background image

Copyright © Acronis, Inc., 2000-2010 

367 

 

 

Dynamic disk 

A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with 
Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, 
better performance or larger volume size. 

A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition 
style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the 
dynamic volumes' configuration. Each dynamic disk holds the complete information about all 
dynamic volumes existing in the disk group which makes for better storage reliability. The database 
occupies the last 1MB of an MBR disk. On a GPT disk, Windows creates the dedicated LDM Metadata 
partition, taking space from the Microsoft Reserved Partition (MSR.) 

Disk 1 

MBR 

 

LDM 

database 

 

 

 

 

 

1 MB 

Disk 2 

Protec-

tive 

MBR 

GPT 

Microsoft 

Reserved 

Partition (MSR) 

LDM  

database  

 

 

GPT 

 

 

 

 

LDM Metadata 

partition 

 

1 MB 

 

 

Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks. 

For more information about dynamic disks please refer to the following Microsoft knowledge base 
articles: 

Disk Management (Windows XP Professional Resource Kit) http://technet.microsoft.com/en-
us/library/bb457110.aspx 

816307 Best practices for using dynamic disks on Windows Server 2003-based computers  
http://support.microsoft.com/kb/816307 

 

Dynamic group 

A group of machines (p. 369) which is populated automatically by the management server (p. 370) 
according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 
offers the following membership criteria:  

 

Operating system 

 

Active Directory organization unit 

 

IP address range. 

A machine remains in a dynamic group as long as the machine meets the group's criteria. The 
machine is removed from the group automatically as soon as  

 

the machine's properties change so that the machine does not meet the criteria anymore OR 

 

the administrator changes the criteria so that the machine does not meet them anymore. 

There is no way to remove a machine from a dynamic group manually except for deleting the 
machine from the management server. 

Содержание BACKUP RECOVERY 10 ADVANCED SERVER -

Страница 1: ...User s Guide Acronis Backup Recovery 10 Advanced Server...

Страница 2: ...hout the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtai...

Страница 3: ...ackup scheme 34 2 6 Tower of Hanoi backup scheme 37 2 7 Retention rules 39 2 8 Backing up dynamic volumes Windows 42 2 9 Backing up LVM volumes Linux 44 2 10 Backing up RAID arrays Linux 46 2 11 Tape...

Страница 4: ...117 4 Vaults 125 4 1 Centralized vaults 126 4 1 1 Working with the Centralized vault view 127 4 1 2 Actions on centralized vaults 128 4 1 3 Tape libraries 133 4 2 Personal vaults 155 4 2 1 Working wi...

Страница 5: ...for destination 222 6 3 8 When to recover 222 6 3 9 Universal Restore 223 6 3 10 How to convert a disk backup to a virtual machine 224 6 3 11 Bootability troubleshooting 225 6 3 12 Recovering MD devic...

Страница 6: ...6 Volume operations 272 6 11 7 Pending operations 278 6 12 Collecting system information 279 7 Centralized management 280 7 1 Administering Acronis Backup Recovery 10 Management Server 280 7 1 1 Dashb...

Страница 7: ...pital expense and software maintenance costs Leveraging existing IT infrastructure Data deduplication to reduce storage consumption and network bandwidth utilization Flexible deduplication mechanism a...

Страница 8: ...rstanding of the GUI elements see Using the management console p 10 For how to enable non root users to start the console under Linux see Privileges for local connection p 74 For how to enable remote...

Страница 9: ...s The tasks can be filtered by machines backup plans and other parameters Refer to the context help for details Viewing log To view the centralized log collected from the registered machines select Lo...

Страница 10: ...ovided in the Setting up centralized data protection in a heterogeneous network p 55 section 1 2 1 Using the management console As soon as the console connects to a managed machine p 369 or to a manag...

Страница 11: ...ess to the main operations available on the managed machine Dashboard Use this view to estimate at a glance whether the data is successfully protected on the managed machine Backup plans and tasks Use...

Страница 12: ...e to a managed machine 2 In the navigation tree right click the machine s name a root element of the navigation tree and then select Create shortcut If the console and agent are installed on the same...

Страница 13: ...action page see the Action pages p 15 section All the actions can also be accessed in the Actions menu Actions bar on a managed machine and on a management server Tools Contains a list of the Acronis...

Страница 14: ...pointer becomes a double headed arrow drag the pointer to move the border The management console remembers the way the panes borders are set When you run the management console next time all the pane...

Страница 15: ...king in the items in the Item s name Actions bar on the Actions and Tools pane By selecting the items in the Actions menu By right clicking the item and selecting the operation in the context menu Act...

Страница 16: ...started the plan creation from the list Thus you can perform the remaining steps and accomplish the backup plan creation Navigation buttons 1 3 Acronis Backup Recovery 10 components This section cont...

Страница 17: ...to their original location or to another place It is possible to recover all files and folders that were backed up or select which of them to recover Other operations Conversion to a virtual machine R...

Страница 18: ...or select which of them to recover 1 3 2 1 Deduplication This add on enables the agent to back up data to deduplicating vaults managed by Acronis Backup Recovery 10 Storage Node 1 3 3 Components for c...

Страница 19: ...he vCenter and automatically register virtual machines created by Acronis Backup Recovery 10 in the vCenter Integration is available in all Acronis Backup Recovery 10 advanced editions a license for V...

Страница 20: ...ns that identical data will be backed up to this vault only once to minimize the network usage during backup and storage space taken by the archives For more information please see the Deduplication p...

Страница 21: ...store p 17 add on enables you to create bootable media with the restore to dissimilar hardware functionality Universal Restore handles differences in devices that are critical for Windows start up suc...

Страница 22: ...ows Vista all editions Windows 7 all editions Acronis Backup Recovery 10 Management Server and Acronis Backup Recovery 10 Storage Node Windows 2000 Professional SP4 XP Professional SP2 Windows 2000 Se...

Страница 23: ...ased distribution such as RHEL CentOS Fedora or Scientific Linux make sure that the following 32 bit packages are installed in the system pam i386 libselinux i386 libsepol i386 These packages should b...

Страница 24: ...a day seven 7 days per week Such electronic services may include but are not limited to user forums software specific information hints and tips bug fix retrieval via the internet software maintenanc...

Страница 25: ...Copyright Acronis Inc 2000 2010 25 More information about contacting Acronis Technical Support is available at the following link http www acronis eu enterprise support...

Страница 26: ...ate bootable media p 363 4 Connect the console to the managed machine 5 Create a backup plan p 362 To do so you have to specify at the very least the data to be protected and the location where the ba...

Страница 27: ...Copyright Acronis Inc 2000 2010 27 The following diagram illustrates the notions discussed above For more definitions please refer to the Glossary...

Страница 28: ...ve and then select the backup referring to the date and time of the backup creation or more precisely to the time when the creation has started In most cases the data will be reverted to that moment E...

Страница 29: ...a recovery operation on that machine This ability remote parallel recovery first appeared in Acronis Backup Recovery 10 the previous Acronis products do not provide it Recovery using bootable media R...

Страница 30: ...ar user such as a member of the Users group has the following management rights Perform file level backup and recovery of the files that the user has permissions to access but without using a file lev...

Страница 31: ...the user who has created or last modified the task Managing a plan task owned by another user Having Administrator privileges on the machine a user can modify tasks and local backup plans owned by any...

Страница 32: ...mes such as Grandfather Father Son and Tower of Hanoi as well as to create custom backup schemes All backup schemes are based on full incremental and differential backup methods The term scheme in fac...

Страница 33: ...backup to recover the data from a differential backup A differential backup is most useful when you are interested in saving only the most recent data state the data changes tend to be small as compa...

Страница 34: ...cheme You are free to use any of the varieties when backing up to a locally attached tape device GFS by Acronis With Acronis Backup Recovery 10 you can easily set up a backup plan that will regularly...

Страница 35: ...sume you select Friday for Weekly Monthly backup Here is the real schedule of the backup tasks that will be created Backup tasks created according to the GFS scheme by Acronis Backup Recovery 10 Sched...

Страница 36: ...anup is shown D stands for the backup that is considered Daily W stands for the backup that is considered Weekly M stands for the backup that is considered Monthly An ideal archive created according t...

Страница 37: ...ckup Dif stands for differential backup I stands for incremental backup The backups that outlive their nominal lifetime because of dependencies are marked pink The initial full backup will be deleted...

Страница 38: ...tern contains N th power of two sessions So the five level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions moves from 1 to 16 in the above figure The table shows the patte...

Страница 39: ...vel backup scheme The pattern consists of 16 sessions As a result of using incremental and differential backups the situation may arise when an old backup deletion must be postponed as it still is a b...

Страница 40: ...date and time in the past corresponding to this interval and deletes all backups created before that moment None of the backups created after this moment will be deleted 2 Keep the archive size withi...

Страница 41: ...ther backups one of the following rules is applied Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also be...

Страница 42: ...me If the free space which in fact is the storage device free space approaches zero you might need to toughen the restrictions for some or all archives residing in this vault 2 8 Backing up dynamic vo...

Страница 43: ...pace The total size of unallocated space is 40GB The recovery will always result in a striped volume if the unallocated space is distributed evenly among the disks 20GB and 20GB If one of the disks ha...

Страница 44: ...n running in Linux with 2 6 x kernel or a Linux based bootable media You can back up data of one or more logical volumes and recover it to a previously created logical volume or a basic MBR disk or vo...

Страница 45: ...GUI displays a similar table Num Partition Flags Start Size Type _________________________________________________________________ Disk 1 1 1 hda1 boot Pri Act 63 208782 Ext3 1 2 hda2 Pri 208845 8177...

Страница 46: ...ing up such volumes does not make sense when a software array is mounted as it won t be possible to recover them Example Here is an example of a volumes list obtained with the list command The GUI dis...

Страница 47: ...rrays may be listed alongside other disks as if they had a bad partition table or no partition table at all Backing up such disks does not make sense as it won t be possible to recover them 2 11 Tape...

Страница 48: ...backup you start with a new tape and create a new archive As soon as the tape is full a dialog window with a request to insert a new tape will appear The content of a non empty tape will be overwritt...

Страница 49: ...d there will be lost That s why Acronis Secure Zone should not be the only location where a backup is stored In enterprise environments Acronis Secure Zone can be thought of as an intermediate locatio...

Страница 50: ...ne hits F11 on prompt Press F11 for Acronis Startup Recovery Manager and performs data recovery in the same way as with ordinary bootable media The user can also back up using Acronis Startup Recovery...

Страница 51: ...rivers Universal Restore is applicable for 1 Instant recovery of a failed system on different hardware 2 Hardware independent cloning and deployment of operating systems 3 Physical to physical physica...

Страница 52: ...Server Virtual Edition Universal Restore for the other product editions is purchased separately has its own license and is installed as a separate feature from the setup file You need to re create bo...

Страница 53: ...while the rest of the files which are not immediately necessary are being recovered in the background Examples movie collection storage music collection storage multimedia storage How to use 1 Back up...

Страница 54: ...g To be able to propagate the management operations to multiple machines you install Acronis Backup Recovery 10 Management Server p 370 and register p 371 the machines on the server After that you can...

Страница 55: ...dy saved in the vaults Deduplication results in reducing backup traffic and saving storage space The storage node also undertakes operations with archives such as validation and cleanup which otherwis...

Страница 56: ...Install Acronis Backup Recovery 10 Agent on each of the machines to back up the machine s disks volumes or files Agent W Agent for Windows Agent L Agent for Linux When installing the agents register...

Страница 57: ...p 59 section Here are some scenarios supported by the aforementioned Acronis Backup Recovery 10 implementation 2 13 2 1 Protecting the servers You will most likely create individual backup plans on ea...

Страница 58: ...to Deployed and its status has to be OK To see the resulting backup plans on each of the workstations a navigate to the All machines group or the W_1 group b select the workstation c select the Backup...

Страница 59: ...if the accounting department forms a separate Active Directory organization unit You specify the accounting OU as the group membership criterion If a new accountant is hired the new machine will be a...

Страница 60: ...istrator creates the G1 dynamic group that contains machines with the server operating systems and applies a backup policy to the group Any server that is added to the network and registered on the ma...

Страница 61: ...that remain in the group of all machines anyway Operations with groups to which backup policies are applied will result in changing the policies on the member machines If a machine is not available or...

Страница 62: ...nd so the management server tracks and displays personal statuses for each machine that it works with as well as the policy s cumulative status 2 13 4 1 A policy on a machine or a group In the diagram...

Страница 63: ...iner stands for a group the one color circle stands for a machine with one applied policy the two color circle stands for a machine with two applied policies the white circle stands for a machine with...

Страница 64: ...that a machine can be a member of only one group besides the All machines group Let s start from this simplified approach In the diagram below the container stands for a group the two color circle sta...

Страница 65: ...both orange and green policies in spite of the fact that G3 has nothing to do with the orange policy That s why it is difficult to track the policies inheritance from the top of the hierarchy if the s...

Страница 66: ...te on the machine is Deploying Once the backup plan is successfully created the policy state on the machine becomes Deployed You may need to modify the policy for some reason Once you confirm the chan...

Страница 67: ...changed to Deployed If no data to back up is found at the time when the backup task starts the task will fail and the policy status will turn to Error If at least one of the data items is found the ba...

Страница 68: ...e and status as related to a specific machine the backup policy has the deployment state and status on a group of machines and the cumulative deployment state and status of the policy 2 13 5 3 Policy...

Страница 69: ...lays the cumulative status for each policy This status is defined as the most severe status of the policy on all machines the policy is applied to If the policy is not applied to any machine its statu...

Страница 70: ...10 GB to the database In case the database is corrupted or the storage node is lost while the vault retains archives and the service folder containing metadata the new storage node rescans the vault...

Страница 71: ...sources Such is the case when you back up operating systems and applications deployed from a single source over the network When performing incremental backups of similar data from different sources p...

Страница 72: ...size will be just about 1 GB in a deduplicating vault This gives a deduplication ratio of 2 1 or 50 Conversely if the two files had different content the backup sizes in non deduplicating and duplica...

Страница 73: ...s is cleared it is cleared by default If the file is less than 4 KB in size If you protected the archive with a password Files that were not deduplicated are stored in the archive as they would be in...

Страница 74: ...nsole is running 2 13 7 2 Privileges for local connection Windows Local connection on a machine running Windows can be established by any user who has the Log on locally user right on the machine Linu...

Страница 75: ...latest version of Linux PAM for your Linux distribution The latest stable source code of Linux PAM is available at Linux PAM source code Web page Remote connection as the root user Remote connections...

Страница 76: ...d the following three lines to the file user_a user_b user_c If necessary also add the root user to the file 3 Create the file etc pam d Acronisagent trusted with the following content PAM 1 0 auth re...

Страница 77: ...rent Instead of Acronis Remote Users and Acronis Centralized Admins the groups are named DCNAME Acronis Remote Users and DCNAME Acronis Centralized Admins respectively here DCNAME stands for the NetBI...

Страница 78: ...perform any further steps all users are typically members of the Domain Users group and so can access the storage node Otherwise you need to create user accounts on the machine where the storage node...

Страница 79: ...ts to any existing account you specify for a corresponding service If you choose to specify an existing user account for the agent service or the storage node service make sure that this account is a...

Страница 80: ...communication options p 81 For instructions on how to manage SSL certificates used for secure authentication see SSL certificates p 84 Note The components of earlier Acronis products including those...

Страница 81: ...tion option that you want to configure The Administrative Template contains the following options each option is explained later in this topic Remote Agent ports Client Encryption options Server Encry...

Страница 82: ...lf signed certificates check box allows the client to connect to the server applications that use self signed SSL certificates such as certificates created during the installation of Acronis Backup Re...

Страница 83: ...is enabled The connection will be established only if the use of SSL certificates is enabled on the client application Disabled The same as Not configured 2 13 8 4 Network port configuration Acronis B...

Страница 84: ...erver application use an SSL certificate called the server certificate In Windows the certificate path and the server certificate s file name are specified in the registry key HKEY_LOCAL_MACHINE SOFTW...

Страница 85: ...md 3 Run the following command note quotation marks CommonProgramFiles Acronis Utils acroniscert reinstall 4 Restart Windows or restart the running Acronis services Non self signed certificates You ha...

Страница 86: ...tioned above will be updated accordingly 3 1 2 Pop up messages About tasks that need interaction This option is effective when the console is connected to a managed machine or to the management server...

Страница 87: ...The option defines whether to alert if no connection was established between a registered machine and the management server for a period of time so indicating that the machine might not be centrally m...

Страница 88: ...the Types of events to log combo box to specify the types of events that will be collected All events all events information warnings and errors occurred on all the machines registered on the manageme...

Страница 89: ...nt server has to send its own log events to the specified Simple Network Management Protocol SNMP managers You can choose the types of events to be sent Acronis Backup Recovery 10 provides the followi...

Страница 90: ...in the other subnet transfers the packets to machines located in that subnet The preset is Disabled To bring this option into use 1 Install Acronis WOL Proxy on any server in the subnet where the mach...

Страница 91: ...307 to the virtual machine s host Such machines appear as not manageable grayed out Once the agent is deployed to an ESX ESXi host this requires a license for Acronis Backup Recovery 10 Advanced Serv...

Страница 92: ...nagement Server IP Name 3 Specify the user name and password of the management server administrator on prompt 4 In the Machine s registration address select how the machine will be registered on the m...

Страница 93: ...fective for both Windows and Linux operating systems This option is not available when operating under the bootable media The option defines whether the agent s operating on the managed machine have t...

Страница 94: ...the installation disc of your operating system Linux To receive SNMP messages on a machine running Linux the net snmp for RHEL and SUSE or the snmpd for Debian package has to be installed SNMP can be...

Страница 95: ...d recovery options 3 4 1 Default backup options Each Acronis agent has its own default backup options Once an agent is installed the default options have pre defined values which are referred to as pr...

Страница 96: ...ting p 108 File level security p 109 Preserve files security settings in archives In archives store encrypted files in decrypted state Media components p 110 Dest removable media Dest removable media...

Страница 97: ...s Disabled To protect the archive from unauthorized access 1 Select the Set password for the archive check box 2 In the Enter the password field type a password 3 In the Confirm the password field re...

Страница 98: ...y using the attrib command For more information refer to the Help and Support Center in Windows Exclude files matching the following criteria Select this check box to skip files whose names match any...

Страница 99: ...o any of the following Click Edit to specify a new command or a batch file Select the existing command or the batch file from the drop down list 3 Click OK Pre backup command To specify a command batc...

Страница 100: ...s This option is effective for both Windows and Linux operating systems The option enables you to define the commands to be automatically executed before and after data capture that is taking the data...

Страница 101: ...Selected Selected Cleared Cleared Result Preset Perform the data capture only after the command is successfully executed Fail the task if the command execution fails Perform the data capture after th...

Страница 102: ...up at the same point in time Choose this setting only if these factors are critical that is backing up files without a snapshot does not make sense To use a snapshot the backup plan has to run under...

Страница 103: ...taken by Acronis Backup Recovery 10 Backup process is fastest but data consistency of the applications whose transactions are not completed at the time of taking a snapshot cannot be guaranteed You m...

Страница 104: ...r to Backup priority This option is effective for both Windows and Linux operating systems The priority of a process running in a system determines the amount of CPU and system resources allocated to...

Страница 105: ...up data By default the speed is set to maximum i e the software uses all the network bandwidth it can get when transferring the backup data Use this option to reserve a part of the network bandwidth t...

Страница 106: ...server check box to enable a POP server and to set up its settings Incoming mail server POP enter the name of the POP server Port set the port of the POP server By default the port is set to 110 User...

Страница 107: ...chine have to log events of the backup operations in the Application Event Log of Windows to see this log run eventvwr exe or select Control Panel Administrative tools Event Viewer You can filter the...

Страница 108: ...will be sent to Community type the name of the SNMP community to which both the host running the SNMP management application and the sending machine belong The typical community is public Click Send...

Страница 109: ...ined to an FTP server since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size 3 4 1 14 File level security These options are effective only...

Страница 110: ...the one click approach does not presume user selections such as selecting volumes to recover Acronis One Click Restore always recovers the entire disk If your disk contains several volumes and you are...

Страница 111: ...or network share Managed vaults and FTP servers are not supported as secondary destinations The preset is Disabled When dual destination is enabled the agent will automatically copy each backup being...

Страница 112: ...please see Scheduling p 162 and Conditions p 172 The preset is Wait until the conditions are met Wait until the conditions are met With this setting the scheduler starts monitoring the conditions and...

Страница 113: ...n as an attempt completes successfully OR the specified number of attempts is performed depending on which comes first If the task fails because of a mistake in the backup plan you can edit the plan w...

Страница 114: ...ific machine off site When the Use a separate tape set option is enabled there might be a case when the backup has to be written onto a tape that is currently out of the tape library device Define wha...

Страница 115: ...en the option is enabled backing up to removable media may be not possible if the user is away because the program will wait for someone to press OK in the prompt box Hence you should disable the prom...

Страница 116: ...led deduplication at target Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node The eventual size of the backup in...

Страница 117: ...very options from the top menu Availability of the recovery options The set of available recovery options depends on The environment the agent operates in Windows Linux bootable media The type of data...

Страница 118: ...he program does not support interactive commands i e commands that require user input for example pause A post recovery command will not be executed if the recovery proceeds with reboot To specify pre...

Страница 119: ...d 4 If successful execution of the command is critical for you select the Fail the task if the command execution fails check box In case the command execution fails the task run result will be set to...

Страница 120: ...and Linux operating systems This option is not available when operating under the bootable media The option enables you to receive e mail notifications about the recovery task s successful completion...

Страница 121: ...WinPopup notifications about about the recovery task s successful completion failure or need for interaction The preset is Disabled Before configuring WinPopup notifications make sure the Messenger se...

Страница 122: ...ry operations in the Application Event Log SNMP notifications This option is effective for both Windows and Linux operating systems This option is not available when operating under the bootable media...

Страница 123: ...eraction it will fail Details of the operation including errors if any can be found in the operation log Re attempt if an error occurs The preset is Enabled Number of attempts 5 Interval between attem...

Страница 124: ...erating system has to be recovered Reboot machine after recovery This option is effective when operating under bootable media The preset is Disabled This option enables booting the machine into the re...

Страница 125: ...through the folders tree Easy archive management A vault is available for access from the Navigation pane Having selected the vault you can browse the archives stored there and perform the following...

Страница 126: ...the machines including local plans can use the centralized vault On a machine that is not registered on the management server a user having the privilege to back up to the centralized vault can do so...

Страница 127: ...the vault is located on a tape library free space space on the storage device where the vault is located For example if the vault is located on a hard disk the vault free space is free space of the ap...

Страница 128: ...the vault type Managed or Unmanaged The procedure of creating centralized vaults is described in depth in the following sections Create a managed centralized vault p 129 Create an unmanaged centraliz...

Страница 129: ...a tape library on a managed vault Click Manage tapes In the Tape Management window define labels for tapes and refresh the inventory For more details see the Managing tape library p 138 section Resca...

Страница 130: ...aged vault will be created 1 Enter the full path to the folder in the Path field or select the desired folder in the folders tree Managed vaults can be organized on the hard drives local to the storag...

Страница 131: ...password field re type the password 4 Select one of the following AES 128 the vault contents will be encrypted using the Advanced Standard Encryption AES algorithm with a 128 bit key AES 192 the vaul...

Страница 132: ...ncing loads between storage nodes As a result the first node stops managing the vault The second node scans archives in the vault creates and fills up the database corresponding to the vault and start...

Страница 133: ...oading mounting rewinding and reading a tape with the full data backup However a tape should be read for example to validate p 373 a backup or to recover data from a backup A tape library can be local...

Страница 134: ...on a tape However after this operation all the incremental and differential backups stored on other tapes and based on the deleted backups cannot be used for data recovery In a Custom backup plan s re...

Страница 135: ...storage snap in Control panel Administrative tools Computer management Removable storage Media pools If a tape has moved into the Free pool it is considered as free and will be accessible to write by...

Страница 136: ...y have barcodes and the RSM Free pool contains enough tapes for a chosen backup scheme the library is ready to fully work automatically You can start working with the vault even though all the tape li...

Страница 137: ...y plan creation These options enable you to specify how the created backup policy plan should use tapes from the tape library however the options presets increase usage efficiency of both whole tape l...

Страница 138: ...138 Rescan p 139 Labeling p 139 Any user with access to a managed vault on a tape library is able to perform these operations However two or more users cannot manage a tape library drive simultaneous...

Страница 139: ...t before the tape will be used If you need to apply a specific label for a tape for example MyWork label for a tape dedicated to back up files from the folder C work instead of a barcode label use the...

Страница 140: ...ption is enabled the backups belonging to the policy or plan being created will be located on a separate tape set Other backups will not be written to this tape set If the console is connected to the...

Страница 141: ...ful information to choose a backup scheme and tape options for tape rotation To calculate the number of tapes required for tape rotation schemes you can use the method described in the Tape planning p...

Страница 142: ...s slots and available tapes capacity of tapes requirements for performing data recovery maximal duration You need to analyze every argument that is relevant for your case and select the main criteria...

Страница 143: ...a separate tape set option is selected All the Always use a free tape options are selected It requires 28 tapes in rotation These examples demonstrate how the number of tapes required for automated r...

Страница 144: ...chive at the moment The differential backup is drawn as a blue rectangle in the figure Number 1 in the green rectangle marks the incremental backup created on Monday of the 1st week of the year Then t...

Страница 145: ...specified tape options A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year Tape usage during the first year The next figure shows the a...

Страница 146: ...cheme combination with the specified tape options commonly any data recovery is a long process that requires loading mounting rewinding and reading of one 3 for backups displayed in the Tape usage dur...

Страница 147: ...ackups have to be kept during the year the archive will require 28 tapes As the GFS backup scheme forces automatic deletion of the outdated backups on the first Friday of the second year the tapes kee...

Страница 148: ...ted the Always use a free tape For each incremental backup option is selected the Always use a free tape For each differential backup option is selected These options define the tape rotation scheme t...

Страница 149: ...5 The Tower of Hanoi scheme with five levels ensures that the roll back period is 8 days Let s designate the backups of the levels with numbers from 1 to 5 by letters A B C D and E respectively Then t...

Страница 150: ...ept on tape 01 at the moment which cannot be deleted as it is a base for actual differential D C B and incremental A backups stored on tape 02 The full backup deletion is postponed until all the above...

Страница 151: ...E because at the moment the first full backup is a base for differential backups D C and B are a base for incremental backup A So the full backup deletion is postponed until all the D C B and A backup...

Страница 152: ...vel The example demonstrates that the tapes usage efficiency is reduced Moreover the data recovery requires access to the backups kept on one full backups 6 two differential backups 44 or three increm...

Страница 153: ...se a separate tape set option is selected the Always use a free tape For each full backup option is cleared the Always use a free tape For each incremental backup option is cleared the Always use a fr...

Страница 154: ...number of the tapes that will be free after the deletion So the calculation ignores this probability Tape set 01 should contain round up F_GB 4 D_GB 5 7 I_GB CL T_GB tapes to store the backups Tape s...

Страница 155: ...direct connection of the console to a managed machine Personal vaults are specific for each managed machine Personal vaults are visible to any user that can log on to the system A user s right to bac...

Страница 156: ...n the selected archives and backups The list of backups is expanded by clicking the plus sign to the left of the archive s name All the archives are grouped by type on the following tabs The Disk arch...

Страница 157: ...n to the Validation p 230 page where this vault is already pre selected as a source The vault validation checks all the archives stored in the vault Delete a vault Click Delete The deleting operation...

Страница 158: ...r destination to vault B 4 In the vaults tree select vault B to check whether the archives are displayed If not click Refresh 5 Delete vault A 4 3 Common operations 4 3 1 Operations with archives stor...

Страница 159: ...ons item of the main menu The following is a guideline for you to perform operations with backups To Do View backup content in a separate window Click View content In the Backup Content window examine...

Страница 160: ...kup To preserve archive consistency the program will consolidate the two backups For example you delete a full backup but retain the next incremental one The backups will be combined into a single ful...

Страница 161: ...10 161 To show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you...

Страница 162: ...current user specify the user s account User logoff any user current user specify the user s account System startup Free space change specify the amount of free space change on any volume selected fo...

Страница 163: ...ample if you set Every 2 day s the task will be started on every other day In the During the day execute the task area select one of the following Once at Set up the time at which the task will be run...

Страница 164: ...ion and say 01 15 PM is the task s creation time the task will be started when the nearest time interval comes at 03 00 PM in our example To 12 15 2009 On this date the task will be performed for the...

Страница 165: ...the task frequency to Every 1 hour From 10 00 00 AM until 10 00 00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day In the Effective area set the following settings From Set up...

Страница 166: ...the task say on Monday at 11 30 AM the task will be started on the same day at 9 PM If the task was created say on Friday after 9 PM then it will be started for the first time on the nearest workday M...

Страница 167: ...the last day of the month irrespective of its actual date On Select specific days of the weeks to run the task on In the During the day execute the task area select one of the following Once at Set up...

Страница 168: ...stom backup scheme p 206 section Season schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010 During a workday the task is performed every 6 hours from 12 AM midnig...

Страница 169: ...o not set 5 4 At Windows Event Log event This type of schedule is effective only in Windows operating systems You can schedule a backup task to start when a certain Windows event has been recorded in...

Страница 170: ...D 7 Important To ensure that such a task will complete despite the presence of bad blocks you must make the task ignore bad blocks To do this in Backup options go to Error handling and then select the...

Страница 171: ...anup or validation is scheduled to start If the backup task on each machine starts with a delay see the next setting the management server will wake up the machines according to those delays Before us...

Страница 172: ...ackup plan 2 In How to back up select the Simple Tower of Hanoi or Custom scheme and then click Change to specify a schedule for the scheme 3 Under Run the task select Daily Weekly or Monthly 4 In the...

Страница 173: ...ly if all users are logged off Condition Time since last backup Value Time since the last backup 12 hour s Task start conditions Wait until the conditions are met If the free space changes by more tha...

Страница 174: ...ge for backing up users data and servers The workday starts at 8AM and ends at 5 PM Users data should be backed up as soon as the users log off but not earlier than 4 30 PM and not later than 10 PM Ev...

Страница 175: ...ged on at 11 PM run the task anyway Event Monthly Months All On First Third Friday Once at 08 00 00 PM Condition User logged off Task start conditions Wait until the conditions are met Run the task an...

Страница 176: ...ed after 12 hours have passed since the completion of the latest successful backup the backup task will start immediately 3 if the machine is never restarted the task will never start You can start th...

Страница 177: ...ou can examine the reason of failure Tasks that need interaction X Resolve Each time a task needs human interaction the Dashboard shows a message to inform you what action has to be performed for exam...

Страница 178: ...will launch the Bootable Media Builder p 370 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time...

Страница 179: ...ecution states in the Backup plans and tasks p 179 view and specify your decision on each task in the Information panel or in the Task details p 187 window 6 1 2 Backup plans and tasks The Backup plan...

Страница 180: ...Otherwise see 4 Waiting for condition This situation is quite normal but delaying a backup for too long is risky The solution may be to set the maximum delay or force the condition tell the user to l...

Страница 181: ...started manually or the event specified by the schedule occurs the task enters either the Running state or the Waiting state Running A task changes to the Running state when the event specified by th...

Страница 182: ...task Check the task log to find out the reason of the failure then do one or more of the following Remove the reason of the failure optionally Start the failed task manually Edit the failed task to p...

Страница 183: ...ls View plan s task s log Backup plan Click View log You will be taken to the Log p 190 view containing the list of the plan related log entries Task Click View log You will be taken to the Log p 190...

Страница 184: ...The task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unalloc...

Страница 185: ...ntly running Editing of the currently running backup plan is impossible Do not have the appropriate privilege Without the Administrator privileges on the machine a user cannot edit plans owned by othe...

Страница 186: ...ges on the machine a user cannot delete tasks owned by other users Refresh table Click Refresh The management console will update the list of backup plans and tasks existing on the machine with the mo...

Страница 187: ...an Temporarily disabling a backup plan is needed when moving archives from one vault to another by means of the third party file manager Applies to backup plans that use custom backup schemes only To...

Страница 188: ...ment operations Compacting Service task performed on a storage node Indexing Deduplication task performed by the storage node in the vault after a backup is completed Depending on the type of task and...

Страница 189: ...der which the plan runs Owner the name of the user who created or last modified the plan State execution state p 180 of the backup plan Status status p 180 of the backup plan Schedule whether the task...

Страница 190: ...n the Log view with pre filtered log entries for the item in question Thus you do not have to configure filters in the log table yourself View Action Dashboard In the calendar right click on any highl...

Страница 191: ...e log entries 2 In the To field select the date up to which to display the log entries Filter log entries by type Press or release the following toolbar buttons to filter error messages to filter warn...

Страница 192: ...er user name of the backup plan owner only under operating system Message a text description of the event The log entry s details that you copy will have the appearance as follows Log Entry Details Ty...

Страница 193: ...s the sequence number of the archive in the location you have selected Access credentials p 199 Optional Provide credentials for the location if the plan account does not have access permissions to th...

Страница 194: ...l Specify whether to convert every full every incremental or every differential backup or convert the last created backup on schedule Specify the conversion schedule if required Host p 210 Specify the...

Страница 195: ...indows or for Linux is installed Select this option to back up specific files and folders If you are not concerned about recovery of the operating system along with all the settings and applications b...

Страница 196: ...e backup stores all other files and folders of the selected volume independent of their attributes including hidden and system files the boot record the file allocation table FAT if it exists the root...

Страница 197: ...of the following parameters Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute If a folder is Hidden all of its contents including files tha...

Страница 198: ...k share which is mounted on a mount point such as mnt share select this mount point instead of the network share itself To back up data to an FTP or SFTP server type the server name or address in the...

Страница 199: ...be lost in the archive content Backup plans that operate with the same archive should back up the same data items say both plans back up volume C 2 Applying multiple retention rules to an archive mak...

Страница 200: ...up levels up to 16 In this scheme the data can be backed up more than once a day By setting up the backup schedule and selecting backup levels you automatically obtain the rollback period the guarante...

Страница 201: ...ention periods for backups of each type Description Let us suppose that we want to set up a backup plan that will regularly produce a series of daily D weekly W and monthly M backups Here is a natural...

Страница 202: ...ntil all backups that directly depend on it become subject to deletion as well This is why you might see a weekly or a monthly backup remain in the archive for a few days past its expected expiration...

Страница 203: ...to recover a previous version of a damaged file from a daily backup as well as 10 day access to weekly backups Each monthly full backup will be available for six months since the creation date Work sc...

Страница 204: ...ce Up to 16 levels of full differential and incremental backups Next level backups are twice as rare as previous level backups One backup of each level is stored at a time Higher density of more recen...

Страница 205: ...ackups accumulate toward the current time Having four backups we could recover data as of today yesterday half a week or a week ago Roll back period The number of days we can go back in the archive is...

Страница 206: ...s Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup For example the full backup can be set up to run every Sunday at 1 00 AM as soon as all u...

Страница 207: ...e can be set up to run after each backup and also on schedule This option is available only if you have set at least one retention rule in Retention rules Cleanup schedule only if On schedule is selec...

Страница 208: ...wait until all users are logged off and users are idle respectively Finally we create retention rules for the archive let us retain only backups that are no older than six months and let the cleanup...

Страница 209: ...rchive will validate all the archive s backups and may take a long time and a lot of system resources 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule...

Страница 210: ...e management server because such machines are not supposed to be backed up What is the host s processing power The conversion task will be created on the machine being backed up and will use this mach...

Страница 211: ...ckup to a new virtual machine of any of the following types VMware Workstation Microsoft Virtual PC Parallels Workstation or Citrix XenServer virtual appliance The virtual appliance can then be import...

Страница 212: ...re p 52 for details Files p 221 You may have to specify credentials for the destination Skip this step when operating on a machine booted with bootable media Access credentials p 222 Optional Provide...

Страница 213: ...ged on If the task has to run on schedule you will be asked for the current user s password on completing the task creation Use the following credentials The task will always run under the credentials...

Страница 214: ...means that the user name and password can be intercepted by an eavesdropper using a packet sniffer If the archive is stored on a locally attached tape device expand the Tape drives group then click t...

Страница 215: ...by selecting the corresponding check boxes in the archives tree Selecting a folder automatically selects all its nested folders and files Use the table to the right of the archives tree to select the...

Страница 216: ...virtual machine files will be saved to the destination you specify If Acronis Backup Recovery 10 Agent for Hyper V or Agent for ESX ESXi is installed These agents enable creating a new virtual machine...

Страница 217: ...on the disk and programs won t find their files The operating system on that disk will be unbootable To retain system bootability on the target disk volume choose one of the following Select automati...

Страница 218: ...le when the Acronis Backup Recovery 10 Agent for Hyper V or Agent for ESX ESXi is installed On selecting this you specify the virtualization server and the target virtual machine Then you proceed to t...

Страница 219: ...olume s type You can change this setting if required Primary Information about primary volumes is contained in the MBR partition table Most operating systems can boot only from the primary volume of t...

Страница 220: ...ft part of the window select the virtualization server Use the right part of the window to review details on the selected server 3 Click OK to return to the Data recovery page To select the type of vi...

Страница 221: ...ts A multicore host CPU or hyperthreading may enable multiple virtual processors on a single processor host 6 3 6 5 File destination To specify a destination 1 Select a location to recover the backed...

Страница 222: ...riority over the file on the hard disk Overwrite existing file if it is older this will give priority to the most recent file modification whether it be in the backup or on the disk Do not overwrite e...

Страница 223: ...vers in the exe cab or zip format extract them using a third party application such as WinRAR http www rarlab com or Universal Extractor http legroom net software uniextract The best practice is to st...

Страница 224: ...in the Mass storage drivers to install anyway step Use drivers bundled with your virtual machine software or download the latest drivers versions from the software manufacturer Web site 6 3 10 How to...

Страница 225: ...stem will not boot This cannot be fixed by changing the boot device order in BIOS because a Virtual PC ignores these settings 10 In When to recover specify when to start the recovery task 11 Optionall...

Страница 226: ...is on the file system of one of the volumes System bootability can be recovered automatically only when the GRUB resides in the first several sectors of the disk and on the file system to which direc...

Страница 227: ...Fedora and Red Hat Enterprise Linux distributions for example as follows vi mnt system boot grub menu lst 6 In the menu lst file respectively grub conf find the menu item that corresponds to the syst...

Страница 228: ...ult multi 0 disk 0 rdisk 0 partition 1 WINDOWS operating systems multi 0 disk 0 rdisk 0 partition 1 WINDOWS Microsoft Windows XP Professional noexecute optin fastdetect Windows Vista 2008 A part of th...

Страница 229: ...icient amount of memory allocated to the recovery process by the operating system s cache manager You can either work around this problem or modify the registry to increase the amount of allocated mem...

Страница 230: ...Add the storage node to the management server again by specifiying the machine on which the recovered storage node is installed 3 Re create the necessary managed vaults 6 4 Validating vaults archives...

Страница 231: ...this archive Vault p 233 select a vault or other location which archives to validate Access Credentials p 233 Optional Provide credentials for accessing the source if the task account does not have en...

Страница 232: ...System CIFS network share which is mounted on a mount point such as mnt share select this mount point instead of the network share itself If the archive is stored on an FTP or SFTP server type the se...

Страница 233: ...uired for access to FTP servers are transferred through a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer Using the archive...

Страница 234: ...e see the Scheduling p 162 section 6 5 Mounting an image Mounting volumes from a disk backup image lets you access the volumes as though they were physical disks Multiple volumes contained in the same...

Страница 235: ...re expand the Network folders group then select the required networked machine and then click the shared folder If the network share requires access credentials the program will ask for them Note for...

Страница 236: ...User name When entering the name of an Active Directory user account be sure to also specify the domain name DOMAIN Username or Username domain Password The password for the account 2 Click OK Accord...

Страница 237: ...6 7 Exporting archives and backups The export operation creates a copy of an archive or a self sufficient part copy of an archive in the location you specify The original archive remains untouched Th...

Страница 238: ...anaged machine you can export an archive or part of an archive to and from any location accessible to the agent residing on the machine These include personal vaults locally attached tape devices remo...

Страница 239: ...e p 213 in that case you need to specify the archive only Backups p 241 specify the archive first and then select the desired backup s in this archive Access credentials p 241 Optional Provide credent...

Страница 240: ...one when the program prompts If the archive is stored on a network share expand the Network folders group then select the required networked machine and then click the shared folder If the network sha...

Страница 241: ...entials 1 Select one of the following Use the task credentials The program will access the location using the credentials of the task account specified in the General section Use the following credent...

Страница 242: ...a network as plaintext This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer To export data to a locally attached tape device expand the Tape drives...

Страница 243: ...Password The password for the account 2 Click OK According to the original FTP specification credentials required for access to FTP servers are transferred through a network as plaintext This means th...

Страница 244: ...r the Acronis Secure Zone depending on your selection You will be able to set the exact zone size in the Acronis Secure Zone Size p 244 window 3 Click OK 6 8 1 2 Acronis Secure Zone Size Enter the Acr...

Страница 245: ...ram will not decrease a volume where free space is or becomes less than 25 of the total volume size Only when all volumes on the disk have 25 or less free space will the program continue decreasing th...

Страница 246: ...Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1 On the Manage Acronis Secure Zone page click Decrease 2 Select volumes that will receive free space after the zone is decreased 3 Spec...

Страница 247: ...econfigure the boot loader manually after the activation Do not activate Disables boot time prompt Press F11 for Acronis Startup Recovery Manager or the menu item in GRUB If Acronis Startup Recovery M...

Страница 248: ...other plug ins you ve added to the PE PE based bootable media helps overcome some Linux related bootable media issues such as support for certain RAID controllers or certain levels of RAID arrays onl...

Страница 249: ...ows Server 2008 PE 2 1 http www microsoft com downloads details aspx FamilyID 94bb6e34 d890 4932 81a5 5b50c657de08 DisplayLang en Automated Installation Kit AIK for Windows 7 PE 3 0 http www microsoft...

Страница 250: ...e USB flash drives if the hardware BIOS allows for boot from such media build an ISO image of a bootable disc to burn it later on a blank disc upload the selected components to Acronis PXE Server uplo...

Страница 251: ...command prompt To start the management console from the command prompt run the command bin product nousb Disables loading of the USB Universal Serial Bus subsystem nousb2 Disables USB 2 0 support USB...

Страница 252: ...gs are selected for saving on the media The MAC address of each existing NIC is also saved on the media You can change the settings except for the MAC address or configure the settings for a non exist...

Страница 253: ...ID or Fiber Channel adapter for the hard disk For more information please refer to Universal Restore p 223 The drivers will be placed in the visible Drivers folder on the bootable media The drivers ar...

Страница 254: ...ISO with the plug in from scratch Adding the Acronis Plug in to a WIM file for any future purpose manual ISO building adding other tools to the image and so on To be able to perform any of the above...

Страница 255: ...6 etfsboot com c winpe_x86 ISO c winpe_x86 winpe_x86 iso For more information on customizing Windows PE see the Windows Preinstallation Environment User s Guide Winpe chm 6 10 1 4 Building Bart PE wit...

Страница 256: ...e utility might correspond to the E drive in Windows Be careful To be on the safe side it is advisable to assign unique names to the volumes 2 The Linux style bootable media shows local disks and volu...

Страница 257: ...hine and the iSCSI target is called the iSCSI initiator The name of the iSCSI initiator is usually defined by an administrator of the server that hosts the device To add an iSCSI device 1 In a bootabl...

Страница 258: ...route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep...

Страница 259: ...e s hard disks If disk configuration has changed An MD device or a logical volume resides on one or more disks each of its own size If you replaced any of these disks between backup and recovery or if...

Страница 260: ...l volumes or both Note Logical Volume Manager utilities such as pvcreate and vgcreate which are normally available in Linux are not included in the bootable media environment so you need to use the lv...

Страница 261: ...nd dev md1 devices lvm pvcreate dev md0 dev md1 lvm vgcreate my_volgroup dev md0 dev md1 lvm vgdisplay The output of the lvm vgdisplay command will contain lines similar to the following Volume group...

Страница 262: ...stored in the backup For example trueimagecmd list filename smb server backups linux_machine tib The output will contain lines similar to the following Num Idx Partition Flags Start Size Type Disk 1...

Страница 263: ...nt components 3 Follow the onscreen instructions Acronis PXE Server runs as a service immediately after installation Later on it will automatically launch at each system restart You can stop and start...

Страница 264: ...eate the necessary disk configuration so that the volume image can be recovered exactly as it was or with any alteration of the disk or volume structure the user might consider necessary All operation...

Страница 265: ...different letter in different Windows operating systems For example volume E might appear as D or L when you boot another Windows operating system installed on the same machine It is also possible tha...

Страница 266: ...sfers complete data from the source basic MBR disk to the target Disk conversion MBR to GPT p 269 converts an MBR partition table to GPT Disk conversion GPT to MBR p 270 converts a GPT partition table...

Страница 267: ...ult In any case the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the source disk data to a target disk exactly as it is Acronis Disk Director Lite allows...

Страница 268: ...ystem volume pay attention to the Advanced options By clicking Finish you ll add the pending operation of the disk cloning To finish the added operation you will have to commit p 278 it Exiting the pr...

Страница 269: ...l receive a warning window stating that you are about to convert MBR into GPT 3 By clicking OK you ll add a pending operation of MBR to GPT disk conversion To finish the added operation you will have...

Страница 270: ...You would want to convert a basic disk to dynamic in the following cases If you plan to use the disk as part of a dynamic disk group If you want to achieve additional disk reliability for data storag...

Страница 271: ...types except Simple volumes then you will be warned here about the possible damage to the data involved in the conversion Please note the operation is unavailable for a dynamic disk containing Spanned...

Страница 272: ...g operations that can be performed on volumes Create Volume p 272 Creates a new volume with the help of the Create Volume Wizard Delete Volume p 276 Deletes the selected volume Set Active p 276 Sets t...

Страница 273: ...Mirrored Volume A fault tolerant volume also sometimes called RAID 1 whose data is duplicated on two identical physical disks All of the data on one disk is copied to another disk to provide data red...

Страница 274: ...elected type of volume you will receive the appropriate warning In this case the Next button will be disabled and you will have to select another type of volume to proceed with the new volume creation...

Страница 275: ...om basic to dynamic For basic volumes if some unallocated space is left on the disk you also will be able to choose the position of the new volume on the disk If you click the Back button you will be...

Страница 276: ...e new volumes using free space from the existing ones exist on the full version of the software so with this version deleting an existing volume sometimes might be the only way to free the necessary d...

Страница 277: ...an manually change the letters that are automatically assigned to the volumes by the operating system If you need to change a letter assigned to a volume by the operating system 1 Select a volume to c...

Страница 278: ...between any number in the preset amount for each file system Note the program suggests the cluster size best suited to the volume with the chosen file system 3 If you click OK to proceed with the Form...

Страница 279: ...g operation list Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them so if you try to exit Disk management without committing the pending operations...

Страница 280: ...moment the system displays No alerts or warnings Types of alerts The table below illustrates the types of messages you may observe Description Offer Comment Failed tasks X View the tasks View the tas...

Страница 281: ...ered by the Last connect field To configure the length of time that is considered critical select Options Console options Time based alerts It is recommended to back up the management server to protec...

Страница 282: ...ht be not available for example if the vault is located on a tape library If the vault itself is not available offline the Vault is not available message will be displayed 7 1 2 Backup policies To be...

Страница 283: ...policy status on at least one machine is Error Otherwise see 2 View the log or identify the failed tasks to find out the reason of the failure then do one or more of the following Remove the reason of...

Страница 284: ...rnings while being deployed revoked or updated In the Tasks view apply the Last result Succeeded with warnings filter if there are too many tasks You can also sort the tasks succeeded with warnings by...

Страница 285: ...console will update the list of backup policies from the management server with the most recent information Though the list of policies is refreshed automatically based on events the data may not be...

Страница 286: ...7 1 2 4 Policy details The Policy details window accumulates in five tabs all information on the selected backup policy and lets you perform operations with the machines and groups of machines the pol...

Страница 287: ...e or more nested groups can be created inside any group created by the administrator Grouping helps organize data protection by the company departments by the Active Directory domains or organizationa...

Страница 288: ...view select the group Use the toolbar s operational buttons to perform actions on the selected group p 300 Use the Information panel s tabs to view detailed information about the selected group and pe...

Страница 289: ...cal machines group Add a machine to another static group Click Add to another group In the Add to group p 293 window specify the group to copy the selected machine to The backup policies applied to th...

Страница 290: ...ine s log entries Update all information related to the machine Click Synchronize The management server will query the machine and update the database with the most recent information Along with synch...

Страница 291: ...details Importing machines from Active Directory To import machines from Active Directory 1 In the Navigation tree select Physical machines or All physical machines 2 Click Import machines from Activ...

Страница 292: ...initially import the machines from a text file Modify this file later as required by adding and removing machines but do not change the names addresses of the machines that have to remain registered T...

Страница 293: ...import Adding a machine to another group To add the selected machine to another group 1 Select the group the machine will be added to 2 Click OK The machine being added becomes a member of more than...

Страница 294: ...essful backup Availability Online the machine is available for the management server This means that the management server s last connection to the machine was successful Connection is established eve...

Страница 295: ...the machine is a member of a group and the policy is applied to the group you cannot revoke the policy from a single machine without firstly removing the machine from the group Examine where the appli...

Страница 296: ...ckup plan stops all its tasks Thus all the task operations will be aborted Task Click Stop What will happen if I stop the task Generally stopping the task aborts its operation backup recovery validati...

Страница 297: ...if the existing archives were created by a new scheme For empty archives all changes are possible Why can t I edit the backup plan The backup plan is currently running Editing of the currently runnin...

Страница 298: ...t information Though the list is refreshed automatically based on events the data may not be retrieved immediately from the managed machine due to some latency Manual refresh guarantees that the most...

Страница 299: ...t and applies the policy to Machine1 respectively The machine or group to which the policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a m...

Страница 300: ...umn type a new name for the selected group Built in groups cannot be renamed Edit a custom group Click Edit In the Edit group p 303 window change the required parameters of the group Move one custom g...

Страница 301: ...ording to the following rules a All the entries of the same criteria are combined by logical addition OR For example the following set of criteria Operating system Windows Server 2008 Operating system...

Страница 302: ...de machines from the list given in the specified txt or csv file If you later modify the file the contents of the group will change accordingly The file is checked every 15 minutes If you later delete...

Страница 303: ...roup Group details Aggregates in two tabs all information on the selected group Allows performing operations with the policies applied to the group This information is also duplicated in the Informati...

Страница 304: ...e policy was applied directly is boldfaced and marked with an icon All items are interactive i e when you click on a group its parent group view will be opened 7 1 4 Virtual machines You can centrally...

Страница 305: ...n tree This section describes available operations with these machines 7 1 4 1 Virtual machines on a management server Availability of virtual machines Virtual machines are displayed as available when...

Страница 306: ...VA Using this criterion you can create a dynamic group of virtual machines hosted on a specified virtualization server or managed by the specified virtual appliance 7 1 4 2 VMware vCenter integration...

Страница 307: ...eck box In a vCenter cluster a single Agent for ESX ESXi backs up virtual machines hosted on all the cluster s hosts For more information please see Support for vCenter clusters p 308 You can add a si...

Страница 308: ...or Acronis Backup Recovery 10 Advanced Server Virtual Edition You need one license for every host you selected To be able to deduplicate backups an agent needs a separately sold license for deduplicat...

Страница 309: ...rise backup archives Storage node enables you to relieve managed machines of unnecessary CPU load by using the storage node side cleanup p 371 and storage node side validation p 372 drastically reduce...

Страница 310: ...To Do Add a storage node to the management server Click Add In the Add storage node p 311 window specify the machine the storage node is installed on Adding a storage node establishes a trusted relat...

Страница 311: ...some latency Manual refresh guarantees that the most recent data is displayed Adding a storage node To add a storage node 1 In the IP Name field enter the name or the IP address of the machine the st...

Страница 312: ...the archives in all the vaults managed by the storage node Vaults This tab displays a list of the vaults managed by the storage node To open a managed vault for detailed examination and to perform ope...

Страница 313: ...task schedule if created remains valid To complete the operation you will have to run the task over again recovery task from the disk backup The target volume will be deleted and its space unallocate...

Страница 314: ...Select Options Console options Number of tasks p 87 and set the desired value The maximum number of tasks that can be displayed is 500 If the number of tasks exceeds the specified value use filters t...

Страница 315: ...entries The maximum number of entries stored in the centralized log is 50000 The maximum number of entries that can be displayed is 10000 In case the number of log entries is greater than 10000 use fi...

Страница 316: ...on Save the selected log entries to a file 1 Select a single log entry or multiple log entries 2 Click Save Selected to File 3 In the opened window specify a path and a name for the file Save all the...

Страница 317: ...o show or hide columns 1 Right click any column header to open the context menu The menu items that are ticked off correspond to the column headers presented in the table 2 Click the items you want to...

Страница 318: ...the way the information is represented Acronis Backup Recovery 10 Management Server offers report templates for Registered machines Backup policies existing on the management server Local and centrali...

Страница 319: ...od within which the next scheduled backup will start on each of the machines Operating system The operating systems that the machines run IP address physical machines only The range for the latest kno...

Страница 320: ...ocal and or Centralized Backup policies available only for centralized backup plans The backup policies on which the centralized backup plans are based Machines The list of machines on which the backu...

Страница 321: ...ll look Select whether to show all items in a single table or to group them by a particular column Specify which table columns to show and in which order Specify how to sort the table 7 1 8 5 Report a...

Страница 322: ...nd backups and average ratios across the selected vaults With the default filter settings the report includes information about all centralized managed vaults plus the combined total Report view Under...

Страница 323: ...ome columns such as Machine name in a report about machines cannot be excluded from the list or moved up or down in it 7 1 8 9 Report view In order for your web browser to correctly display dates and...

Страница 324: ...Recovery 10 Storage Node as described in the correspondent subtopics of this topic 7 2 1 1 How to load Acronis Administrative Template The Administrative Template provided by Acronis enables the fine...

Страница 325: ...multaneously When this limit is reached the storage node will use the backup queue see the next parameter for the agents that are awaiting connection Backup Queue Limit Description Specifies the maxim...

Страница 326: ...e Suppose further that the size of the archives in Vault A is 20 GB and the size of the archives in Vault B is 45 GB If the volume has 5 GB of free space then the total size of Vault A is 20 GB 5 GB 2...

Страница 327: ...d vault s database is less than the value of Vault Database Free Space Error Limit an error is recorded in the storage node s log Backups performed to the vault will keep failing until the amount of f...

Страница 328: ...efault value False Trace Level Description Specifies the minimum level of severity of events to be recorded into the event log Only events of levels greater than or equal to the value in Trace Level w...

Страница 329: ...on for a machine is complete the management server may disconnect from that machine and use the free connection for synchronization with another machine and so on Note Connections to machines with hig...

Страница 330: ...to provide new data whenever it will appear and then enters a listening mode This approach is called real time monitoring Real time monitoring may reduce network traffic for example when centralized...

Страница 331: ...the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that changes extensively during backup This parameter is used when creati...

Страница 332: ...recorded into the agent s log You can view this warning in the Dashboard If the value is 0 no license check will be performed without a license Acronis Backup Recovery 10 s functionality will be disa...

Страница 333: ...is cleaned up see Log cleanup rules p 94 Windows Event Log Specifies when to record Acronis Backup Recovery 10 Agent s events into the Application event log in Windows This parameter has two settings...

Страница 334: ...if more space is needed for the snapshot You may want to increase the initial size of the snapshot storage or to place it on a different volume when experiencing problems with backing up data that ch...

Страница 335: ...of the following Not Configured The component will use the default TCP port number 9876 Enabled The component will use the specified port type the port number in the Server TCP Port box Disabled The...

Страница 336: ...sabled The same as Not configured Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application Select one of the following Not Configured...

Страница 337: ...termination of a process such as the agent s process Event tracing parameters are specified as the following settings in the administrative template File Trace Minimal Level Description Specifies the...

Страница 338: ...mmunity For Acronis Backup Recovery 10 Agent Windows Event Log SNMP SNMP Address SNMP Community and Customer Experience Program You will find the description of these parameters in the correspondent t...

Страница 339: ...applied to both Windows and Linux machines To create a backup policy perform the following steps General Policy name Optional Enter a unique name for the backup policy A conscious name lets you ident...

Страница 340: ...he backup operation such as pre post backup commands maximum network bandwidth allocated for the backup stream or the backup archive compression level If you do nothing in this section the default val...

Страница 341: ...que name Folder on VMware vCenter If the management server is integrated with vCenter Server the resultant virtual machines will appear in the Acronis Backups folder on the vCenter You can specify a s...

Страница 342: ...In the Volumes column Comments Windows and Linux volumes All volumes Type or select All Volumes Refers to all volumes on machines running Windows and all mounted volumes on machines running Linux Win...

Страница 343: ...d speeds up the backup and recovery operations Windows The swap file pagefile sys and the file that keeps the RAM content when the machine goes into hibernation hiberfil sys are not backed up After re...

Страница 344: ...rd partition one can type dev hda3 in the row of the Volumes to back up selection rules dialog box Furthermore a Linux partition can be mounted anywhere inside the tree Say dev hda3 can be mounted as...

Страница 345: ...d folders column type or select File Text doc in folder D Work D Work Text doc Folder C Windows C Windows Environment variables Some environment variables point to Windows folders Using such variables...

Страница 346: ...irectory of the common users home The root user s home directory root Directory for all user related programs usr Directory for system configuration files etc 7 3 3 Access credentials for source Speci...

Страница 347: ...o skip files whose names match any of the criteria called file masks in the list use the Add Edit Remove and Remove All buttons to create the list of file masks You can use one or more wildcard charac...

Страница 348: ...ify names for the archives The program generates a common name for the new archives and displays it in the Name field The name looks like PolicyName _ MachineName _Archive1 If you are not satisfied wi...

Страница 349: ...he Grandfather Father Son backup scheme The scheme does not allow data to be backed up more than once a day You set the days of week when the daily backup will be performed and select from these days...

Страница 350: ...set up the simple backup scheme specify the appropriate settings as follows Backup Set up the backup schedule when and how often to back up the data To learn more about setting up the schedule see the...

Страница 351: ...t in hours days weeks months or years For monthly backups you can also select Keep indefinitely if you want them to be saved forever The default values for each backup type are as follows Daily 7 days...

Страница 352: ...ups more short lived at the same time ensuring that your information can be recovered in case of an accidental data loss Suppose that you need to Perform backups at the end of each working day Be able...

Страница 353: ...lect it in the Back up on field Such an archive would allow you to compare your financial documents as of the first and the last day of work and have a five year history of all documents etc No daily...

Страница 354: ...you select See the example below for details Example Schedule parameters are set as follows Recur Every 1 day Frequency Once at 6 PM Number of levels 4 This is how the first 14 days or 14 sessions of...

Страница 355: ...11 days which is the best case scenario The following day however a new third level differential backup is created and the old full backup is deleted 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1...

Страница 356: ...the program will act as follows Delete the oldest full backup with all dependent incremental differential backups If there is only one full backup left and a full backup is in progress then delete the...

Страница 357: ...leted until all incremental backups that depend on it become subject to deletion too For more information see Retention rules p 39 Monthly full weekly differential and daily incremental backups plus c...

Страница 358: ...ckup runs every Friday at 10 00 PM Incremental backup runs manually Differential backup runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans a...

Страница 359: ...opyright Acronis Inc 2000 2010 359 3 Validation schedule appears only if you have selected the on schedule in step 1 set the schedule of validation For more information see the Scheduling p 162 sectio...

Страница 360: ...nis Secure Zone A secure volume for storing backup archives p 361 within a managed machine p 369 Advantages enables recovery of a disk to the same disk where the disk s backup resides offers a cost ef...

Страница 361: ...is a file or a tape record that contains a copy of the backed up data as of specific date and time Backup files created by Acronis Backup Recovery 10 have a TIB extension The TIB files resulting from...

Страница 362: ...his is an option Physically a backup plan is a bundle of tasks p 372 configured for execution on a managed machine p 369 A backup plan can be created directly on the machine local plan or appears on t...

Страница 363: ...locally through the GUI or remotely using the console p 365 Bootable media A physical media CD DVD USB flash drive or other media supported by a machine p 369 BIOS as a boot device that contains the...

Страница 364: ...ckup plan p 364 Such task appears on the managed machine p 369 as a result of deploying a backup policy p 362 from the management server p 370 and can be modified only by editing the backup policy Cen...

Страница 365: ...For example the retention rules require to delete a full backup p 368 that has expired but retain the next incremental p 369 one The backups will be combined into a single full backup which will be da...

Страница 366: ...er of dynamic disks p 366 that store the common configuration data in their LDM databases and therefore can be managed as a whole Normally all dynamic disks created within the same machine p 369 are m...

Страница 367: ...Dynamic disks organized on MBR Disk 1 and GPT Disk 2 disks For more information about dynamic disks please refer to the following Microsoft knowledge base articles Disk Management Windows XP Professio...

Страница 368: ...ed anywhere on the disk or in the backup file the password hash is used for verification purposes With this two level security the backup data is protected from any unauthorized access but recovering...

Страница 369: ...incremental backup L Local backup plan A backup plan p 362 created on a managed machine p 369 using direct management p 365 Local task A task p 372 belonging to a local backup plan p 369 or a task tha...

Страница 370: ...try point to the Acronis Backup Recovery 10 infrastructure an easy way to protect data on numerous machines p 369 using backup policies p 362 and grouping enterprise wide monitoring functionality the...

Страница 371: ...ic group A group of machines which a management server p 370 administrator populates by manually adding machines to the group A machine remains in a static group until the administrator removes it fro...

Страница 372: ...to be performed on a managed machine p 369 when a certain time comes or a certain event occurs The actions are described in an xml script file The start condition schedule exists in the protected reg...

Страница 373: ...ry under the bootable media to a spare hard drive can guarantee successful recovery in the future Validation rules A part of the backup plan p 362 Rules that define when and how often to perform valid...

Страница 374: ...Server 2008 PE 2 1 WinPE is commonly used by OEMs and corporations for deployment test diagnostic and system repair purposes A machine can be booted into WinPE via PXE CD ROM USB flash drive or hard d...

Страница 375: ...On LAN Proxy 21 Acronis WOL Proxy 90 Action pages 12 13 15 Actions on a tape library vault 136 Actions on backup plans and tasks 179 183 Actions on backup policies 282 284 Actions on centralized vaul...

Страница 376: ...policy statuses 282 283 287 294 Backup policy s state and statuses 66 283 Backup priority 96 104 Backup scheme 362 363 369 372 Backup scheme selection 340 349 Backup schemes 193 200 Backup selection...

Страница 377: ...ralized vault 128 131 Creating the volume structure automatically 259 Creating the volume structure manually 259 260 Criteria of the choice 142 Cumulative state and status of a policy 69 Custom backup...

Страница 378: ...ives 128 156 160 Filtering and sorting backup plans and tasks 179 186 298 Filtering and sorting backup policies 282 285 295 304 Filtering and sorting log entries 190 191 315 316 Filtering and sorting...

Страница 379: ...ils 286 288 290 292 294 Machine management 92 291 294 Machine options 91 107 108 122 Machines selection 284 285 Main area views and action pages 11 14 Managed machine 10 26 87 360 362 364 365 369 371...

Страница 380: ...68 Policy status on a machine 67 91 Pop up messages 86 Post backup command 100 Post data capture command 101 Post recovery command 119 Pre Post commands 96 99 100 117 118 Pre Post data capture comman...

Страница 381: ...sion schedule 194 209 341 Setting up a display mode 256 Setting up a machine to boot from PXE 263 Setting up centralized data protection in a heterogeneous network 10 55 Setting up regular conversion...

Страница 382: ...t 361 373 User is idle 173 User logged off 175 User privileges on a managed machine 30 75 76 195 213 232 240 341 User privileges on a storage node 78 127 310 Using a single tape drive 48 Using custom...

Страница 383: ...1 When to recover 212 222 When to validate 231 234 Why is the program asking for the password 194 Windows event log 89 92 97 107 118 122 WinPE Windows Preinstallation Environment 360 363 373 Work acro...

Отзывы: