background image

 

 

Universal Restore (Acronis Backup & Recovery Server OEM Universal 

Restore) 

The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual 
machine. The Universal Restore handles differences in devices that are critical for the operating 
system start-up, such as storage controllers, motherboard or chipset. 

The Universal Restore is not available: 

when the machine is booted with Acronis Startup Recovery Manager (p. 146) (using F11), because 
these features are primarily meant for instant data recovery on the same machine. 

 

 

Unmanaged vault 

Any vault (p. 152) that is not a managed vault. 

Validation 

An operation that checks the possibility of data recovery from a backup (p. 147). 

Validation of a file backup imitates recovery of all files from the backup to a dummy destination. The 
previous product versions considered a file backup valid when the metadata contained in its header 
was consistent. The current method is time-consuming but much more reliable. Validation of a 
volume backup calculates a checksum for every data block saved in the backup. This procedure is 
also resource-intensive. 

While the successful validation means a high probability of successful recovery, it does not check all 
factors that influence the recovery process. If you back up the operating system, only a test recovery 
under the bootable media to a spare hard drive can guarantee successful recovery in the future. 

Validation rules 

A part of the backup plan. Rules that define when and how often to perform validation (p. 152) and 
whether to validate the entire archive or the latest backup in the archive. 

Vault 

A place for storing backup archives. A vault can be organized on a local or networked drive or 
detachable media, such as an external USB drive. There are no settings for limiting a vault size or the 
number of backups in a vault. You can limit the size of each archive using cleanup, but the total size 
of archives stored in the vault is limited by the storage size only. 

WinPE (Windows Preinstallation Environment) 

A minimal Windows system based on any of the following kernels: 

Summary of Contents for Backup & Recovery Server OEM

Page 1: ...User s Guide...

Page 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Page 3: ...2 6 Tape support 24 2 6 1 Using a single tape drive 24 2 7 Proprietary Acronis technologies 25 2 7 1 Acronis Startup Recovery Manager 25 2 7 2 Universal Restore Acronis Backup Recovery Server OEM Univ...

Page 4: ...3 9 Universal Restore 90 5 3 10 Bootability troubleshooting 91 5 4 Validating vaults archives and backups 92 5 4 1 Task credentials 93 5 4 2 Archive selection 93 5 4 3 Backup selection 94 5 4 4 Locat...

Page 5: ...dows 122 6 1 Agent for Windows command line utility 122 6 1 1 Supported commands 122 6 1 2 Common options 126 6 1 3 Specific options 129 6 1 4 trueimagecmd exe usage examples 138 6 2 Scripting 143 6 2...

Page 6: ...Start the console Windows Start the console by selecting it from the start menu 3 Connect the console to the machine where the agent is installed Where to go from here For what to do next see Basic co...

Page 7: ...policies tasks and perform other operations Displays the different views and action pages p 10 depending on items selected in the menu Navigation tree or on the Actions and Tools pane Menu bar Appears...

Page 8: ...hines in demand by adding them as shortcuts To add a shortcut to a machine 1 Connect the console to a managed machine 2 In the navigation tree right click the machine s name a root element of the navi...

Page 9: ...for all views Clicking the operation opens the respective action page see the Action pages section All the actions can also be accessed in the Actions menu Actions bar on a managed machine Tools Conta...

Page 10: ...o change the panes borders 1 Point to the pane s border 2 When the pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the panes borders...

Page 11: ...em There are several ways of performing the same action on selected items By clicking the buttons on the table toolbar By clicking in the items in the Item s name Actions bar on the Actions and Tools...

Page 12: ...he respective Change links to the right Others are selected from the drop down list or typed manually in the page s fields Action page Controls Acronis Backup Recovery Server OEM remembers the changes...

Page 13: ...table media builder you can create bootable media in order to use the agents and other rescue utilities in a rescue environment Availability of the agent add ons in a rescue environment depends on whe...

Page 14: ...Preinstallation Environment The Universal Restore p 14 add on enables you to create bootable media with the restore to dissimilar hardware functionality Universal Restore handles differences in devic...

Page 15: ...e Item Minimum requirements Recommended Computer processor Modern processor 800 MHz or faster Itanium platforms are not supported 1 GHz 32 bit x86 or 64 bit x64 processor System memory 128 MB 512 MB o...

Page 16: ...plan To do so you have to specify at the very least the data to be protected and the location where the backup archive will be stored This will create a minimal backup plan consisting of one task p 15...

Page 17: ...The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Page 18: ...the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment Examples of excepti...

Page 19: ...ure a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery Server OEM Recovery using bootable media Recovery over a volume locked by the o...

Page 20: ...ts specific role according to its advantages A competent backup scheme will benefit from the advantages of all backup methods and lessen the influence of all the methods shortcomings Full backup A ful...

Page 21: ...so can View and manage backup plans and tasks owned by any user on the machine 2 4 Owners and credentials This section explains the concept of owner and the meaning of a backup plan s or task s creden...

Page 22: ...ect the Advanced view check box 2 Select General Plan s Task credentials Change 3 Enter the credentials under which the plan task will run Scheduled or postponed start The plan task credentials are ma...

Page 23: ...covered The unallocated space size has to be enough to accommodate the backup content The way unallocated space is distributed among the disks is also important Example Striped volumes consume equal p...

Page 24: ...nis Backup Recovery Server OEM includes a handy disk management utility which enables you to perform the above operations both under the operating system and on bare metal To find out more about Acron...

Page 25: ...ble locations and then select the backup After recovery is started you will be prompted for other tapes if the tapes are needed for recovery 2 7 Proprietary Acronis technologies This section describes...

Page 26: ...only for Plug and Play devices sound cards network adapters video cards etc As for system Hardware Abstraction Layer HAL and mass storage device drivers they must be identical on the source and the t...

Page 27: ...p the security identifier SID and user profile settings in order to run the system immediately after recovery without re joining the domain or re mapping network user profiles If you are going to chan...

Page 28: ...option defines whether to display the pop up messages about task run results successful completion failure or success with warnings When displaying of pop up messages is disabled you can review the t...

Page 29: ...n the default backup and recovery options when creating a backup plan or a recovery task The settings you obtain in this case will be plan specific or task specific 3 2 1 1 Windows event log This opti...

Page 30: ...Recovery Server OEM please see Support for SNMP The preset is Disabled To set up sending SNMP messages Select the Send messages to SNMP server check box Specify the appropriate options as follows Typ...

Page 31: ...g entries You can select the amount of log entries to retain The default 95 setting will keep most of the log With the minimum 1 setting the log will be nearly cleared 3 3 Default backup and recovery...

Page 32: ...write data on a tape without prompting user for confirmation Dest Tape Dest Tape Dismount media after backup is finished Dest removable media Dest removable media Ask for first media while creating ba...

Page 33: ...ot support interactive commands i e commands that require user input for example pause To specify pre post commands 1 Enable pre post commands execution by checking the following options Execute befor...

Page 34: ...box In case the command execution fails the program will remove the resulting TIB file and temporary files if possible and the task will fail When the check box is not selected the command execution...

Page 35: ...mands that require user input for example pause 2 In the Working directory field specify a path to a directory where the command batch file will be executed 3 In the Arguments field specify the comman...

Page 36: ...volume snapshot This option is effective only for Windows operating systems This option applies to disk level backup The option determines whether to take snapshots of multiple volumes at the same tim...

Page 37: ...olume shadow copy writers for those applications are turned on by examining the list of writers that are present in the operating system To view this list run the following command vssadmin list write...

Page 38: ...wing Low to minimize resources taken by the backup process leaving more resources to other processes running on the machine Normal to run the backup process with normal speed allocating resources on a...

Page 39: ...ows operating systems This option is not available when operating under the bootable media The option enables you to receive e mail notifications about the backup task s successful completion failure...

Page 40: ...s on the receiving machine This option is not available when operating under bootable media The option enables you to receive WinPopup notifications about the backup task s successful completion failu...

Page 41: ...Log Specify the types of events to be logged All events log all events information warnings and errors Errors and warnings Errors only Do not log to disable logging events of the backup operations in...

Page 42: ...ll be created if the destination disk s file system allows the estimated file size The backup will automatically be split into several files if the destination disk s file system does not allow the es...

Page 43: ...ed number of attempts is performed depending on which comes first For example if the backup destination on the network becomes unavailable or not reachable the program will attempt to reach the destin...

Page 44: ...iency of both the whole tape library and each tape If you are not forced to modify these options by some specific needs leave them unchanged An archive can occupy several tapes In such cases a so call...

Page 45: ...tached tape device the program will warn that you are about to lose data on the tape To disable this warning select this check box Dismount media after backup has finished This option is effective in...

Page 46: ...The set of available recovery options depends on The environment the agent operates in Windows bootable media The type of data being recovered disk The operating system being recovered from the disk...

Page 47: ...nd will not be executed if the recovery proceeds with reboot To specify pre post commands 1 Enable pre post commands execution by checking the following options Execute before the recovery Execute aft...

Page 48: ...and execution fails check box In case the command execution fails the task run result will be set to Failed When the check box is not selected the command execution result does not affect the task exe...

Page 49: ...to receive e mail notifications about the backup task s successful completion failure or need for interaction along with the full log of the task The preset is Disabled To configure e mail notificati...

Page 50: ...rating under bootable media The option enables you to receive WinPopup notifications about the backup task s successful completion failure or need for interaction The preset is Disabled Before configu...

Page 51: ...nt Log Specify the types of events to be logged All events log all events information warnings and errors Errors and warnings Errors only Do not log to disable logging events of the recovery operation...

Page 52: ...rogram will automatically handle situations requiring user interaction where possible If an operation cannot continue without user interaction it will fail Details of the operation including errors if...

Page 53: ...f it is required for recovery Such might be the case when a volume locked by the operating system has to be recovered Reboot machine after recovery This option is effective when operating under bootab...

Page 54: ...chive and backup deletion can be performed without creating vaults The operation of creating a vault results in adding the vault name to the Vaults section of the Navigation pane Personal vaults A vau...

Page 55: ...rsonal vault See the Actions on personal vaults section for details Pie chart with legend The pie chart lets you estimate the vault s load it shows the proportion of the vault s free space and occupie...

Page 56: ...he procedure of creating personal vaults is described in depth in the Creating a personal vault p 57 section Edit a vault 1 Select the vault 2 Click Edit The Edit personal vault page lets you edit the...

Page 57: ...ult How can I merge two vaults Suppose you have two vaults A and B in use Both vaults are used by backup plans You decide to leave only vault B moving all the archives from vault A there To do this pr...

Page 58: ...s described below are performed by clicking the corresponding buttons on the toolbar These operations can be also accessed from the Backup name actions bar on the Actions and tools pane and from the B...

Page 59: ...le To Do Sort backup archives by any column Click the column s header to sort the archives in ascending order Click it once again to sort the archives in descending order Filter archives by name owner...

Page 60: ...erver at the start and then every 1 5 days the default is 1 day as specified by the agent configuration parameters If the license check does not succeed for 1 60 days as specified by the agent configu...

Page 61: ...t be lost or the server might be unavailable and the machine is not centrally managed as a result Activities The calendar lets you explore the history of the Acronis Backup Recovery Server OEM agent s...

Page 62: ...te of the plan s tasks The status of a backup plan helps you to estimate whether the data is successfully protected A task is a set of sequential actions to be performed on a machine when a certain ti...

Page 63: ...uled plan or plans It makes sense to edit the plan in this case 4 Stopping At least one task is stopping Otherwise see 5 No action is required 5 Idle All the tasks are idle No action is required Task...

Page 64: ...om the queue Task state diagram Task statuses A task can have one of the following statuses Error Warning OK A task status is derived from the result of the last run of the task Status How it is deter...

Page 65: ...In the Task Details window review the task details View plan s task s log Backup plan Click View log You will be taken to the Log p 71 view containing the list of the plan related log entries Task Cli...

Page 66: ...eated remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unallocated you will get the s...

Page 67: ...running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by other users Task Click Edit Why can t I ed...

Page 68: ...he most recent information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manual refresh guarantees t...

Page 69: ...p plans that use custom backup schemes only To disable a backup plan 1 Click Edit 2 Enter the backup scheme scheduling option and disable the schedule for the desired period by changing the Start date...

Page 70: ...sk is running It is common for all types of tasks The tab provides information about task progress elapsed time and other parameters Backup plan details The Backup plan details window also duplicated...

Page 71: ...ollapsed by default To expand the panel click the chevron The content of the panel is also duplicated in the Log entry details p 73 window Opening the Log with pre filtered log entries Having selected...

Page 72: ...network share As a result the log entries of that list will be saved Delete all the log entries Click Clear Log All the log entries will be deleted from the log and a new log entry will be created It...

Page 73: ...ins the following data fields Type type of event Error Warning Information Date date and time of the event occurrence Backup plan the backup plan the event relates to if any Task the task the event re...

Page 74: ...data type specified previously Access credentials p 76 Optional Provide credentials for the source data if the plan s account does not have access permissions to the data To access this option select...

Page 75: ...task has to run regardless of users being logged on In case you have not explicitly specified the credentials under which the task s will run the program proposes using your account Enter your passwor...

Page 76: ...kup size and speeds up the backup and recovery operations Windows The swap file pagefile sys and the file that keeps the RAM content when the machine goes into hibernation hiberfil sys are not backed...

Page 77: ...n each location you select While you are reviewing the location content archives can be added deleted or modified by another user or by the program itself according to scheduled operations Use the Ref...

Page 78: ...tion You might need to provide special credentials for a network share Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Usern...

Page 79: ...he retention period for the backups 5 2 8 4 Custom backup scheme At a glance Custom schedule and conditions for backups of each type Custom schedule and retention rules Parameters Parameter Meaning Fu...

Page 80: ...backup are left empty All backups in the archive are kept indefinitely no archive cleanup is performed 5 2 9 Archive validation Set up the validation task to check if the backed up data is recoverable...

Page 81: ...management operations on the target hardware both under the operating system and on bare metal To find out more about Acronis Disk Director LV see the Disk management section To create a recovery task...

Page 82: ...To access this option select the Advanced view check box Recovery options Settings Optional Customize the recovery operation by configuring the recovery options such as pre post recovery commands rec...

Page 83: ...t the required networked machine and then click the shared folder If the network share requires access credentials the program will ask for them To select FTP or SFTP server expand the corresponding g...

Page 84: ...ion layout Acronis Backup Recovery Server OEM automatically updates Windows loaders after recovery so there is no need to recover the MBR and Track 0 for Windows systems unless the MBR is damaged 5 3...

Page 85: ...d The selected disks will be recovered to the physical disks of the machine the console is connected to On selecting this you proceed to the regular disk mapping procedure described below Disk Disk MO...

Page 86: ...sons Acronis Backup Recovery Server OEM creates scheduled tasks using the signature of the source hard disk If you recover the same disk signature you don t need to re create or edit the tasks created...

Page 87: ...to be reduced first Tip A volume cannot be resized when being recovered from a backup split into multiple removable media To be able to resize the volume copy all parts of the backup to a single locat...

Page 88: ...es that are inaccessible to Windows such as to those other than FAT and NTFS 5 3 6 3 File destination To specify a destination 1 Select a location to recover the backed up files to Original location f...

Page 89: ...existing file this will give the file on the hard disk priority over the file in the backup 5 3 7 Access credentials for destination To specify credentials 1 Select one of the following Use the task c...

Page 90: ...media with the necessary drivers and the necessary network configuration for each of your servers Or you can simply specify the path to the repository every time Universal Restore is used Universal R...

Page 91: ...ing system resides The system was recovered on dissimilar hardware and the new hardware is incompatible with the most critical drivers included in the backup Solution for Windows Recover the volume on...

Page 92: ...onment to a spare hard drive can guarantee success of the recovery At least ensure that the backup can be successfully validated using the bootable media Different ways to create a validation task Usi...

Page 93: ...ask creation Use the following credentials The task will always run under the credentials you specify whether started manually or executed on schedule Specify User name When entering the name of an Ac...

Page 94: ...lect the desired location in the folders tree To select a personal vault expand the Personal group and click the appropriate vault To select a local folder CD DVD drive or locally attached tape device...

Page 95: ...alidation to the managed machine s off peak period On the other hand if you prefer to be immediately informed whether the data is not corrupted and can be successfully recovered consider starting vali...

Page 96: ...equired folder To select a network share expand the Network folders group select the required networked machine and then click the shared folder If the network share requires access credentials the pr...

Page 97: ...4 Volume selection Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows 1 Select the check box for each volume you need to mount 2 Click on th...

Page 98: ...utility by pressing F11 or by selecting it from the menu respectively The system disk should have at least 70 MB of free space to activate Acronis Startup Recovery Manager Unless you use the GRUB boo...

Page 99: ...llows for dynamic loading of the necessary device drivers 5 8 1 How to create bootable media To enable creating physical media the machine must have a CD DVD recording drive or allow a flash drive to...

Page 100: ...t PE image with Acronis Plug in using the Bart PE Builder Please refer to Building Bart PE with Acronis Plug in from Windows distribution p 102 for details 5 8 1 1 Adding the Acronis Plug in to WinPE...

Page 101: ...When creating a new PE ISO Select Create Windows PE 2 x or 3 0 automatically The software runs the appropriate script and proceeds to the next window When adding the plug in to the existing PE ISO Se...

Page 102: ...nd check whether the Acronis Backup Recovery Server OEM plug in is enabled Enable if disabled 10 Specify the output folder and the full path to the resulting ISO file including the file name or the me...

Page 103: ...locally attached devices On the network an iSCSI device is identified by its IP address and an NDAS device is identified by its device ID An iSCSI device is sometimes called an iSCSI target A hardware...

Page 104: ...covery or if you are recovering the volumes to a different machine make sure that the new disk configuration includes enough disks whose sizes are at least those of the original disks To create the vo...

Page 105: ...ironment so you need to use the lvm utility with a corresponding command lvm pvcreate lvm vgcreate etc 5 Return to the management console by pressing CTRL ALT F1 or by running the command bin product...

Page 106: ...ALT F1 to return to the management console Step 2 Starting the recovery 1 In the management console click Recover 2 In Archive click Change and then specify the name of the archive 3 In Backup click C...

Page 107: ...eing reassured that your data is safe Acronis Backup Recovery Server OEM is an extremely effective comprehensive data backup and recovery solution It creates a data or disk backup copy stored in a com...

Page 108: ...lect 5 9 5 Disk management view Acronis Disk Director Lite is controlled through the Disk management view of the console The top part of the view contains a disks and volumes table enabling data sorti...

Page 109: ...alized or possibly has a file structure unknown to the machine system that means that no programs can be installed on it and you will not be able to store any files there Acronis Disk Director Lite wi...

Page 110: ...the disk that was chosen as the target the user will receive a warning The selected target disk is not empty The data on its volumes will be overwritten meaning that all the data currently located on...

Page 111: ...l be unbootable You have the following two alternatives to retain system bootability on the target disk volume 1 Copy NT signature to provide the target disk with the source disk NT signature matched...

Page 112: ...gh the same menu items the name of the operation will be listed as Convert to MBR Dynamic disk conversion MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynami...

Page 113: ...ks using the same menu items though the operation now will be named Convert to basic System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynami...

Page 114: ...n bootability loss In contrast to Windows Disk Manager the program ensures safe conversion of a dynamic disk to basic when it contains volumes with data for simple and mirrored volumes in multiboot sy...

Page 115: ...ing system or swap file on a new volume Add new hardware to a machine In Acronis Disk Director Lite the tool for creating volumes is the Create volume Wizard Types of dynamic volumes Simple Volume A v...

Page 116: ...riped across the disk array And it is always stored on a different disk than the data itself If a physical disk fails the portion of the RAID 5 volume that was on that failed disk can be re created fr...

Page 117: ...f the volume type you have previously decided upon If you are creating a dynamic volume and select one or several basic disks as its destination you will receive a warning that the selected disk will...

Page 118: ...operating system on this volume to boot at machine startup If the Primary button is not selected the Active option will be inactive If the volume is intended for data storage select Logical A Basic di...

Page 119: ...evious active volume will have to be set passive first By clicking OK in the Warning window you ll add the pending operation of setting active volume Please note even if you have the Operating System...

Page 120: ...K button will be disabled You will have to use only supported characters to proceed with changing the volume label To finish the added operation you will have to commit it Exiting the program without...

Page 121: ...t also be launched from the Disk management menu of the console All planned operations are added to the pending operation list The Undo action lets you undo the latest operation in the list While the...

Page 122: ...ed a console interface in some situations Acronis Backup Recovery Server OEM supports this mode with trueimagecmd exe utility The file is located in the folder where Acronis Backup Recovery Server OEM...

Page 123: ...ition size in sectors fat16_32 type active primary logical preserve_mbr deploy_mbr Restores the MBR from a disk or partition image vault path arc archive name arc_id archive id filename file name pass...

Page 124: ...sword password progress on off log file name log_net_user remote user log_net_password password net_src_user username net_src_password password ftp_src_user username ftp_src_password password target_v...

Page 125: ...Displays the Acronis Secure Zone size free space and contents password password asz_files Displays the Acronis Secure Zone size free space and contents using the generated file names password password...

Page 126: ...erverA Folder1 CD DVD with the path specified as a local path e g vault F Acronis Secure Zone e g vault atis asz Tapes e g vault atis tape 0 Unmanaged vaults are specified by their path For example if...

Page 127: ...default latest increment Selects a backup in a sequence of incremental backups inside the archive To get a backup index from the ASZ use asz_content include_pits pits numbers Specifies the backups pit...

Page 128: ...on if required and after the operation is completed Use this option when performing any operation that requires a reboot recovering a system disk creating Acronis Secure Zone on a system disk cloning...

Page 129: ...er Specifies the hard disks to include into the image file The list of available hard disks is provided by the list command An image may contain data of more than one hard disk In that case separate d...

Page 130: ...to be excluded from the backup Use the common Windows masking rules For example to exclude all files with extension exe add exe My exe will exclude all exe files with names consisting of five symbols...

Page 131: ...DYN e g partition DYN1 target_harddisk disk number Specifies the hard disk number where the image will be restored By specifying target_harddisk DYN you will select unallocated space on all dynamic di...

Page 132: ...be set logical if the target disk is not the 1st the restored partition will be set logical preserve_mbr When restoring a partition over an existing one the target partition is deleted from the disk a...

Page 133: ...e as in the archive older this will give priority to the most recent file modification whether it be in the archive or on the disk never this will give the file on the hard disk unconditional priority...

Page 134: ...user username Specifies the user name for logon to the FTP SFTP server to access the source archive ftp_src_password password Specifies the password for logon to the FTP SFTP server to access the sour...

Page 135: ...rt by numbers For each disk a separate virtual disk will be created By specifying harddisk DYN you will convert all dynamic volumes that are present in the system vm_type vmware esx Microsoft parallel...

Page 136: ...D that are used with the arc_id option The following locations are supported Local folders e g vault C Test or vault C Test 1 Network folders e g vault ServerA Share Managed vaults for advanced produc...

Page 137: ...or Acronis Secure Zone size ASZ size in sectors unallocated Sets the Acronis Secure Zone size in sectors If not specified the size is set as an average between the maximal unallocated space plus free...

Page 138: ...sk 2 reboot raw incremental compression 5 split 640 progress off The image will be saved to C Test folder protected with password qwerty split into 640 MB parts and contain all cluster data Image comp...

Page 139: ...otected with password pswd trueimagecmd deploy_mbr harddisk 1 asz 2 index 3 password pswd The following command will restore the MBR from the image of hard disk 1 to hard disk 2 The image is contained...

Page 140: ...o the new archive Archive 2 on the FTP server Server22 Vault3 trueimagecmd export vault D Backups arc Archive 1 include_pits 2 4 5 target_vault ftp Server22 Vault3 target_arc Archive 2 ftp_user user f...

Page 141: ...imagecmd asz_content Assume that the contents of Acronis Secure Zone are as follows C Program Files Acronis BackupAndRecovery trueimagecmd asz_content ASZ size 34 439 GB ASZ free space 34 409 GB ARCHI...

Page 142: ...ive AAA2 2 stands for the number of backups in the archive consists of full base image backup created on incremental backup created on 2 16 2009 at 3 43 4 25 2009 at 11 44 Archive FAAA F means that th...

Page 143: ...lone harddisk 2 target_harddisk 3 6 1 4 14 Explore image The following command will connect all images stored in file mybackup tib on the network drive as virtual drives trueimagecmd explore filename...

Page 144: ...urce disk 2 6 2 2 2 Target Specifies the name and the location of an image file e g target file E Mybackup2 tib username username password password username and password parameters are optional They a...

Page 145: ...plit into 650 MB parts for recording to CD R RW media Password protection will also be added The entire script must be located between the backup and backup tags xml version 1 0 encoding utf 8 backup...

Page 146: ...is especially useful for mobile users If a failure occurs the user reboots the machine hits F11 on prompt Press F11 for Acronis Startup Recovery Manager and performs data recovery in the same way as w...

Page 147: ...he data that exists on a machine s p 151 hard disk for the purpose of recovering or reverting the data to a specified date and time Backup options Configuration parameters of a backup operation p 147...

Page 148: ...oot device that contains the bootable agent or Windows Preinstallation Environment WinPE with the Acronis Plug in for WinPE p 146 A machine can also be booted into the above environments using the net...

Page 149: ...ntil at least one of its members exists Once the last dynamic disk is disconnected or converted to basic the group is discontinued though its name is kept in the above registry key In case a dynamic d...

Page 150: ...actices for using dynamic disks on Windows Server 2003 based computers http support microsoft com kb 816307 Dynamic volume Any volume located on dynamic disks p 149 or more precisely on a disk group p...

Page 151: ...ent is installed Media builder A dedicated tool for creating bootable media P Personal vault A local or networked vault p 152 created using direct management Once a personal vault is created a shortcu...

Page 152: ...ime consuming but much more reliable Validation of a volume backup calculates a checksum for every data block saved in the backup This procedure is also resource intensive While the successful validat...

Page 153: ...Windows Server 2008 PE 2 1 WinPE is commonly used by OEMs and corporations for deployment test diagnostic and system repair purposes A machine can be booted into WinPE via CD ROM USB flash drive or h...

Reviews: