3 Copyright © Acronis, Inc., 2000-2009
Table of Contents
Chapter 1. Introduction ...................................................................................... 7
1.1 Acronis
®
True Image Echo Enterprise Server – a complete solution for corporate users ........... 7
1.2 Acronis True Image Echo Enterprise Server components ....................................................... 9
1.3 New in Acronis True Image Echo Enterprise Server .............................................................. 9
1.4 Supported file systems and storage media ......................................................................... 11
1.4.1 Supported file systems .............................................................................................. 11
1.4.2 Supported storage media ........................................................................................... 11
1.5 License policy .................................................................................................................. 12
1.6 Technical support ............................................................................................................ 12
Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
............................................................................................................................ 13
2.1 System requirements ....................................................................................................... 13
2.1.1 Minimum hardware requirements ............................................................................... 13
2.1.2 Supported operating systems ..................................................................................... 13
2.2 Security parameters ......................................................................................................... 14
2.2.1 Credentials ............................................................................................................... 14
2.2.2 Firewall setup ........................................................................................................... 14
2.2.3 Encrypted communication ........................................................................................... 15
2.2.4 Security parameters in Acronis Administrative Template ............................................... 15
2.3 Installing Acronis True Image Echo Enterprise Server components ....................................... 16
2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis
True Image Agent for Windows ........................................................................................... 17
2.3.2 Installation of Acronis True Image Agent for Linux ....................................................... 18
2.3.3 Installation of Acronis Group Server ............................................................................ 18
2.3.4 Acronis Backup Server installation and setup ............................................................... 18
2.3.5 Acronis Universal Restore installation .......................................................................... 22
2.4 Extracting Acronis True Image Echo Enterprise Server components ..................................... 22
2.5 Running Acronis True Image Echo Enterprise Server components ........................................ 22
2.5.1 Running Acronis True Image Echo Enterprise Server (local version) ............................... 22
2.5.2 Running Acronis True Image Management Console ...................................................... 23
2.5.3 Running other Acronis components ............................................................................. 23
2.6 Removing Acronis True Image Echo Enterprise Server components ...................................... 23
Chapter 3. General information and proprietary Acronis technologies ............ 24
3.1 The difference between file archives and disk/partition images ............................................ 24
3.2 Full, incremental and differential backups .......................................................................... 24
3.3 Acronis Secure Zone
®
...................................................................................................... 25
3.4 Acronis Startup Recovery Manager .................................................................................... 26
3.4.1 How it works ............................................................................................................ 26
3.4.2 How to use ............................................................................................................... 26
3.5 Acronis Backup Server ..................................................................................................... 27
3.5.1 Backup locations ....................................................................................................... 27
3.5.2 Quotas and time limits for computers and users ........................................................... 28
3.5.3 Administrators and Users ........................................................................................... 28
3.5.4 Operations with archives ............................................................................................ 29
3.6 Acronis Active Restore ..................................................................................................... 29
3.6.1 Limitations in using Acronis Active Restore .................................................................. 29
3.6.2 How it works ............................................................................................................ 29
3.6.3 How to use ............................................................................................................... 30
3.7 Acronis Universal Restore ................................................................................................. 31
3.7.1 Acronis Universal Restore purpose .............................................................................. 31
3.7.2 Acronis Universal Restore general principles ................................................................ 31
3.7.3 Acronis Universal Restore and Microsoft Sysprep .......................................................... 32