ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION User Manual Download Page 275

Copyright © Acronis, Inc., 2000-2010 

275 

 

 

2.

 

Right-click on the selected volume, and then click 

Convert to GPT

 in the context menu. 

You will receive a warning window, stating that you are about to convert MBR into GPT. 

3.

 

By clicking 

OK

, you'll add a pending operation of MBR to GPT disk conversion. 

(To finish the added operation you will have to commit (p. 284) it. Exiting the program without 
committing the pending operations will effectively cancel them.) 

Please note: A GPT-partitioned disk reserves the space in the end of the partitioned area necessary for the 
backup area, which stores copies of the GPT header and the partition table. If the disk is full and the volume size 
cannot be automatically decreased, the conversion operation of the MBR disk to GPT will fail. 

The operation is irreversible. If you have a primary volume, belonging to an MBR disk, and convert the disk first 
to GPT and then back to MBR, the volume will be logical and will not be able to be used as a system volume. 

If you plan to install an OS that does not support GPT disks, the reverse conversion of the disk to 
MBR is also possible through the same menu items the name of the operation will be listed as 

Convert to MBR

Dynamic disk conversion: MBR to GPT  

Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However 
you can perform the following conversions to reach the goal using the program: 

1.

 

MBR disk conversion: dynamic to basic  (p. 276) using the 

Convert to basic

 operation. 

2.

 

Basic disk conversion: MBR to GPT  using the 

Convert to GPT

 operation. 

3.

 

GPT disk conversion: basic to dynamic  (p. 275) using the 

Convert to dynamic

 operation. 

 

6.11.5.4

 

Disk conversion: GPT to MBR 

If you plan to install an OS that does not support GPT disks, conversion of the GPT disk to MBR is 
possible the name of the operation will be listed as 

Convert to MBR

If you need to convert a GPT disk to MBR: 

1.

 

Select a GPT disk to convert to MBR. 

2.

 

Right-click on the selected volume, and then click 

Convert to MBR

 in the context menu. 

You will receive a warning window, stating that you are about to convert GPT into MBR. 
You will be explained the changes that will happen to the system after the chosen disk is 
converted from GPT to MBR. E.g. if such conversion will stop a disk from being accessed by the 
system, the operating system will stop loading after such conversion or some volumes on the 
selected GPT disk will not be accessible with MBR (e.g. volumes located more than 2 TB from the 
beginning of the disk) you will be warned here about such damage. 

Please note, a volume, belonging to a GPT disk to convert, will be a logical one after the operation and is 
irreversible. 

3.

 

By clicking 

OK

, you'll add a pending operation of GPT to MBR disk conversion. 

(To finish the added operation you will have to commit (p. 284) it. Exiting the program without 
committing the pending operations will effectively cancel them.) 

 

6.11.5.5

 

Disk conversion: basic to dynamic 

You would want to convert a basic disk to dynamic in the following cases: 

 

If you plan to use the disk as part of a dynamic disk group. 

 

If you want to achieve additional disk reliability for data storage. 

Summary of Contents for BACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION

Page 1: ...User s Guide Acronis Backup Recovery 10 Advanced Server Virtual Edition...

Page 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Page 3: ...backups 33 2 5 GFS backup scheme 35 2 6 Tower of Hanoi backup scheme 38 2 7 Retention rules 40 2 8 Backing up dynamic volumes Windows 43 2 9 Backing up LVM volumes Linux 45 2 10 Backing up RAID array...

Page 4: ...p and recovery options 98 3 4 1 Default backup options 98 3 4 2 Default recovery options 120 4 Vaults 129 4 1 Centralized vaults 130 4 1 1 Working with the Centralized vault view 131 4 1 2 Actions on...

Page 5: ...221 6 3 7 Access credentials for destination 228 6 3 8 When to recover 228 6 3 9 Universal Restore 228 6 3 10 How to convert a disk backup to a virtual machine 230 6 3 11 Bootability troubleshooting...

Page 6: ...ions 272 6 11 6 Volume operations 277 6 11 7 Pending operations 284 6 12 Collecting system information 284 7 Centralized management 285 7 1 Administering Acronis Backup Recovery 10 Management Server 2...

Page 7: ...g both capital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication me...

Page 8: ...3 Connect the console to the machine where the agent is installed Where to go from here For what to do next see Basic concepts p 27 For understanding of the GUI elements see Using the management conso...

Page 9: ...ables you to start stop edit and delete the plans and tasks You can also use the Tasks view that displays all tasks existing on the registered machines The tasks can be filtered by machines backup pla...

Page 10: ...ers create several policies and apply each policy to the appropriate group of machines For more information please refer to Grouping the registered machines p 62 The comprehensive example of advanced...

Page 11: ...ws depend on whether the console is connected to a managed machine or to the management server Views for a managed machine When the console is connected to a managed machine the following views are av...

Page 12: ...anaging a centralized vault as well as the history of operations logged in the local logs of the registered machines and the storage nodes Shortcuts bar The Shortcuts bar appears under the navigation...

Page 13: ...e actions bars Actions Contains a list of common operations that can be performed on a managed machine or on a management server Always the same for all views Clicking the operation opens the respecti...

Page 14: ...pane How to change the panes borders 1 Point to the pane s border 2 When the pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the pan...

Page 15: ...lected item There are several ways of performing the same action on selected items By clicking the buttons on the table toolbar By clicking in the items in the Item s name Actions bar on the Actions a...

Page 16: ...nfigured by clicking the respective Change links to the right Others are selected from the drop down list or typed manually in the page s fields Action page Controls Acronis Backup Recovery 10 remembe...

Page 17: ...le provides Graphical User Interface and remote connection to the agents and other Acronis Backup Recovery 10 components Usage of the console is not licensed Bootable media builder With bootable media...

Page 18: ...ng style between MBR and GPT or changing a disk label can be performed either in the operating system or using bootable media 1 3 1 1 Universal Restore The Universal Restore add on enables you to use...

Page 19: ...s the components included in the Acronis Backup Recovery 10 editions that provide the centralized management capability Besides these components Acronis Backup Recovery 10 Agents have to be installed...

Page 20: ...re installation is required on the vCenter Server This feature also enables automatic deployment and configuration of Agent for ESX ESXi to any ESX ESXi server that is not necessarily managed by the v...

Page 21: ...the User Guide Encryption A managed vault can be configured so that anything written to it is encrypted and anything read from it is decrypted transparently by the storage node using a vault specific...

Page 22: ...installs on Linux creates bootable media based on Linux kernel The Deduplication p 18 add on enables you to create bootable media with the back up to a deduplicating vault functionality This add on c...

Page 23: ...2008 x64 Editions Windows Vista all editions except for Vista Home Basic and Vista Home Premium Windows 7 all editions except for the Starter and Home editions Acronis Backup Recovery 10 Storage Node...

Page 24: ...ns of the above Linux distributions and other Linux distributions are also supported The agent for Linux is in fact a 32 bit executable For authentication the agent uses system libraries 32 bit versio...

Page 25: ...installation 160 MB 400 MB 250 MB Agent for Linux 65 MB 150 MB 70 MB Bootable Media Builder 70 MB 240 MB 140 MB Management Console 25 MB 100 MB 40 MB The components installed on VMware ESX i server A...

Page 26: ...lying patches updates and other changes that Acronis at its sole discretion makes or adds to the Software and which Acronis makes generally available without additional charge to other licensees of th...

Page 27: ...ate bootable media p 371 4 Connect the console to the managed machine 5 Create a backup plan p 370 To do so you have to specify at the very least the data to be protected and the location where the ba...

Page 28: ...28 Copyright Acronis Inc 2000 2010 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Page 29: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Page 30: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Page 31: ...ar user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but without using a file lev...

Page 32: ...the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local backup plans owned by any...

Page 33: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Page 34: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Page 35: ...cheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acronis With Acronis Backup Recovery 10 you can easily set up a backup plan that will regularly...

Page 36: ...sume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be created Backup tasks created according to the GFS scheme by Acronis Backup Recovery 10 Sched...

Page 37: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Page 38: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Page 39: ...tern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table shows the patte...

Page 40: ...vel backup scheme The pattern consists of 16 sessions As a result of using incremental and differential backups the situation may arise when an old backup deletion must be postponed as it still is a b...

Page 41: ...date and time in the past corresponding to this interval and deletes all backups created before that moment None of the backups created after this moment will be deleted 2 Keep the archive size withi...

Page 42: ...ther backups one of the following rules is applied Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also be...

Page 43: ...me If the free space which in fact is the storage device free space approaches zero you might need to toughen the restrictions for some or all archives residing in this vault 2 8 Backing up dynamic vo...

Page 44: ...pace The total size of unallocated space is 40GB The recovery will always result in a striped volume if the unallocated space is distributed evenly among the disks 20GB and 20GB If one of the disks ha...

Page 45: ...n running in Linux with 2 6 x kernel or a Linux based bootable media You can back up data of one or more logical volumes and recover it to a previously created logical volume or a basic MBR disk or vo...

Page 46: ...GUI displays a similar table Num Partition Flags Start Size Type _________________________________________________________________ Disk 1 1 1 hda1 boot Pri Act 63 208782 Ext3 1 2 hda2 Pri 208845 8177...

Page 47: ...ing up such volumes does not make sense when a software array is mounted as it won t be possible to recover them Example Here is an example of a volumes list obtained with the list command The GUI dis...

Page 48: ...nary hard disks Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a bad partition table or no partition table at all Backing up such disks does n...

Page 49: ...Hyper V virtual machine that uses at least one pass through disk a physical disk either local or SAN LUN attached to the virtual machine cannot be backed up from the host To back up such machine or i...

Page 50: ...s because there is no registry key HKEY_CLASSES_ROOT Wow6432Node CLSID F2C2787D 95AB 40D4 942D 298F5F757874 Solution Add this key to the registry To do so create and run the following script xxx reg H...

Page 51: ...perating system 2 12 1 Tape compatibility table The following table summarizes the readability of tapes written by Acronis True Image Echo and Acronis True Image 9 1 product families in Acronis Backup...

Page 52: ...ot be recovered from a disk backup 3 Backups cannot be deleted from a tape either manually or automatically during cleanup Retention rules and backup schemes that use automatic cleanup GFS Tower of Ha...

Page 53: ...lans p 372 can use Acronis Secure Zone as well as local plans p 377 If you have used Acronis Secure Zone before please note a radical change in the zone functionality The zone does not perform automat...

Page 54: ...before the upgrade You can activate Acronis Startup Recovery Manager again at any time 2 13 3 Universal Restore Acronis Backup Recovery 10 Universal Restore Acronis Backup Recovery 10 Universal Resto...

Page 55: ...the built in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system start such as video audio and USB Windows takes control ov...

Page 56: ...s in the backup If this scan finds a supported operating system the Acronis Active Restore option becomes available If you do not enable the option the system recovery will proceed in the usual way an...

Page 57: ...he system tray The machine becomes operational and ready to provide necessary services The immediate user sees the drive tree and icons and can open files or launch applications even though they were...

Page 58: ...the management server only since a well thought out policy functions automatically and rarely requires human intervention Using the management server you can create one or more centralized archive sto...

Page 59: ...ole Console on the machine which you prefer to operate from 3 The console enables you to access and manage other Acronis components through Graphical User Interface 2 Install Acronis Backup Recovery 1...

Page 60: ...to the management server 2 Create a managed vault as described in Operations with centralized vaults p 132 Enable deduplication when creating a managed vault Setting up groups and policies The detail...

Page 61: ...rules In Apply retention rules set After backup 2 Create a dynamic group named say W_1 Specify Windows XP and Windows Vista as the criteria This way any workstation that will be registered on the mana...

Page 62: ...various policies applicable to different sets of machines In this case consider creating custom groups 2 14 3 1 Static and dynamic groups You can explicitly specify which machines the custom group has...

Page 63: ...e than one group Besides physical machines you can group virtual machines p 310 hosted on registered virtualization servers Virtual machines have their own grouping criteria depending on their propert...

Page 64: ...ups You create empty groups in the generic root Physical machines or Virtual machines or within existing groups and populate them by manual adding machines static groups or by adding criteria of dynam...

Page 65: ...the reverse action to the aggregate of applying and deploying Revoking removes the correspondence between the policy and one or more machines and then removes the tasks from the machines If a machine...

Page 66: ...ine when the machine is moved copied or deleted from a group In the diagram below the container stands for a group the one color circle stands for a machine with one applied policy the two color circl...

Page 67: ...that a machine can be a member of only one group besides the All machines group Let s start from this simplified approach In the diagram below the container stands for a group the two color circle sta...

Page 68: ...both orange and green policies in spite of the fact that G3 has nothing to do with the orange policy That s why it is difficult to track the policies inheritance from the top of the hierarchy if the s...

Page 69: ...te on the machine is Deploying Once the backup plan is successfully created the policy state on the machine becomes Deployed You may need to modify the policy for some reason Once you confirm the chan...

Page 70: ...changed to Deployed If no data to back up is found at the time when the backup task starts the task will fail and the policy status will turn to Error If at least one of the data items is found the ba...

Page 71: ...e and status as related to a specific machine the backup policy has the deployment state and status on a group of machines and the cumulative deployment state and status of the policy 2 14 5 3 Policy...

Page 72: ...lays the cumulative status for each policy This status is defined as the most severe status of the policy on all machines the policy is applied to If the policy is not applied to any machine its statu...

Page 73: ...10 GB to the database In case the database is corrupted or the storage node is lost while the vault retains archives and the service folder containing metadata the new storage node rescans the vault...

Page 74: ...sources Such is the case when you back up operating systems and applications deployed from a single source over the network When performing incremental backups of similar data from different sources p...

Page 75: ...size will be just about 1 GB in a deduplicating vault This gives a deduplication ratio of 2 1 or 50 Conversely if the two files had different content the backup sizes in non deduplicating and duplica...

Page 76: ...s is cleared it is cleared by default If the file is less than 4 KB in size If you protected the archive with a password Files that were not deduplicated are stored in the archive as they would be in...

Page 77: ...nsole is running 2 14 7 2 Privileges for local connection Windows Local connection on a machine running Windows can be established by any user who has the Log on locally user right on the machine Linu...

Page 78: ...latest version of Linux PAM for your Linux distribution The latest stable source code of Linux PAM is available at Linux PAM source code Web page Remote connection as the root user Remote connections...

Page 79: ...d the following three lines to the file user_a user_b user_c If necessary also add the root user to the file 3 Create the file etc pam d Acronisagent trusted with the following content PAM 1 0 auth re...

Page 80: ...rent Instead of Acronis Remote Users and Acronis Centralized Admins the groups are named DCNAME Acronis Remote Users and DCNAME Acronis Centralized Admins respectively here DCNAME stands for the NetBI...

Page 81: ...perform any further steps all users are typically members of the Domain Users group and so can access the storage node Otherwise you need to create user accounts on the machine where the storage node...

Page 82: ...ts to any existing account you specify for a corresponding service If you choose to specify an existing user account for the agent service or the storage node service make sure that this account is a...

Page 83: ...communication options p 84 For instructions on how to manage SSL certificates used for secure authentication see SSL certificates p 87 Note The components of earlier Acronis products including those...

Page 84: ...tion option that you want to configure The Administrative Template contains the following options each option is explained later in this topic Remote Agent ports Client Encryption options Server Encry...

Page 85: ...lf signed certificates check box allows the client to connect to the server applications that use self signed SSL certificates such as certificates created during the installation of Acronis Backup Re...

Page 86: ...is enabled The connection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured 2 14 8 4 Network port configuration Acronis B...

Page 87: ...erver application use an SSL certificate called the server certificate In Windows the certificate path and the server certificate s file name are specified in the registry key HKEY_LOCAL_MACHINE SOFTW...

Page 88: ...md 3 Run the following command note quotation marks CommonProgramFiles Acronis Utils acroniscert reinstall 4 Restart Windows or restart the running Acronis services Non self signed certificates You ha...

Page 89: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Page 90: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Page 91: ...the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all the machines registered on the manageme...

Page 92: ...nt server has to send its own log events to the specified Simple Network Management Protocol SNMP managers You can choose the types of events to be sent Acronis Backup Recovery 10 provides the followi...

Page 93: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Page 94: ...312 to the virtual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Serv...

Page 95: ...nagement Server IP Name 3 Specify the user name and password of the management server administrator on prompt 4 In the Machine s registration address select how the machine will be registered on the m...

Page 96: ...fective for both Windows and Linux operating systems This option is not available when operating under the bootable media The option defines whether the agent s operating on the managed machine have t...

Page 97: ...the installation disc of your operating system Linux To receive SNMP messages on a machine running Linux the net snmp for RHEL and SUSE or the snmpd for Debian package has to be installed SNMP can be...

Page 98: ...d recovery options 3 4 1 Default backup options Each Acronis agent has its own default backup options Once an agent is installed the default options have pre defined values which are referred to as pr...

Page 99: ...1 Backup splitting p 111 File level security p 112 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 113 Dest removable media Dest re...

Page 100: ...p The preset is Disabled To protect the archive from unauthorized access 1 Select the Set password for the archive check box 2 In the Enter the password field type a password 3 In the Confirm the pass...

Page 101: ...by using the attrib command For more information refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files whose names match any...

Page 102: ...Do any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file from the drop down list 3 Click OK Pre backup command To specify a command bat...

Page 103: ...This option is effective for both Windows and Linux operating systems The option enables you to define the commands to be automatically executed before and after data capture that is taking the data...

Page 104: ...Selected Selected Cleared Cleared Result Preset Perform the data capture only after the command is successfully executed Fail the task if the command execution fails Perform the data capture after th...

Page 105: ...up at the same point in time Choose this setting only if these factors are critical that is backing up files without a snapshot does not make sense To use a snapshot the backup plan has to run under...

Page 106: ...taken by Acronis Backup Recovery 10 Backup process is fastest but data consistency of the applications whose transactions are not completed at the time of taking a snapshot cannot be guaranteed You m...

Page 107: ...r to Backup priority This option is effective for both Windows and Linux operating systems The priority of a process running in a system determines the amount of CPU and system resources allocated to...

Page 108: ...up data By default the speed is set to maximum i e the software uses all the network bandwidth it can get when transferring the backup data Use this option to reserve a part of the network bandwidth t...

Page 109: ...server check box to enable a POP server and to set up its settings Incoming mail server POP enter the name of the POP server Port set the port of the POP server By default the port is set to 110 User...

Page 110: ...chine have to log events of the backup operations in the Application Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the...

Page 111: ...will be sent to Community type the name of the SNMP community to which both the host running the SNMP management application and the sending machine belong The typical community is public Click Send...

Page 112: ...ined to an FTP server since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size 3 4 1 14 File level security These options are effective only...

Page 113: ...the one click approach does not presume user selections such as selecting volumes to recover Acronis One Click Restore always recovers the entire disk If your disk contains several volumes and you are...

Page 114: ...or network share Managed vaults and FTP servers are not supported as secondary destinations The preset is Disabled When dual destination is enabled the agent will automatically copy each backup being...

Page 115: ...please see Scheduling p 166 and Conditions p 176 The preset is Wait until the conditions are met Wait until the conditions are met With this setting the scheduler starts monitoring the conditions and...

Page 116: ...n as an attempt completes successfully OR the specified number of attempts is performed depending on which comes first If the task fails because of a mistake in the backup plan you can edit the plan w...

Page 117: ...ific machine off site When the Use a separate tape set option is enabled there might be a case when the backup has to be written onto a tape that is currently out of the tape library device Define wha...

Page 118: ...en the option is enabled backing up to removable media may be not possible if the user is away because the program will wait for someone to press OK in the prompt box Hence you should disable the prom...

Page 119: ...led deduplication at target Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node The eventual size of the backup in...

Page 120: ...very options from the top menu Availability of the recovery options The set of available recovery options depends on The environment the agent operates in Windows Linux bootable media The type of data...

Page 121: ...he program does not support interactive commands i e commands that require user input for example pause A post recovery command will not be executed if the recovery proceeds with reboot To specify pre...

Page 122: ...d 4 If successful execution of the command is critical for you select the Fail the task if the command execution fails check box In case the command execution fails the task run result will be set to...

Page 123: ...and Linux operating systems This option is not available when operating under the bootable media The option enables you to receive e mail notifications about the recovery task s successful completion...

Page 124: ...WinPopup notifications about about the recovery task s successful completion failure or need for interaction The preset is Disabled Before configuring WinPopup notifications make sure the Messenger se...

Page 125: ...ry operations in the Application Event Log SNMP notifications This option is effective for both Windows and Linux operating systems This option is not available when operating under the bootable media...

Page 126: ...eraction it will fail Details of the operation including errors if any can be found in the operation log Re attempt if an error occurs The preset is Enabled Number of attempts 5 Interval between attem...

Page 127: ...option enables booting the machine into the recovered operating system without user interaction Change SID after the recovery is finished This option is not effective when recovery to a virtual machin...

Page 128: ...option if you prefer to power off virtual machines manually before the recovery Power on the target virtual machine when recovery is completed The preset is Off After a machine is recovered from a bac...

Page 129: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Page 130: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Page 131: ...the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space is free space of the ap...

Page 132: ...the vault type Managed or Unmanaged The procedure of creating centralized vaults is described in depth in the following sections Create a managed centralized vault p 133 Create an unmanaged centraliz...

Page 133: ...a tape library on a managed vault Click Manage tapes In the Tape Management window define labels for tapes and refresh the inventory For more details see the Managing tape library p 142 section Resca...

Page 134: ...aged vault will be created 1 Enter the full path to the folder in the Path field or select the desired folder in the folders tree Managed vaults can be organized on the hard drives local to the storag...

Page 135: ...password field re type the password 4 Select one of the following AES 128 the vault contents will be encrypted using the Advanced Standard Encryption AES algorithm with a 128 bit key AES 192 the vaul...

Page 136: ...ncing loads between storage nodes As a result the first node stops managing the vault The second node scans archives in the vault creates and fills up the database corresponding to the vault and start...

Page 137: ...oading mounting rewinding and reading a tape with the full data backup However a tape should be read for example to validate p 381 a backup or to recover data from a backup A tape library can be local...

Page 138: ...on a tape However after this operation all the incremental and differential backups stored on other tapes and based on the deleted backups cannot be used for data recovery In a Custom backup plan s re...

Page 139: ...storage snap in Control panel Administrative tools Computer management Removable storage Media pools If a tape has moved into the Free pool it is considered as free and will be accessible to write by...

Page 140: ...eating only one vault per tape device If all cartridges in a tape library have barcodes and the RSM Free pool contains enough tapes for a chosen backup scheme the library is ready to fully work automa...

Page 141: ...same way as with other storage devices The only difference is the additional Tape support p 116 options that can be set up during the backup policy plan creation These options enable you to specify h...

Page 142: ...3 6 Managing a tape library To manage a tape library the following tasks procedures are in the product Inventory p 142 Rescan p 143 Labeling p 143 Any user with access to a managed vault on a tape lib...

Page 143: ...es need a barcode or other readable labels If a tape does not get a label you should define it before the tape will be used If you need to apply a specific label for a tape for example MyWork label fo...

Page 144: ...ith such tapes as the program manages all the tapes automatically When this option is enabled the backups belonging to the policy or plan being created will be located on a separate tape set Other bac...

Page 145: ...Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries This section provides you with useful information to choose a backup scheme and tape options fo...

Page 146: ...backups minimal maximal period of backup keeping need to store tape cartridges off site capability of the tape library number of drives loaders slots and available tapes capacity of tapes requirements...

Page 147: ...use a free tape For each full backup option is selected Other Always use a free tape options are cleared It requires 16 tapes in rotation GFS Example 3 p 152 The Use a separate tape set option is sel...

Page 148: ...ive and mounted and then the backup last 24 Gb is continued onto the beginning of the new tape The next figure demonstrates the data backup archive at the moment The differential backup is drawn as a...

Page 149: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Page 150: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Page 151: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Page 152: ...ted the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define the tape rotation scheme t...

Page 153: ...5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbers from 1 to 5 by letters A B C D and E respectively Then t...

Page 154: ...ept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and incremental A backups stored on tape 02 The full backup deletion is postponed until all the above...

Page 155: ...E because at the moment the first full backup is a base for differential backups D C and B are a base for incremental backup A So the full backup deletion is postponed until all the D C B and A backup...

Page 156: ...vel The example demonstrates that the tapes usage efficiency is reduced Moreover the data recovery requires access to the backups kept on one full backups 6 two differential backups 44 or three increm...

Page 157: ...se a separate tape set option is selected the Always use a free tape For each full backup option is cleared the Always use a free tape For each incremental backup option is cleared the Always use a fr...

Page 158: ...number of the tapes that will be free after the deletion So the calculation ignores this probability Tape set 01 should contain round up F_GB 4 D_GB 5 7 I_GB CL T_GB tapes to store the backups Tape s...

Page 159: ...direct connection of the console to a managed machine Personal vaults are specific for each managed machine Personal vaults are visible to any user that can log on to the system A user s right to bac...

Page 160: ...n the selected archives and backups The list of backups is expanded by clicking the plus sign to the left of the archive s name All the archives are grouped by type on the following tabs The Disk arch...

Page 161: ...n to the Validation p 235 page where this vault is already pre selected as a source The vault validation checks all the archives stored in the vault Delete a vault Click Delete The deleting operation...

Page 162: ...r destination to vault B 4 In the vaults tree select vault B to check whether the archives are displayed If not click Refresh 5 Delete vault A 4 3 Common operations 4 3 1 Operations with archives stor...

Page 163: ...ons item of the main menu The following is a guideline for you to perform operations with backups To Do View backup content in a separate window Click View content In the Backup Content window examine...

Page 164: ...kup To preserve archive consistency the program will consolidate the two backups For example you delete a full backup but retain the next incremental one The backups will be combined into a single ful...

Page 165: ...10 165 To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you...

Page 166: ...current user specify the user s account User logoff any user current user specify the user s account System startup Free space change specify the amount of free space change on any volume selected fo...

Page 167: ...ample if you set Every 2 day s the task will be started on every other day In the During the day execute the task area select one of the following Once at Set up the time at which the task will be run...

Page 168: ...ion and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00 PM in our example To 12 15 2009 On this date the task will be performed for the...

Page 169: ...the task frequency to Every 1 hour From 10 00 00 AM until 10 00 00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day In the Effective area set the following settings From Set up...

Page 170: ...the task say on Monday at 11 30 AM the task will be started on the same day at 9 PM If the task was created say on Friday after 9 PM then it will be started for the first time on the nearest workday M...

Page 171: ...the last day of the month irrespective of its actual date On Select specific days of the weeks to run the task on In the During the day execute the task area select one of the following Once at Set up...

Page 172: ...stom backup scheme p 211 section Season schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010 During a workday the task is performed every 6 hours from 12 AM midnig...

Page 173: ...o not set 5 4 At Windows Event Log event This type of schedule is effective only in Windows operating systems You can schedule a backup task to start when a certain Windows event has been recorded in...

Page 174: ...D 7 Important To ensure that such a task will complete despite the presence of bad blocks you must make the task ignore bad blocks To do this in Backup options go to Error handling and then select the...

Page 175: ...anup or validation is scheduled to start If the backup task on each machine starts with a delay see the next setting the management server will wake up the machines according to those delays Before us...

Page 176: ...ackup plan 2 In How to back up select the Simple Tower of Hanoi or Custom scheme and then click Change to specify a schedule for the scheme 3 Under Run the task select Daily Weekly or Monthly 4 In the...

Page 177: ...ly if all users are logged off Condition Time since last backup Value Time since the last backup 12 hour s Task start conditions Wait until the conditions are met If the free space changes by more tha...

Page 178: ...ge for backing up users data and servers The workday starts at 8AM and ends at 5 PM Users data should be backed up as soon as the users log off but not earlier than 4 30 PM and not later than 10 PM Ev...

Page 179: ...ged on at 11 PM run the task anyway Event Monthly Months All On First Third Friday Once at 08 00 00 PM Condition User logged off Task start conditions Wait until the conditions are met Run the task an...

Page 180: ...ed after 12 hours have passed since the completion of the latest successful backup the backup task will start immediately 3 if the machine is never restarted the task will never start You can start th...

Page 181: ...ou can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what action has to be performed for exam...

Page 182: ...will launch the Bootable Media Builder p 378 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time...

Page 183: ...ecution states in the Backup plans and tasks p 183 view and specify your decision on each task in the Information panel or in the Task details p 191 window 6 1 2 Backup plans and tasks The Backup plan...

Page 184: ...Otherwise see 4 Waiting for condition This situation is quite normal but delaying a backup for too long is risky The solution may be to set the maximum delay or force the condition tell the user to l...

Page 185: ...started manually or the event specified by the schedule occurs the task enters either the Running state or the Waiting state Running A task changes to the Running state when the event specified by th...

Page 186: ...task Check the task log to find out the reason of the failure then do one or more of the following Remove the reason of the failure optionally Start the failed task manually Edit the failed task to p...

Page 187: ...ls View plan s task s log Backup plan Click View log You will be taken to the Log p 194 view containing the list of the plan related log entries Task Click View log You will be taken to the Log p 194...

Page 188: ...The task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unalloc...

Page 189: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Page 190: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Page 191: ...an Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backup schemes only To...

Page 192: ...ment operations Compacting Service task performed on a storage node Indexing Deduplication task performed by the storage node in the vault after a backup is completed Depending on the type of task and...

Page 193: ...der which the plan runs Owner the name of the user who created or last modified the plan State execution state p 184 of the backup plan Status status p 184 of the backup plan Schedule whether the task...

Page 194: ...n the Log view with pre filtered log entries for the item in question Thus you do not have to configure filters in the log table yourself View Action Dashboard In the calendar right click on any highl...

Page 195: ...e log entries 2 In the To field select the date up to which to display the log entries Filter log entries by type Press or release the following toolbar buttons to filter error messages to filter warn...

Page 196: ...er user name of the backup plan owner only under operating system Message a text description of the event The log entry s details that you copy will have the appearance as follows Log Entry Details Ty...

Page 197: ...s the sequence number of the archive in the location you have selected Access credentials p 205 Optional Provide credentials for the location if the plan account does not have access permissions to th...

Page 198: ...l Specify whether to convert every full every incremental or every differential backup or convert the last created backup on schedule Specify the conversion schedule if required Host p 215 Specify the...

Page 199: ...back up specific files and folders If you are not concerned about recovery of the operating system along with all the settings and applications but plan to keep safe only certain data the current proj...

Page 200: ...on different volumes always include both volumes in the backup The volumes must also be recovered together otherwise there is a high risk that the operating system will not start 2 Optional To create...

Page 201: ...machine configuration To back up one or more virtual machines residing on a virtualization server 1 Select the check boxes next to virtual machines that you want to back up Selecting the check box fo...

Page 202: ...rtual machine cannot be backed up from the host To back up such machine or its disks install Agent for Windows or Agent for Linux on the machine A SAN LUN disk attached to an ESX ESXi virtual machine...

Page 203: ...xt yields files such as Doc txt and Document txt The question mark substitutes for exactly one character in a file name for example the file mask Doc txt yields files such as Doc1 txt and Docs txt but...

Page 204: ...e and displays it in the Name field The name commonly looks like Archive 1 The generated name is unique within the selected location If you are satisfied with the automatically generated name click OK...

Page 205: ...rd for the account 2 Click OK Warning According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means that the user...

Page 206: ...en to start the backup The task will be started manually Select this check box if you do not need to put the backup task on a schedule and wish to start it manually afterwards 6 2 9 3 Simple scheme Wi...

Page 207: ...on field you want to reserve for weekly and monthly backups A monthly backup will be performed every fourth such day The default value is Friday Keep backups Specifies how long you want the backups to...

Page 208: ...stored on the system until February 7 Monthly backups will never be deleted Limited storage If you do not want to arrange a vast amount of space to store a huge archive you may set up a GFS scheme so...

Page 209: ...ps Daily 6 months Weekly 6 months Monthly 5 years Here daily incremental backups will be created on Tuesdays and Thursdays with weekly and monthly backups performed on Fridays Note that in order to ch...

Page 210: ...elect from 2 to 16 backup levels See the example stated below for details Roll back period The guaranteed number of sessions that one can go back in the archive at any time Calculated automatically de...

Page 211: ...10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been created so the backup of day five is still stored Since it depends on the full backup of day one that backup is avai...

Page 212: ...ackup destinations such as shared folders or centralized vaults When there is insufficient space while backing up The archive will be cleaned up only during backup and only if there is not enough spac...

Page 213: ...all backups older than one year be deleted from the archive and let the cleanup be performed upon creating a new backup Retention rules Delete backups older than 12 months Apply the rules After backi...

Page 214: ...f the schedule has not been set up You can manually run any backup task or cleanup task at any time regardless of whether it has a schedule In the first of the previous examples we set up a schedule o...

Page 215: ...ne is created If this operation succeeds the old machine is replaced If an error occurs during creation of the temporary machine the temporary machine is deleted This way the task always ends up with...

Page 216: ...k space On VMware ESX ESXi new machines are created with pre allocated disks This means that virtual disk size is always equal to the original disk capacity Assuming that the original disk size is 100...

Page 217: ...ut Acronis Disk Director LV see the Disk management p 269 section To create a recovery task perform the following steps General Task name Optional Enter a unique name for the recovery task A conscious...

Page 218: ...k adapter drivers Acronis Universal Restore will install drivers that better fit the target hardware Mass storage drivers to install anyway Optional Specify the mass storage drivers manually if the au...

Page 219: ...on the machine expand the Local folders group and click the required folder If the archive is located on removable media e g DVDs first insert the last DVD and then insert the discs in order starting...

Page 220: ...disk data to a certain moment in time Specify the items to recover By default all items of the selected backup will be selected If you do not want to recover certain items just uncheck them To obtain...

Page 221: ...ess permissions to the location You might need to provide special credentials for a network share or a storage node vault Specify User name When entering the name of an Active Directory user account b...

Page 222: ...ource disks NT signature p 222 Select the way the recovered disk s signature will be handled The disk signature is used by Windows and the Linux kernel version 2 6 and later Disk destination To specif...

Page 223: ...e physical disks of the machine the console is connected to On selecting this you proceed to the regular volume mapping procedure described below New virtual machine p 225 If Acronis Backup Recovery 1...

Page 224: ...ll the data stored on the target volume will be replaced by the backed up data so be careful and watch out for non backed up data that you might need When using bootable media Disk letters seen under...

Page 225: ...option is not available Assume you are going to recover a volume from an old low capacity FAT16 disk to a newer disk FAT16 would not be effective and might even be impossible to set on the high capac...

Page 226: ...on the host hardware the host operating system and the virtualization product settings For example virtual machines may be allowed to use no more than 30 of memory Disks Initial setting the number an...

Page 227: ...xt and Document txt The question mark substitutes for exactly one character in a file name for example the file mask Doc txt yields files such as Doc1 txt and Docs txt but not the files Doc txt or Doc...

Page 228: ...the final OK Recover later the recovery task will be started at the date and time you specify If you do not need to schedule the task and wish to start it manually afterwards select the Task will be s...

Page 229: ...erating system If the hardware has multiple network interface cards Universal Restore will try to configure all the cards drivers In case Universal Restore cannot find a compatible driver in the speci...

Page 230: ...g a recovery task as described in Recovering data p 216 Select the archive and then select the disk or volume backup you want to convert Use the Navigation pane to navigate to the vault where the arch...

Page 231: ...dows Recover the volume once again When configuring recovery opt for using Acronis Universal Restore and specify the appropriate HAL and mass storage drivers Windows was recovered to a dynamic volume...

Page 232: ...n Change the loader configuration and etc fstab so that the LVM is not used and reactivate the boot loader 6 3 11 1 How to reactivate GRUB and change its configuration Generally you should refer to th...

Page 233: ...chroot mnt system usr sbin grub 9 Specify the disk on which GRUB is located typically the boot or root partition root hd0 0 10 Install GRUB For example to install GRUB in the master boot record MBR o...

Page 234: ...e that the device will be automatically assembled following the reboot To view or change the partition type use a disk partitioning utility such as fdisk Otherwise such as in the second example recove...

Page 235: ...e node registered on the management server in case the storage node and the management server are installed on different machines if they are installed on the same machine simply recover that machine...

Page 236: ...plan p 196 section You can access the Validation page from the Vaults p 129 view Right click the object to validate archive backup or vault and select Validate from the context menu The Validation pa...

Page 237: ...desired folder in the folders tree If the archive is stored in a centralized vault expand the Centralized group and click the vault If the archive is stored in a personal vault expand the Personal gro...

Page 238: ...lection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree To select a centralized vault expand the Centralized group and cli...

Page 239: ...t makes sense to schedule validation to the managed machine s off peak period On the other hand if you prefer to be immediately informed whether the data is not corrupted and can be successfully recov...

Page 240: ...ced view check box Mount settings Volumes p 242 Select volumes to mount and configure the mount settings for every volume assign a letter or enter the mount point choose the read write or read only ac...

Page 241: ...by another user or by the program itself according to scheduled operations Use the Refresh button to refresh the list of archives 3 Click OK 6 5 2 Backup selection To select a backup 1 Select one of t...

Page 242: ...me is mounted you can browse files and folders contained in the backup using a file manager and copy the desired files to any destination Thus if you need to take out only a few files and folders from...

Page 243: ...dered as simple on demand archive staging The resulting archive s name By default the exported archive inherits the name of the original archive Because having multiple archives of the same names in t...

Page 244: ...ly running the archive deletion task followed by the export task Different ways to create an export task Using the Export page is the most general way to create an export task Here you can export any...

Page 245: ...als you specify whether started manually or executed on schedule Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or...

Page 246: ...pted by an eavesdropper using a packet sniffer If the archive is stored on a locally attached tape device expand the Tape drives group then click the required device For the management server in the f...

Page 247: ...folders group and click the required folder To export data to a network share expand the Network folders group select the required networked machine and then click the shared folder If the network sh...

Page 248: ...of an archive to the same location twice In any of the above cases provide an archive name that is unique to the destination folder or vault If you need to redo the export using the same archive name...

Page 249: ...nal Protect the Acronis Secure Zone from unauthorized access with a password The prompt for the password appear at any operation relating to the zone After you configure the required settings click OK...

Page 250: ...field re type the password 4 Click OK To disable password 1 Choose Do not use 2 Click OK 6 8 1 4 Result confirmation The Result confirmation window displays the expected partition layout according to...

Page 251: ...archives To learn more about operations with vaults see the Vaults p 129 section 6 8 2 1 Increasing Acronis Secure Zone To increase Acronis Secure Zone 1 On the Manage Acronis Secure Zone page click...

Page 252: ...ates the need for a separate media or network connection to start the bootable rescue utility Activate Enables the boot time prompt Press F11 for Acronis Startup Recovery Manager if you do not have th...

Page 253: ...server or WDS RIS using the same wizard Linux based bootable media Linux based media contains Acronis Backup Recovery 10 Bootable Agent based on Linux kernel The agent can boot and perform operations...

Page 254: ...rver 2003 with Service Pack 1 PE 1 6 Windows Vista PE 2 0 Windows Vista SP1 and Windows Server 2008 PE 2 1 Windows 7 PE 3 0 If you already have media with PE1 x distribution unpack the media ISO to a...

Page 255: ...e enabled if Acronis Backup Recovery 10 Universal Restore is installed on the machine where the media is created 3 optional The timeout interval for the boot menu plus the component that will automati...

Page 256: ...a particular hardware configuration vga ask Prompts for the video mode to be used by the bootable media s graphical user interface Without the vga parameter the video mode is detected automatically v...

Page 257: ...ay want to use this parameter if the kernel is unable to allocate interrupt requests IRQs or discover secondary PCI buses on the motherboard These calls might not work properly on some machines But th...

Page 258: ...the network adapters for communication with the management console through the production network Automatic configuration could be done for this connection Sizeable data for recovery could be transfe...

Page 259: ...move 6 10 1 2 Adding the Acronis Plug in to WinPE 1 x Acronis Plug in for WinPE can be added to Windows PE 2004 1 5 Windows XP Professional with Service Pack 2 Windows PE 2005 1 6 Windows Server 2003...

Page 260: ...Select Use WinPE files located in the folder I specify Specify path to the folder where the WinPE files are located 4 optional Specify Windows drivers to be added to Windows PE Once you boot a machine...

Page 261: ...e media to create 11 Build the Bart PE 12 Burn the ISO to CD or DVD if this has not been done yet or copy to a flash drive Once the machine boots into the Bart PE and you configure the network connect...

Page 262: ...nfiguration monitor and graphics card specifications If for some reason the video mode is detected incorrectly do the following 1 In the boot menu press F11 2 Add to the command prompt the following c...

Page 263: ...es click Add device 4 Specify the 20 character device ID 5 If you want to allow writing data onto the device specify the five character write key Without this key the device will be available in the r...

Page 264: ...e the volume structure in either of the following ways Automatically in Linux based bootable media by using the management console or a script see Creating the volume structure automatically p 264 Man...

Page 265: ...Return to the management console by pressing CTRL ALT F1 or by running the command bin product 6 Click Recover then specify the path to the archive and any other required parameters and then click OK...

Page 266: ...owing disk configuration The machine has two 1 gigabyte and two 2 gigabyte SCSI hard disks mounted on dev sda dev sdb dev sdc and dev sdd respectively The first and second pairs of hard disks are conf...

Page 267: ...the backup from which you want to recover data 4 In Data type select Volumes 5 In Items to recover select the check box next to my_volgroup my_logvol 6 Under Where to recover click Change and then se...

Page 268: ...reduces the time required for booting multiple machines as compared to using physical bootable media Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder To uplo...

Page 269: ...and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine add to the DHCP server option 60 Client Identifier with string value PXE Client This can be done as follow...

Page 270: ...mple rules 1 Create a disk image of the disk on which volumes will be created or managed Having your most important data backed up to another hard disk or CD will allow you to work on disk volumes bei...

Page 271: ...rough the Disk management view of the console The top part of the view contains a disks and volumes table enabling data sorting and columns customization and toolbar The table presents the numbers of...

Page 272: ...nd you will not be able to store any files there Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be initialized The Disk management view will show the newly...

Page 273: ...ably Cloning method and advanced options The Clone basic disk operation usually means that the information from the source disk is transferred to the target As is So if the destination disk is the sam...

Page 274: ...target disk signature and update the operating system according to the signature If you need to copy the NT signature 1 Select the Copy NT signature check box You receive the warning If there is an op...

Page 275: ...to basic operation 2 Basic disk conversion MBR to GPT using the Convert to GPT operation 3 GPT disk conversion basic to dynamic p 275 using the Convert to dynamic operation 6 11 5 4 Disk conversion G...

Page 276: ...volumes takes a certain amount of time and any power loss unintentional turning off of the machine or accidental pressing of the Reset button during the procedure could result in bootability loss In...

Page 277: ...ys appears in the graphical view of the disk next to the disk s name Online The online status means that a disk is accessible in the read write mode This is the normal disk status If you need a disk t...

Page 278: ...linked together by the LDM from several physical disks Up to 32 disks can be included into one volume thus overcoming the hardware size limitations but if at least one disk fails all data will be lost...

Page 279: ...rovides other disk management functions Its pages will enable you to enter operation parameters proceeding step by step further on and return to any previous step if necessary to change any previously...

Page 280: ...ill proceed to the next page Set the volume size p 280 Set the volume size On the third wizard page you will be able to define the size of the future volume according to the previously made selections...

Page 281: ...button will be disabled You will have to change the label to proceed with the creation of the new volume If you click the Back button you will be returned to the previous page Set the volume size p 2...

Page 282: ...ou will have to confirm your decision to set the new volume as active To finish the added operation you will have to commit p 284 it Exiting the program without committing the pending operations will...

Page 283: ...g operations will effectively cancel them The new label will be graphically represented in the Disk Management view of the console immediately 6 11 6 6 Format volume You might want to format a volume...

Page 284: ...Undo action lets you undo the latest operation in the list While the list is not empty this action is available The Redo action lets you reinstate the last pending operation that was undone The Commi...

Page 285: ...moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer Comment Failed tasks X View the tasks View the tas...

Page 286: ...ered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is recommended to back up the management server to protec...

Page 287: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Page 288: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Page 289: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Page 290: ...console will update the list of backup policies from the management server with the most recent information Though the list of policies is refreshed automatically based on events the data may not be...

Page 291: ...7 1 2 4 Policy details The Policy details window accumulates in five tabs all information on the selected backup policy and lets you perform operations with the machines and groups of machines the pol...

Page 292: ...e or more nested groups can be created inside any group created by the administrator Grouping helps organize data protection by the company departments by the Active Directory domains or organizationa...

Page 293: ...view select the group Use the toolbar s operational buttons to perform actions on the selected group p 305 Use the Information panel s tabs to view detailed information about the selected group and pe...

Page 294: ...cal machines group Add a machine to another static group Click Add to another group In the Add to group p 298 window specify the group to copy the selected machine to The backup policies applied to th...

Page 295: ...ine s log entries Update all information related to the machine Click Synchronize The management server will query the machine and update the database with the most recent information Along with synch...

Page 296: ...details Importing machines from Active Directory To import machines from Active Directory 1 In the Navigation tree select Physical machines or All physical machines 2 Click Import machines from Activ...

Page 297: ...initially import the machines from a text file Modify this file later as required by adding and removing machines but do not change the names addresses of the machines that have to remain registered T...

Page 298: ...import Adding a machine to another group To add the selected machine to another group 1 Select the group the machine will be added to 2 Click OK The machine being added becomes a member of more than...

Page 299: ...essful backup Availability Online the machine is available for the management server This means that the management server s last connection to the machine was successful Connection is established eve...

Page 300: ...the machine is a member of a group and the policy is applied to the group you cannot revoke the policy from a single machine without firstly removing the machine from the group Examine where the appli...

Page 301: ...ckup plan stops all its tasks Thus all the task operations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validati...

Page 302: ...if the existing archives were created by a new scheme For empty archives all changes are possible Why can t I edit the backup plan The backup plan is currently running Editing of the currently runnin...

Page 303: ...t information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manual refresh guarantees that the most...

Page 304: ...t and applies the policy to Machine1 respectively The machine or group to which the policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a m...

Page 305: ...umn type a new name for the selected group Built in groups cannot be renamed Edit a custom group Click Edit In the Edit group p 308 window change the required parameters of the group Move one custom g...

Page 306: ...ording to the following rules a All the entries of the same criteria are combined by logical addition OR For example the following set of criteria Operating system Windows Server 2008 Operating system...

Page 307: ...de machines from the list given in the specified txt or csv file If you later modify the file the contents of the group will change accordingly The file is checked every 15 minutes If you later delete...

Page 308: ...roup Group details Aggregates in two tabs all information on the selected group Allows performing operations with the policies applied to the group This information is also duplicated in the Informati...

Page 309: ...e policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a group its parent group view will be opened 7 1 4 Virtual machines You can centrally...

Page 310: ...tion tree This section describes available operations with these machines 7 1 4 1 Virtual machines on a management server Availability of virtual machines Virtual machines are displayed as available w...

Page 311: ...VA Using this criterion you can create a dynamic group of virtual machines hosted on a specified virtualization server or managed by the specified virtual appliance 7 1 4 2 VMware vCenter integration...

Page 312: ...eck box In a vCenter cluster a single Agent for ESX ESXi backs up virtual machines hosted on all the cluster s hosts For more information please see Support for vCenter clusters p 313 You can add a si...

Page 313: ...s for Acronis Backup Recovery 10 Advanced Server Virtual Edition You need one license for every host you selected To be able to deduplicate backups an agent needs a separately sold license for dedupli...

Page 314: ...vailable operations depends on the privileges a user has on the vCenter Server Only those actions are available that the user has permission to perform The below tables contain the privileges required...

Page 315: ...urce pool Virtual machine Configuration Add existing disk Add new disk Add or remove device Change CPU count Memory Remove disk Rename Settings Virtual machine Interaction Configure CD media Console i...

Page 316: ...up a VM s disk Recover to an existing VM Datastore Allocate space Global Licenses Network Assign network Resource Assign VM to resource pool Virtual machine Configuration Add existing disk Add new di...

Page 317: ...ise data protection This goal is achieved through organizing managed vaults p 377 that serve as dedicated storages of the enterprise backup archives Storage node enables you to relieve managed machine...

Page 318: ...To Do Add a storage node to the management server Click Add In the Add storage node p 319 window specify the machine the storage node is installed on Adding a storage node establishes a trusted relat...

Page 319: ...some latency Manual refresh guarantees that the most recent data is displayed Adding a storage node To add a storage node 1 In the IP Name field enter the name or the IP address of the machine the st...

Page 320: ...the archives in all the vaults managed by the storage node Vaults This tab displays a list of the vaults managed by the storage node To open a managed vault for detailed examination and to perform ope...

Page 321: ...task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unallocate...

Page 322: ...Select Options Console options Number of tasks p 90 and set the desired value The maximum number of tasks that can be displayed is 500 If the number of tasks exceeds the specified value use filters t...

Page 323: ...entries The maximum number of entries stored in the centralized log is 50000 The maximum number of entries that can be displayed is 10000 In case the number of log entries is greater than 10000 use fi...

Page 324: ...on Save the selected log entries to a file 1 Select a single log entry or multiple log entries 2 Click Save Selected to File 3 In the opened window specify a path and a name for the file Save all the...

Page 325: ...and show the hidden ones To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 C...

Page 326: ...d are stored in the dedicated databases Reports are generated based on report templates The templates define the information to be included in the report and the way the information is represented Acr...

Page 327: ...ch the last connection between the machines and the management server occurred Last successful backup The period within which the last successful backup finished on each of the machines Next backup Th...

Page 328: ...lter criteria are included Origin The types of origin of the backup plans Local and or Centralized Backup policies available only for centralized backup plans The backup policies on which the centrali...

Page 329: ...ll look Select whether to show all items in a single table or to group them by a particular column Specify which table columns to show and in which order Specify how to sort the table 7 1 8 5 Report a...

Page 330: ...nd backups and average ratios across the selected vaults With the default filter settings the report includes information about all centralized managed vaults plus the combined total Report view Under...

Page 331: ...ome columns such as Machine name in a report about machines cannot be excluded from the list or moved up or down in it 7 1 8 9 Report view In order for your web browser to correctly display dates and...

Page 332: ...Recovery 10 Storage Node as described in the correspondent subtopics of this topic 7 2 1 1 How to load Acronis Administrative Template The Administrative Template provided by Acronis enables the fine...

Page 333: ...multaneously When this limit is reached the storage node will use the backup queue see the next parameter for the agents that are awaiting connection Backup Queue Limit Description Specifies the maxim...

Page 334: ...e Suppose further that the size of the archives in Vault A is 20 GB and the size of the archives in Vault B is 45 GB If the volume has 5 GB of free space then the total size of Vault A is 20 GB 5 GB 2...

Page 335: ...d vault s database is less than the value of Vault Database Free Space Error Limit an error is recorded in the storage node s log Backups performed to the vault will keep failing until the amount of f...

Page 336: ...efault value False Trace Level Description Specifies the minimum level of severity of events to be recorded into the event log Only events of levels greater than or equal to the value in Trace Level w...

Page 337: ...on for a machine is complete the management server may disconnect from that machine and use the free connection for synchronization with another machine and so on Note Connections to machines with hig...

Page 338: ...to provide new data whenever it will appear and then enters a listening mode This approach is called real time monitoring Real time monitoring may reduce network traffic for example when centralized...

Page 339: ...the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that changes extensively during backup This parameter is used when creati...

Page 340: ...recorded into the agent s log You can view this warning in the Dashboard If the value is 0 no license check will be performed without a license Acronis Backup Recovery 10 s functionality will be disa...

Page 341: ...is cleaned up see Log cleanup rules p 97 Windows Event Log Specifies when to record Acronis Backup Recovery 10 Agent s events into the Application event log in Windows This parameter has two settings...

Page 342: ...if more space is needed for the snapshot You may want to increase the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that ch...

Page 343: ...of the following Not Configured The component will use the default TCP port number 9876 Enabled The component will use the specified port type the port number in the Server TCP Port box Disabled The...

Page 344: ...sabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application Select one of the following Not Configured...

Page 345: ...termination of a process such as the agent s process Event tracing parameters are specified as the following settings in the administrative template File Trace Minimal Level Description Specifies the...

Page 346: ...mmunity For Acronis Backup Recovery 10 Agent Windows Event Log SNMP SNMP Address SNMP Community and Customer Experience Program You will find the description of these parameters in the correspondent t...

Page 347: ...applied to both Windows and Linux machines To create a backup policy perform the following steps General Policy name Optional Enter a unique name for the backup policy A conscious name lets you ident...

Page 348: ...he backup operation such as pre post backup commands maximum network bandwidth allocated for the backup stream or the backup archive compression level If you do nothing in this section the default val...

Page 349: ...que name Folder on VMware vCenter If the management server is integrated with vCenter Server the resultant virtual machines will appear in the Acronis Backups folder on the vCenter You can specify a s...

Page 350: ...In the Volumes column Comments Windows and Linux volumes All volumes Type or select All Volumes Refers to all volumes on machines running Windows and all mounted volumes on machines running Linux Win...

Page 351: ...d speeds up the backup and recovery operations Windows The swap file pagefile sys and the file that keeps the RAM content when the machine goes into hibernation hiberfil sys are not backed up After re...

Page 352: ...rd partition one can type dev hda3 in the row of the Volumes to back up selection rules dialog box Furthermore a Linux partition can be mounted anywhere inside the tree Say dev hda3 can be mounted as...

Page 353: ...d folders column type or select File Text doc in folder D Work D Work Text doc Folder C Windows C Windows Environment variables Some environment variables point to Windows folders Using such variables...

Page 354: ...irectory of the common users home The root user s home directory root Directory for all user related programs usr Directory for system configuration files etc 7 3 3 Access credentials for source Speci...

Page 355: ...o skip files whose names match any of the criteria called file masks in the list use the Add Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard charac...

Page 356: ...ify names for the archives The program generates a common name for the new archives and displays it in the Name field The name looks like PolicyName _ MachineName _Archive1 If you are not satisfied wi...

Page 357: ...he Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these days...

Page 358: ...set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule when and how often to back up the data To learn more about setting up the schedule see the...

Page 359: ...t in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup type are as follows Daily 7 days...

Page 360: ...ups more short lived at the same time ensuring that your information can be recovered in case of an accidental data loss Suppose that you need to Perform backups at the end of each working day Be able...

Page 361: ...lect it in the Back up on field Such an archive would allow you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily...

Page 362: ...schedule parameters and the numbers of levels you select See the example below for details Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 Th...

Page 363: ...as well This enables us to go as far back as 11 days which is the best case scenario The following day however a new third level differential backup is created and the old full backup is deleted 1 2...

Page 364: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Page 365: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 40 Monthly full weekly differential and daily incremental backups plus c...

Page 366: ...ckup runs every Friday at 10 00 PM Incremental backup runs manually Differential backup runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans a...

Page 367: ...opyright Acronis Inc 2000 2010 367 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule of validation For more information see the Scheduling p 166 sectio...

Page 368: ...nis Secure Zone A secure volume for storing backup archives p 369 within a managed machine p 377 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost ef...

Page 369: ...is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TIB extension The TIB files resulting from...

Page 370: ...his is an option Physically a backup plan is a bundle of tasks p 380 configured for execution on a managed machine p 377 A backup plan can be created directly on the machine local plan or appears on t...

Page 371: ...locally through the GUI or remotely using the console p 373 Bootable media A physical media CD DVD USB flash drive or other media supported by a machine p 377 BIOS as a boot device that contains the...

Page 372: ...ckup plan p 372 Such task appears on the managed machine p 377 as a result of deploying a backup policy p 370 from the management server p 378 and can be modified only by editing the backup policy Cen...

Page 373: ...For example the retention rules require to delete a full backup p 376 that has expired but retain the next incremental p 377 one The backups will be combined into a single full backup which will be da...

Page 374: ...er of dynamic disks p 374 that store the common configuration data in their LDM databases and therefore can be managed as a whole Normally all dynamic disks created within the same machine p 377 are m...

Page 375: ...Dynamic disks organized on MBR Disk 1 and GPT Disk 2 disks For more information about dynamic disks please refer to the following Microsoft knowledge base articles Disk Management Windows XP Professio...

Page 376: ...ed anywhere on the disk or in the backup file the password hash is used for verification purposes With this two level security the backup data is protected from any unauthorized access but recovering...

Page 377: ...incremental backup L Local backup plan A backup plan p 370 created on a managed machine p 377 using direct management p 373 Local task A task p 380 belonging to a local backup plan p 377 or a task tha...

Page 378: ...try point to the Acronis Backup Recovery 10 infrastructure an easy way to protect data on numerous machines p 377 using backup policies p 370 and grouping enterprise wide monitoring functionality the...

Page 379: ...ic group A group of machines which a management server p 378 administrator populates by manually adding machines to the group A machine remains in a static group until the administrator removes it fro...

Page 380: ...to be performed on a managed machine p 377 when a certain time comes or a certain event occurs The actions are described in an xml script file The start condition schedule exists in the protected reg...

Page 381: ...ry under the bootable media to a spare hard drive can guarantee successful recovery in the future Validation rules A part of the backup plan p 370 Rules that define when and how often to perform valid...

Page 382: ...Server 2008 PE 2 1 WinPE is commonly used by OEMs and corporations for deployment test diagnostic and system repair purposes A machine can be booted into WinPE via PXE CD ROM USB flash drive or hard d...

Page 383: ...Wake On LAN Proxy 22 Acronis WOL Proxy 93 Action pages 12 13 15 Actions on a tape library vault 140 Actions on backup plans and tasks 183 187 Actions on backup policies 287 289 Actions on centralized...

Page 384: ...287 Backup policy Policy 19 58 370 372 373 378 379 Backup policy deployment states 287 288 Backup policy statuses 287 288 292 299 Backup policy s state and statuses 69 288 Backup priority 99 107 Backu...

Page 385: ...vault 161 Creating a volume 277 278 Creating Acronis Secure Zone 161 249 356 Creating an unmanaged centralized vault 132 135 Creating the volume structure automatically 264 Creating the volume struct...

Page 386: ...99 112 113 120 123 Files selection 220 Files to back up selection rules 350 353 Filtering and sorting archives 132 160 164 Filtering and sorting backup plans and tasks 183 190 303 Filtering and sortin...

Page 387: ...og 187 194 290 292 295 300 301 308 321 323 Log cleanup rules 91 97 336 341 Log entry details 194 196 Logging level 91 324 M Machine 19 369 370 371 372 374 375 377 378 379 380 381 Machine details 291 2...

Page 388: ...cal machines 292 Plan 378 Policies on machines and groups 64 293 Policy 378 Policy credentials 347 349 Policy deployment state on a group 71 Policy deployment state on a machine 69 Policy details 287...

Page 389: ...of volume being created 279 280 Selecting a host that will perform conversion 198 215 349 Selecting a virtual machine s disks and volumes 202 Selecting disks and volumes 200 202 Selecting entire virtu...

Page 390: ...er of Hanoi backup scheme 38 137 145 380 Tower of Hanoi scheme 210 361 Types of connection to a managed machine 76 Types of dynamic volumes 278 U Understanding Acronis Backup Recovery 10 27 Understand...

Page 391: ...277 Volume properties 224 Volume selection 240 242 Volume Shadow Copy Service 99 103 106 Volumes 217 223 Volumes to back up selection rules 350 W Weekly schedule 169 210 319 362 What if 158 When dedup...

Reviews: