks mounted on dev sda dev sdb dev sdc and dev sdd respectively The first and second pairs of hard disks are configured as two MD devices both in the RAID 1 configuration and are mounted on dev md...

Page 276: ...the backup from which you want to recover data 4 In Data type select Volumes 5 In Items to recover select the check box next to my_volgroup my_logvol 6 Under Where to recover click Change and then se...

Page 277: ...reduces the time required for booting multiple machines as compared to using physical bootable media Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder To uplo...

Page 278: ...ds make sure that the card supported by the BIOS has the network cable plugged in 6 10 6 3 PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine add to the...

Page 279: ...n account with administrator s rights Please take all necessary precautions p 279 to avoid possible data loss 6 11 1 Basic precautions To avoid any possible disk and volume structure damage or data lo...

Page 280: ...nsole toolbar after The current disk layout is for Click the OS name to select another operating system in the Operating System Selection window Under bootable media this window appears after clicking...

Page 281: ...the disk close them all 6 11 5 1 Disk initialization If you add any new disk to your machine Acronis Disk Director Lite will notice the configuration change and scan the added disk to include it to th...

Page 282: ...peration The program enables the user to select a disk if its size will be sufficient to hold all the data from the source disk without any loss If there is some data on the disk that was chosen as th...

Page 283: ...sk will lose their letters all paths will be invalid on the disk and programs won t find their files The operating system on that disk will be unbootable You have the following two alternatives to ret...

Page 284: ...lume If you plan to install an OS that does not support GPT disks the reverse conversion of the disk to MBR is also possible through the same menu items the name of the operation will be listed as Con...

Page 285: ...full and the size of its volumes cannot be decreased automatically the basic disk to dynamic conversion operation will fail Should you decide to revert your dynamic disks back to basic ones e g if you...

Page 286: ...erating system Dynamic to basic conversion of the disk comprising of system volumes takes a certain amount of time and any power loss unintentional turning off of the machine or accidental pressing of...

Page 287: ...ume and start again If you can not determine which applications use the volume close them all 6 11 6 1 Creating a volume You might need a new volume to Recover a previously saved backup copy in the ex...

Page 288: ...ntage remains inherent with the mirror architecture a low disk to volume size ratio RAID 5 A fault tolerant volume whose data is striped across an array of three or more disks The disks do not need to...

Page 289: ...te a Striped volume Select two or more destination disks to create the volume on To create a RAID 5 volume Select three destination disks to create the volume on After you choose the disks the wizard...

Page 290: ...ster size best suited to the volume with the chosen file system If you are creating a basic volume which can be made into a system volume this page will be different giving you the opportunity to sele...

Page 291: ...ill effectively cancel them 6 11 6 3 Set active volume If you have several primary volumes you must specify one to be the boot volume For this you can set a volume to become active A disk can have onl...

Page 292: ...ume label is an optional attribute It is a name assigned to a volume for easier recognition For example one volume could be called SYSTEM a volume with an operating system or PROGRAM an application vo...

Page 293: ...ome programs e g Setup programs might calculate its disk space incorrectly 6 11 7 Pending operations All operations which were prepared by the user in manual mode or with the aid of a wizard are consi...

Page 294: ...athers information about the machine to which the management console is connected and saves it to a file You may want to provide this file when contacting Acronis technical support This option is avai...

Page 295: ...t the top If there are no alerts or warnings at the moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer...

Page 296: ...en the Machines view with the list of machines filtered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is rec...

Page 297: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Page 298: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Page 299: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Page 300: ...s related to the selected policy Refresh a list of policies Click Refresh The management console will update the list of backup policies from the management server with the most recent information Tho...

Page 301: ...needs and preferences To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Clic...

Page 302: ...administrator checks its status A machine s status is defined as the most severe status of all backup plans p 186 both local and centralized existing on the machine and all backup policies p 298 appl...

Page 303: ...ations such as start stop tasks revoke policies explore the policy inheritance etc The panel is collapsed by default To expand the panel click the chevron The content of the panel is also duplicated i...

Page 304: ...lick Apply backup policy In the Policy selection window specify the backup policy you need to apply to the selected machine Grouping actions To Do Create a custom static or dynamic group Click Create...

Page 305: ...anaged machine Enables to administer a managed machine and perform all the direct management operations Other operations View detailed information on a machine Click View details In the Machine detail...

Page 306: ...nt Select the Save password check box to store the password for future connections 5 Click OK Initiating registration on the machine side The registration procedure can be initiated on the machine sid...

Page 307: ...the management server A registered machine has to be specified by its registration address that is you need to provide exactly the same host name fully qualified domain name FQDN or IP address as was...

Page 308: ...mechanism is used to operate on all the machines Importing machines from a text file To import machines from a file 1 In the Navigation tree select Physical machines or All physical machines 2 Click I...

Page 309: ...oon as the machine becomes available to the server Machine details Accumulates in four tabs all information on the selected machine Lets the management server administrator perform operations with the...

Page 310: ...n in Windows Backup policies Displays a list of backup policies applied to the selected machine and lets the management server administrator perform the following operations To Do View details of a po...

Page 311: ...og p 196 view containing the list of the task related log entries Run a plan task Backup plan Click Run In the Run Backup Plan p 193 window select the task you need to run Running the backup plan star...

Page 312: ...e to change the scheme to Grandfather Father Son or Tower of Hanoi 2 If the Tower of Hanoi scheme is used it is not possible to change the number of levels In all other cases the scheme can be changed...

Page 313: ...g on the machine with the most recent information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manu...

Page 314: ...p1 in the root contains Group2 to which the policy is applied directly Group2 in turn contains child Group3 that inherits the policy from the parent and applies the policy to Machine1 respectively The...

Page 315: ...window specify the backup policy you need to apply to the selected group If there are child groups in the selected group the backup policy will be applied to them as well View detailed information on...

Page 316: ...f the dynamic group Organizational unit p 317 All the machines belonging to the specified organizational unit OU will be members of the dynamic group IP address range All the machines whose IP address...

Page 317: ...d in the management server options the program will ask you to provide them The credentials will be saved in the Domain access credentials p 93 option For example suppose that the domain us corp examp...

Page 318: ...he same way as creating p 316 one Changing the type of group will result in its conversion Any custom group can be converted to a dynamic group if it was static and vice versa When converting a static...

Page 319: ...way as for the Backup policies view See the Filtering and sorting backup policies p 300 section for details Inheritance order The Inheritance order window lets you examine where the policy applied to...

Page 320: ...n the management server If the machine is already registered skip this step 4 The virtual machines hosted on the Hyper V server appear in the All virtual machines group Adding ESX ESXi virtual machine...

Page 321: ...ge vault Grouping of virtual machines The Virtual machines section of the navigation tree contains one built in group called All virtual machines You cannot modify this group manually delete or move i...

Page 322: ...and registered on the management server Virtual machines dynamically grouped by their hosts will appear on the management server and you will be able to apply backup policies to the virtual machines o...

Page 323: ...ation Centralized backup plans and recovery tasks originating from the management server will run under this account by default This means the account must have the necessary privileges on the vCenter...

Page 324: ...deployed to a storage shared by all the cluster s hosts Normally this is an NFS share or a SAN LUN attached to each of the hosts Let s assume that the cluster contains three servers Server 1 uses stor...

Page 325: ...f the pane is also duplicated in the Storage node details p 327 window Way of working with storage nodes typical workflow 1 Install the Acronis Backup Recovery 10 Storage Node 2 Create a user account...

Page 326: ...the compacting task schedule After deleting backups from deduplicating vaults either manually or during cleanup unreferenced data may appear in the deduplicating vaults and their databases The compact...

Page 327: ...e This information is also duplicated on the Information pane Storage node properties The tab displays the following information about the selected storage node Name the name of the machine where the...

Page 328: ...sk states p 187 and Task statuses p 188 sections Way of working with tasks Use the filtering and sorting p 330 capabilities to display the desired tasks in the table Select a task to take an action on...

Page 329: ...n you need to modify a task belonging to a local backup plan edit the backup plan A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan...

Page 330: ...w or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you want to be d...

Page 331: ...filters in the log table by yourself View Action Dashboard In the calendar right click on any highlighted date and then select View log The Log view will appear with the list of the log entries alread...

Page 332: ...ify whether to collect log events from the registered machines to the centralized log 7 1 7 2 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries To D...

Page 333: ...if any Task The task the event relates to if any Managed entity type Type of managed entity where the event has occurred if any Managed entity The name of the managed entity where the event has occur...

Page 334: ...tion as of the current time Reports about vaults statistics and task activities are interval based and provide historical information for the specified time interval that can last from days to years d...

Page 335: ...sort the table 7 1 8 2 Report about the backup policies In this view you can generate a report about the backup policies existing on the management server This report consists of one or more tables Fi...

Page 336: ...e report includes all backup plans from all machines Report view Under Report view choose how the report will look Select whether to show all items in a single table or to group them by a particular c...

Page 337: ...the archives Creation time The period within which the newest backup was created in each of the archives Occupied space The limits for the space occupied by each of the archives Data backed up The li...

Page 338: ...ed with warnings and Failed Report coverage Under Report coverage choose the time interval for which you want to generate the report Filters Under Filters choose which tasks to include in the report O...

Page 339: ...and then click the Advanced tab 2 Select the Allow active content to run files on My Computer check box under Security 3 Click OK in Mozilla Firefox 1 On the Options menu click Content 2 Make sure tha...

Page 340: ...settings Through the Microsoft Group Policy mechanism the template policy settings can be applied to a single computer as well as to a domain To load the Acronis Administrative Template 1 Run Windows...

Page 341: ...Limit parameter determines the maximum number of such connections that the storage node can handle simultaneously When this limit is reached the storage node will use the backup queue see the next par...

Page 342: ...number between 0 and 100 Default value 10 The total size of a vault is the vault s free space plus the size of all archives that are contained in the vault For example suppose that two vaults Vault A...

Page 343: ...an error is recorded in the storage node s log and any backup to the vault becomes prohibited Possible values Any integer number between 0 and 2147483647 Default value 10 If the amount of free space o...

Page 344: ...record Acronis Backup Recovery 10 Management Server s events into the Application event log in Windows This parameter has two settings Trace State Description Specifies whether to record Acronis Backu...

Page 345: ...ections to keep Possible values Any integer number between 1 and 500 Default value 200 If the total number of online registered machines does not exceed the value in Maximum Connections connections to...

Page 346: ...alues Any integer number between 15 and 2147483647 Default value 15 This parameter is analogous to the Period parameter described previously Real Time Monitoring Description Specifies whether to perfo...

Page 347: ...urther attempt until reaching the value specified in Offline Period Threshold If the machine comes back online the time interval becomes normal again This approach aims at efficient use of the managem...

Page 348: ...strative Template Licensing Specifies how often the agent checks its license on the license server and how long it can work without a license server License Check Interval in days Description Specifie...

Page 349: ...License Server Possible values Any string 0 to 32765 characters long Default value Empty string Log Cleanup Rules Specifies how to clean up the agent log This parameter has the following settings Max...

Page 350: ...on Specifies the community name for the SNMP notifications Possible values Any string 0 to 32765 characters long Default value public Backup Specifies the location and initial size of the snapshot sto...

Page 351: ...available space minus 50 MB Without the snapshot storage taking snapshots is still possible The size of the snapshot storage does not affect the size of the backup 7 2 1 5 Acronis Backup Recovery 10...

Page 352: ...eep this check box selected unless you have a Public Key Infrastructure PKI in your environment In Use Agent Certificate Authentication select one of the following Do not use The use of SSL certificat...

Page 353: ...nection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured Event tracing parameters In Windows the events occurring in Acr...

Page 354: ...talled will participate in the Customer Experience Program Select one of the following Not Configured By default the machine does not participate in the Customer Experience Program Enabled In Enable s...

Page 355: ...eter applies separately to disk level and file level backups So compacting may be performed for one data store and skipped for the other Parameters related to vault databases The following two paramet...

Page 356: ...policy A conscious name lets you identify the policy among the others Source type Select the type of items to back up Disk volumes or Files Policy credentials p 358 Optional You can change the policy...

Page 357: ...randfather Father Son and Tower of Hanoi create a custom backup scheme or back up data once Archive validation When to validate Optional Define when and how often to perform validation and whether to...

Page 358: ...erver or the folder to place the virtual machine files in Resultant VMs Specify a name for the virtual machines to be created The default name consists of variables that reflect the policy name and th...

Page 359: ...type it manually To add another rule click the next empty line and select the rule from the list or type it manually The program remembers the rules typed manually and the next time you open the wind...

Page 360: ...CSI hard disk drive For more details see Note on Linux machines below First partition on the first software RAID hard disk of a Linux machine Type or select dev md1 md1 is the standard device name for...

Page 361: ...possible to set up a policy to back up volume C on Windows machines and partition dev hda1 on Linux machines Unlike Windows there is no clear distinction between a volume partition and a folder direc...

Page 362: ...of which belong to the volume group vg_mymachine specify the following selection rules dev vg_mymachine lv_root dev vg_mymachine lv_bin To see the list of logical volumes on a machine run the lvdispl...

Page 363: ...NDIR Points to the folder where Windows is located for example C Windows Common data for all user profiles ALLUSERSPROFILE Points to the folder where the common data of all user profiles is located ty...

Page 364: ...name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK 7 3 4 Exclusions Set up exclusions...

Page 365: ...e letter add a backslash to the folder name in the criterion for example C Finance Exclusion examples Criterion Example Description Windows and Linux By name F log F Excludes all files named F log Exc...

Page 366: ...opper using a packet sniffer Store each machine s archive in the specified folder on the machine Enter the full path to the folder in the Path field This path will be created on each machine the polic...

Page 367: ...t the user name and password can be intercepted by an eavesdropper using a packet sniffer 7 3 7 Backup scheme selection Choose one of the available backup schemes Back up now to create a backup task f...

Page 368: ...f there is no full backup in the archive a full backup will be created regardless of your selection Date and time Specify when to start the backup The task will be started manually Select this check b...

Page 369: ...y workday except Friday which is left for weekly and monthly backups Monthly backups run every fourth Friday and weekly backups run on all other Fridays Monthly Grandfather backups are full Weekly Fat...

Page 370: ...ght see a weekly or a monthly backup remain in the archive for a few days past its expected expiration date If the schedule starts with a daily or a weekly backup a full backup is created instead Exam...

Page 371: ...to recover a previous version of a damaged file from a daily backup as well as 10 day access to weekly backups Each monthly full backup will be available for six months since the creation date Work sc...

Page 372: ...ce Up to 16 levels of full differential and incremental backups Next level backups are twice as rare as previous level backups One backup of each level is stored at a time Higher density of more recen...

Page 373: ...ackups accumulate toward the current time Having four backups we could recover data as of today yesterday half a week or a week ago Roll back period The number of days we can go back in the archive is...

Page 374: ...s Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup For example the full backup can be set up to run every Sunday at 1 00 AM as soon as all u...

Page 375: ...ules p 41 For example the cleanup procedure can be set up to run after each backup and also on schedule This option is available only if you have set at least one retention rule in Retention rules Cle...

Page 376: ...heduled at 9 00 PM may actually start later as soon as the backup location becomes available Likewise backup tasks for incremental and differential backups will wait until all users are logged off and...

Page 377: ...ails 7 3 8 Archive validation Set up the validation task to check if the backed up data is recoverable If the backup could not pass the validation successfully the validation task fails and the backup...

Page 378: ...Storage To use this service you need to buy a subscription that determines the amount of storage space reserved for your backups storage quota and how long the online service will be available to you...

Page 379: ...cronis software onto the virtualization host This approach comes in handy when the virtualization product installed on the host server is VMware ESX i or Windows Server 2008 with Hyper V or Microsoft...

Page 380: ...available only for online storage is Initial seeding This is the Back up now scheme using local destination and full backup method To use this scheme you need a license for the Initial Seeding p 381 s...

Page 381: ...ore the machine is not able to back up to the subscription it used before recovery This happens regardless of recovery to new or to different hardware To continue backing up the machine to the same su...

Page 382: ...one per machine 8 1 7 7 How to buy an Initial Seeding license You can buy an Initial Seeding license from an Acronis partner or in Acronis online store Follow the link www acronis eu my backup recove...

Page 383: ...kup plan to do incremental backups In Backup scheme select Back up now Back up later for manual backups or Simple for scheduled backups For Simple specify the schedule and optionally the retention rul...

Page 384: ...company s web site prepare and print two prepaid shipping labels 1 Shipping label for sending your hard drive This label is placed on the top of the box You should send your package to one of the Acr...

Page 385: ...the license cannot be used for any other machine From this point on you can cancel the order if something goes wrong This will return the license to the pool of available licenses A full backup has st...

Page 386: ...these issues Occasional The order has been cancelled The order had been cancelled before the media was shipped so returning the media is not required Occasional The order has been cancelled The media...

Page 387: ...le on the Initial Seeding Recovery tab A license purchased in Acronis online store becomes available immediately after the payment is processed 8 1 8 8 How do I track a Large Scale Recovery order stat...

Page 388: ...ate online backup subscriptions in the Actions menu 2 Click Go to account management Web page 3 Log in to your account create one if you are not registered yet 8 1 9 2 Where do I find the subscription...

Page 389: ...on appears in the Next subscription column for the selected machine Renewing a number of activated subscriptions at once This operation is possible if the appropriate number of new subscriptions are i...

Page 390: ...des come with the purchase confirmation e mail Next install Acronis software if not yet installed and assign p 391 each subscription to a machine The subscriptions become activated After that you can...

Page 391: ...long with paid ones The same expiration rules apply to trial and paid subscriptions To continue using the service after the trial subscription expires buy the same type subscription and renew the tria...

Page 392: ...ther machine You reinstalled Acronis Backup Recovery 10 on a machine and want to resume its online backups You recovered a machine to bare metal or to a state when it did not yet have an activated sub...

Page 393: ...have the following options Before reassigning Delete backups from Subscription 1 using Machine 1 if it is available and turned on Delete backups from Subscription 2 using Machine 2 After reassigning...

Page 394: ...please refer to the context sensitive help 8 6 Limitations of the online storage Unlike other types of storage available in Acronis Backup Recovery 10 the online storage has the following limitations...

Page 395: ...od does not start counting down until the subscription is activated Assigned subscription A subscription that has been assigned to a machine Available subscription A subscription that is not assigned...

Page 396: ...ption Assign a subscription that has the same storage quota as the current activated subscription This subscription will become activated as soon as the current subscription expires Storage quota The...

Page 397: ...secure volume for storing backup archives p 398 within a managed machine p 406 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost effective and handy...

Page 398: ...gle backup operation p 398 Physically it is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TI...

Page 399: ...immediately after its creation this is a validation rule protect the archive with a password this is an option Physically a backup plan is a bundle of tasks p 409 configured for execution on a managed...

Page 400: ...ent is based on Linux kernel A machine p 406 can be booted into a bootable agent using either bootable media p 400 or Acronis PXE Server Operations can be configured and controlled either locally thro...

Page 401: ...p 408 monitoring activities of the Acronis Backup Recovery 10 components viewing the centralized log and more Centralized task A task p 409 belonging to a centralized backup plan p 401 Such task appea...

Page 402: ...subsequent backups p 398 belonging to the same archive p 398 into a single backup Consolidation might be needed when deleting backups either manually or during cleanup p 401 For example the retention...

Page 403: ...overy 10 provides an option to take a raw image that is copy all the disk sectors which enables imaging of unsupported file systems Disk group A number of dynamic disks p 404 that store the common con...

Page 404: ...Reserved Partition MSR Disk 1 MBR LDM database 1 MB Disk 2 Protec tive MBR GPT Microsoft Reserved Partition MSR LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR Disk 1 and...

Page 405: ...enerated key with a user defined size of 128 192 or 256 bits The encryption key is then encrypted with AES 256 using a SHA 256 hash of the password as a key The password itself is not stored anywhere...

Page 406: ...ntal backup A backup p 398 that stores changes to the data against the latest backup You need access to other backups from the same archive p 398 to restore data from an incremental backup L Local bac...

Page 407: ...thin the enterprise network Acronis Backup Recovery 10 Management Server provides the administrator with a single entry point to the Acronis Backup Recovery 10 infrastructure an easy way to protect da...

Page 408: ...twork attackers from establishing a fake connection on behalf of a trusted principal the management server S Selection rule A part of the backup policy p 399 Enables the management server p 407 admini...

Page 409: ...etention rules set by Backup plan Backup plan Storage node side validation Validation p 410 performed by a storage node p 408 according to the backup plans p 399 that produce the archives p 398 stored...

Page 410: ...n The previous product versions considered a file backup valid when the metadata contained in its header was consistent The current method is time consuming but much more reliable Validation of a volu...

Page 411: ...hines is installed on that server W WinPE Windows Preinstallation Environment A minimal Windows system based on any of the following kernels Windows XP Professional with Service Pack 2 PE 1 5 Windows...

Reviews: