Contents
4
Copyright © Acronis, Inc., 2000-2005
Table of Contents
CHAPTER 1. INTRODUCTION ........................................................................................................................ 6
1.1
W
HAT IS
A
CRONIS
T
RUE
I
MAGE
S
ERVER
8.0
FOR
W
INDOWS
.................................................................... 6
1.2
W
HAT
'
S NEW IN
A
CRONIS
T
RUE
I
MAGE
S
ERVER
8.0
FOR
W
INDOWS
......................................................... 7
1.3
W
HAT IS A DISK IMAGE
.............................................................................................................................. 7
1.4
S
OFTWARE USAGE TERMS AND CONDITIONS
.............................................................................................. 8
CHAPTER 2. INSTALLATION AND RUNNING ............................................................................................ 9
2.1
S
YSTEM REQUIREMENTS
............................................................................................................................ 9
2.2
S
UPPORTED OPERATING SYSTEMS
.............................................................................................................. 9
2.3
A
CRONIS
T
RUE
I
MAGE
S
ERVER
8.0
FOR
W
INDOWS INSTALLATION
........................................................... 9
2.4
R
UNNING
A
CRONIS
T
RUE
I
MAGE
S
ERVER
8.0
FOR
W
INDOWS
................................................................. 10
2.5
R
EMOVING THE PROGRAM
....................................................................................................................... 10
CHAPTER 3. GENERAL PROGRAM INFORMATION .............................................................................. 11
3.1
M
AIN PROGRAM WINDOW
........................................................................................................................ 11
3.2
A
CRONIS
S
ECURE
Z
ONE
.......................................................................................................................... 13
3.2.1
Creating Acronis Secure Zone ............................................................................................................ 14
3.2.2
Resizing Acronis Secure Zone ............................................................................................................ 15
3.2.3
Deleting the images in Acronis Secure Zone ...................................................................................... 16
3.2.4
Deleting Acronis Secure Zone ............................................................................................................ 17
3.3
A
CRONIS
S
TARTUP
R
ECOVERY
M
ANAGER
.............................................................................................. 18
3.4
S
UPPORTED FILE SYSTEMS
....................................................................................................................... 19
3.5
U
SING DYNAMIC DISKS AND VOLUMES
.................................................................................................... 19
3.6
B
ACKING UP TO TAPE DRIVE
.................................................................................................................... 20
CHAPTER 4. CREATING A PARTITION (DISK) IMAGE ......................................................................... 21
4.1
S
ELECTING PARTITIONS
........................................................................................................................... 21
4.2
S
ELECTING IMAGE LOCATION
.................................................................................................................. 21
4.3
S
ELECTING IMAGE MODE
......................................................................................................................... 22
4.3.1
Creating an incremental image............................................................................................................ 23
4.4
S
ELECTING IMAGE FILE SIZE
.................................................................................................................... 24
4.5
S
ELECTING DATA COMPRESSION LEVEL
................................................................................................... 25
4.6
P
ROTECTING IMAGES WITH PASSWORDS
.................................................................................................. 26
4.7
P
ROVIDING COMMENTS
........................................................................................................................... 26
4.8
I
MAGE CREATION SCRIPT
......................................................................................................................... 27
4.9
S
ELECTING IMAGE CREATION PRIORITY
................................................................................................... 28
4.10
O
PERATION RESULTS NOTIFICATION
.................................................................................................... 28
4.10.1
Email notification ............................................................................................................................ 28
4.10.2
WinPopup notification..................................................................................................................... 29
CHAPTER 5. RESTORING A DISK (PARTITION) FROM AN IMAGE................................................... 30
5.1
S
ELECTING AN IMAGE TO RESTORE FROM
................................................................................................ 30
5.2
C
HECKING IMAGE INTEGRITY BEFORE RESTORATION
.............................................................................. 31
5.3
S
ELECTING A PARTITION TO RESTORE
...................................................................................................... 32
5.4
S
ELECTING A LOCATION TO RESTORE TO
................................................................................................. 33
5.5
S
ELECTING PARTITION TYPE
.................................................................................................................... 34
5.6
S
ELECTING A FILE SYSTEM
...................................................................................................................... 34
5.7
S
ELECTING RESTORED PARTITION SIZE
.................................................................................................... 35
5.8
A
SSIGNING A LETTER TO A PARTITION
..................................................................................................... 36
5.9
C
HECKING FILE SYSTEM INTEGRITY
......................................................................................................... 37
5.10
R
ESTORING SEVERAL PARTITIONS AT ONCE
......................................................................................... 38
5.11
R
ESTORATION SCRIPT
.......................................................................................................................... 38
CHAPTER 6. BROWSING AND RESTORING PARTICULAR FILES ..................................................... 40
6.1
C
ONNECTING A VIRTUAL DISK
................................................................................................................. 40
6.1.1
Selecting an image .............................................................................................................................. 40