background image

 
 
 

User’s Guide

 

 
 
 

Acronis

®

 

True Image Echo 

Enterprise Server 

 
 
 
 
 
 

 

Summary of Contents for TRUE IMAGE ECHO - ENTERPRISE SERVER

Page 1: ...User s Guide Acronis True Image Echo Enterprise Server...

Page 2: ...erred to are the property of their respective owners Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder Distribution...

Page 3: ...Server 18 2 3 4 Acronis Backup Server installation and setup 18 2 3 5 Acronis Universal Restore installation 22 2 4 Extracting Acronis True Image Echo Enterprise Server components 22 2 5 Running Acro...

Page 4: ...1 Default settings 53 4 5 2 Set up Administrator profiles 54 4 5 3 Adding Users and Administrators to the Acronis Backup Server database 55 4 5 4 Changing User profiles 57 4 5 5 Configuring Backup Loc...

Page 5: ...ass storage drivers 97 7 4 7 Additional settings 98 7 4 8 Error handling 99 7 5 Creating dynamic disks and volumes 99 7 5 1 Creating dynamic volumes 99 Chapter 8 Scheduling tasks 102 8 1 Creating sche...

Page 6: ...Selecting partition transfer method 139 14 3 9 Partitioning the old disk 140 14 3 10 Old and new disk partition layouts 140 14 3 11 Cloning summary 141 14 4 Cloning with manual partitioning 141 14 4 1...

Page 7: ...ith minimal user training A central management console provides remote administration ensuring that all systems in the network regardless of the domain or workgroup structure can be managed from one l...

Page 8: ...f Independent Disks RAID tapes USB and IEEE 1394 FireWire compliant storage devices CDs DVDs removable drives Floppy Zip etc and shared storage Moreover the product ensures that you maximize the space...

Page 9: ...nsolidate backups in case of quota violation perform one time backups consolidation This ensures optimal usage of the storage capacity Acronis Backup Server also enables users to access a tape library...

Page 10: ...ocal network share Support for VMware Consolidated backup Archive bit reset file level backup only Generating time based names for backup files Recovery Recovery of dynamic volumes Recovery of system...

Page 11: ...1 4 1 Supported file systems FAT16 32 NTFS Ext2 Ext3 ReiserFS Reiser4 Linux SWAP XFS JFS DFS If a file system is not supported or is corrupted Acronis True Image Echo Enterprise Server can copy data u...

Page 12: ...has its own serial number 1 6 Technical support As part of a purchased annual Support charge you are entitled to Technical Support as follows to the extent that electronic services are available you m...

Page 13: ...n remote machines running Vista Acronis True Image Agent for Windows Acronis True Image Echo Enterprise Server Acronis Backup Server Acronis Group Server Windows Professional 2000 SP4 Professional XP...

Page 14: ...r account In a workgroup it would make sense to create identical accounts in the Administrators group on each computer with Acronis True Image Agent If you do not wish to create a uniform account prov...

Page 15: ...Layer mechanism There are two stakeholders of the encryption operation Client application the application that tries to establish initiates connection This could be the Acronis True Image Management C...

Page 16: ...cations the Acronis client applications always attempt to establish an encrypted connection The Client Requires Encryption option defines the client behavior in case the server does not support encryp...

Page 17: ...edia Installing the Bootable Rescue Media Builder will allow you to create bootable media its ISO image or a bootable RIS package at any time from the main program window or running Bootable Rescue Me...

Page 18: ...s Backup Server installation and setup The Acronis Backup Server only can be installed locally on a computer by running the setup program Before starting installation of this component please read sec...

Page 19: ...he storage drive capacity minus the estimated size of the largest backup some space must be reserved for the temporary file created at consolidation 7 Set the default limitations for users computers i...

Page 20: ...sers will be allowed to back up data on the backup server Add the users as follows Add the person s local or domain account to the AcronisBackupServerUsers group on the backup server Click Set up User...

Page 21: ...tic consolidation and backup management Choose Periodically Choose Weekly Schedule check to be performed once a week during off peak time Click Proceed The backup server is ready to work To perform ba...

Page 22: ...nterprise Server components During Acronis True Image Management Console installation all Acronis True Image Echo Enterprise Server components setup msi files will be placed to C Program Files Common...

Page 23: ...Console Acronis True Image Management Console 2 5 3 Running other Acronis components Acronis True Image Agents Acronis Backup Server and Acronis Group Server run as services immediately after install...

Page 24: ...e allocation table root and the zero track of the hard disk with master boot record MBR A disk image includes images of all disk partitions as well as the zero track with the master boot record MBR Al...

Page 25: ...mended that you re create a full backup after disk defragmentation 3 3 Acronis Secure Zone The Acronis Secure Zone is a special partition for storing archives on the computer system itself Certain Win...

Page 26: ...artup Recovery Manager 3 4 1 How it works The Acronis Startup Recovery Manager enables starting Acronis True Image Echo Enterprise Server on a local computer without loading the operating system If th...

Page 27: ...where Acronis Backup Server is installed A backup location is a storage area for backups on a local backup server hard drive At installation Acronis Backup Server creates one default backup location...

Page 28: ...ect user computer backup data to the backup server while space or number quota is exceeded will not succeed Backup to the full location will also be prohibited An administrator can schedule a check of...

Page 29: ...sets concatenation between the backup being consolidated and the backup before the deleted one Thus the archive integrity will not be affected in spite of the fact that one backup will be deleted Data...

Page 30: ...ue Image Agent on the local computer 2 Create the Acronis Secure Zone on the local computer hard disk see Chapter 9 Managing the Acronis Secure Zone 3 Activate Acronis Startup Recovery manager see 3 4...

Page 31: ...ndent cloning and deployment of operating systems 3 Real to virtual and virtual to real computer migration for system recovery test and other purposes 3 7 2 Acronis Universal Restore general principle...

Page 32: ...disk but only the selected partitions In some cases especially if your system resides on a partition other than the first this can confuse the loader and prevent the restored system from startup To a...

Page 33: ...y attached to the servers The devices attached to the Backup Server must work through Windows Removable Storage Management RSM Locally attached devices do not require RSM The following operations are...

Page 34: ...ou might experience short pauses that are required to rewind the tape Low quality or old tape as well as dirt on the magnetic head might lead to pauses that can last up to several minutes Limitations...

Page 35: ...hine archive will not be discovered by Acronis and therefore cannot be restored by the first tape device Please be aware of this limitation when using tapes between multiple computers Using RSM pools...

Page 36: ...ing up to tape Archives created on tape devices through Acronis Backup Server cannot be accessed by Acronis True Image Echo Enterprise Server local and bootable versions and agents for validation data...

Page 37: ...Arrange Icons by button and select the column To select columns to view right click the headers line or left click the Choose Details button Then flag the columns you want to display If you click the...

Page 38: ...nsole main window 4 2 Installing updating Acronis components on remote machines Acronis True Image Management Console allows for group installation and updates of Acronis True Image Echo Enterprise Se...

Page 39: ...gistered Components Search removable media or Specify location The default selection Registered Components will use setup files from the default C Program Files Common Files Acronis RemoteInstall fold...

Page 40: ...do not specify credentials for all machines involved or if the credentials are not valid for some machines you will have an option to provide credentials during installation there is an option Other u...

Page 41: ...puter network name IP address or select it using Browse button Browse will open a list including all computers controllable with Acronis True Image Management Console 3 Enter administrator or backup o...

Page 42: ...system in wizards or operation may hang Use Reconnect on the sidebar to test whether the computer is available again or eliminate any malfunction that persists The console automatically attempts to r...

Page 43: ...re after backup commands etc Click Remote Computer Options select Default backup options or Default restoration options and make settings See details in 6 3 Setting backup options and 7 4 Setting rest...

Page 44: ...e then follow the Wizard s instructions See details in 11 3 Consolidating backup Convert disk images to virtual disk files of the type you select vmdk vhd hdd Click Convert backup to Virtual Disk and...

Page 45: ...le its creation setting the necessary back up options Click Back Up Mailboxes then follow the Wizard s instructions Restore a previously created database archive at the documents and folders level or...

Page 46: ...soft Exchange Tasks if you follow the link presented there After you perform all necessary operations on the remote computer select Disconnect or New connection on the toolbar sidebar or the Connect m...

Page 47: ...unction you should proceed to Tools Options Network Computers Discovery and specify the search parameters in the Search for computers whose IP match the mask and or in the Search for computers in the...

Page 48: ...sidebar Computer details Visibility Hide To make a hidden computer visible and monitored enable Show hidden computers in the Filter group select the hidden computer then select on the sidebar Computer...

Page 49: ...archive if necessary default or custom backup options and comment For more information see Chapter 6 Creating backup archives 7 Provide a name for the group task The name will be displayed in the Gro...

Page 50: ...ment window displays the list of group tasks To see details of a group task mouse over the task name To create new or delete existing backup task use the New and Delete items on the Group tasks toolba...

Page 51: ...Acronis Group Server regularly polls computers included in its database for their status Ready Offline and so on according to 4 4 1 Group status display The default interval between enquires is 2 seco...

Page 52: ...ng the basic operating principles of this application When connected to a computer where Acronis Backup Server is installed click Acronis Backup Server management to display the following window When...

Page 53: ...n and its quotas time limits by selecting Specify Default Settings Set backup location and entering the desired location and values Changing the default backup location will direct backups of newly ad...

Page 54: ...mits The actual number of backups created in a backup location can exceed the Maximum number of backups by one This enables the program to detect the fact of exceeding and start consolidation Backup t...

Page 55: ...at least as much free space on the device as the computer archives occupy because the archives will first be copied to the new location and then deleted from the old folder If you select a computer an...

Page 56: ...er you a choice of adding the new user name from the list of domain users or entering it manually In some cases when the list of domain users is excessively big the manual way of entering the new user...

Page 57: ...file for both remotely and locally controlled backups 4 5 4 Changing User profiles You might need to change a user profile that is already set To do so select the user and click Edit The Edit User Pro...

Page 58: ...p Locations To edit limitations for a backup location select the backup location click Quotas and Time Limits and enter the new values in the appearing window To move a backup location along with all...

Page 59: ...y Location or Owners users and computers by clicking on the respective item above the list 2 Filter out from the list all user s or all computer s backups use buttons in the Filter group 3 Consolidate...

Page 60: ...onnections is set then some agents or local Acronis True Image Echo Enterprise Server versions may be unable to access the server immediately after starting their task They will be trying to connect t...

Page 61: ...electing task category the Tools and Help panes The main area displays operation icons or tasks depending on the category selected By default the program displays operations included in the Backup and...

Page 62: ...Secure Zone Activate Acronis Startup Recovery Manager activate the boot restoration manager F11 key Explore Backup Archive explore file level archives or mount disk partition images as virtual drives...

Page 63: ...k Logs in the Manage Tasks group or select the Show Log tool on the sidebar to navigate to the Event Log window See details in 12 3 Viewing logs Set up default backup or restore options such as system...

Page 64: ...or to restore individual files Select Operations Mount Image and follow the wizard s instructions See details in 11 2 2 Mounting an image Unmount previously mounted partition images Select Operations...

Page 65: ...ff Windows System Restore tool See 12 5 Managing System Restore Some of the above operations can be executed in command line mode For more information on Acronis True Image Echo Enterprise Server comm...

Page 66: ...procedure is much faster than copying files and may significantly speed the backup process when it comes to backing up large volumes of data see details in 3 1 The difference between file archives an...

Page 67: ...existing full backup it will be overwritten Including date in the backup file name will add to the name the time and date of the backup creation formatted as DD Month YYYY HH MM SS Example C MyBackup...

Page 68: ...ation backup If enabled the program will automatically place a copy of your backup archives on a local drive or network share as well as Acronis Secure Zone See details in 6 3 12 Dual destination back...

Page 69: ...size and creation date are automatically appended to the description so you do not need to enter this information 9 At the final step the backup task summary is displayed Up to this point you can clic...

Page 70: ...sk is completed To view the log click the Show Operation Logs button on the toolbar If you burn an archive to multiple removable media be sure to number them since you will have to insert them in orde...

Page 71: ...l backup select the full backup which will be a base or any of the existing differential backups Either way the program will create a new differential backup The farther you store the archive from the...

Page 72: ...d task Clicking Proceed will launch the task 9 For Acronis True Image Echo Enterprise Server local version only The task progress will be shown in a special window You can stop the procedure by clicki...

Page 73: ...password for the zone itself Encryption The preset is 128 bit Once the password has been set you can choose to encrypt the backup for advanced security with industry standard AES cryptographic algori...

Page 74: ...pleted at the moment of data capture If it become necessary to restore a damaged database it will be restored completely and be ready to access after recovery 1 Volume Shadow Copy Service Microsoft Vo...

Page 75: ...ommands execution is complete box which is checked by default 3 Multi volume snapshot The preset is disabled Enable the Multi volume snapshot feature if you are going to back up data located on multip...

Page 76: ...backed up drag the slider or enter the writing speed in kilobytes per second 3 Network connection speed The preset is Maximum If you frequently backup data to network drives think of limiting the netw...

Page 77: ...atively you can select Fixed size and enter the desired file size or select it from the drop down list The backup will then be split into multiple files of the specified size That comes in handy when...

Page 78: ...rtitions must be included in the image Any partitions missing from the image will be lost If you want more functionality during restoration write a standalone version of Acronis True Image Echo Enterp...

Page 79: ...re missing from the copy they will be copied to the external location along with the new backup In addition to enhancing the archive security provided with replication this feature allows traveling us...

Page 80: ...nd display the test result 3 Repeat steps 1 2 for all computers you wish to wake on LAN 4 Schedule a group backup task for the above computers When setting the backup options ensure that the Wake On L...

Page 81: ...at selecting file Properties General Advanced Archive and Index attributes This attribute also known as archive bit is set by the operating system each time the file is changed and can be reset by bac...

Page 82: ...differ from the way Windows identifies drives For example the D drive identified in the standalone Acronis True Image Echo Enterprise Server might correspond to the E drive in Windows If a backup ima...

Page 83: ...lumes on the target disks Backward conversion of dynamic volume to basic disks can be performed if need be using the Add new disk operation see Chapter 15 Adding a new hard disk With these tools anywh...

Page 84: ...e it will be displayed to the right of the drives tree If the archive was protected with a password Acronis True Image Echo Enterprise Server will ask for it The comment and the Next button will be un...

Page 85: ...e contents and select the desired folders or files 6 Select the options for the restoration process that is pre post restoration commands restoration process priority file level security settings etc...

Page 86: ...d each time you restore data see 7 4 1 Files to exclude from restoration 8 The next selection allows you to keep useful data changes made since the selected backup was created Choose what to do if the...

Page 87: ...mage Echo Enterprise Server must obtain exclusive access to the target partition disk This means no other applications can access it at that time If you receive a message stating that the partition di...

Page 88: ...of the drives tree If the archive was protected with a password Acronis True Image Echo Enterprise Server will ask for it The partitions layout the comment and the Next button will be unavailable unti...

Page 89: ...nis Active Restore Having selected this option you will proceed directly to the summary window 7 3 14 Restoration summary and executing restoration A few seconds after pressing Proceed the computer wi...

Page 90: ...generate a new disk signature for the recovered drive Set this option when you are restoring an image backup on another hard drive i e cloning the volume not recovering the corrupted one If the optio...

Page 91: ...me size as the uncompressed image data All the data stored on the target partition will be replaced by the image data so be careful and watch for non backed up data that you might need When restoring...

Page 92: ...or the same disk and want to load an operating system from it you will select Active If you restore a system partition to another hard disk with its own partitions and OS most likely you will need onl...

Page 93: ...tters will be assigned to the restored partition hiding it from OS You should not assign letters to partitions inaccessible to Windows such as to those other than FAT and NTFS 7 3 11 Restoring several...

Page 94: ...he user at the current step the Windows default driver storage folders in the image being restored The program will find the most suitable drivers of all available drivers and install them into the re...

Page 95: ...r MS Exchange Bare Metal Restore after data Recovery parameter in order to start the Acronis Recovery for MS Exchange bare metal restore task automatically after the image restoration is finished If A...

Page 96: ...d was done Choose what to do if the program finds in the target folder a file with the same name as in the archive Overwrite existing file this will give the archived file unconditional priority over...

Page 97: ...If the files security settings were preserved during backup see 6 3 9 File level security settings you can choose whether to restore files security settings or let the files inherit the security sett...

Page 98: ...disabled When enabled files and folders are restored directly to the folder that you specified as a target folder When disabled the full path to the files and folders that exists in the backup will be...

Page 99: ...is enabled When the backup location on the network is not available or not reachable the program will attempt to reach the location at the specified time interval 7 5 Creating dynamic disks and volum...

Page 100: ...nned striped mirrored or RAID 5 5 Specify amount of space that the dynamic volume will occupy on each of the selected disks The value you set is adjusted to the selected volume type For a spanned volu...

Page 101: ...Proceed in the summary window On completion of operations the dynamic volumes are unformatted and have no letters assigned You will be able to assign the letters using Windows Disk Management tool aft...

Page 102: ...m To navigate to the Scheduled Tasks window click Tasks in the Manage Tasks group or select the Task Scheduling category on the sidebar 8 1 Creating scheduled tasks 1 To start the Schedule Task Wizard...

Page 103: ...be executed when the free disk space changes by the specified amount When my computer starts the task will be executed at every OS startup When I log on the task will be executed each time the current...

Page 104: ...ick Cancel all settings will be lost Click Finish to save the task 8 The task schedule and default name appear in the Scheduled Tasks window You can rename the task if need be 8 1 1 Setting up daily e...

Page 105: ...elds 8 1 2 Setting up weekly execution If you select weekly execution set the Start time specify the task execution periodicity in the Every x weeks box every week every two weeks etc and check the da...

Page 106: ...cified day e g on second Tuesday or fourth Friday select this from the drop down lists If the computer is off when the scheduled time comes the task won t be performed but you can force the missed tas...

Page 107: ...ters This is performed in the same way as creation however the earlier selected options will be set so you have to enter only the changes To edit a task select it and click Edit on the toolbar If you...

Page 108: ...k It is created using unallocated space if available or at the expense of free space on a partition Partition resizing may require a reboot A computer can have only one Acronis Secure Zone To create a...

Page 109: ...The maximum size is equal to the disk s unallocated space plus the total free space on all partitions selected at the previous step When creating the zone the program will first use the unallocated sp...

Page 110: ...ard select Manage Acronis Secure Zone 2 Select to increase or decrease the zone You might need to increase it to provide more space for archives The opposite situation could arise if either partition...

Page 111: ...ick Proceed in the final wizard window 9 4 Managing backups in the Acronis Secure Zone The purpose of the Acronis Secure Zone management is to manually free up space in the Acronis Secure Zone by dele...

Page 112: ...you remove Acronis True Image Agent or Acronis True Image Echo Enterprise Server local version from the system To delete the zone without uninstalling the program proceed as follows 1 When prompted by...

Page 113: ...is available both in Acronis True Image Echo Enterprise Server local version and Acronis True Image Management Console However Acronis True Image Management Console does not contain Rescue Media Build...

Page 114: ...If you set 10 sec for Acronis Bootable Agent for example the agent will launch in 10 seconds after the menu is displayed This enables fully remote operations if you are booting from a RIS server 3 Sel...

Page 115: ...ution 1 Make sure that Acronis Bart PE plug in is installed on the computer the default path is Program Files Acronis TrueImageEchoEnterpriseServer BartPE If not run Acronis True Image Echo Enterprise...

Page 116: ...116 Copyright Acronis Inc 2000 2009 Media based on Win PE 2 0 and including Acronis True Image Echo Enterprise Server requires at least 768MB RAM to work...

Page 117: ...hecking by clicking Cancel You must have all incremental and differential backups belonging to the archive and the initial full backup to check archive data integrity If any successive backups are mis...

Page 118: ...e Explore operation The following is a brief summary of the Explore and Mount operations Explore Mount Archive type File level disk or partition image Partition image Assigning a letter No Yes Archive...

Page 119: ...state for a given point in time To explore an incremental backup you must have all previous incremental backups and the initial full backup If any successive backups are missing exploring is not poss...

Page 120: ...u select one of the successive incremental images by its creation date time This allows you to explore the partition state for a given point in time To mount an incremental image you must have all pre...

Page 121: ...ary operations are finished as keeping up virtual disks takes considerable system resources If you do not the virtual disk will disappear after your server is turned off To disconnect the virtual disk...

Page 122: ...is installed select Backup and Recovery tasks and click Consolidate Archive In Acronis True Image Echo Enterprise Server local version start the Backup Consolidation Wizard by selecting Tools Consolid...

Page 123: ...ive copy The clone archive will consist of MyBackup3 and MyBackup5 however their numbers will be zero no number and 2 MyBackup3 will change into a full backup 4 Choose location and name for the archiv...

Page 124: ...is the copy consisting of MyBackup 1 and MyBackup 1 2 MyBackup 1 is a full backup containing data as of Tuesday July 17 2007 5 35 09 PM MyBackup 1 2 is an incremental backup containing data as of Tues...

Page 125: ...needed if the SMTP server requires authentication Some Internet service providers require authentication on the incoming mail server before being allowed to send anything If this is your case click Ad...

Page 126: ...ill be sent Below in this window you can choose whether you want to get notifications when the operation is completed successfully when the operation failed during the operation when user interaction...

Page 127: ...ircle filters information messages To select columns step parameters to display right click the headers line or left click the Choose Details button Then check the desired parameters To sort messages...

Page 128: ...sages to SNMP server and specify types of events to be reported All events Warnings and Errors or Errors only Please note Depending on the reasons of the operation failure sometimes the SNMP notificat...

Page 129: ...Manage System Restore icon in the main program window 2 Click Next 3 Now you can turn on off System Restore on all your hard disk s partitions at once or do it individually for each partition Note tha...

Page 130: ...les represent the VM configuration storage memory or other parameters The files can be backed up with both imaging and file level backup However backing up the running VM files can prevent us from res...

Page 131: ...l machine and Citrix XenServer respectively The further usage of the disk is as follows 13 3 1 Recover data on the VM In case data is corrupted or inadvertently deleted while the VM is running do one...

Page 132: ...luding the system disk 2 Restore the images to physical disks When restoring a system disk use Acronis Universal Restore Complete the hardware driver configuration if Windows prompts Combination of th...

Page 133: ...the Acronis Secure Zone select Personal backup location or Acronis Secure Zone to select the image during the next step 3 If there are several disks in the image select one to convert 4 Choose a type...

Page 134: ...e actions to transfer all the data including partitions folders and files to a newer disk making it bootable if the original disk was bootable There will be only one difference between these disks par...

Page 135: ...erred to the new disk the server boots up from it and all applications work 14 3 Executing transfers 14 3 1 Selecting Clone mode You will see the Clone mode window just after the welcome window We rec...

Page 136: ...ition and file system information 14 3 3 Selecting destination disk After you select the source disk select the destination where the disk information will be copied The previously selected source bec...

Page 137: ...ion will be performed at this time For now the program will just map out cloning All changes will be implemented only when you click Proceed 14 3 5 Old and new disk partition layout If you selected th...

Page 138: ...r data storage you can create a new partition layout on it In this case the disk will be ready right after cloning is complete To protect yourself from unforeseen consequences it would be better to le...

Page 139: ...method is less secure but is still suitable for most cases 14 3 8 Selecting partition transfer method Acronis True Image Echo Enterprise Server will offer you the following data transfer methods As is...

Page 140: ...d less than others as they have a 4GB size limit Depending on the selected combination you will proceed to either the old disk partitioning window or the disk partition layout window see below 14 3 9...

Page 141: ...will cancel the entire procedure Cloning a non system disk or a disk containing an operating system but one that is not currently active will proceed without reboot After you click Proceed Acronis Tru...

Page 142: ...ct a partition to resize It will be underlined in red Resize and relocate it on the next step You can do this by entering values to the Unallocated space before Partition size or Unallocated space aft...

Page 143: ...onsole is not supported To add a new disk you must first install it in your server 15 1 Selecting a hard disk Select the disk that you ve added to the server This window might be bypassed if the progr...

Page 144: ...it Having provided the new partition location and size you can input a label for the new partition If you make a mistake at partitioning click Back to redo the process Finally you will be taken back t...

Page 145: ...am Files Acronis TrueImageEchoEnterpriseServer ICompGS exe is located in the folder where the Group Server is installed by default it is C Program Files Acronis GroupServer Ebasrvdb exe and Tdbrepair...

Page 146: ...he Acronis Universal Restore option ur_path path ur_username user ur_password pwd ur_driver inf filename deploy_mbr Restores the MBR from a disk or partition image filename file name password password...

Page 147: ...s available drives and partitions With the filename option lists the image contents password password index N asz net_user username net_password password ftp_user ftp_password filename file name explo...

Page 148: ...ons options common for most trueimagecmd commands Option Description Archive location Access to archives filename file name Backup file name Other than ASZ Archive name when restoring or deleting file...

Page 149: ...ASZ General options oss_numbers Declares that numbers of partitions in the partition option are adjusted for the MBR partition table rather than just as ascending numbers This means that primary part...

Page 150: ...partition DYN1 filename 1 tib raw Use this option to create an image of a disk partition with an unrecognized or unsupported file system This will copy all disk partition contents sector by sector Wit...

Page 151: ...ion size in sectors fat16_32 Enables the file system conversion from FAT16 to FAT32 if the partition size after recovery is likely to exceed 2GB Without this option the recovered partition will inheri...

Page 152: ...ata changes made since the backup being restored was done Choose what to do if the program finds in the target folder a file with the same name as in the archive older this will give the priority to t...

Page 153: ...resulting virtual disk is supposed to be bootable With this key the program will add drivers necessary for the virtual machine type selected with vm_type key to the resulting virtual disk If the imag...

Page 154: ...artitions selected with the partition option and minimal about 35MB values Either way the program will first use the unallocated space If there is not enough unallocated space the selected partitions...

Page 155: ...The server will be rebooted after the operation is completed trueimagecmd create partition 2 1 filename server1 folder arc tib net_user user1 net_password pw1 log server2 dir log1 log log_net_user use...

Page 156: ...ftp_password fpswd This will restore MBR from the image of hard disk 1 to the hard disk 2 The image is contained in the arc tib file located on the FTP server 3 Back up files trueimagecmd filebackup f...

Page 157: ...s will list contents of the latest image located in the Acronis Secure Zone 8 Acronis Secure Zone managing backups by archive numbers trueimagecmd asz_content This will list the Acronis Secure Zone si...

Page 158: ...8 14 2007 at 2 17 incremental backup created on 8 14 2007 at 2 19 trueimagecmd filerestore filename asz FAAA target_folder e password aszpw This will restore files and folders with their original pat...

Page 159: ...tool generate an XML file with the backup mapping details Syntax EBaSrvDB exe filename path to the XML file The purpose of this tool is to provide a way to understand the mapping between a specific ba...

Page 160: ...to tape libraries and tape drives 16 1 8 Adv_report exe a report generation tool Syntax adv_report exe c filename zip The tool gathers system information and packs it into a zip archive The collected...

Page 161: ...tions must be used without a colon Disk numbers correspond to their system numbers To create images of several partitions or disks use the SOURCE tag for each of them e g source letter C source letter...

Page 162: ...e image is to be split into 650MB parts for recording to CD R RW media Password protection will also be added The entire script must be located between the backup and backup tags xml version 1 0 encod...

Reviews: