background image

221 

Copyright © Acronis, Inc., 2000-2010 

 

 

MBR destination 

To specify a destination disk: 

1.

 

Select the disk to recover the MBR to. 

2.

 

Click 

OK

 

Volume destination 

To specify a destination volume: 

1.

 

Select a volume or unallocated space where you want the selected volume to be recovered to. 
The destination volume/unallocated space should be at least the same size as the uncompressed 
image data. 

2.

 

Click 

OK

All the data stored on the target volume will be replaced by the backed up data, so be careful and watch out for 
non-backed-up data that you might need. 

When using bootable media 

Disk letters seen under Windows-style bootable media might differ from the way Windows identifies 
drives. For example, the D: drive in the rescue utility might correspond to the E: drive in Windows.  

Be careful! To be on the safe side, it is advisable to assign unique names to the volumes.  

The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...). 

 

Volume properties 

Resizing and relocating 

When recovering a volume to a basic MBR disk, you can resize and relocate the volume by dragging it 
or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this 
feature, you can redistribute the disk space between the volumes being recovered. In this case, you 
will have to recover the volume to be reduced first. 

Tip: A volume cannot be resized when being recovered from a backup split into multiple removable media. To be 
able to resize the volume, copy all parts of the backup to a single location on a hard disk. 

Properties 

Type 

A basic MBR disk can contain up to four primary volumes or up to three primary volumes and 
multiple logical drives. By default, the program selects the original volume's type. You can change 
this setting, if required. 

 

Primary

. Information about primary volumes is contained in the MBR partition table. Most 

operating systems can boot only from the primary volume of the first hard disk, but the number 
of primary volumes is limited. 
If you are going to recover a system volume to a basic MBR disk, select the Active check box. 
Active volume is used for loading an operating system. Choosing active for a volume without an 
installed operating system could prevent the machine from booting. You cannot set a logical 
drive or dynamic volume active. 

 

Logical

. Information about logical volumes is located not in the MBR, but in the extended 

partition table. The number of logical volumes on a disk is unlimited. A logical volume cannot be 

Содержание BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3

Страница 1: ...Update 3 Acronis Backup Recovery 10 Advanced Server SBS Edition User s Guide...

Страница 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Страница 3: ...scheme 32 2 6 Tower of Hanoi backup scheme 36 2 7 Retention rules 38 2 8 Backing up dynamic volumes Windows 41 2 9 Tape support 43 2 9 1 Tape compatibility table 43 2 9 2 Using a single tape drive 44...

Страница 4: ...aults 120 4 1 Centralized vaults 121 4 1 1 Working with the Centralized vault view 122 4 1 2 Actions on centralized vaults 123 4 1 3 Tape libraries 128 4 2 Personal vaults 151 4 2 1 Working with the P...

Страница 5: ...on selection 218 6 3 7 Access credentials for destination 225 6 3 8 When to recover 225 6 3 9 Universal Restore 225 6 3 10 How to convert a disk backup to a virtual machine 227 6 3 11 Bootability trou...

Страница 6: ...284 7 1 2 Backup policies 286 7 1 3 Physical machines 291 7 1 4 Virtual machines 308 7 1 5 Storage nodes 313 7 1 6 Tasks 317 7 1 7 Log 319 7 1 8 Reporting 323 7 2 Configuring Acronis Backup Recovery...

Страница 7: ...g a subscription 379 8 4 Activating online backup subscriptions 380 8 4 1 Activating subscriptions 380 8 4 2 Reassigning an activated subscription 381 8 5 Configuring proxy settings 382 8 6 Limitation...

Страница 8: ...Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication mechanism allowing deduplication of backup data both at...

Страница 9: ...nt 1 Install Acronis Backup Recovery 10 Management Server p 19 2 Install Acronis Backup Recovery 10 Agents on the machines that need data protection When installing the agents register each of the mac...

Страница 10: ...lecting Vaults Centralized Vault name in the Navigation tree The shortcut to the vault will be deployed to all the registered machines The vault can be specified as a backup destination in any backup...

Страница 11: ...nd the Shortcuts bar and lets you navigate to the different views see the Navigation pane p 12 section Actions and tools pane Contains bars with a set of actions that can be performed and tools see th...

Страница 12: ...nt backups as virtual drives etc Log Use this view to examine information on operations performed by the program on the managed machine Disk management Use this view to perform operations on the machi...

Страница 13: ...connected to Acronis Management Server the shortcut is added automatically as AMS Machine name 1 2 1 2 Actions and tools pane The Actions and tools pane enables you to easily and efficiently work wit...

Страница 14: ...menu Tools bar Help Contains a list of help topics Different views and action pages of Acronis Backup Recovery 10 provided with lists of specific help topics 1 2 1 3 Operations with panes How to expan...

Страница 15: ...he items you select in the menu Navigation tree or on the Actions and Tools pane Views A view appears on the main area when clicking any item in the Navigation tree in the Navigation pane p 12 Tasks v...

Страница 16: ...n order to create and launch any task or a backup plan or backup policy Action page Create backup plan Using controls and specifying settings The action pages offer two ways of representation basic an...

Страница 17: ...very 10 components with a brief description of their functionality Acronis Backup Recovery 10 includes the following main types of components Components for a managed machine agents These are applicat...

Страница 18: ...ons Conversion to a virtual machine Rather than converting a disk backup to a virtual disk file which requires additional operations to bring the virtual disk into use Agent for Windows performs the c...

Страница 19: ...abase used for synchronization of the management server with registered machines and storage nodes This is a database with rapidly changing operational data The reporting database that stores the cent...

Страница 20: ...operations to be performed on the vault A managed vault can be organized on the hard drives local to the storage node on a network share on a Storage Area Network SAN on a Network Attached Storage NA...

Страница 21: ...sing Acronis License Server 1 3 3 Management Console Acronis Backup Recovery 10 Management Console is an administrative tool for remote or local access to Acronis Backup Recovery 10 agents and in the...

Страница 22: ...ery without the volume resize capability particular files cannot be recovered from disk backups located on Acronis Backup Recovery 10 Storage Node JFS particular files cannot be recovered from disk ba...

Страница 23: ...Home editions x86 x64 Windows Server 2008 the Standard Enterprise Small Business Server Foundation editions x86 x64 Windows Server 2008 R2 the Standard Enterprise Small Business Server Datacenter Foun...

Страница 24: ...B PXE Server 5 MB 80 MB 15 MB Network interface card or virtual network adapter is a common requirement for all the components Bootable media Media type Memory ISO image size Additional Based on Windo...

Страница 25: ...ate bootable media p 389 4 Connect the console to the managed machine 5 Create a backup plan p 388 To do so you have to specify at the very least the data to be protected and the location where the ba...

Страница 26: ...26 Copyright Acronis Inc 2000 2010 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Страница 27: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Страница 28: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Страница 29: ...with each other does not make much sense because the methods work as a team in a backup scheme Each method should play its specific role according to its advantages A competent backup scheme will bene...

Страница 30: ...y of an oversized archive is even more questionable Example Backing up a database transaction log Differential backup A differential backup stores changes to the data against the latest full backup Yo...

Страница 31: ...machine with or without using a disk snapshot Members of the Administrators group also can View and manage backup plans and tasks owned by any user on the machine 2 4 Owners and credentials This sect...

Страница 32: ...redentials regardless of the user who actually starts the task if you specify the task credentials explicitly To do so on the plan task creation page 1 Select the Advanced view check box 2 Select Gene...

Страница 33: ...he space freed on the tape after cleanup cannot be reused until all the tape becomes free take into account additional considerations when using GFS on a tape library p 138 The following is an explana...

Страница 34: ...fy Keep backups Weekly This step defines the retention rule for weekly backups The cleanup task will run after each weekly backup and delete all weekly backups that are older than you specify The week...

Страница 35: ...for weekly and monthly backups will look similar to the week based timescale The resulting archive real In reality the archive content will somewhat differ from the ideal scheme When using the increm...

Страница 36: ...uent backups always conflicts with the cost of keeping such backups for a long time The Tower of Hanoi ToH backup scheme is a useful compromise Tower of Hanoi overview The Tower of Hanoi scheme is bas...

Страница 37: ...ckups you can recover data as of today yesterday half a week ago or a week ago For the five level scheme you can also recover data backed up two weeks ago So every additional backup level doubles the...

Страница 38: ...lls with deleted backups are grayed out Differential backup D created at session 9 will be deleted at session 25 after creation of a new differential backup is completed This way a backup archive crea...

Страница 39: ...of the archive Every time a retention rule is applied the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value The...

Страница 40: ...ther backups one of the following rules is applied Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also be...

Страница 41: ...me If the free space which in fact is the storage device free space approaches zero you might need to toughen the restrictions for some or all archives residing in this vault 2 8 Backing up dynamic vo...

Страница 42: ...pace The total size of unallocated space is 40GB The recovery will always result in a striped volume if the unallocated space is distributed evenly among the disks 20GB and 20GB If one of the disks ha...

Страница 43: ...ecovery 10 supports tape libraries autoloaders SCSI and USB tape drives as storage devices A tape device can be locally attached to a managed machine in this case the Acronis Backup Recovery 10 Agent...

Страница 44: ...ape will appear The content of a non empty tape will be overwritten on prompt You have an option to disable prompts see Additional settings p 109 Workaround In case you want to keep more than one arch...

Страница 45: ...fier OID 1 3 6 1 4 1 24769 100 200 2 0 Syntax OctetString The value contains the text description of the event it looks identical to messages published by Acronis Backup Recovery 10 in its log Example...

Страница 46: ...of a disk to the same disk where the disk s backup resides Offers a cost effective and handy method for protecting data from software malfunction virus attack operator error Being an internal archive...

Страница 47: ...r Acronis Startup Recovery Manager and performs data recovery in the same way as with ordinary bootable media The user can also back up using Acronis Startup Recovery Manager while on the move On mach...

Страница 48: ...rivers Universal Restore is applicable for 1 Instant recovery of a failed system on different hardware 2 Hardware independent cloning and deployment of operating systems 3 Physical to physical physica...

Страница 49: ...rsal Restore Universal Restore comes free with Acronis Backup Recovery 10 Advanced Server SBS Edition and Acronis Backup Recovery 10 Advanced Server Virtual Edition Universal Restore for the other pro...

Страница 50: ...d to storage such as movies sounds or other multimedia files Some of these storage volumes can be extremely large as compared to the system and so practically all the recovery time will be dedicated t...

Страница 51: ...ect You connect the console to the machine and create a backup plan p 388 or multiple backup plans What if you have to manage hundreds of machines It takes time to create a backup plan on each machine...

Страница 52: ...vaults p 395 The storage node helps the agent deduplicate p 391 backups before transferring them to managed vaults and deduplicates the backups already saved in the vaults Deduplication results in red...

Страница 53: ...s your single entry point to the Acronis infrastructure 3 Install Acronis Backup Recovery 10 Agent on each of the machines to back up the machine s disks volumes or files Agent W Agent for Windows Age...

Страница 54: ...tailed explanation of when and why you need to organize groups of machines can be found in the Grouping the registered machines p 56 section Here are some scenarios supported by the aforementioned Acr...

Страница 55: ...be registered on the management server later will be added to this group and protected by the same policy 3 Apply the policy to the W_1 group Make sure that the policy has been successfully deployed...

Страница 56: ...various combinations when a policy is revoked from machines and groups when a machine or a group is moved from one group to another Operations with groups to which backup policies are applied will res...

Страница 57: ...a group 3 A policy applied to a group cannot be revoked from a machine 4 To revoke the policy from the machine remove the machine from the group The same policy on a group and on a machine 1 The same...

Страница 58: ...ied actions 2 Move to another group Machine 3 is moved from one group to another The orange policy is revoked the blue policy is applied to the machine 3 Add to another group Machine 3 is added to ano...

Страница 59: ...in the root If no policies are applied to the group all its members are supposed to be green But if we add say the 1 machine to G3 the machine will bear both orange and green policies in spite of the...

Страница 60: ...machines the agent creates a backup plan While the policy is transferred to the machine and the backup plan is being created the policy s deployment state on the machine is Deploying Once the backup...

Страница 61: ...be applied to a machine that does not have data meeting the selection rules p 397 No error or warning will be logged during the policy deployment because it is assumed that the data may appear in the...

Страница 62: ...rning The updating log has warnings OK The updating log does not have errors and warnings Revoking Error The revoking log has errors Warning The revoking log has warnings OK The revoking log does not...

Страница 63: ...oying then change to Updating Deployed or Deployed Deploying and will normally end up with Deployed The cumulative status of a backup policy To see this parameter select Backup policies in the tree Th...

Страница 64: ...centralized vault view when creating the vault Deduplication database can be created in a local folder only The size of the deduplication database is about one percent of the total size of archives in...

Страница 65: ...stop the task from the Tasks view Because deletion of unused items is resource consuming the compacting task performs it only when a sufficient amount of data to delete has accumulated The threshold i...

Страница 66: ...and is now idle You can view the state of the indexing task in the list of tasks on Acronis Backup Recovery 10 Management Server 2 12 6 5 Deduplication ratio The deduplication ratio shows the size of...

Страница 67: ...16 KB and 64 KB If you protected the archive with a password Tip If you want to protect the data in the archive while still allowing it to be deduplicated leave the archive non password protected and...

Страница 68: ...which you want to connect or click Browse to select the machine from the list 3 To specify credentials for connection click Options and then type the user name and password in the User name and Passwo...

Страница 69: ...o is a member of this group is a management server administrator Management server administrators can connect to the management server by using Acronis Backup Recovery 10 Management Console they have...

Страница 70: ...naged by the storage node provided that the user is also an Acronis Backup Recovery 10 Management Server administrator Re schedule the compacting task as described in Operations with storage nodes p 3...

Страница 71: ...nistrator the user must be a member of the Acronis Centralized Admins group on the machine where the management server is installed 2 12 7 7 Rights for Acronis services The Acronis Backup Recovery 10...

Страница 72: ...The Acronis Remote Agent Service provides connectivity among Acronis components It runs under the Network Service account and cannot run under a different account 2 12 8 Communication between Acronis...

Страница 73: ...Server Yes Yes Acronis Backup Recovery 10 Storage Node Yes Yes Acronis PXE Server No Yes Acronis Backup Recovery 10 Bootable Agent Yes Yes 2 12 8 3 Configuring communication settings You can configure...

Страница 74: ...ed port type the port number in the Server TCP Port box Disabled The same as Not configured For details about the network port and instructions on how to specify it in Linux and a bootable environment...

Страница 75: ...hed only if the use of SSL certificates is enabled on the server application Disabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the co...

Страница 76: ...nis_agent in Linux service After the port is changed on the server side connect to the server using the Server IP port or the Server hostname port URL notation Note If you use network address translat...

Страница 77: ...the list of certificates for the local machine is not displayed in the Certificates console you can use the following procedure To open the list of a machine s certificates 1 Click Start then click Ru...

Страница 78: ...type certmgr msc 2 In the Certificates console double click the name of the certificate that you want to install 3 In the Details tab in the list of fields click Thumbprint 4 Select and copy the field...

Страница 79: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Страница 80: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Страница 81: ...set is Collect logs for All events Use the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all...

Страница 82: ...s and warnings Errors only To disable this option clear the Log events check box 3 2 3 2 SNMP notifications This option defines whether the management server has to send its own log events to the spec...

Страница 83: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Страница 84: ...ual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Server Virtual Editi...

Страница 85: ...Server To be able to use this option you must be logged on as a member of the Administrators group on the machine You have the opportunity to register the machine on the management server when install...

Страница 86: ...tion Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the events to be logged You can override the settings set here exclu...

Страница 87: ...pplication the messages will be sent to Community type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong The typical community is...

Страница 88: ...ines whether the Acronis agent will connect to the Internet through a proxy server Note Acronis Backup Recovery 10 Online supports only HTTP and HTTPS proxy servers To set up proxy server settings 1 S...

Страница 89: ...fault backup options Once an agent is installed the default options have pre defined values which are referred to as presets in the documentation When creating a backup plan you can either use a defau...

Страница 90: ...litting p 103 File level security p 104 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 104 Dest removable media Dest removable med...

Страница 91: ...P server Notifications E mail p 100 Win Pop up p 101 Event tracing Windows events log p 102 SNMP p 102 3 4 1 1 Archive protection This option is effective for Windows and Linux operating systems and b...

Страница 92: ...for file systems that are supported by Windows Select this check box to skip files and folders with the Hidden attribute If a folder is Hidden all of its contents including files that are not Hidden...

Страница 93: ...you selected the folder MyFolder and the file MyFile tmp outside that folder and selected to skip all tmp files In this case all tmp files in the folder MyFolder will be skipped during the backup proc...

Страница 94: ...red Result Preset Perform the backup only after the command is successfully executed Fail the task if the command execution fails Perform the backup after the command is executed despite execution fai...

Страница 95: ...ore and after the data capture process which takes seconds while the entire backup procedure may take much longer depending on the amount of data to be backed up Therefore the database or application...

Страница 96: ...path to a directory where the command batch file will be executed 3 In the Arguments field specify the command s execution arguments if required 4 Depending on the result you want to obtain select the...

Страница 97: ...p This option also applies to file level backup when the file level backup is performed by taking a snapshot The File level backup snapshot p 96 option determines whether a snapshot will be taken duri...

Страница 98: ...of writers that are present in the operating system To view this list run the following command vssadmin list writers Note In Microsoft Windows Small Business Server 2003 the writer for Microsoft Exch...

Страница 99: ...the backup process priority Select one of the following Low to minimize resources taken by the backup process leaving more resources to other processes running on the machine Normal to run the backup...

Страница 100: ...overy 10 provides the ability of notifying users about backup completion through e mail or the messaging service E mail This option is effective for Windows and Linux operating systems This option is...

Страница 101: ...pup This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine This option is not available when operating under bootable med...

Страница 102: ...log events of the backup operations in the Application Event Log Specify the types of events to be logged All events log all events information warnings and errors Errors and warnings Errors only Do...

Страница 103: ...rogram determines whether a file has changed or not by the file size and the date time when the file was last modified Disabling this feature will make the program compare the entire file contents to...

Страница 104: ...a different machine File encryption is available in Windows using the NTFS file system with the Encrypting File System EFS To access a file or folder encryption setting select Properties General Advan...

Страница 105: ...e Restore or Universal Restore If the media is being created in Windows the disk management functionality will also be available 3 4 1 16 Error handling These options are effective for Windows and Lin...

Страница 106: ...ady backup on the network This comes in handy in cases of slow or busy networks and time consuming backup procedures Disconnection during the copy transfer will not affect the backup operation as oppo...

Страница 107: ...box and specify the time interval The task will start as soon as the conditions are met OR the maximum time delay lapses depending on which comes first Time diagram Wait until conditions are met Skip...

Страница 108: ...by some specific needs leave them unchanged An archive can occupy several tapes In such cases a so called tape set is used for keeping the data backups Tape set is a logical group of one or more tape...

Страница 109: ...a separate tape set option With some of the options below enabled the program will add new tapes to the tape set every time when a full incremental or differential backup is created For each full bac...

Страница 110: ...abled In Windows operating systems each file has the File is ready for archiving attribute available by selecting File Properties General Advanced Archive and Index attributes This attribute also know...

Страница 111: ...n this option is enabled Acronis Backup Recovery 10 will save information about the structure of logical volumes known as LVM volumes and of Linux Software RAID devices known as MD devices to the etc...

Страница 112: ...ity of the recovery options Agent for Windows Bootable media Linux based or PE based Disk recovery File recovery also from a disk backup Disk recovery File recovery also from a disk backup Pre Post re...

Страница 113: ...the following options Execute before the recovery Execute after the recovery 2 Do any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file...

Страница 114: ...ccess You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard 5 Click Test command to check if the command is correct A post recovery comm...

Страница 115: ...check box to activate notifications 2 In the E mail addresses field type the e mail address to which notifications will be sent You can enter several addresses separated by semicolons 3 Under Send no...

Страница 116: ...e messages The Messenger service is not started by default in the Microsoft Windows Server 2003 family Change the service Startup mode to Automatic and start the service To configure WinPopup notifica...

Страница 117: ...nes whether the agent s operating on the managed machine have to send the log events of the recovery operations to the specified Simple Network Management Protocol SNMP managers You can choose the typ...

Страница 118: ...s first For example if the network location becomes unavailable or not reachable the program will attempt to reach the location every 30 seconds but no more than 5 times The attempts will be stopped a...

Страница 119: ...system without user interaction Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup Recovery 10 Agent for ESX ESXi...

Страница 120: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Страница 121: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Страница 122: ...art is not available if the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space...

Страница 123: ...the Vault name actions item of the main menu The following is a guideline for you to perform operations with centralized vaults To Do Create a managed or an unmanaged vault 1 Click Create 2 In the Typ...

Страница 124: ...vaults that reside on shared storages only Refresh a vault s information Click Refresh While you are reviewing the vault content archives can be added to the vault deleted or modified Click Refresh to...

Страница 125: ...cryption Anything written to the vault will be encrypted and anything read from it will be decrypted transparently by the storage node using a vault specific encryption key stored on the storage node...

Страница 126: ...to the storage node This encryption has nothing to do with the archive encryption specified by the backup plan and performed by an agent If the archive is already encrypted the storage node side encr...

Страница 127: ...cording to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by...

Страница 128: ...verview Acronis Backup Recovery 10 provides full support of a tape library through Acronis Backup Recovery 10 Storage Node The storage node should be installed on the machine a tape library is attache...

Страница 129: ...ble barcode digital value Such labels are used for tape identification in a tape library or especially in off site storage If all cartridges in a tape library have barcodes the library is ready to be...

Страница 130: ...l If you fill tape library slots with unused tapes all the tapes will be included into the Free pool automatically If a tape was used previously the RSM tries to detect the registered application the...

Страница 131: ...covery 10 Management Server and Acronis Backup Recovery 10 Management Console installed on local or remote machines as well as Acronis Backup Recovery 10 Storage Node installed on the machine with the...

Страница 132: ...and tasks that use this vault will fail The backup archives belonging to a deleting centralized vault on a tape library will be deleted as well but these archives might be recovered by any storage nod...

Страница 133: ...more tapes so it might be durational The program finds the tapes and inserts them automatically in the right order The Task Need Interaction window comes up if a required tape is not found Keep in min...

Страница 134: ...igation pane of the console click Manage tapes and then click Start inventory on the Tape Management window When inventorying is completed a user has the list of tapes currently loaded into the librar...

Страница 135: ...or the Imported pool can be renamed on condition that the user account used to run the storage node service ASN User has write permissions for these pools These permissions are not assigned to ASN Us...

Страница 136: ...user interaction the backup task will enter the Need Interaction state and wait for the tape with the required label to be loaded into the tape library device Use a free tape the backup will be writt...

Страница 137: ...ed tapes for archiving If your backup archive must provide recovery with daily resolution for the last several days weekly resolution for the last several weeks and monthly resolution for any time in...

Страница 138: ...e options for the case All the below analyzed examples are a simplistic approach to a real case but provide you with a general conception of backup distribution onto tapes Legend for the case example...

Страница 139: ...e For each differential backup option is cleared Imagine the first backup operation is scheduled on Friday 1st of January On that day at 11 00 PM the first full backup 320 Gb on the tape whose size is...

Страница 140: ...third week four incremental backups on the 4th week The next full backup 320 Gb should be written on Friday of the 4th week However tape 02 has only 104 Gb of free space at the moment So after the tap...

Страница 141: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Страница 142: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Страница 143: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Страница 144: ...l backup option is selected the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define th...

Страница 145: ...task every 1 day at 11 00 PM Repeat once Number of levels 5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbe...

Страница 146: ...information about it is deleted from the storage node database The figure shows the full backup kept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and...

Страница 147: ...ups deleted at the moment are drawn as dark gray rectangles The figure indicates that there are two full backups on level E because at the moment the first full backup is a base for differential backu...

Страница 148: ...assical five level ToH scheme Two additional tapes used for 1 keeping an old full backup postponed deletion as it is a base for other level backups 2 keeping an old backup on a level until a new backu...

Страница 149: ...e planning Example 1 Imagine the case with the following features full backup size is F_GB average size of incremental backups is I_GB average size of differential backups is D_GB compression level pr...

Страница 150: ...the line of backups that consists of two sections The figure below shows the sections at the moment before the first backup will be deleted In the figure the full differential and incremental backups...

Страница 151: ...vaults view of the console select the vault rescan the tape select the archive and the backup to recover data from and create the recovery task If you don t know which tape has the data to recover yo...

Страница 152: ...free space of the appropriate volume occupied space total size of backup archives and their metadata if it is located in the vault Other files that may be put to this folder by a user are not counted...

Страница 153: ...The Edit personal vault page lets you edit the vault s name and information in the Comments field Change user account for accessing a vault Click Change user In the appearing dialog box provide the c...

Страница 154: ...t 5 Delete the old vault How can I merge two vaults Suppose you have two vaults A and B in use Both vaults are used by backup plans You decide to leave only vault B moving all the archives from vault...

Страница 155: ...program duplicates your selection in the new window that has check boxes for each archive and each backup Review the selection and correct if need be then confirm the deletion 4 3 2 Operations with ba...

Страница 156: ...eletion 4 3 3 Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view but with check boxes for each archive and backup The archive or backup you have cho...

Страница 157: ...mn s header type the archive name the owner name or the machine name As a result you will see the list of the archives whose names owner names or machine names fully or just partly coincide with the e...

Страница 158: ...rrent user specify the user s account User logoff any user current user specify the user s account Shutting down is not the same as logging off The task will not run at a system shutdown System startu...

Страница 159: ...ws Every day s Set up the certain number of days you want the task to be run For example if you set Every 2 day s the task will be started on every other day In the During the day execute the task are...

Страница 160: ...tive From 09 15 2009 If September 15 2009 is the current date of the task s creation and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00...

Страница 161: ...the task will be run once Every From Until Set up how many times the task will be run during the specified time interval For example setting the task frequency to Every 1 hour From 10 00 00 AM until...

Страница 162: ...ox automatically selects the corresponding check boxes Mon Tue Wed Thu and Fri and leaves the remaining ones unchanged 2 Once at 09 00 00 PM 3 Effective From empty If you have created the task say on...

Страница 163: ...systems To specify a monthly schedule In the Schedule area select the appropriate parameter as follows Months Select a certain month s you want to run the task in Days Select specific days of the mont...

Страница 164: ...empty This schedule is widely used when creating a custom backup scheme The Last day of every month schedule is added to the full backups while the differential backups are scheduled to be performed...

Страница 165: ...PM 4 Effective From 11 01 2009 To not set Second schedule 1 Months March April May September October November 2 On All All workdays 3 Every 12 hours From 12 00 00 AM Until 12 00 00 PM 4 Effective Fro...

Страница 166: ...the maximum delay value The conditions if any will be checked at the task s actual start time on each machine The following examples illustrate this setting Example 1 Suppose that you are deploying a...

Страница 167: ...n as Windows discovers that your hard disk drive is about to fail Parameters Log name Specifies the name of the log Select the name of a standard log Application Security or System from the list or ty...

Страница 168: ...ient Event type Information Event ID 18 Tip To set up a similar backup plan for machines running Microsoft Windows XP replace the text in Event source with Windows Update Agent and leave the remaining...

Страница 169: ...is defined by the Task start conditions p 106 backup option There you can specify how important the conditions are for the backup strategy conditions are obligatory put the backup task run on hold un...

Страница 170: ...start immediately after the user becomes idle 3 If the user is still active at 11PM the backup task starts anyway 5 7 2 Location s host is available Applies to Windows Linux Location s host is availab...

Страница 171: ...a result 1 if the user logs off between 04 30 00 PM and 10 00 00 PM the backup task will start immediately following the logging off 2 if the user logs off at any other time the task will be skipped W...

Страница 172: ...es to Windows Linux Enables to put a backup task run on hold until the specified time interval since the last successful backup completion passes Example Run the backup task at system startup but only...

Страница 173: ...s view with failed tasks where you can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what act...

Страница 174: ...olume if it is different 2 Create at least one bootable media p 389 Create now will launch the Bootable Media Builder p 396 No backups have been created for X days Back up now The Dashboard warns you...

Страница 175: ...ails and dashboard parameter the tasks will be displayed on the Dashboard among other alerts and warnings Alternatively you can review the task execution states in the Backup plans and tasks p 175 vie...

Страница 176: ...pace on the vault ignore the read error create the missing Acronis Secure Zone 2 Running At least one task is running Otherwise see 3 No action is required 3 Waiting At least one task is waiting Other...

Страница 177: ...s been started yet or some of the tasks are stopped or being stopped These situations are considered as normal Task states A task can be in one of the following states Idle Waiting Running Stopping Ne...

Страница 178: ...ed In this case since the task is not running stop means removing it from the queue Task state diagram Task statuses A task can have one of the following statuses Error Warning OK A task status is der...

Страница 179: ...ing is a guideline for you to perform operations with backup plans and tasks To Do Create a new backup plan or a task Click New then select one of the following Backup plan p 188 Recovery task p 212 V...

Страница 180: ...rations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validation exporting conversion migration The task enters t...

Страница 181: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Страница 182: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Страница 183: ...abling a backup plan Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backu...

Страница 184: ...ecure Zone ASZ management Resizing changing password deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing Deduplication...

Страница 185: ...t server centralized origin Policy for backup plans with centralized origin name of the backup policy whose deployment created the backup plan Account the name of the account under which the plan runs...

Страница 186: ...plicated in the Log entry details p 188 window Opening the Log with pre filtered log entries Having selected items in other administration views Dashboard Backup plans and tasks you can open the Log v...

Страница 187: ...ted It will contain information about who deleted the entries and when 6 1 3 2 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries To Do Display log e...

Страница 188: ...t relates to if any Task the task the event relates to if any Code the program code of the event Every type of event in the program has its own code A code is an integer number that may be used by Acr...

Страница 189: ...the data items to back up A list of items to backup depends on the data type specified previously Access credentials p 193 Optional Provide credentials for the source data if the plan s account does...

Страница 190: ...appears The setting status changes from Default to Custom Should you modify the setting again the line will display the new value unless the new value is the default one When the default value is set...

Страница 191: ...change the scheduled start to manual 6 2 2 Backup plan s credentials Provide the credentials for the account under which the plan s tasks will run To specify credentials 1 Select one of the following...

Страница 192: ...y of these volumes with resize might fail 6 2 4 Items to back up The items to backup depend on the source type p 191 selected previously 6 2 4 1 Selecting disks and volumes To specify disks volumes to...

Страница 193: ...files 2 Select an item by checking the corresponding check box in the tree Selecting a check box for a folder means that all its content files and folders will be backed up That is also the case for n...

Страница 194: ...ation refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files and folders whose names match any of the criteria called file ma...

Страница 195: ...ck up data to a centralized vault expand the Centralized group and click the vault To back up data to a personal vault expand the Personal group and click the vault To back up data to a local folder o...

Страница 196: ...ient except for some specific cases Why two or more plans should not back up to the same archive 1 Backing up different sources to the same archive makes using the archive difficult from the usability...

Страница 197: ...sage examples This section provides examples of how you can use simplified file naming Example 1 Daily backup replacing the old one Consider the following scenario You want to perform a daily full bac...

Страница 198: ...s with daily drive swaps Consider the following scenario You want to perform daily full backups of your machine to the file MyMachine tib on an external hard disk drive You have two such drives Either...

Страница 199: ...ical files every day You want the first backup of each day to be full and to run at 01 00 AM You want the backups during working hours to be differential and to run every hour from 8 00 AM through 5 0...

Страница 200: ...b incremental created on January 31 at noon MyArchive 2 1 2011 tib full created on February 1 at midnight MyArchive 2 1 2011 2 tib incremental created on February 1 at noon Example 2 Suppose that you...

Страница 201: ...se the Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these d...

Страница 202: ...At the first time a full backup will be created The next backups will be incremental To set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule w...

Страница 203: ...d in the archive A term can be set in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup...

Страница 204: ...loss Suppose that you need to Perform backups at the end of each working day Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered relatively quickly Ha...

Страница 205: ...you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily backups Consider a more exotic GFS scheme Start backup at 12...

Страница 206: ...ails Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 This is how the first 14 days or 14 sessions of this scheme s schedule look Shaded numbe...

Страница 207: ...he following day however a new third level differential backup is created and the old full backup is deleted 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1 2 1 3 This gives us only a four day recov...

Страница 208: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Страница 209: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 38 Monthly full weekly differential and daily incremental backups plus c...

Страница 210: ...f whether it has a schedule In the first of the previous examples we set up a schedule only for full backups However the scheme will still result in three backup tasks enabling you to manually start a...

Страница 211: ...virtual machine When creating a backup plan p 188 you can set up regular conversion of a disk or volume backup to a virtual machine This section provides information that helps you make the appropria...

Страница 212: ...sk will be executed by the host that you select and so will take that host s CPU resource If multiple backup plans use the same host multiple conversion tasks will be queued on that host and it may ta...

Страница 213: ...en Virtual Appliance OVA The virtual appliance can then be imported to XenServer The VMware Workstation machine can be converted to the open virtualization format OVF using the VMware OVF tool With Ac...

Страница 214: ...als do not enable recovery of the selected data To access this option select the Advanced view check box When to recover Recover p 225 Select when to start recovery The task can start immediately afte...

Страница 215: ...ser name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK To learn...

Страница 216: ...se anonymous access instead of entering credentials According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means...

Страница 217: ...rtition table and partition layout Acronis Backup Recovery 10 automatically updates Windows loaders after recovery so there is no need to recover the MBR and Track 0 for Windows systems unless the MBR...

Страница 218: ...d to the regular disk mapping procedure described below New virtual machine p 222 If Acronis Backup Recovery 10 Agent for Windows is installed The selected disks will be recovered to a new virtual mac...

Страница 219: ...discovers the same signature on the second one automatically generates a new unique NT signature and assigns it to the second disk As a result all the volumes on the second disk will lose their lette...

Страница 220: ...rce machine configuration being copied where possible The configuration is displayed in the Virtual Machine Settings p 222 section Check the settings and make changes if necessary Then you proceed to...

Страница 221: ...ding values in the appropriate fields Using this feature you can redistribute the disk space between the volumes being recovered In this case you will have to recover the volume to be reduced first Ti...

Страница 222: ...Windows only Assign a letter to the recovered volume Select the desired letter from a drop down list With the default AUTO selection the first unused letter will be assigned to the volume If you sele...

Страница 223: ...ome cases delete the proposed disks Implementation of Xen machines is based on Microsoft Virtual PC and inherits its limitations up to 3 IDE disks and 1 processor SCSI disks are not supported Processo...

Страница 224: ...F log F1 log By mask F log Excludes all log files with names consisting of four symbols and starting with F Windows By file path Finance F log Excludes files named F log from all folders with the name...

Страница 225: ...will be started immediately after you click the final OK Recover later the recovery task will be started at the date and time you specify If you do not need to schedule the task and wish to start it...

Страница 226: ...vers are located in a networked folder or on the bootable media specify the path to the folder in the Search folder field During recovery Universal Restore will perform the recursive search in all the...

Страница 227: ...s for further usage The Citrix XenServer Open Virtual Appliance OVA can be imported to a XenServer using Citrix XenCenter The VMware Workstation machine can be converted to the open virtualization for...

Страница 228: ...gure the loader to point to the new devices and reactivate it Configuring GRUB is described in How to reactivate GRUB and change its configuration p 230 Tip If you want to preserve logical LVM volumes...

Страница 229: ...e disk and on the file system to which direct access is possible In other cases the user has to manually reactivate the boot loader Solution Reactivate the boot loader You might also need to fix the c...

Страница 230: ...le for Fedora and Red Hat Enterprise Linux distributions for example as follows vi mnt system boot grub menu lst 6 In the menu lst file respectively grub conf find the menu item that corresponds to th...

Страница 231: ...g systems multi 0 disk 0 rdisk 0 partition 1 WINDOWS Microsoft Windows XP Professional noexecute optin fastdetect Windows Vista 2008 A part of the loader resides in the partition boot sector the rest...

Страница 232: ...age Node you may want to perform a disk backup of the machine where the storage node itself is installed This section describes how to recover the storage node registered on the management server in c...

Страница 233: ...iately or set up a validation schedule for any backup archive or location you have permission to access Validation of an archive or of the latest backup in the archive can be scheduled as part of the...

Страница 234: ...Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK To learn more about using credentials in Acron...

Страница 235: ...credentials required for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer If...

Страница 236: ...es 6 4 5 Access credentials for source Specify the credentials required for access to the location where the backup archive is stored To specify credentials 1 Select one of the following Use the task...

Страница 237: ...t is save move create delete files or folders and run executables consisting of one file Limitation Mounting of volume backups stored on Acronis Backup Recovery 10 Storage Node is not possible Usage s...

Страница 238: ...the network share requires access credentials the program will ask for them Note for Linux users To specify a Common Internet File System CIFS network share which is mounted on a mount point such as...

Страница 239: ...work share or a storage node vault Specify User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The...

Страница 240: ...the table and click Unmount To unmount all the mounted volumes click Unmount all 6 7 Exporting archives and backups The export operation creates a copy of an archive or a self sufficient part copy of...

Страница 241: ...at is unique to the destination folder or vault If you need to redo the export using the same archive name first delete the archive that resulted from the previous export operation The resulting archi...

Страница 242: ...ionally provide a name for the task To export an archive or a backup perform the following steps General Task name Optional Enter a unique name for the task A conscious name lets you quickly identify...

Страница 243: ...he location in the Path field or select the desired folder in the folders tree If the archive is stored in Acronis Online Backup Storage click Log in and specify the credentials to log in to the onlin...

Страница 244: ...contained in each vault folder you select If the archive is password protected provide the password While you are reviewing the location content archives can be added deleted or modified by another u...

Страница 245: ...ork share requires access credentials the program will ask for them Note for Linux users To specify a Common Internet File System CIFS network share which is mounted on a mount point such as mnt share...

Страница 246: ...provide an archive name that is unique to the destination folder or vault If you need to redo the export using the same archive name first delete the archive that resulted from the previous export ope...

Страница 247: ...nal Protect the Acronis Secure Zone from unauthorized access with a password The prompt for the password appear at any operation relating to the zone After you configure the required settings click OK...

Страница 248: ...field re type the password 4 Click OK To disable password 1 Choose Do not use 2 Click OK 6 8 1 4 Result confirmation The Result confirmation window displays the expected partition layout according to...

Страница 249: ...nd backups from the archives To learn more about operations with vaults see the Vaults p 120 section 6 8 2 1 Increasing Acronis Secure Zone To increase Acronis Secure Zone 1 On the Manage Acronis Secu...

Страница 250: ...oot time prompt Press F11 for Acronis Startup Recovery Manager if you do not have the GRUB boot loader or adds the Acronis Startup Recovery Manager item to GRUB s menu if you have GRUB If the system f...

Страница 251: ...server or WDS RIS using the same wizard Linux based bootable media Linux based media contains Acronis Backup Recovery 10 Bootable Agent based on Linux kernel The agent can boot and perform operations...

Страница 252: ...ice Pack 2 PE 1 5 Windows Server 2003 with Service Pack 1 PE 1 6 Windows Vista PE 2 0 Windows Vista SP1 and Windows Server 2008 PE 2 1 Windows 7 PE 3 0 If you already have media with PE1 x distributio...

Страница 253: ...p 254 2 The Acronis bootable components to be placed on the media Universal Restore can be enabled if Acronis Backup Recovery 10 Universal Restore is installed on the machine where the media is creat...

Страница 254: ...dvanced Programmable Interrupt Controller APIC You may want to use this parameter when experiencing problems with a particular hardware configuration vga ask Prompts for the video mode to be used by t...

Страница 255: ...e access methods will be allowed You may want to use this parameter when the bootable media fails to start which may be caused by the BIOS pci biosirq Uses PCI BIOS calls to get the interrupt routing...

Страница 256: ...he slot closest to the processor NIC2 is in the next slot and so on When the bootable agent starts on that machine it will find no NICs with known MAC addresses and will configure the NICs in the same...

Страница 257: ...ur information To add drivers 1 Click Add and browse to the INF file or a folder that contains INF files 2 Select the INF file or the folder 3 Click OK The drivers can be removed from the list only in...

Страница 258: ...2 Start the Bootable Media Builder either from the management console by selecting Tools Create Bootable Media or as a separate component 3 Select Bootable media type Windows PE When creating a new P...

Страница 259: ...mmand export_license bat 6 Copy the contents of the current folder by default C Program Files Acronis Bootable Components WinPE to the BartPE folder plugins Acronis 7 Insert your Windows distribution...

Страница 260: ...Acronis Secure Zone is not possible 7 Tasks cannot be scheduled in fact tasks are not created at all If you need to repeat the operation configure it from scratch 8 The log lifetime is limited to the...

Страница 261: ...media or Run the iSCSI Setup in a PE based media 3 Specify the IP address and port of the iSCSI device s host and the name of the iSCSI initiator 4 If the host requires authentication specify the use...

Страница 262: ...on egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt r...

Страница 263: ...k configuration includes enough disks whose sizes are at least those of the original disks To create the volume structure by using the management console 1 Boot the machine from a Linux based bootable...

Страница 264: ...ux are not included in the bootable media environment so you need to use the lvm utility with a corresponding command lvm pvcreate lvm vgcreate etc 6 If you previously mounted the backup by using the...

Страница 265: ...destroys all data on the dev md0 and dev md1 devices lvm pvcreate dev md0 dev md1 lvm vgcreate my_volgroup dev md0 dev md1 lvm vgdisplay The output of the lvm vgdisplay command will contain lines simi...

Страница 266: ...rting the recovery To mount a backup volume 1 Use the list command to list the volumes which are stored in the backup For example trueimagecmd list filename smb server backups linux_machine tib The ou...

Страница 267: ...onis PXE Server 1 Run the Acronis Backup Recovery 10 setup file 2 Select Acronis PXE Server from the list of Centralized management components 3 Follow the onscreen instructions Acronis PXE Server run...

Страница 268: ...machine disk configuration might change due to a HDD replacement or hardware loss In such case with the help of Acronis Disk Director Lite the user has the possibility to recreate the necessary disk...

Страница 269: ...e Acronis Bootable Media Builder run the management console and then click Disk Management 6 11 3 Choosing the operating system for disk management On a machine with two or more operating systems repr...

Страница 270: ...form at the bottom of the view Any volume changes including changing the volume letter or label are also immediately displayed in the view 6 11 5 Disk operations Acronis Disk Director Lite includes t...

Страница 271: ...ngs it can be done later using the standard Acronis Disk Director Lite disk tools 6 11 5 2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk It can be a case o...

Страница 272: ...he size limitations safe transfer of all the source disk data to the target disk is impossible even with the proportional resizing of the volumes then the Clone basic disk operation will be impossible...

Страница 273: ...one disk If you need additional disk reliability against any possible data damage If you need to convert a basic MBR disk to basic GPT 1 Select a basic MBR disk to convert to GPT 2 Right click on the...

Страница 274: ...d operation you will have to commit p 282 it Exiting the program without committing the pending operations will effectively cancel them 6 11 5 5 Disk conversion basic to dynamic You would want to conv...

Страница 275: ...types that are only supported by dynamic disks all volume types except Simple volumes then you will be warned here about the possible damage to the data involved in the conversion Please note the ope...

Страница 276: ...nis Disk Director Lite includes the following operations that can be performed on volumes Create Volume p 276 Creates a new volume with the help of the Create Volume Wizard Delete Volume p 280 Deletes...

Страница 277: ...ore than one disk Striped volumes are created for improved performance not for their better reliability they do not contain redundant information Mirrored Volume A fault tolerant volume also sometimes...

Страница 278: ...a brief description of every type of volume for better understanding of the advantages and limitations of each possible volume architecture If the current operating system installed on this machine do...

Страница 279: ...ume size might differ e g when the size of one mirror establishes the size of the other mirror or the last 8Mb of the disk space is reserved for the future conversion of the disk from basic to dynamic...

Страница 280: ...l systems for recovering previously saved volume images The features of resizing the existing volumes and creating the new volumes using free space from the existing ones exist on the full version of...

Страница 281: ...As a result some applications might stop working normally or user files might not be automatically found and opened To prevent this you can manually change the letters that are automatically assigned...

Страница 282: ...disabled if the Volume Size is more than 2 GB FAT32 disabled if the Volume Size is more than 2 TB or NTFS In the text window you will be able to enter the volume label if necessary by default this wi...

Страница 283: ...able to undo any actions or operations after you choose the Proceed operation You can also cancel the commitment by clicking Cancel Then no changes will be done to the pending operation list Quitting...

Страница 284: ...t the top If there are no alerts or warnings at the moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer...

Страница 285: ...en the Machines view with the list of machines filtered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is rec...

Страница 286: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Страница 287: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Страница 288: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Страница 289: ...s related to the selected policy Refresh a list of policies Click Refresh The management console will update the list of backup policies from the management server with the most recent information Tho...

Страница 290: ...needs and preferences To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Clic...

Страница 291: ...administrator checks its status A machine s status is defined as the most severe status of all backup plans p 176 both local and centralized existing on the machine and all backup policies p 287 appl...

Страница 292: ...ations such as start stop tasks revoke policies explore the policy inheritance etc The panel is collapsed by default To expand the panel click the chevron The content of the panel is also duplicated i...

Страница 293: ...lick Apply backup policy In the Policy selection window specify the backup policy you need to apply to the selected machine Grouping actions To Do Create a custom static or dynamic group Click Create...

Страница 294: ...anaged machine Enables to administer a managed machine and perform all the direct management operations Other operations View detailed information on a machine Click View details In the Machine detail...

Страница 295: ...nt Select the Save password check box to store the password for future connections 5 Click OK Initiating registration on the machine side The registration procedure can be initiated on the machine sid...

Страница 296: ...the management server A registered machine has to be specified by its registration address that is you need to provide exactly the same host name fully qualified domain name FQDN or IP address as was...

Страница 297: ...mechanism is used to operate on all the machines Importing machines from a text file To import machines from a file 1 In the Navigation tree select Physical machines or All physical machines 2 Click I...

Страница 298: ...oon as the machine becomes available to the server Machine details Accumulates in four tabs all information on the selected machine Lets the management server administrator perform operations with the...

Страница 299: ...n in Windows Backup policies Displays a list of backup policies applied to the selected machine and lets the management server administrator perform the following operations To Do View details of a po...

Страница 300: ...og p 186 view containing the list of the task related log entries Run a plan task Backup plan Click Run In the Run Backup Plan p 183 window select the task you need to run Running the backup plan star...

Страница 301: ...e to change the scheme to Grandfather Father Son or Tower of Hanoi 2 If the Tower of Hanoi scheme is used it is not possible to change the number of levels In all other cases the scheme can be changed...

Страница 302: ...g on the machine with the most recent information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manu...

Страница 303: ...p1 in the root contains Group2 to which the policy is applied directly Group2 in turn contains child Group3 that inherits the policy from the parent and applies the policy to Machine1 respectively The...

Страница 304: ...window specify the backup policy you need to apply to the selected group If there are child groups in the selected group the backup policy will be applied to them as well View detailed information on...

Страница 305: ...f the dynamic group Organizational unit p 306 All the machines belonging to the specified organizational unit OU will be members of the dynamic group IP address range All the machines whose IP address...

Страница 306: ...d in the management server options the program will ask you to provide them The credentials will be saved in the Domain access credentials p 83 option For example suppose that the domain us corp examp...

Страница 307: ...he same way as creating p 305 one Changing the type of group will result in its conversion Any custom group can be converted to a dynamic group if it was static and vice versa When converting a static...

Страница 308: ...way as for the Backup policies view See the Filtering and sorting backup policies p 289 section for details Inheritance order The Inheritance order window lets you examine where the policy applied to...

Страница 309: ...n the management server If the machine is already registered skip this step 4 The virtual machines hosted on the Hyper V server appear in the All virtual machines group Adding ESX ESXi virtual machine...

Страница 310: ...ge vault Grouping of virtual machines The Virtual machines section of the navigation tree contains one built in group called All virtual machines You cannot modify this group manually delete or move i...

Страница 311: ...and registered on the management server Virtual machines dynamically grouped by their hosts will appear on the management server and you will be able to apply backup policies to the virtual machines o...

Страница 312: ...ation Centralized backup plans and recovery tasks originating from the management server will run under this account by default This means the account must have the necessary privileges on the vCenter...

Страница 313: ...deployed to a storage shared by all the cluster s hosts Normally this is an NFS share or a SAN LUN attached to each of the hosts Let s assume that the cluster contains three servers Server 1 uses stor...

Страница 314: ...f the pane is also duplicated in the Storage node details p 316 window Way of working with storage nodes typical workflow 1 Install the Acronis Backup Recovery 10 Storage Node 2 Create a user account...

Страница 315: ...the compacting task schedule After deleting backups from deduplicating vaults either manually or during cleanup unreferenced data may appear in the deduplicating vaults and their databases The compact...

Страница 316: ...e This information is also duplicated on the Information pane Storage node properties The tab displays the following information about the selected storage node Name the name of the machine where the...

Страница 317: ...sk states p 177 and Task statuses p 178 sections Way of working with tasks Use the filtering and sorting p 319 capabilities to display the desired tasks in the table Select a task to take an action on...

Страница 318: ...n you need to modify a task belonging to a local backup plan edit the backup plan A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan...

Страница 319: ...w or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you want to be d...

Страница 320: ...filters in the log table by yourself View Action Dashboard In the calendar right click on any highlighted date and then select View log The Log view will appear with the list of the log entries alread...

Страница 321: ...ify whether to collect log events from the registered machines to the centralized log 7 1 7 2 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries To D...

Страница 322: ...if any Task The task the event relates to if any Managed entity type Type of managed entity where the event has occurred if any Managed entity The name of the managed entity where the event has occur...

Страница 323: ...tion as of the current time Reports about vaults statistics and task activities are interval based and provide historical information for the specified time interval that can last from days to years d...

Страница 324: ...sort the table 7 1 8 2 Report about the backup policies In this view you can generate a report about the backup policies existing on the management server This report consists of one or more tables Fi...

Страница 325: ...e report includes all backup plans from all machines Report view Under Report view choose how the report will look Select whether to show all items in a single table or to group them by a particular c...

Страница 326: ...the archives Creation time The period within which the newest backup was created in each of the archives Occupied space The limits for the space occupied by each of the archives Data backed up The li...

Страница 327: ...ed with warnings and Failed Report coverage Under Report coverage choose the time interval for which you want to generate the report Filters Under Filters choose which tasks to include in the report O...

Страница 328: ...and then click the Advanced tab 2 Select the Allow active content to run files on My Computer check box under Security 3 Click OK in Mozilla Firefox 1 On the Options menu click Content 2 Make sure tha...

Страница 329: ...settings Through the Microsoft Group Policy mechanism the template policy settings can be applied to a single computer as well as to a domain To load the Acronis Administrative Template 1 Run Windows...

Страница 330: ...Limit parameter determines the maximum number of such connections that the storage node can handle simultaneously When this limit is reached the storage node will use the backup queue see the next par...

Страница 331: ...number between 0 and 100 Default value 10 The total size of a vault is the vault s free space plus the size of all archives that are contained in the vault For example suppose that two vaults Vault A...

Страница 332: ...an error is recorded in the storage node s log and any backup to the vault becomes prohibited Possible values Any integer number between 0 and 2147483647 Default value 10 If the amount of free space o...

Страница 333: ...record Acronis Backup Recovery 10 Management Server s events into the Application event log in Windows This parameter has two settings Trace State Description Specifies whether to record Acronis Backu...

Страница 334: ...ections to keep Possible values Any integer number between 1 and 500 Default value 200 If the total number of online registered machines does not exceed the value in Maximum Connections connections to...

Страница 335: ...alues Any integer number between 15 and 2147483647 Default value 15 This parameter is analogous to the Period parameter described previously Real Time Monitoring Description Specifies whether to perfo...

Страница 336: ...urther attempt until reaching the value specified in Offline Period Threshold If the machine comes back online the time interval becomes normal again This approach aims at efficient use of the managem...

Страница 337: ...strative Template Licensing Specifies how often the agent checks its license on the license server and how long it can work without a license server License Check Interval in days Description Specifie...

Страница 338: ...License Server Possible values Any string 0 to 32765 characters long Default value Empty string Log Cleanup Rules Specifies how to clean up the agent log This parameter has the following settings Max...

Страница 339: ...on Specifies the community name for the SNMP notifications Possible values Any string 0 to 32765 characters long Default value public Backup Specifies the location and initial size of the snapshot sto...

Страница 340: ...available space minus 50 MB Without the snapshot storage taking snapshots is still possible The size of the snapshot storage does not affect the size of the backup 7 2 1 5 Acronis Backup Recovery 10...

Страница 341: ...eep this check box selected unless you have a Public Key Infrastructure PKI in your environment In Use Agent Certificate Authentication select one of the following Do not use The use of SSL certificat...

Страница 342: ...nection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured Event tracing parameters In Windows the events occurring in Acr...

Страница 343: ...talled will participate in the Customer Experience Program Select one of the following Not Configured By default the machine does not participate in the Customer Experience Program Enabled In Enable s...

Страница 344: ...eter applies separately to disk level and file level backups So compacting may be performed for one data store and skipped for the other Parameters related to vault databases The following two paramet...

Страница 345: ...policy A conscious name lets you identify the policy among the others Source type Select the type of items to back up Disk volumes or Files Policy credentials p 347 Optional You can change the policy...

Страница 346: ...randfather Father Son and Tower of Hanoi create a custom backup scheme or back up data once Archive validation When to validate Optional Define when and how often to perform validation and whether to...

Страница 347: ...erver or the folder to place the virtual machine files in Resultant VMs Specify a name for the virtual machines to be created The default name consists of variables that reflect the policy name and th...

Страница 348: ...type it manually To add another rule click the next empty line and select the rule from the list or type it manually The program remembers the rules typed manually and the next time you open the wind...

Страница 349: ...CSI hard disk drive For more details see Note on Linux machines below First partition on the first software RAID hard disk of a Linux machine Type or select dev md1 md1 is the standard device name for...

Страница 350: ...possible to set up a policy to back up volume C on Windows machines and partition dev hda1 on Linux machines Unlike Windows there is no clear distinction between a volume partition and a folder direc...

Страница 351: ...th of which belong to the volume group vg_mymachine specify the following selection rules dev vg_mymachine lv_root dev vg_mymachine lv_bin To see the list of logical volumes on a machine run the lvdis...

Страница 352: ...NDIR Points to the folder where Windows is located for example C Windows Common data for all user profiles ALLUSERSPROFILE Points to the folder where the common data of all user profiles is located ty...

Страница 353: ...name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK 7 3 4 Exclusions Set up exclusions...

Страница 354: ...e letter add a backslash to the folder name in the criterion for example C Finance Exclusion examples Criterion Example Description Windows and Linux By name F log F Excludes all files named F log Exc...

Страница 355: ...opper using a packet sniffer Store each machine s archive in the specified folder on the machine Enter the full path to the folder in the Path field This path will be created on each machine the polic...

Страница 356: ...t the user name and password can be intercepted by an eavesdropper using a packet sniffer 7 3 7 Backup scheme selection Choose one of the available backup schemes Back up now to create a backup task f...

Страница 357: ...f there is no full backup in the archive a full backup will be created regardless of your selection Date and time Specify when to start the backup The task will be started manually Select this check b...

Страница 358: ...y workday except Friday which is left for weekly and monthly backups Monthly backups run every fourth Friday and weekly backups run on all other Fridays Monthly Grandfather backups are full Weekly Fat...

Страница 359: ...ght see a weekly or a monthly backup remain in the archive for a few days past its expected expiration date If the schedule starts with a daily or a weekly backup a full backup is created instead Exam...

Страница 360: ...to recover a previous version of a damaged file from a daily backup as well as 10 day access to weekly backups Each monthly full backup will be available for six months since the creation date Work sc...

Страница 361: ...ce Up to 16 levels of full differential and incremental backups Next level backups are twice as rare as previous level backups One backup of each level is stored at a time Higher density of more recen...

Страница 362: ...ackups accumulate toward the current time Having four backups we could recover data as of today yesterday half a week or a week ago Roll back period The number of days we can go back in the archive is...

Страница 363: ...s Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup For example the full backup can be set up to run every Sunday at 1 00 AM as soon as all u...

Страница 364: ...ules p 38 For example the cleanup procedure can be set up to run after each backup and also on schedule This option is available only if you have set at least one retention rule in Retention rules Cle...

Страница 365: ...heduled at 9 00 PM may actually start later as soon as the backup location becomes available Likewise backup tasks for incremental and differential backups will wait until all users are logged off and...

Страница 366: ...ails 7 3 8 Archive validation Set up the validation task to check if the backed up data is recoverable If the backup could not pass the validation successfully the validation task fails and the backup...

Страница 367: ...Storage To use this service you need to buy a subscription that determines the amount of storage space reserved for your backups storage quota and how long the online service will be available to you...

Страница 368: ...cronis software onto the virtualization host This approach comes in handy when the virtualization product installed on the host server is VMware ESX i or Windows Server 2008 with Hyper V or Microsoft...

Страница 369: ...available only for online storage is Initial seeding This is the Back up now scheme using local destination and full backup method To use this scheme you need a license for the Initial Seeding p 370 s...

Страница 370: ...ore the machine is not able to back up to the subscription it used before recovery This happens regardless of recovery to new or to different hardware To continue backing up the machine to the same su...

Страница 371: ...one per machine 8 1 7 7 How to buy an Initial Seeding license You can buy an Initial Seeding license from an Acronis partner or in Acronis online store Follow the link www acronis eu my backup recove...

Страница 372: ...kup plan to do incremental backups In Backup scheme select Back up now Back up later for manual backups or Simple for scheduled backups For Simple specify the schedule and optionally the retention rul...

Страница 373: ...company s web site prepare and print two prepaid shipping labels 1 Shipping label for sending your hard drive This label is placed on the top of the box You should send your package to one of the Acr...

Страница 374: ...the license cannot be used for any other machine From this point on you can cancel the order if something goes wrong This will return the license to the pool of available licenses A full backup has st...

Страница 375: ...these issues Occasional The order has been cancelled The order had been cancelled before the media was shipped so returning the media is not required Occasional The order has been cancelled The media...

Страница 376: ...le on the Initial Seeding Recovery tab A license purchased in Acronis online store becomes available immediately after the payment is processed 8 1 8 8 How do I track a Large Scale Recovery order stat...

Страница 377: ...ate online backup subscriptions in the Actions menu 2 Click Go to account management Web page 3 Log in to your account create one if you are not registered yet 8 1 9 2 Where do I find the subscription...

Страница 378: ...on appears in the Next subscription column for the selected machine Renewing a number of activated subscriptions at once This operation is possible if the appropriate number of new subscriptions are i...

Страница 379: ...des come with the purchase confirmation e mail Next install Acronis software if not yet installed and assign p 380 each subscription to a machine The subscriptions become activated After that you can...

Страница 380: ...long with paid ones The same expiration rules apply to trial and paid subscriptions To continue using the service after the trial subscription expires buy the same type subscription and renew the tria...

Страница 381: ...ther machine You reinstalled Acronis Backup Recovery 10 on a machine and want to resume its online backups You recovered a machine to bare metal or to a state when it did not yet have an activated sub...

Страница 382: ...have the following options Before reassigning Delete backups from Subscription 1 using Machine 1 if it is available and turned on Delete backups from Subscription 2 using Machine 2 After reassigning...

Страница 383: ...please refer to the context sensitive help 8 6 Limitations of the online storage Unlike other types of storage available in Acronis Backup Recovery 10 the online storage has the following limitations...

Страница 384: ...od does not start counting down until the subscription is activated Assigned subscription A subscription that has been assigned to a machine Available subscription A subscription that is not assigned...

Страница 385: ...ption Assign a subscription that has the same storage quota as the current activated subscription This subscription will become activated as soon as the current subscription expires Storage quota The...

Страница 386: ...secure volume for storing backup archives p 387 within a managed machine p 395 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost effective and handy...

Страница 387: ...gle backup operation p 387 Physically it is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TI...

Страница 388: ...immediately after its creation this is a validation rule protect the archive with a password this is an option Physically a backup plan is a bundle of tasks p 398 configured for execution on a managed...

Страница 389: ...ent is based on Linux kernel A machine p 395 can be booted into a bootable agent using either bootable media p 389 or Acronis PXE Server Operations can be configured and controlled either locally thro...

Страница 390: ...p 397 monitoring activities of the Acronis Backup Recovery 10 components viewing the centralized log and more Centralized task A task p 398 belonging to a centralized backup plan p 390 Such task appea...

Страница 391: ...subsequent backups p 387 belonging to the same archive p 387 into a single backup Consolidation might be needed when deleting backups either manually or during cleanup p 390 For example the retention...

Страница 392: ...overy 10 provides an option to take a raw image that is copy all the disk sectors which enables imaging of unsupported file systems Disk group A number of dynamic disks p 393 that store the common con...

Страница 393: ...Reserved Partition MSR Disk 1 MBR LDM database 1 MB Disk 2 Protec tive MBR GPT Microsoft Reserved Partition MSR LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR Disk 1 and...

Страница 394: ...enerated key with a user defined size of 128 192 or 256 bits The encryption key is then encrypted with AES 256 using a SHA 256 hash of the password as a key The password itself is not stored anywhere...

Страница 395: ...ntal backup A backup p 387 that stores changes to the data against the latest backup You need access to other backups from the same archive p 387 to restore data from an incremental backup L Local bac...

Страница 396: ...thin the enterprise network Acronis Backup Recovery 10 Management Server provides the administrator with a single entry point to the Acronis Backup Recovery 10 infrastructure an easy way to protect da...

Страница 397: ...twork attackers from establishing a fake connection on behalf of a trusted principal the management server S Selection rule A part of the backup policy p 388 Enables the management server p 396 admini...

Страница 398: ...etention rules set by Backup plan Backup plan Storage node side validation Validation p 399 performed by a storage node p 397 according to the backup plans p 388 that produce the archives p 387 stored...

Страница 399: ...n The previous product versions considered a file backup valid when the metadata contained in its header was consistent The current method is time consuming but much more reliable Validation of a volu...

Страница 400: ...hines is installed on that server W WinPE Windows Preinstallation Environment A minimal Windows system based on any of the following kernels Windows XP Professional with Service Pack 2 PE 1 5 Windows...

Отзывы: