background image

108 

Copyright © Acronis, Inc., 2000-2010 

 

 

Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) 
objects to SNMP management applications: 

1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 

1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical 
to messages published by Acronis Backup & Recovery 10 in its log). 

The preset is: 

Use the setting set in the Machine options.

 

To select whether to send the backup operations events to the SNMP managers: 

Choose one of the following: 

 

Use the setting set in the Machine options

 – to use the setting specified for the machine. For 

more information refer to Machine options (p. 91). 

 

Send SNMP notifications individually for backup operation events

 – to send the events of the 

backup operations to the specified SNMP managers. 

 

Types of events to send

 – choose the types of events to be sent: 

All events

Errors and 

warnings

, or 

Errors only

 

Server name/IP

 – type the name or IP address of the host running the SNMP management 

application, the messages will be sent to. 

 

Community

 – type the name of the SNMP community to which both the host running the 

SNMP management application and the sending machine belong. The typical community is 
"public". 

Click 

Send test message

 to check if the settings are correct. 

 

Do not send SNMP notifications

 – to disable sending the log events of the backup operations to 

SNMP managers. 

 

3.4.1.12

 

Fast incremental/differential backup 

The option is effective in Windows and Linux operating systems and bootable media. 

This option is effective for incremental and differential disk-level backup. 

This option defines whether a file change is detected using the file size and time stamp or by 
comparing the file contents to those stored in the archive.   

The preset is: 

Enabled.

 

Incremental or differential backup captures only data changes. To speed up the backup process, the 
program determines whether a file has changed or not by the file size and the date/time when the 
file was last modified. Disabling this feature will make the program compare the entire file contents 
to those stored in the archive. 

 

3.4.1.13

 

Backup splitting 

This option is effective for Windows and Linux operating systems and bootable media. 

The option defines how a backup can be split. 

The preset is: 

Automatic.

  

The following settings are available. 

Summary of Contents for BACKUP RECOVERY 10 ADVANCED SERVER -

Page 1: ...User s Guide Acronis Backup Recovery 10 Advanced Server...

Page 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Page 3: ...ackup scheme 34 2 6 Tower of Hanoi backup scheme 37 2 7 Retention rules 39 2 8 Backing up dynamic volumes Windows 42 2 9 Backing up LVM volumes Linux 44 2 10 Backing up RAID arrays Linux 46 2 11 Tape...

Page 4: ...117 4 Vaults 125 4 1 Centralized vaults 126 4 1 1 Working with the Centralized vault view 127 4 1 2 Actions on centralized vaults 128 4 1 3 Tape libraries 133 4 2 Personal vaults 155 4 2 1 Working wi...

Page 5: ...for destination 222 6 3 8 When to recover 222 6 3 9 Universal Restore 223 6 3 10 How to convert a disk backup to a virtual machine 224 6 3 11 Bootability troubleshooting 225 6 3 12 Recovering MD devic...

Page 6: ...6 Volume operations 272 6 11 7 Pending operations 278 6 12 Collecting system information 279 7 Centralized management 280 7 1 Administering Acronis Backup Recovery 10 Management Server 280 7 1 1 Dashb...

Page 7: ...pital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication mechanism a...

Page 8: ...rstanding of the GUI elements see Using the management console p 10 For how to enable non root users to start the console under Linux see Privileges for local connection p 74 For how to enable remote...

Page 9: ...s The tasks can be filtered by machines backup plans and other parameters Refer to the context help for details Viewing log To view the centralized log collected from the registered machines select Lo...

Page 10: ...ovided in the Setting up centralized data protection in a heterogeneous network p 55 section 1 2 1 Using the management console As soon as the console connects to a managed machine p 369 or to a manag...

Page 11: ...ess to the main operations available on the managed machine Dashboard Use this view to estimate at a glance whether the data is successfully protected on the managed machine Backup plans and tasks Use...

Page 12: ...e to a managed machine 2 In the navigation tree right click the machine s name a root element of the navigation tree and then select Create shortcut If the console and agent are installed on the same...

Page 13: ...action page see the Action pages p 15 section All the actions can also be accessed in the Actions menu Actions bar on a managed machine and on a management server Tools Contains a list of the Acronis...

Page 14: ...pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the panes borders are set When you run the management console next time all the pane...

Page 15: ...king in the items in the Item s name Actions bar on the Actions and Tools pane By selecting the items in the Actions menu By right clicking the item and selecting the operation in the context menu Act...

Page 16: ...started the plan creation from the list Thus you can perform the remaining steps and accomplish the backup plan creation Navigation buttons 1 3 Acronis Backup Recovery 10 components This section cont...

Page 17: ...to their original location or to another place It is possible to recover all files and folders that were backed up or select which of them to recover Other operations Conversion to a virtual machine R...

Page 18: ...or select which of them to recover 1 3 2 1 Deduplication This add on enables the agent to back up data to deduplicating vaults managed by Acronis Backup Recovery 10 Storage Node 1 3 3 Components for c...

Page 19: ...he vCenter and automatically register virtual machines created by Acronis Backup Recovery 10 in the vCenter Integration is available in all Acronis Backup Recovery 10 advanced editions a license for V...

Page 20: ...ns that identical data will be backed up to this vault only once to minimize the network usage during backup and storage space taken by the archives For more information please see the Deduplication p...

Page 21: ...store p 17 add on enables you to create bootable media with the restore to dissimilar hardware functionality Universal Restore handles differences in devices that are critical for Windows start up suc...

Page 22: ...ows Vista all editions Windows 7 all editions Acronis Backup Recovery 10 Management Server and Acronis Backup Recovery 10 Storage Node Windows 2000 Professional SP4 XP Professional SP2 Windows 2000 Se...

Page 23: ...ased distribution such as RHEL CentOS Fedora or Scientific Linux make sure that the following 32 bit packages are installed in the system pam i386 libselinux i386 libsepol i386 These packages should b...

Page 24: ...a day seven 7 days per week Such electronic services may include but are not limited to user forums software specific information hints and tips bug fix retrieval via the internet software maintenanc...

Page 25: ...Copyright Acronis Inc 2000 2010 25 More information about contacting Acronis Technical Support is available at the following link http www acronis eu enterprise support...

Page 26: ...ate bootable media p 363 4 Connect the console to the managed machine 5 Create a backup plan p 362 To do so you have to specify at the very least the data to be protected and the location where the ba...

Page 27: ...Copyright Acronis Inc 2000 2010 27 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Page 28: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Page 29: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Page 30: ...ar user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but without using a file lev...

Page 31: ...the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local backup plans owned by any...

Page 32: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Page 33: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Page 34: ...cheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acronis With Acronis Backup Recovery 10 you can easily set up a backup plan that will regularly...

Page 35: ...sume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be created Backup tasks created according to the GFS scheme by Acronis Backup Recovery 10 Sched...

Page 36: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Page 37: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Page 38: ...tern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table shows the patte...

Page 39: ...vel backup scheme The pattern consists of 16 sessions As a result of using incremental and differential backups the situation may arise when an old backup deletion must be postponed as it still is a b...

Page 40: ...date and time in the past corresponding to this interval and deletes all backups created before that moment None of the backups created after this moment will be deleted 2 Keep the archive size withi...

Page 41: ...ther backups one of the following rules is applied Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also be...

Page 42: ...me If the free space which in fact is the storage device free space approaches zero you might need to toughen the restrictions for some or all archives residing in this vault 2 8 Backing up dynamic vo...

Page 43: ...pace The total size of unallocated space is 40GB The recovery will always result in a striped volume if the unallocated space is distributed evenly among the disks 20GB and 20GB If one of the disks ha...

Page 44: ...n running in Linux with 2 6 x kernel or a Linux based bootable media You can back up data of one or more logical volumes and recover it to a previously created logical volume or a basic MBR disk or vo...

Page 45: ...GUI displays a similar table Num Partition Flags Start Size Type _________________________________________________________________ Disk 1 1 1 hda1 boot Pri Act 63 208782 Ext3 1 2 hda2 Pri 208845 8177...

Page 46: ...ing up such volumes does not make sense when a software array is mounted as it won t be possible to recover them Example Here is an example of a volumes list obtained with the list command The GUI dis...

Page 47: ...rrays may be listed alongside other disks as if they had a bad partition table or no partition table at all Backing up such disks does not make sense as it won t be possible to recover them 2 11 Tape...

Page 48: ...backup you start with a new tape and create a new archive As soon as the tape is full a dialog window with a request to insert a new tape will appear The content of a non empty tape will be overwritt...

Page 49: ...d there will be lost That s why Acronis Secure Zone should not be the only location where a backup is stored In enterprise environments Acronis Secure Zone can be thought of as an intermediate locatio...

Page 50: ...ne hits F11 on prompt Press F11 for Acronis Startup Recovery Manager and performs data recovery in the same way as with ordinary bootable media The user can also back up using Acronis Startup Recovery...

Page 51: ...rivers Universal Restore is applicable for 1 Instant recovery of a failed system on different hardware 2 Hardware independent cloning and deployment of operating systems 3 Physical to physical physica...

Page 52: ...Server Virtual Edition Universal Restore for the other product editions is purchased separately has its own license and is installed as a separate feature from the setup file You need to re create bo...

Page 53: ...while the rest of the files which are not immediately necessary are being recovered in the background Examples movie collection storage music collection storage multimedia storage How to use 1 Back up...

Page 54: ...g To be able to propagate the management operations to multiple machines you install Acronis Backup Recovery 10 Management Server p 370 and register p 371 the machines on the server After that you can...

Page 55: ...dy saved in the vaults Deduplication results in reducing backup traffic and saving storage space The storage node also undertakes operations with archives such as validation and cleanup which otherwis...

Page 56: ...Install Acronis Backup Recovery 10 Agent on each of the machines to back up the machine s disks volumes or files Agent W Agent for Windows Agent L Agent for Linux When installing the agents register...

Page 57: ...p 59 section Here are some scenarios supported by the aforementioned Acronis Backup Recovery 10 implementation 2 13 2 1 Protecting the servers You will most likely create individual backup plans on ea...

Page 58: ...to Deployed and its status has to be OK To see the resulting backup plans on each of the workstations a navigate to the All machines group or the W_1 group b select the workstation c select the Backup...

Page 59: ...if the accounting department forms a separate Active Directory organization unit You specify the accounting OU as the group membership criterion If a new accountant is hired the new machine will be a...

Page 60: ...istrator creates the G1 dynamic group that contains machines with the server operating systems and applies a backup policy to the group Any server that is added to the network and registered on the ma...

Page 61: ...that remain in the group of all machines anyway Operations with groups to which backup policies are applied will result in changing the policies on the member machines If a machine is not available or...

Page 62: ...nd so the management server tracks and displays personal statuses for each machine that it works with as well as the policy s cumulative status 2 13 4 1 A policy on a machine or a group In the diagram...

Page 63: ...iner stands for a group the one color circle stands for a machine with one applied policy the two color circle stands for a machine with two applied policies the white circle stands for a machine with...

Page 64: ...that a machine can be a member of only one group besides the All machines group Let s start from this simplified approach In the diagram below the container stands for a group the two color circle sta...

Page 65: ...both orange and green policies in spite of the fact that G3 has nothing to do with the orange policy That s why it is difficult to track the policies inheritance from the top of the hierarchy if the s...

Page 66: ...te on the machine is Deploying Once the backup plan is successfully created the policy state on the machine becomes Deployed You may need to modify the policy for some reason Once you confirm the chan...

Page 67: ...changed to Deployed If no data to back up is found at the time when the backup task starts the task will fail and the policy status will turn to Error If at least one of the data items is found the ba...

Page 68: ...e and status as related to a specific machine the backup policy has the deployment state and status on a group of machines and the cumulative deployment state and status of the policy 2 13 5 3 Policy...

Page 69: ...lays the cumulative status for each policy This status is defined as the most severe status of the policy on all machines the policy is applied to If the policy is not applied to any machine its statu...

Page 70: ...10 GB to the database In case the database is corrupted or the storage node is lost while the vault retains archives and the service folder containing metadata the new storage node rescans the vault...

Page 71: ...sources Such is the case when you back up operating systems and applications deployed from a single source over the network When performing incremental backups of similar data from different sources p...

Page 72: ...size will be just about 1 GB in a deduplicating vault This gives a deduplication ratio of 2 1 or 50 Conversely if the two files had different content the backup sizes in non deduplicating and duplica...

Page 73: ...s is cleared it is cleared by default If the file is less than 4 KB in size If you protected the archive with a password Files that were not deduplicated are stored in the archive as they would be in...

Page 74: ...nsole is running 2 13 7 2 Privileges for local connection Windows Local connection on a machine running Windows can be established by any user who has the Log on locally user right on the machine Linu...

Page 75: ...latest version of Linux PAM for your Linux distribution The latest stable source code of Linux PAM is available at Linux PAM source code Web page Remote connection as the root user Remote connections...

Page 76: ...d the following three lines to the file user_a user_b user_c If necessary also add the root user to the file 3 Create the file etc pam d Acronisagent trusted with the following content PAM 1 0 auth re...

Page 77: ...rent Instead of Acronis Remote Users and Acronis Centralized Admins the groups are named DCNAME Acronis Remote Users and DCNAME Acronis Centralized Admins respectively here DCNAME stands for the NetBI...

Page 78: ...perform any further steps all users are typically members of the Domain Users group and so can access the storage node Otherwise you need to create user accounts on the machine where the storage node...

Page 79: ...ts to any existing account you specify for a corresponding service If you choose to specify an existing user account for the agent service or the storage node service make sure that this account is a...

Page 80: ...communication options p 81 For instructions on how to manage SSL certificates used for secure authentication see SSL certificates p 84 Note The components of earlier Acronis products including those...

Page 81: ...tion option that you want to configure The Administrative Template contains the following options each option is explained later in this topic Remote Agent ports Client Encryption options Server Encry...

Page 82: ...lf signed certificates check box allows the client to connect to the server applications that use self signed SSL certificates such as certificates created during the installation of Acronis Backup Re...

Page 83: ...is enabled The connection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured 2 13 8 4 Network port configuration Acronis B...

Page 84: ...erver application use an SSL certificate called the server certificate In Windows the certificate path and the server certificate s file name are specified in the registry key HKEY_LOCAL_MACHINE SOFTW...

Page 85: ...md 3 Run the following command note quotation marks CommonProgramFiles Acronis Utils acroniscert reinstall 4 Restart Windows or restart the running Acronis services Non self signed certificates You ha...

Page 86: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Page 87: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Page 88: ...the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all the machines registered on the manageme...

Page 89: ...nt server has to send its own log events to the specified Simple Network Management Protocol SNMP managers You can choose the types of events to be sent Acronis Backup Recovery 10 provides the followi...

Page 90: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Page 91: ...307 to the virtual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Serv...

Page 92: ...nagement Server IP Name 3 Specify the user name and password of the management server administrator on prompt 4 In the Machine s registration address select how the machine will be registered on the m...

Page 93: ...fective for both Windows and Linux operating systems This option is not available when operating under the bootable media The option defines whether the agent s operating on the managed machine have t...

Page 94: ...the installation disc of your operating system Linux To receive SNMP messages on a machine running Linux the net snmp for RHEL and SUSE or the snmpd for Debian package has to be installed SNMP can be...

Page 95: ...d recovery options 3 4 1 Default backup options Each Acronis agent has its own default backup options Once an agent is installed the default options have pre defined values which are referred to as pr...

Page 96: ...ting p 108 File level security p 109 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 110 Dest removable media Dest removable media...

Page 97: ...s Disabled To protect the archive from unauthorized access 1 Select the Set password for the archive check box 2 In the Enter the password field type a password 3 In the Confirm the password field re...

Page 98: ...y using the attrib command For more information refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files whose names match any...

Page 99: ...o any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file from the drop down list 3 Click OK Pre backup command To specify a command batc...

Page 100: ...s This option is effective for both Windows and Linux operating systems The option enables you to define the commands to be automatically executed before and after data capture that is taking the data...

Page 101: ...Selected Selected Cleared Cleared Result Preset Perform the data capture only after the command is successfully executed Fail the task if the command execution fails Perform the data capture after th...

Page 102: ...up at the same point in time Choose this setting only if these factors are critical that is backing up files without a snapshot does not make sense To use a snapshot the backup plan has to run under...

Page 103: ...taken by Acronis Backup Recovery 10 Backup process is fastest but data consistency of the applications whose transactions are not completed at the time of taking a snapshot cannot be guaranteed You m...

Page 104: ...r to Backup priority This option is effective for both Windows and Linux operating systems The priority of a process running in a system determines the amount of CPU and system resources allocated to...

Page 105: ...up data By default the speed is set to maximum i e the software uses all the network bandwidth it can get when transferring the backup data Use this option to reserve a part of the network bandwidth t...

Page 106: ...server check box to enable a POP server and to set up its settings Incoming mail server POP enter the name of the POP server Port set the port of the POP server By default the port is set to 110 User...

Page 107: ...chine have to log events of the backup operations in the Application Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the...

Page 108: ...will be sent to Community type the name of the SNMP community to which both the host running the SNMP management application and the sending machine belong The typical community is public Click Send...

Page 109: ...ined to an FTP server since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size 3 4 1 14 File level security These options are effective only...

Page 110: ...the one click approach does not presume user selections such as selecting volumes to recover Acronis One Click Restore always recovers the entire disk If your disk contains several volumes and you are...

Page 111: ...or network share Managed vaults and FTP servers are not supported as secondary destinations The preset is Disabled When dual destination is enabled the agent will automatically copy each backup being...

Page 112: ...please see Scheduling p 162 and Conditions p 172 The preset is Wait until the conditions are met Wait until the conditions are met With this setting the scheduler starts monitoring the conditions and...

Page 113: ...n as an attempt completes successfully OR the specified number of attempts is performed depending on which comes first If the task fails because of a mistake in the backup plan you can edit the plan w...

Page 114: ...ific machine off site When the Use a separate tape set option is enabled there might be a case when the backup has to be written onto a tape that is currently out of the tape library device Define wha...

Page 115: ...en the option is enabled backing up to removable media may be not possible if the user is away because the program will wait for someone to press OK in the prompt box Hence you should disable the prom...

Page 116: ...led deduplication at target Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node The eventual size of the backup in...

Page 117: ...very options from the top menu Availability of the recovery options The set of available recovery options depends on The environment the agent operates in Windows Linux bootable media The type of data...

Page 118: ...he program does not support interactive commands i e commands that require user input for example pause A post recovery command will not be executed if the recovery proceeds with reboot To specify pre...

Page 119: ...d 4 If successful execution of the command is critical for you select the Fail the task if the command execution fails check box In case the command execution fails the task run result will be set to...

Page 120: ...and Linux operating systems This option is not available when operating under the bootable media The option enables you to receive e mail notifications about the recovery task s successful completion...

Page 121: ...WinPopup notifications about about the recovery task s successful completion failure or need for interaction The preset is Disabled Before configuring WinPopup notifications make sure the Messenger se...

Page 122: ...ry operations in the Application Event Log SNMP notifications This option is effective for both Windows and Linux operating systems This option is not available when operating under the bootable media...

Page 123: ...eraction it will fail Details of the operation including errors if any can be found in the operation log Re attempt if an error occurs The preset is Enabled Number of attempts 5 Interval between attem...

Page 124: ...erating system has to be recovered Reboot machine after recovery This option is effective when operating under bootable media The preset is Disabled This option enables booting the machine into the re...

Page 125: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Page 126: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Page 127: ...the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space is free space of the ap...

Page 128: ...the vault type Managed or Unmanaged The procedure of creating centralized vaults is described in depth in the following sections Create a managed centralized vault p 129 Create an unmanaged centraliz...

Page 129: ...a tape library on a managed vault Click Manage tapes In the Tape Management window define labels for tapes and refresh the inventory For more details see the Managing tape library p 138 section Resca...

Page 130: ...aged vault will be created 1 Enter the full path to the folder in the Path field or select the desired folder in the folders tree Managed vaults can be organized on the hard drives local to the storag...

Page 131: ...password field re type the password 4 Select one of the following AES 128 the vault contents will be encrypted using the Advanced Standard Encryption AES algorithm with a 128 bit key AES 192 the vaul...

Page 132: ...ncing loads between storage nodes As a result the first node stops managing the vault The second node scans archives in the vault creates and fills up the database corresponding to the vault and start...

Page 133: ...oading mounting rewinding and reading a tape with the full data backup However a tape should be read for example to validate p 373 a backup or to recover data from a backup A tape library can be local...

Page 134: ...on a tape However after this operation all the incremental and differential backups stored on other tapes and based on the deleted backups cannot be used for data recovery In a Custom backup plan s re...

Page 135: ...storage snap in Control panel Administrative tools Computer management Removable storage Media pools If a tape has moved into the Free pool it is considered as free and will be accessible to write by...

Page 136: ...y have barcodes and the RSM Free pool contains enough tapes for a chosen backup scheme the library is ready to fully work automatically You can start working with the vault even though all the tape li...

Page 137: ...y plan creation These options enable you to specify how the created backup policy plan should use tapes from the tape library however the options presets increase usage efficiency of both whole tape l...

Page 138: ...138 Rescan p 139 Labeling p 139 Any user with access to a managed vault on a tape library is able to perform these operations However two or more users cannot manage a tape library drive simultaneous...

Page 139: ...t before the tape will be used If you need to apply a specific label for a tape for example MyWork label for a tape dedicated to back up files from the folder C work instead of a barcode label use the...

Page 140: ...ption is enabled the backups belonging to the policy or plan being created will be located on a separate tape set Other backups will not be written to this tape set If the console is connected to the...

Page 141: ...ful information to choose a backup scheme and tape options for tape rotation To calculate the number of tapes required for tape rotation schemes you can use the method described in the Tape planning p...

Page 142: ...s slots and available tapes capacity of tapes requirements for performing data recovery maximal duration You need to analyze every argument that is relevant for your case and select the main criteria...

Page 143: ...a separate tape set option is selected All the Always use a free tape options are selected It requires 28 tapes in rotation These examples demonstrate how the number of tapes required for automated r...

Page 144: ...chive at the moment The differential backup is drawn as a blue rectangle in the figure Number 1 in the green rectangle marks the incremental backup created on Monday of the 1st week of the year Then t...

Page 145: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Page 146: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Page 147: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Page 148: ...ted the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define the tape rotation scheme t...

Page 149: ...5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbers from 1 to 5 by letters A B C D and E respectively Then t...

Page 150: ...ept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and incremental A backups stored on tape 02 The full backup deletion is postponed until all the above...

Page 151: ...E because at the moment the first full backup is a base for differential backups D C and B are a base for incremental backup A So the full backup deletion is postponed until all the D C B and A backup...

Page 152: ...vel The example demonstrates that the tapes usage efficiency is reduced Moreover the data recovery requires access to the backups kept on one full backups 6 two differential backups 44 or three increm...

Page 153: ...se a separate tape set option is selected the Always use a free tape For each full backup option is cleared the Always use a free tape For each incremental backup option is cleared the Always use a fr...

Page 154: ...number of the tapes that will be free after the deletion So the calculation ignores this probability Tape set 01 should contain round up F_GB 4 D_GB 5 7 I_GB CL T_GB tapes to store the backups Tape s...

Page 155: ...direct connection of the console to a managed machine Personal vaults are specific for each managed machine Personal vaults are visible to any user that can log on to the system A user s right to bac...

Page 156: ...n the selected archives and backups The list of backups is expanded by clicking the plus sign to the left of the archive s name All the archives are grouped by type on the following tabs The Disk arch...

Page 157: ...n to the Validation p 230 page where this vault is already pre selected as a source The vault validation checks all the archives stored in the vault Delete a vault Click Delete The deleting operation...

Page 158: ...r destination to vault B 4 In the vaults tree select vault B to check whether the archives are displayed If not click Refresh 5 Delete vault A 4 3 Common operations 4 3 1 Operations with archives stor...

Page 159: ...ons item of the main menu The following is a guideline for you to perform operations with backups To Do View backup content in a separate window Click View content In the Backup Content window examine...

Page 160: ...kup To preserve archive consistency the program will consolidate the two backups For example you delete a full backup but retain the next incremental one The backups will be combined into a single ful...

Page 161: ...10 161 To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you...

Page 162: ...current user specify the user s account User logoff any user current user specify the user s account System startup Free space change specify the amount of free space change on any volume selected fo...

Page 163: ...ample if you set Every 2 day s the task will be started on every other day In the During the day execute the task area select one of the following Once at Set up the time at which the task will be run...

Page 164: ...ion and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00 PM in our example To 12 15 2009 On this date the task will be performed for the...

Page 165: ...the task frequency to Every 1 hour From 10 00 00 AM until 10 00 00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day In the Effective area set the following settings From Set up...

Page 166: ...the task say on Monday at 11 30 AM the task will be started on the same day at 9 PM If the task was created say on Friday after 9 PM then it will be started for the first time on the nearest workday M...

Page 167: ...the last day of the month irrespective of its actual date On Select specific days of the weeks to run the task on In the During the day execute the task area select one of the following Once at Set up...

Page 168: ...stom backup scheme p 206 section Season schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010 During a workday the task is performed every 6 hours from 12 AM midnig...

Page 169: ...o not set 5 4 At Windows Event Log event This type of schedule is effective only in Windows operating systems You can schedule a backup task to start when a certain Windows event has been recorded in...

Page 170: ...D 7 Important To ensure that such a task will complete despite the presence of bad blocks you must make the task ignore bad blocks To do this in Backup options go to Error handling and then select the...

Page 171: ...anup or validation is scheduled to start If the backup task on each machine starts with a delay see the next setting the management server will wake up the machines according to those delays Before us...

Page 172: ...ackup plan 2 In How to back up select the Simple Tower of Hanoi or Custom scheme and then click Change to specify a schedule for the scheme 3 Under Run the task select Daily Weekly or Monthly 4 In the...

Page 173: ...ly if all users are logged off Condition Time since last backup Value Time since the last backup 12 hour s Task start conditions Wait until the conditions are met If the free space changes by more tha...

Page 174: ...ge for backing up users data and servers The workday starts at 8AM and ends at 5 PM Users data should be backed up as soon as the users log off but not earlier than 4 30 PM and not later than 10 PM Ev...

Page 175: ...ged on at 11 PM run the task anyway Event Monthly Months All On First Third Friday Once at 08 00 00 PM Condition User logged off Task start conditions Wait until the conditions are met Run the task an...

Page 176: ...ed after 12 hours have passed since the completion of the latest successful backup the backup task will start immediately 3 if the machine is never restarted the task will never start You can start th...

Page 177: ...ou can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what action has to be performed for exam...

Page 178: ...will launch the Bootable Media Builder p 370 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time...

Page 179: ...ecution states in the Backup plans and tasks p 179 view and specify your decision on each task in the Information panel or in the Task details p 187 window 6 1 2 Backup plans and tasks The Backup plan...

Page 180: ...Otherwise see 4 Waiting for condition This situation is quite normal but delaying a backup for too long is risky The solution may be to set the maximum delay or force the condition tell the user to l...

Page 181: ...started manually or the event specified by the schedule occurs the task enters either the Running state or the Waiting state Running A task changes to the Running state when the event specified by th...

Page 182: ...task Check the task log to find out the reason of the failure then do one or more of the following Remove the reason of the failure optionally Start the failed task manually Edit the failed task to p...

Page 183: ...ls View plan s task s log Backup plan Click View log You will be taken to the Log p 190 view containing the list of the plan related log entries Task Click View log You will be taken to the Log p 190...

Page 184: ...The task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unalloc...

Page 185: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Page 186: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Page 187: ...an Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backup schemes only To...

Page 188: ...ment operations Compacting Service task performed on a storage node Indexing Deduplication task performed by the storage node in the vault after a backup is completed Depending on the type of task and...

Page 189: ...der which the plan runs Owner the name of the user who created or last modified the plan State execution state p 180 of the backup plan Status status p 180 of the backup plan Schedule whether the task...

Page 190: ...n the Log view with pre filtered log entries for the item in question Thus you do not have to configure filters in the log table yourself View Action Dashboard In the calendar right click on any highl...

Page 191: ...e log entries 2 In the To field select the date up to which to display the log entries Filter log entries by type Press or release the following toolbar buttons to filter error messages to filter warn...

Page 192: ...er user name of the backup plan owner only under operating system Message a text description of the event The log entry s details that you copy will have the appearance as follows Log Entry Details Ty...

Page 193: ...s the sequence number of the archive in the location you have selected Access credentials p 199 Optional Provide credentials for the location if the plan account does not have access permissions to th...

Page 194: ...l Specify whether to convert every full every incremental or every differential backup or convert the last created backup on schedule Specify the conversion schedule if required Host p 210 Specify the...

Page 195: ...indows or for Linux is installed Select this option to back up specific files and folders If you are not concerned about recovery of the operating system along with all the settings and applications b...

Page 196: ...e backup stores all other files and folders of the selected volume independent of their attributes including hidden and system files the boot record the file allocation table FAT if it exists the root...

Page 197: ...of the following parameters Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute If a folder is Hidden all of its contents including files tha...

Page 198: ...k share which is mounted on a mount point such as mnt share select this mount point instead of the network share itself To back up data to an FTP or SFTP server type the server name or address in the...

Page 199: ...be lost in the archive content Backup plans that operate with the same archive should back up the same data items say both plans back up volume C 2 Applying multiple retention rules to an archive mak...

Page 200: ...up levels up to 16 In this scheme the data can be backed up more than once a day By setting up the backup schedule and selecting backup levels you automatically obtain the rollback period the guarante...

Page 201: ...ention periods for backups of each type Description Let us suppose that we want to set up a backup plan that will regularly produce a series of daily D weekly W and monthly M backups Here is a natural...

Page 202: ...ntil all backups that directly depend on it become subject to deletion as well This is why you might see a weekly or a monthly backup remain in the archive for a few days past its expected expiration...

Page 203: ...to recover a previous version of a damaged file from a daily backup as well as 10 day access to weekly backups Each monthly full backup will be available for six months since the creation date Work sc...

Page 204: ...ce Up to 16 levels of full differential and incremental backups Next level backups are twice as rare as previous level backups One backup of each level is stored at a time Higher density of more recen...

Page 205: ...ackups accumulate toward the current time Having four backups we could recover data as of today yesterday half a week or a week ago Roll back period The number of days we can go back in the archive is...

Page 206: ...s Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup For example the full backup can be set up to run every Sunday at 1 00 AM as soon as all u...

Page 207: ...e can be set up to run after each backup and also on schedule This option is available only if you have set at least one retention rule in Retention rules Cleanup schedule only if On schedule is selec...

Page 208: ...wait until all users are logged off and users are idle respectively Finally we create retention rules for the archive let us retain only backups that are no older than six months and let the cleanup...

Page 209: ...rchive will validate all the archive s backups and may take a long time and a lot of system resources 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule...

Page 210: ...e management server because such machines are not supposed to be backed up What is the host s processing power The conversion task will be created on the machine being backed up and will use this mach...

Page 211: ...ckup to a new virtual machine of any of the following types VMware Workstation Microsoft Virtual PC Parallels Workstation or Citrix XenServer virtual appliance The virtual appliance can then be import...

Page 212: ...re p 52 for details Files p 221 You may have to specify credentials for the destination Skip this step when operating on a machine booted with bootable media Access credentials p 222 Optional Provide...

Page 213: ...ged on If the task has to run on schedule you will be asked for the current user s password on completing the task creation Use the following credentials The task will always run under the credentials...

Page 214: ...means that the user name and password can be intercepted by an eavesdropper using a packet sniffer If the archive is stored on a locally attached tape device expand the Tape drives group then click t...

Page 215: ...by selecting the corresponding check boxes in the archives tree Selecting a folder automatically selects all its nested folders and files Use the table to the right of the archives tree to select the...

Page 216: ...virtual machine files will be saved to the destination you specify If Acronis Backup Recovery 10 Agent for Hyper V or Agent for ESX ESXi is installed These agents enable creating a new virtual machine...

Page 217: ...on the disk and programs won t find their files The operating system on that disk will be unbootable To retain system bootability on the target disk volume choose one of the following Select automati...

Page 218: ...le when the Acronis Backup Recovery 10 Agent for Hyper V or Agent for ESX ESXi is installed On selecting this you specify the virtualization server and the target virtual machine Then you proceed to t...

Page 219: ...olume s type You can change this setting if required Primary Information about primary volumes is contained in the MBR partition table Most operating systems can boot only from the primary volume of t...

Page 220: ...ft part of the window select the virtualization server Use the right part of the window to review details on the selected server 3 Click OK to return to the Data recovery page To select the type of vi...

Page 221: ...ts A multicore host CPU or hyperthreading may enable multiple virtual processors on a single processor host 6 3 6 5 File destination To specify a destination 1 Select a location to recover the backed...

Page 222: ...riority over the file on the hard disk Overwrite existing file if it is older this will give priority to the most recent file modification whether it be in the backup or on the disk Do not overwrite e...

Page 223: ...vers in the exe cab or zip format extract them using a third party application such as WinRAR http www rarlab com or Universal Extractor http legroom net software uniextract The best practice is to st...

Page 224: ...in the Mass storage drivers to install anyway step Use drivers bundled with your virtual machine software or download the latest drivers versions from the software manufacturer Web site 6 3 10 How to...

Page 225: ...stem will not boot This cannot be fixed by changing the boot device order in BIOS because a Virtual PC ignores these settings 10 In When to recover specify when to start the recovery task 11 Optionall...

Page 226: ...is on the file system of one of the volumes System bootability can be recovered automatically only when the GRUB resides in the first several sectors of the disk and on the file system to which direc...

Page 227: ...Fedora and Red Hat Enterprise Linux distributions for example as follows vi mnt system boot grub menu lst 6 In the menu lst file respectively grub conf find the menu item that corresponds to the syst...

Page 228: ...ult multi 0 disk 0 rdisk 0 partition 1 WINDOWS operating systems multi 0 disk 0 rdisk 0 partition 1 WINDOWS Microsoft Windows XP Professional noexecute optin fastdetect Windows Vista 2008 A part of th...

Page 229: ...icient amount of memory allocated to the recovery process by the operating system s cache manager You can either work around this problem or modify the registry to increase the amount of allocated mem...

Page 230: ...Add the storage node to the management server again by specifiying the machine on which the recovered storage node is installed 3 Re create the necessary managed vaults 6 4 Validating vaults archives...

Page 231: ...this archive Vault p 233 select a vault or other location which archives to validate Access Credentials p 233 Optional Provide credentials for accessing the source if the task account does not have en...

Page 232: ...System CIFS network share which is mounted on a mount point such as mnt share select this mount point instead of the network share itself If the archive is stored on an FTP or SFTP server type the se...

Page 233: ...uired for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer Using the archive...

Page 234: ...e see the Scheduling p 162 section 6 5 Mounting an image Mounting volumes from a disk backup image lets you access the volumes as though they were physical disks Multiple volumes contained in the same...

Page 235: ...re expand the Network folders group then select the required networked machine and then click the shared folder If the network share requires access credentials the program will ask for them Note for...

Page 236: ...User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK Accord...

Page 237: ...6 7 Exporting archives and backups The export operation creates a copy of an archive or a self sufficient part copy of an archive in the location you specify The original archive remains untouched Th...

Page 238: ...anaged machine you can export an archive or part of an archive to and from any location accessible to the agent residing on the machine These include personal vaults locally attached tape devices remo...

Page 239: ...e p 213 in that case you need to specify the archive only Backups p 241 specify the archive first and then select the desired backup s in this archive Access credentials p 241 Optional Provide credent...

Page 240: ...one when the program prompts If the archive is stored on a network share expand the Network folders group then select the required networked machine and then click the shared folder If the network sha...

Page 241: ...entials 1 Select one of the following Use the task credentials The program will access the location using the credentials of the task account specified in the General section Use the following credent...

Page 242: ...a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer To export data to a locally attached tape device expand the Tape drives...

Page 243: ...Password The password for the account 2 Click OK According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means th...

Page 244: ...r the Acronis Secure Zone depending on your selection You will be able to set the exact zone size in the Acronis Secure Zone Size p 244 window 3 Click OK 6 8 1 2 Acronis Secure Zone Size Enter the Acr...

Page 245: ...ram will not decrease a volume where free space is or becomes less than 25 of the total volume size Only when all volumes on the disk have 25 or less free space will the program continue decreasing th...

Page 246: ...Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1 On the Manage Acronis Secure Zone page click Decrease 2 Select volumes that will receive free space after the zone is decreased 3 Spec...

Page 247: ...econfigure the boot loader manually after the activation Do not activate Disables boot time prompt Press F11 for Acronis Startup Recovery Manager or the menu item in GRUB If Acronis Startup Recovery M...

Page 248: ...other plug ins you ve added to the PE PE based bootable media helps overcome some Linux related bootable media issues such as support for certain RAID controllers or certain levels of RAID arrays onl...

Page 249: ...ows Server 2008 PE 2 1 http www microsoft com downloads details aspx FamilyID 94bb6e34 d890 4932 81a5 5b50c657de08 DisplayLang en Automated Installation Kit AIK for Windows 7 PE 3 0 http www microsoft...

Page 250: ...e USB flash drives if the hardware BIOS allows for boot from such media build an ISO image of a bootable disc to burn it later on a blank disc upload the selected components to Acronis PXE Server uplo...

Page 251: ...command prompt To start the management console from the command prompt run the command bin product nousb Disables loading of the USB Universal Serial Bus subsystem nousb2 Disables USB 2 0 support USB...

Page 252: ...gs are selected for saving on the media The MAC address of each existing NIC is also saved on the media You can change the settings except for the MAC address or configure the settings for a non exist...

Page 253: ...ID or Fiber Channel adapter for the hard disk For more information please refer to Universal Restore p 223 The drivers will be placed in the visible Drivers folder on the bootable media The drivers ar...

Page 254: ...ISO with the plug in from scratch Adding the Acronis Plug in to a WIM file for any future purpose manual ISO building adding other tools to the image and so on To be able to perform any of the above...

Page 255: ...6 etfsboot com c winpe_x86 ISO c winpe_x86 winpe_x86 iso For more information on customizing Windows PE see the Windows Preinstallation Environment User s Guide Winpe chm 6 10 1 4 Building Bart PE wit...

Page 256: ...e utility might correspond to the E drive in Windows Be careful To be on the safe side it is advisable to assign unique names to the volumes 2 The Linux style bootable media shows local disks and volu...

Page 257: ...hine and the iSCSI target is called the iSCSI initiator The name of the iSCSI initiator is usually defined by an administrator of the server that hosts the device To add an iSCSI device 1 In a bootabl...

Page 258: ...route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep...

Page 259: ...e s hard disks If disk configuration has changed An MD device or a logical volume resides on one or more disks each of its own size If you replaced any of these disks between backup and recovery or if...

Page 260: ...l volumes or both Note Logical Volume Manager utilities such as pvcreate and vgcreate which are normally available in Linux are not included in the bootable media environment so you need to use the lv...

Page 261: ...nd dev md1 devices lvm pvcreate dev md0 dev md1 lvm vgcreate my_volgroup dev md0 dev md1 lvm vgdisplay The output of the lvm vgdisplay command will contain lines similar to the following Volume group...

Page 262: ...stored in the backup For example trueimagecmd list filename smb server backups linux_machine tib The output will contain lines similar to the following Num Idx Partition Flags Start Size Type Disk 1...

Page 263: ...nt components 3 Follow the onscreen instructions Acronis PXE Server runs as a service immediately after installation Later on it will automatically launch at each system restart You can stop and start...

Page 264: ...eate the necessary disk configuration so that the volume image can be recovered exactly as it was or with any alteration of the disk or volume structure the user might consider necessary All operation...

Page 265: ...different letter in different Windows operating systems For example volume E might appear as D or L when you boot another Windows operating system installed on the same machine It is also possible tha...

Page 266: ...sfers complete data from the source basic MBR disk to the target Disk conversion MBR to GPT p 269 converts an MBR partition table to GPT Disk conversion GPT to MBR p 270 converts a GPT partition table...

Page 267: ...ult In any case the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the source disk data to a target disk exactly as it is Acronis Disk Director Lite allows...

Page 268: ...ystem volume pay attention to the Advanced options By clicking Finish you ll add the pending operation of the disk cloning To finish the added operation you will have to commit p 278 it Exiting the pr...

Page 269: ...l receive a warning window stating that you are about to convert MBR into GPT 3 By clicking OK you ll add a pending operation of MBR to GPT disk conversion To finish the added operation you will have...

Page 270: ...You would want to convert a basic disk to dynamic in the following cases If you plan to use the disk as part of a dynamic disk group If you want to achieve additional disk reliability for data storag...

Page 271: ...types except Simple volumes then you will be warned here about the possible damage to the data involved in the conversion Please note the operation is unavailable for a dynamic disk containing Spanned...

Page 272: ...g operations that can be performed on volumes Create Volume p 272 Creates a new volume with the help of the Create Volume Wizard Delete Volume p 276 Deletes the selected volume Set Active p 276 Sets t...

Page 273: ...Mirrored Volume A fault tolerant volume also sometimes called RAID 1 whose data is duplicated on two identical physical disks All of the data on one disk is copied to another disk to provide data red...

Page 274: ...elected type of volume you will receive the appropriate warning In this case the Next button will be disabled and you will have to select another type of volume to proceed with the new volume creation...

Page 275: ...om basic to dynamic For basic volumes if some unallocated space is left on the disk you also will be able to choose the position of the new volume on the disk If you click the Back button you will be...

Page 276: ...e new volumes using free space from the existing ones exist on the full version of the software so with this version deleting an existing volume sometimes might be the only way to free the necessary d...

Page 277: ...an manually change the letters that are automatically assigned to the volumes by the operating system If you need to change a letter assigned to a volume by the operating system 1 Select a volume to c...

Page 278: ...between any number in the preset amount for each file system Note the program suggests the cluster size best suited to the volume with the chosen file system 3 If you click OK to proceed with the Form...

Page 279: ...g operation list Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them so if you try to exit Disk management without committing the pending operations...

Page 280: ...moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer Comment Failed tasks X View the tasks View the tas...

Page 281: ...ered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is recommended to back up the management server to protec...

Page 282: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Page 283: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Page 284: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Page 285: ...console will update the list of backup policies from the management server with the most recent information Though the list of policies is refreshed automatically based on events the data may not be...

Page 286: ...7 1 2 4 Policy details The Policy details window accumulates in five tabs all information on the selected backup policy and lets you perform operations with the machines and groups of machines the pol...

Page 287: ...e or more nested groups can be created inside any group created by the administrator Grouping helps organize data protection by the company departments by the Active Directory domains or organizationa...

Page 288: ...view select the group Use the toolbar s operational buttons to perform actions on the selected group p 300 Use the Information panel s tabs to view detailed information about the selected group and pe...

Page 289: ...cal machines group Add a machine to another static group Click Add to another group In the Add to group p 293 window specify the group to copy the selected machine to The backup policies applied to th...

Page 290: ...ine s log entries Update all information related to the machine Click Synchronize The management server will query the machine and update the database with the most recent information Along with synch...

Page 291: ...details Importing machines from Active Directory To import machines from Active Directory 1 In the Navigation tree select Physical machines or All physical machines 2 Click Import machines from Activ...

Page 292: ...initially import the machines from a text file Modify this file later as required by adding and removing machines but do not change the names addresses of the machines that have to remain registered T...

Page 293: ...import Adding a machine to another group To add the selected machine to another group 1 Select the group the machine will be added to 2 Click OK The machine being added becomes a member of more than...

Page 294: ...essful backup Availability Online the machine is available for the management server This means that the management server s last connection to the machine was successful Connection is established eve...

Page 295: ...the machine is a member of a group and the policy is applied to the group you cannot revoke the policy from a single machine without firstly removing the machine from the group Examine where the appli...

Page 296: ...ckup plan stops all its tasks Thus all the task operations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validati...

Page 297: ...if the existing archives were created by a new scheme For empty archives all changes are possible Why can t I edit the backup plan The backup plan is currently running Editing of the currently runnin...

Page 298: ...t information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manual refresh guarantees that the most...

Page 299: ...t and applies the policy to Machine1 respectively The machine or group to which the policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a m...

Page 300: ...umn type a new name for the selected group Built in groups cannot be renamed Edit a custom group Click Edit In the Edit group p 303 window change the required parameters of the group Move one custom g...

Page 301: ...ording to the following rules a All the entries of the same criteria are combined by logical addition OR For example the following set of criteria Operating system Windows Server 2008 Operating system...

Page 302: ...de machines from the list given in the specified txt or csv file If you later modify the file the contents of the group will change accordingly The file is checked every 15 minutes If you later delete...

Page 303: ...roup Group details Aggregates in two tabs all information on the selected group Allows performing operations with the policies applied to the group This information is also duplicated in the Informati...

Page 304: ...e policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a group its parent group view will be opened 7 1 4 Virtual machines You can centrally...

Page 305: ...n tree This section describes available operations with these machines 7 1 4 1 Virtual machines on a management server Availability of virtual machines Virtual machines are displayed as available when...

Page 306: ...VA Using this criterion you can create a dynamic group of virtual machines hosted on a specified virtualization server or managed by the specified virtual appliance 7 1 4 2 VMware vCenter integration...

Page 307: ...eck box In a vCenter cluster a single Agent for ESX ESXi backs up virtual machines hosted on all the cluster s hosts For more information please see Support for vCenter clusters p 308 You can add a si...

Page 308: ...or Acronis Backup Recovery 10 Advanced Server Virtual Edition You need one license for every host you selected To be able to deduplicate backups an agent needs a separately sold license for deduplicat...

Page 309: ...rise backup archives Storage node enables you to relieve managed machines of unnecessary CPU load by using the storage node side cleanup p 371 and storage node side validation p 372 drastically reduce...

Page 310: ...To Do Add a storage node to the management server Click Add In the Add storage node p 311 window specify the machine the storage node is installed on Adding a storage node establishes a trusted relat...

Page 311: ...some latency Manual refresh guarantees that the most recent data is displayed Adding a storage node To add a storage node 1 In the IP Name field enter the name or the IP address of the machine the st...

Page 312: ...the archives in all the vaults managed by the storage node Vaults This tab displays a list of the vaults managed by the storage node To open a managed vault for detailed examination and to perform ope...

Page 313: ...task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unallocate...

Page 314: ...Select Options Console options Number of tasks p 87 and set the desired value The maximum number of tasks that can be displayed is 500 If the number of tasks exceeds the specified value use filters t...

Page 315: ...entries The maximum number of entries stored in the centralized log is 50000 The maximum number of entries that can be displayed is 10000 In case the number of log entries is greater than 10000 use fi...

Page 316: ...on Save the selected log entries to a file 1 Select a single log entry or multiple log entries 2 Click Save Selected to File 3 In the opened window specify a path and a name for the file Save all the...

Page 317: ...o show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you want to...

Page 318: ...the way the information is represented Acronis Backup Recovery 10 Management Server offers report templates for Registered machines Backup policies existing on the management server Local and centrali...

Page 319: ...od within which the next scheduled backup will start on each of the machines Operating system The operating systems that the machines run IP address physical machines only The range for the latest kno...

Page 320: ...ocal and or Centralized Backup policies available only for centralized backup plans The backup policies on which the centralized backup plans are based Machines The list of machines on which the backu...

Page 321: ...ll look Select whether to show all items in a single table or to group them by a particular column Specify which table columns to show and in which order Specify how to sort the table 7 1 8 5 Report a...

Page 322: ...nd backups and average ratios across the selected vaults With the default filter settings the report includes information about all centralized managed vaults plus the combined total Report view Under...

Page 323: ...ome columns such as Machine name in a report about machines cannot be excluded from the list or moved up or down in it 7 1 8 9 Report view In order for your web browser to correctly display dates and...

Page 324: ...Recovery 10 Storage Node as described in the correspondent subtopics of this topic 7 2 1 1 How to load Acronis Administrative Template The Administrative Template provided by Acronis enables the fine...

Page 325: ...multaneously When this limit is reached the storage node will use the backup queue see the next parameter for the agents that are awaiting connection Backup Queue Limit Description Specifies the maxim...

Page 326: ...e Suppose further that the size of the archives in Vault A is 20 GB and the size of the archives in Vault B is 45 GB If the volume has 5 GB of free space then the total size of Vault A is 20 GB 5 GB 2...

Page 327: ...d vault s database is less than the value of Vault Database Free Space Error Limit an error is recorded in the storage node s log Backups performed to the vault will keep failing until the amount of f...

Page 328: ...efault value False Trace Level Description Specifies the minimum level of severity of events to be recorded into the event log Only events of levels greater than or equal to the value in Trace Level w...

Page 329: ...on for a machine is complete the management server may disconnect from that machine and use the free connection for synchronization with another machine and so on Note Connections to machines with hig...

Page 330: ...to provide new data whenever it will appear and then enters a listening mode This approach is called real time monitoring Real time monitoring may reduce network traffic for example when centralized...

Page 331: ...the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that changes extensively during backup This parameter is used when creati...

Page 332: ...recorded into the agent s log You can view this warning in the Dashboard If the value is 0 no license check will be performed without a license Acronis Backup Recovery 10 s functionality will be disa...

Page 333: ...is cleaned up see Log cleanup rules p 94 Windows Event Log Specifies when to record Acronis Backup Recovery 10 Agent s events into the Application event log in Windows This parameter has two settings...

Page 334: ...if more space is needed for the snapshot You may want to increase the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that ch...

Page 335: ...of the following Not Configured The component will use the default TCP port number 9876 Enabled The component will use the specified port type the port number in the Server TCP Port box Disabled The...

Page 336: ...sabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application Select one of the following Not Configured...

Page 337: ...termination of a process such as the agent s process Event tracing parameters are specified as the following settings in the administrative template File Trace Minimal Level Description Specifies the...

Page 338: ...mmunity For Acronis Backup Recovery 10 Agent Windows Event Log SNMP SNMP Address SNMP Community and Customer Experience Program You will find the description of these parameters in the correspondent t...

Page 339: ...applied to both Windows and Linux machines To create a backup policy perform the following steps General Policy name Optional Enter a unique name for the backup policy A conscious name lets you ident...

Page 340: ...he backup operation such as pre post backup commands maximum network bandwidth allocated for the backup stream or the backup archive compression level If you do nothing in this section the default val...

Page 341: ...que name Folder on VMware vCenter If the management server is integrated with vCenter Server the resultant virtual machines will appear in the Acronis Backups folder on the vCenter You can specify a s...

Page 342: ...In the Volumes column Comments Windows and Linux volumes All volumes Type or select All Volumes Refers to all volumes on machines running Windows and all mounted volumes on machines running Linux Win...

Page 343: ...d speeds up the backup and recovery operations Windows The swap file pagefile sys and the file that keeps the RAM content when the machine goes into hibernation hiberfil sys are not backed up After re...

Page 344: ...rd partition one can type dev hda3 in the row of the Volumes to back up selection rules dialog box Furthermore a Linux partition can be mounted anywhere inside the tree Say dev hda3 can be mounted as...

Page 345: ...d folders column type or select File Text doc in folder D Work D Work Text doc Folder C Windows C Windows Environment variables Some environment variables point to Windows folders Using such variables...

Page 346: ...irectory of the common users home The root user s home directory root Directory for all user related programs usr Directory for system configuration files etc 7 3 3 Access credentials for source Speci...

Page 347: ...o skip files whose names match any of the criteria called file masks in the list use the Add Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard charac...

Page 348: ...ify names for the archives The program generates a common name for the new archives and displays it in the Name field The name looks like PolicyName _ MachineName _Archive1 If you are not satisfied wi...

Page 349: ...he Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these days...

Page 350: ...set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule when and how often to back up the data To learn more about setting up the schedule see the...

Page 351: ...t in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup type are as follows Daily 7 days...

Page 352: ...ups more short lived at the same time ensuring that your information can be recovered in case of an accidental data loss Suppose that you need to Perform backups at the end of each working day Be able...

Page 353: ...lect it in the Back up on field Such an archive would allow you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily...

Page 354: ...you select See the example below for details Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 This is how the first 14 days or 14 sessions of...

Page 355: ...11 days which is the best case scenario The following day however a new third level differential backup is created and the old full backup is deleted 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1...

Page 356: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Page 357: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 39 Monthly full weekly differential and daily incremental backups plus c...

Page 358: ...ckup runs every Friday at 10 00 PM Incremental backup runs manually Differential backup runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans a...

Page 359: ...opyright Acronis Inc 2000 2010 359 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule of validation For more information see the Scheduling p 162 sectio...

Page 360: ...nis Secure Zone A secure volume for storing backup archives p 361 within a managed machine p 369 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost ef...

Page 361: ...is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TIB extension The TIB files resulting from...

Page 362: ...his is an option Physically a backup plan is a bundle of tasks p 372 configured for execution on a managed machine p 369 A backup plan can be created directly on the machine local plan or appears on t...

Page 363: ...locally through the GUI or remotely using the console p 365 Bootable media A physical media CD DVD USB flash drive or other media supported by a machine p 369 BIOS as a boot device that contains the...

Page 364: ...ckup plan p 364 Such task appears on the managed machine p 369 as a result of deploying a backup policy p 362 from the management server p 370 and can be modified only by editing the backup policy Cen...

Page 365: ...For example the retention rules require to delete a full backup p 368 that has expired but retain the next incremental p 369 one The backups will be combined into a single full backup which will be da...

Page 366: ...er of dynamic disks p 366 that store the common configuration data in their LDM databases and therefore can be managed as a whole Normally all dynamic disks created within the same machine p 369 are m...

Page 367: ...Dynamic disks organized on MBR Disk 1 and GPT Disk 2 disks For more information about dynamic disks please refer to the following Microsoft knowledge base articles Disk Management Windows XP Professio...

Page 368: ...ed anywhere on the disk or in the backup file the password hash is used for verification purposes With this two level security the backup data is protected from any unauthorized access but recovering...

Page 369: ...incremental backup L Local backup plan A backup plan p 362 created on a managed machine p 369 using direct management p 365 Local task A task p 372 belonging to a local backup plan p 369 or a task tha...

Page 370: ...try point to the Acronis Backup Recovery 10 infrastructure an easy way to protect data on numerous machines p 369 using backup policies p 362 and grouping enterprise wide monitoring functionality the...

Page 371: ...ic group A group of machines which a management server p 370 administrator populates by manually adding machines to the group A machine remains in a static group until the administrator removes it fro...

Page 372: ...to be performed on a managed machine p 369 when a certain time comes or a certain event occurs The actions are described in an xml script file The start condition schedule exists in the protected reg...

Page 373: ...ry under the bootable media to a spare hard drive can guarantee successful recovery in the future Validation rules A part of the backup plan p 362 Rules that define when and how often to perform valid...

Page 374: ...Server 2008 PE 2 1 WinPE is commonly used by OEMs and corporations for deployment test diagnostic and system repair purposes A machine can be booted into WinPE via PXE CD ROM USB flash drive or hard d...

Page 375: ...On LAN Proxy 21 Acronis WOL Proxy 90 Action pages 12 13 15 Actions on a tape library vault 136 Actions on backup plans and tasks 179 183 Actions on backup policies 282 284 Actions on centralized vaul...

Page 376: ...policy statuses 282 283 287 294 Backup policy s state and statuses 66 283 Backup priority 96 104 Backup scheme 362 363 369 372 Backup scheme selection 340 349 Backup schemes 193 200 Backup selection...

Page 377: ...ralized vault 128 131 Creating the volume structure automatically 259 Creating the volume structure manually 259 260 Criteria of the choice 142 Cumulative state and status of a policy 69 Custom backup...

Page 378: ...ives 128 156 160 Filtering and sorting backup plans and tasks 179 186 298 Filtering and sorting backup policies 282 285 295 304 Filtering and sorting log entries 190 191 315 316 Filtering and sorting...

Page 379: ...ils 286 288 290 292 294 Machine management 92 291 294 Machine options 91 107 108 122 Machines selection 284 285 Main area views and action pages 11 14 Managed machine 10 26 87 360 362 364 365 369 371...

Page 380: ...68 Policy status on a machine 67 91 Pop up messages 86 Post backup command 100 Post data capture command 101 Post recovery command 119 Pre Post commands 96 99 100 117 118 Pre Post data capture comman...

Page 381: ...sion schedule 194 209 341 Setting up a display mode 256 Setting up a machine to boot from PXE 263 Setting up centralized data protection in a heterogeneous network 10 55 Setting up regular conversion...

Page 382: ...t 361 373 User is idle 173 User logged off 175 User privileges on a managed machine 30 75 76 195 213 232 240 341 User privileges on a storage node 78 127 310 Using a single tape drive 48 Using custom...

Page 383: ...1 When to recover 212 222 When to validate 231 234 Why is the program asking for the password 194 Windows event log 89 92 97 107 118 122 WinPE Windows Preinstallation Environment 360 363 373 Work acro...

Reviews: