ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition manuals

Owner’s manuals and user’s guides for Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition.
We providing 3 pdf manuals ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition for download free by document types: Manual, User's Guide


Table of contents

User's Guide

1

Table of contents

3

1.2 Getting started

8

Name Description

10

"Navigation" pane

11

Shortcuts bar

12

Actions

13

Operations with panes

14

Action pages

15

Action page - Controls

16

Navigation buttons

16

1.3.1 Agent for Windows

17

1.3.2 Agent for Linux

18

1.3.3 Agent for ESX/ESXi

18

Management Server

19

Storage Node

20

1.3.5 Management Console

21

1.4 Supported file systems

22

1.6 System requirements

24

1.7 Technical support

25

2.1 Basic concepts

26

Backup using bootable media

28

Windows

30

2.3 Owners and credentials

31

Full backup

32

Incremental backup

33

Differential backup

33

2.5 GFS backup scheme

34

The resulting archive: ideal

36

The resulting archive: real

36

Tower of Hanoi overview

38

Tower of Hanoi by Acronis

38

2.7 Retention rules

39

1. Delete backups older than

40

Combination of rules 1 and 2

41

Best practices

42

Backing up dynamic volumes

42

Recovering dynamic volumes

43

Software RAID arrays

46

Hardware RAID arrays

47

Virtual machines backup

47

Guest operating systems

48

Guest HDD

49

Troubleshooting

49

2.12 Tape support

50

2.13.1 Acronis Secure Zone

51

Advantages

52

Limitation

52

Universal Restore)

53

Getting Universal Restore

54

Supported operating systems

55

How it works

55

Usage scenarios

55

2.14.1 Basic concepts

56

Protecting the servers

59

Protecting the workstations

60

Static and dynamic groups

61

Dynamic grouping criteria

61

Using custom groups

62

Policy on a machine

64

Policy on a group

64

Operations with a machine

65

Inheritance of policies

66

Policy status on a machine

69

Policy status on a group

70

2.14.6 Deduplication

71

How deduplication works

72

Deduplication best practices

73

Deduplication ratio

74

Deduplication restrictions

74

Local connection

75

Remote connection

76

Example 1

77

Acronis security groups

78

On a domain controller

79

Rights for Acronis services

81

Secure communication

82

Remote Agent ports

83

Client Encryption options

84

Server Encryption options

84

Network port configuration

85

SSL certificates

86

Self-signed certificates

87

Non-self-signed certificates

87

3 Options

88

3.1.3 Time-based alerts

89

3.1.4 Number of tasks

89

3.1.5 Fonts

89

3.2.1 Logging level

90

3.2.2 Log cleanup rules

90

3.2.3 Event tracing

91

3.2.5 Acronis WOL Proxy

92

3.2.6 VM protection options

92

3.3 Machine options

93

3.3.1 Machine management

94

3.3.2 Event tracing

94

3.3.3 Log cleanup rules

96

Archive protection

99

Source files exclusion

100

Pre/Post commands

101

Pre-backup command

101

Post-backup command

102

Pre-data capture command

103

Post-data capture command

103

File-level backup snapshot

104

Multi-volume snapshot

104

Volume Shadow Copy Service

105

Compression level

105

Backup performance

106

Backup priority

106

HDD writing speed

106

Network connection speed

107

Notifications

107

Messenger service (WinPopup)

108

Event tracing

109

Windows event log

109

SNMP notifications

109

Backup splitting

110

File-level security

111

Media components

112

Error handling

112

Dual destination

113

Task start conditions

114

Task failure handling

115

Tape support

115

Always use a free tape

116

Additional settings

117

Use FTP in Active mode

118

Pre-recovery command

120

Post-recovery command

121

Recovery priority

121

VM power management

126

4 Vaults

128

4.1 Centralized vaults

129

Vault toolbar

130

Pie chart with legend

130

Vault content

130

Vault path

133

Vault database path

133

Vault encryption

134

Attaching a managed vault

135

4.1.3 Tape libraries

136

Hardware

137

Limitations

137

RSM Media Pools

137

Prerequisites

138

Backing up to tape library

140

Recovering from tape library

140

Managing a tape library

141

Inventory

141

Labeling

142

Tape rotation

144

Choosing a backup scheme

144

Criteria of the choice

145

Case to analyze

145

GFS Example 1

146

GFS Example 2

149

GFS Example 3

151

ToH Example 1

152

ToH Example 2

153

ToH Example 3

154

Tape planning

155

Tape planning: Example 1

156

Tape planning: Example 2

156

What if

157

4.2 Personal vaults

158

Creating a personal vault

160

4.3 Common operations

161

To show or hide columns

164

5 Scheduling

165

5.1 Daily schedule

166

 fifth at 7 PM

167

 first at 8 AM

167

 second at 12 PM (noon)

167

 third at 3 PM

167

 fourth at 5 PM

167

5.2 Weekly schedule

168

5.3 Monthly schedule

170

Examples

171

Parameters

172

Use Wake-On-LAN

174

5.6 Conditions

175

5.6.1 User is idle

176

5.6.3 Fits time interval

177

5.6.4 User logged off

178

6 Direct management

180

Activities

181

Tasks need interaction

182

Backup plan execution states

183

Backup plan statuses

183

Task states

184

Task statuses

185

 Backup plan (p. 195)

186

 Recovery task (p. 215)

186

 Validation task (p. 235)

186

Run backup plan

190

Task details

190

Archive

191

Settings

191

Progress

191

Backup plan details

192

6.1.3 Log

193

Configuring the log table

194

6.2 Creating a backup plan

195

What to backup

196

Where to back up

196

How to back up

196

Archive validation

196

Backup options

196

Convert to VM

197

6.2.3 Source type

198

6.2.4 Items to back up

199

Selecting files and folders

200

6.2.6 Exclusions

201

6.2.7 Archive

202

2. Using the archives table

203

3. Naming the new archive

203

6.2.9 Backup schemes

204

Back up now scheme

205

Back up later scheme

205

Simple scheme

205

Tower of Hanoi scheme

209

Custom backup scheme

210

6.2.10 Archive validation

213

6.3 Recovering data

215

General

216

What to recover

216

Where to recover

216

6.3.1 Task credentials

217

6.3.2 Archive selection

218

6.3.3 Data type

219

6.3.4 Content selection

219

6.3.6 Destination selection

220

Disk destination

221

NT signature

221

Volumes

222

MBR destination

223

Volume destination

223

Volume properties

223

Properties

224

Virtual machine settings

225

File destination

226

Recovery exclusions

226

Overwriting

226

6.3.8 When to recover

227

6.3.9 Universal Restore

227

Preparation

228

Universal Restore settings

228

About Windows loaders

232

Windows Vista/2008

233

What to validate

235

6.4.1 Task credentials

236

6.4.2 Archive selection

236

6.4.3 Backup selection

237

6.4.4 Location selection

237

6.4.6 When to validate

238

6.5 Mounting an image

239

6.5.2 Backup selection

240

6.5.3 Access credentials

240

6.6 Managing mounted images

241

What to export

243

6.7.1 Task credentials

244

6.7.2 Archive selection

244

6.7.3 Backup selection

245

6.7.5 Location selection

246

6.8 Acronis Secure Zone

248

Acronis Secure Zone Size

249

Result confirmation

249

Deleting Acronis Secure Zone

251

6.10 Bootable media

252

Linux-based bootable media

253

PE-based bootable media

253

Kernel parameters

255

Network settings

256

Network port

257

Setting up a display mode

261

Linux commands and utilities

262

Example

265

Mounting backup volumes

266

6.10.6 Acronis PXE Server

267

6.11 Disk management

268

6.11.1 Basic precautions

269

Starting the operations

270

Displaying operation results

270

6.11.5 Disk operations

271

Disk conversion: MBR to GPT

273

Disk conversion: GPT to MBR

274

System disk conversion

275

6.11.6 Volume operations

276

Creating a volume

277

Types of dynamic volumes

277

Create volume wizard

278

Select destination disks

278

Set the volume size

279

Set the volume options

279

Delete volume

280

Set active volume

281

Change volume letter

281

Change volume label

282

Format volume

282

6.11.7 Pending operations

283

7 Centralized management

284

7.1.2 Backup policies

286

Backup policy statuses

287

Actions on backup policies

288

Machines selection

289

Policy details

290

7.1.3 Physical machines

291

Actions on machines

292

Applying policies

293

Grouping actions

293

Other actions

294

Text file requirements

296

Adding machines to a group

297

Machine details

298

Backup policies

299

Plans and tasks

299

Member of

302

Hosted virtual machines

302

Inheritance order

303

Actions on groups

303

To create a group

304

 Operating system

304

Adding multiple criteria

305

Move one group to another

306

Editing custom groups

306

Group details

307

7.1.4 Virtual machines

308

VMware vCenter integration

310

Support for vCenter clusters

312

Removing Agent for ESX/ESXi

315

7.1.5 Storage nodes

316

Actions on storage nodes

317

Adding a storage node

318

Storage node details

318

7.1.6 Tasks

319

7.1.7 Log

321

Local event log

322

Centralized event log

322

Actions on log entries

323

7.1.8 Reporting

325

Report about the machines

326

Report about the tasks

327

Filters

328

Report view

328

Column selection

330

Connection parameters

342

Event tracing parameters

344

When to modify

345

What to back up

346

7.3.1 Policy credentials

348

7.3.2 Items to back up

349

7.3.4 Exclusions

353

7.3.5 Archive

354

2. Naming the archives

355

Roll-back period

361

Resulting tasks

364

7.3.8 Archive validation

365

Glossary

366

Backup plan (Plan)

368

Backup policy (Policy)

368

Backup scheme

369

Bootable agent

369

Bootable media

369

Built-in group

369

Centralized backup plan

370

Centralized management

370

Centralized task

370

Centralized vault

370

Cleanup

370

Disk backup (Image)

372

Disk group

372

Dynamic disk

373

Dynamic group

373

Dynamic volume

374

Encrypted archive

374

Encrypted vault

374

Storage node-side validation

378

Tower of Hanoi

378

 Windows Vista (PE 2.0)

380

Table of contents

User's Guide

1

Table of Contents

3

1.2. Getting started

8

• Using deduplication

10

Navigation tree

12

Shortcuts bar

13

"Tasks" view

15

Action pages

16

1.3.1. Agent for Windows

18

1.3.2. Agent for Linux

19

1.3.3. Agent for ESX/ESXi

19

1.3.5.1. Management Server

20

VMware vCenter integration

21

1.3.5.2. Storage Node

21

1.3.5.3. PXE Server

22

1.3.5.4. License Server

22

1.3.6. Management Console

23

1.5. Supported file systems

25

1.6. Hardware requirements

25

1.7. Technical support

26

2.1. Basic concepts

28

Backup using bootable media

30

2.3. Owners and credentials

33

Full backup

35

Incremental backup

35

Differential backup

35

2.5. GFS backup scheme

36

The resulting archive: ideal

38

The resulting archive: real

39

Tower of Hanoi overview

40

Tower of Hanoi by Acronis

41

2.7. Retention rules

42

Combination of rules 1 and 2

44

Best practices

45

Backing up dynamic volumes

45

Recovering dynamic volumes

46

Software RAID arrays

49

Hardware RAID arrays

50

Virtual machines backup

51

Guest operating systems

52

Guest HDD

52

Troubleshooting

53

2.12. Tape support

54

2.13.1. Acronis Secure Zone

56

Limitation

57

Restore)

58

Limitations

59

Getting Universal Restore

59

Supported operating systems

59

How it works

60

Usage scenarios

60

How to use

60

2.14.1. Basic concepts

61

Setting up the storage node

64

2.14.3.4. Example

67

Policy on a machine

70

Policy on a group

70

Backup policy state diagram

75

2.14.6. Deduplication

77

Deduplication database

78

Deduplication at source

78

Deduplication at target

79

What ratio to expect

81

Local connection

82

Remote connection

82

Example 1

84

Example 2

85

On a domain controller

86

Remote Agent ports

90

Client Encryption options

91

Server Encryption options

92

2.14.8.5. SSL certificates

93

Self-signed certificates

94

Non-self-signed certificates

95

3. Options

96

3.1.3. Time-based alerts

97

3.1.4. Number of tasks

97

3.1.5. Fonts

98

3.2.1. Logging level

98

3.2.2. Log cleanup rules

98

3.2.3. Event tracing

99

3.2.5. Acronis WOL Proxy

100

3.3. Machine options

102

3.3.2. Event tracing

103

Windows

104

3.3.3. Log cleanup rules

105

3.4.1.1. Archive protection

108

3.4.1.3. Pre/Post commands

109

Pre-backup command

110

Post-backup command

111

Pre-data capture command

112

Post-data capture command

112

• Always create a snapshot

113

• Do not create a snapshot

113

Volume shadow copy writers

114

3.4.1.8. Compression level

115

3.4.1.9. Backup performance

115

Backup priority

115

HDD writing speed

116

Network connection speed

116

3.4.1.10. Notifications

117

Messenger service (WinPopup)

118

3.4.1.11. Event tracing

118

Windows event log

118

SNMP notifications

119

3.4.1.13. Backup splitting

120

3.4.1.15. Media components

121

3.4.1.16. Error handling

122

3.4.1.17. Dual destination

123

Skip the task execution

124

3.4.1.20. Tape support

125

Always use a free tape

126

Reset archive bit

127

Use FTP in Active mode

128

3.4.2.1. Pre/Post commands

130

Pre-recovery command

131

Post-recovery command

131

3.4.2.2. Recovery priority

132

3.4.2.4. Notifications

132

3.4.2.5. Event tracing

134

3.4.2.6. Error handling

135

4. Vaults

138

4.1. Centralized vaults

139

Vault toolbar

140

Pie chart with legend

140

Vault content

141

Vault path

143

Vault database path

144

Vault encryption

144

4.1.3. Tape libraries

146

4.1.3.1. Overview

147

4.1.3.2. Hardware

147

4.1.3.3. Limitations

148

4.1.3.4. RSM Media Pools

148

Prerequisites

149

Backing up to tape library

151

Recovering from tape library

151

Inventory

152

Labeling

153

4.1.3.7. Tape support

154

4.1.3.8. Tape rotation

155

Choosing a backup scheme

155

Criteria of the choice

156

Case to analyze

156

GFS Example 1

158

GFS Example 2

161

GFS Example 3

162

ToH Example 1

164

ToH Example 2

165

ToH Example 3

166

Tape planning

167

Tape planning: Example 1

168

Tape planning: Example 2

168

4.1.3.9. What if

169

4.2. Personal vaults

170

4.3. Common operations

173

To show or hide columns

176

5. Scheduling

177

5.1. Daily schedule

178

Examples

179

5.2. Weekly schedule

180

5.3. Monthly schedule

182

Parameters

185

Use Wake-On-LAN

187

5.6. Conditions

188

5.6.1. User is idle

189

5.6.3. Fits time interval

190

5.6.4. User logged off

191

6. Direct management

193

Activities

194

System view

195

Way of working

195

Backup plan execution states

196

Backup plan statuses

197

Task states

197

Task statuses

198

• Backup plan (p. 209)

199

• Recovery task (p. 230)

199

• Validation task (p. 251)

199

Run backup plan

203

Task details

203

Archive

204

Settings

204

Backup plan details

205

6.1.3. Log

206

• Click View Details

207

6.1.3.3. Log entry details

208

6.2. Creating a backup plan

209

How to back up

210

Archive validation

210

Backup options

210

Convert to VM

210

To specify credentials

211

6.2.3. Source type

212

6.2.4. Items to back up

213

6.2.6. Exclusions

215

6.2.7. Archive

216

2. Using the archives table

217

3. Naming the new archive

217

6.2.9. Backup schemes

218

6.2.9.1. Back up now scheme

219

6.2.9.3. Simple scheme

219

Description

220

At a glance

223

Example

224

Roll-back period

224

6.2.10. Archive validation

228

6.3. Recovering data

230

General

231

What to recover

231

Where to recover

232

When to recover

232

Recovery options

232

6.3.1. Task credentials

233

6.3.2. Archive selection

233

6.3.3. Data type

234

6.3.4. Content selection

234

6.3.4.2. Files selection

235

6.3.6.1. Disks

236

Disk destination

237

NT signature

237

6.3.6.2. Volumes

237

Recover to:

238

MBR destination

239

Volume destination

239

Volume properties

239

6.3.6.5. File destination

241

Exclusions

242

6.3.8. When to recover

243

6.3.9. Universal Restore

243

Preparation

244

Universal Restore settings

244

Windows NT/2000/XP/2003

249

Windows Vista/2008

249

What to validate

252

When to validate

252

6.4.1. Task credentials

253

6.4.2. Archive selection

253

6.4.3. Backup selection

254

6.4.4. Location selection

254

6.5. Mounting an image

255

6.5.1. Archive selection

256

6.5.2. Backup selection

257

6.5.3. Access credentials

257

6.6. Managing mounted images

258

Unmounting images

259

6.7.1. Task credentials

261

6.7.2. Archive selection

262

6.7.3. Backup selection

263

6.7.5. Location selection

263

6.8. Acronis Secure Zone

265

Activate

269

Do not activate

269

6.10. Bootable media

270

Linux-based bootable media

271

PE-based bootable media

271

Using Bart PE

272

Kernel parameters

273

Network settings

274

Network port

275

2.0 is 512MB

277

To add an iSCSI device

280

To add an NDAS device

280

Linux commands and utilities

281

Mounting backup volumes

285

6.10.6. Acronis PXE Server

286

6.11. Disk management

288

Starting the operations

289

6.11.5. Disk operations

290

Using advanced options

292

System disk conversion

294

6.11.6. Volume operations

296

Types of dynamic volumes

297

Create volume wizard

298

Select destination disks

298

Set the volume size

299

Set the volume options

299

6.11.6.2. Delete volume

300

6.11.6.3. Set active volume

301

6.11.6.6. Format volume

302

6.11.7. Pending operations

303

7. Centralized management

304

7.1.2. Backup policies

306

Machines selection

309

7.1.2.4. Policy details

310

7.1.3. Physical machines

311

Applying policies

313

Grouping actions

313

Other actions

314

To add a machine

315

• installing the agent

315

Text file requirements

316

Adding machines to a group

318

Machine details

318

Plans and tasks

320

Inheritance order

323

7.1.3.2. Actions on groups

324

Adding multiple criteria

325

Move one group to another

327

Editing custom groups

327

Group details

327

7.1.4. Virtual machines

329

Grouping of virtual machines

330

• Host/VA

331

7.1.5. Storage nodes

333

• Information panel

334

Adding a storage node

336

7.1.6. Tasks

337

7.1.7. Log

339

Configuring the log table

342

7.1.8. Reporting

343

Generating reports

344

Filters

344

Report view

344

Report coverage

347

7.1.8.8. Column selection

348

7.1.8.9. Report view

348

Connection parameters

361

Event tracing parameters

363

When to modify

365

What to back up

366

Where to back up

366

7.3.1. Policy credentials

368

7.3.2. Items to back up

368

7.3.4. Exclusions

373

7.3.5. Archive

374

7.3.7.1. Back up now scheme

376

7.3.7.3. Simple scheme

377

Resulting tasks

385

7.3.8. Archive validation

386

Glossary

387

Backup plan (Plan)

389

Backup policy (Policy)

389

Backup scheme

390

Bootable agent

390

Bootable media

390

Built-in group

390

Centralized backup plan

391

Centralized management

391

Centralized task

391

Centralized vault

391

Cleanup

392

Consolidation

392

Deduplicating vault

392

Deduplication

392

Direct management

393

Disk backup (Image)

393

Disk group

393

Dynamic disk

394

Dynamic group

394

Dynamic volume

395

Encrypted archive

395

Encrypted vault

395

Managed vault

397

Media builder

397

Personal vault

397

Physical machine

397

Storage node-side cleanup

399

Storage node-side validation

399

Tower of Hanoi

399

Unmanaged vault

400

Validation

400

Validation rules

400

Virtual machine

401





More products and manuals for Backup recovery software ACRONIS

Models Document Type
Backup & Recovery 10 UR Advanced Server Manual   Acronis Backup & Recovery 10 UR Advanced Server, 10 pages
Disk Director 11 Home User's Guide   Acronis Disk Director 11 Home, 96 pages
RECOVERY - FOR MICROSOFT EXCHANGE Installation Guide   ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Installation guide, 59 pages
TRUE IMAGE 9.0 - HOME User's Guide   ACRONIS TRUE IMAGE 9.0 - HOME User`s guide, 124 pages
Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU User's Guide   Acronis Backup & Recovery 10 Server for Linux, ESD, AAS, 1u, StdSup, FRE, 182 pages
TRUE IMAGE 9.0 - HOME User Manual   Acronis True Image FAQ, 16 pages
TRUE IMAGE 9.0 - HOME User's Guide   ACRONIS TRUE IMAGE 9.0 - HOME User`s guide, 31 pages
BACKUP AND RECOVERY 10 ONLINE STAND-ALONE User's Guide   ACRONIS BACKUP AND RECOVERY 10 ONLINE STAND-ALONE User guide, 31 pages
BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Installation Guide   ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Installation guide, 69 pages
BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Installation Guide   ACRONIS BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Installation guide, 31 pages
BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3 User's Guide   ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3 User`s guide, 16 pages
BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS User Manual   Acronis® Backup & Recovery ™ 10 Server for Linux, 10 pages
RECOVERY - FOR MICROSOFT EXCHANGE Specifications   ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Specifications, 88 pages
MIGRATE EASY 7.0 User's Guide   ACRONIS MIGRATE EASY 7.0 User`s guide, 78 pages
BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS User Manual   ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Product data, 23 pages
TRUE IMAGE 8.0 User's Guide   ACRONIS TRUE IMAGE 8.0 User`s guide, 81 pages
BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3 Installation Guide   ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3 Installation guide, 33 pages
SDSCLPDES21 Datasheet   Acronis Universal Deploy 3.0 Server, AAP, ESD, DEU, 2 pages
TIHPB2ENS1 Datasheet   Acronis True Image Home 2010, 204 pages
KIT33100124739 Datasheet   Acronis K/Backup & Recovery 10 Srv+5 Workst/DE, 221 pages