ACRONIS Backup & Recovery 10 Advanced Server, UR, AAS, RNW, L2, 500-1249u, FRE User's Guide Page 237

  • Download
  • Add to my manuals
  • Print
  • Page
    / 402
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 236
237 Copyright © Acronis, Inc., 2000-2010
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.
6.4.6 When to validate
As validation is a resource-intensive operation, it makes sense to schedule validation to the managed
machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the
data is not corrupted and can be successfully recovered, consider starting validation right after the
task creation.
Choose one of the following:
Now - to start the validation task right after its creation, that is, after clicking OK on the
Validation page.
Later - to start the one-time validation task, at the date and time you specify.
Specify the appropriate parameters as follows:
Date and time - the date and time when to start the task.
The task will be started manually (do not schedule the task) - select this check box, if you
wish to start the task manually later.
On schedule - to schedule the task. To learn more about how to configure the scheduling
parameters, please see the Scheduling (p. 159) section.
6.5 Mounting an image
Mounting volumes from a disk backup (image) lets you access the volumes as though they were
physical disks. Multiple volumes contained in the same backup can be mounted within a single
mount operation. The mount operation is available when the console is connected to a managed
machine running either Windows or Linux.
Mounting volumes in the read/write mode enables you to modify the backup content, that is, save,
move, create, delete files or folders, and run executables consisting of one file.
Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible.
Usage scenarios:
Sharing: mounted images can be easily shared to networked users.
"Band aid" database recovery solution: mount up an image that contains an SQL database from
a recently failed machine. This will give access to the database until the failed machine is
recovered.
Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable
media and creates an image. Then, the administrator mounts this image in read/write mode,
scans and cleans it with an antivirus program, and finally recovers the machine.
Error check: if recovery failed due to a disk error, mount the image in the read/write mode.
Then, check the mounted disk for errors with the chkdsk /r command.
To mount an image, perform the following steps.
Source
Archive (p. 238)
Specify the path to the archive location and select the archive containing disk backups.
Page view 236
1 2 ... 232 233 234 235 236 237 238 239 240 241 242 ... 401 402

Comments to this Manuals

No comments