9.1
C
REATING
A
CRONIS
S
ECURE
Z
ONE
............................................................................................................ 74
9.2
R
ESIZING
A
CRONIS
S
ECURE
Z
ONE
.............................................................................................................. 75
9.3
D
ELETING
A
CRONIS
S
ECURE
Z
ONE
............................................................................................................. 75
CHAPTER 10. CREATING BOOTABLE MEDIA........................................................................................ 77
CHAPTER 11. OTHER OPERATIONS ......................................................................................................... 80
11.1
V
ALIDATING BACKUP ARCHIVES
............................................................................................................... 80
11.2
O
PERATION RESULTS NOTIFICATION
......................................................................................................... 80
11.2.1 Email notification ............................................................................................................................. 81
11.2.2 WinPopup notification...................................................................................................................... 81
11.3
V
IEWING LOGS
.......................................................................................................................................... 82
11.4
E
VENT TRACING
........................................................................................................................................ 83
11.4.1 Windows event log............................................................................................................................ 83
11.4.2 SNMP notifications........................................................................................................................... 83
11.5
M
ANAGING
S
YSTEM
R
ESTORE
.................................................................................................................. 83
CHAPTER 12. MOUNTING AN IMAGE AS A VIRTUAL DRIVE............................................................ 85
12.1
M
OUNTING AN IMAGE
............................................................................................................................... 85
12.2
U
NMOUNTING AN IMAGE
.......................................................................................................................... 87
CHAPTER 13. TRANSFERRING THE SYSTEM TO A NEW DISK......................................................... 88
13.1
G
ENERAL INFORMATION
........................................................................................................................... 88
13.2
S
ECURITY
.................................................................................................................................................. 89
13.3
E
XECUTING TRANSFERS
............................................................................................................................ 89
13.3.1 Selecting Clone mode ....................................................................................................................... 89
13.3.2 Selecting source disk ........................................................................................................................ 89
13.3.3 Selecting destination disk ................................................................................................................. 90
13.3.4 Partitioned destination disk.............................................................................................................. 91
13.3.5 Old and new disk partition layout .................................................................................................... 91
13.3.6 Old disk data .................................................................................................................................... 91
13.3.7 Destroying the old disk data............................................................................................................. 92
13.3.8 Selecting partition transfer method .................................................................................................. 93
13.3.9 Partitioning the old disk ................................................................................................................... 94
13.3.10 Old and new disk partition layouts................................................................................................. 94
13.3.11 Cloning summary ........................................................................................................................... 95
13.4
C
LONING WITH MANUAL PARTITIONING
.................................................................................................... 95
13.4.1 Old and new disk partition layouts................................................................................................... 95
CHAPTER 14. ADDING A NEW HARD DISK ............................................................................................. 97
14.1
S
ELECTING A HARD DISK
........................................................................................................................... 97
14.2
C
REATING NEW PARTITIONS
...................................................................................................................... 97
14.3
D
ISK ADD SUMMARY
................................................................................................................................. 98
CHAPTER 15. COMMAND-LINE MODE AND SCRIPTING .................................................................... 99
15.1
W
ORKING IN THE COMMAND
-
LINE MODE
.................................................................................................. 99
15.1.1 Supported commands ....................................................................................................................... 99
15.1.2 trueimagecmd.exe usage examples................................................................................................. 104
15.1.3 Command-line mode usage under DOS ......................................................................................... 105
15.2
S
CRIPTING
............................................................................................................................................... 105
15.2.1 Script execution parameters ........................................................................................................... 105
15.2.2 Script structure ............................................................................................................................... 106
15.2.3 Script usage examples .................................................................................................................... 106
6 Copyright © Acronis, Inc., 2000-2006