ACRONIS Backup & Recovery 10 Advanced Server manuals

Owner’s manuals and user’s guides for Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server.
We providing 2 pdf manuals ACRONIS Backup & Recovery 10 Advanced Server for download free by document types: User's Guide


Table of contents

Advanced Server

1

Table of Contents

3

1.2. Getting started

8

• Backup

9

• Recovery

9

• Managing plans and tasks

9

• Viewing log

9

• Using deduplication

10

Navigation tree

12

Shortcuts bar

13

"Tasks" view

15

Action pages

16

1.3.1. Agent for Windows

18

1.3.2. Agent for Linux

19

1.3.4.1. Management Server

20

VMware vCenter integration

20

1.3.4.2. Storage Node

21

1.3.5. Management Console

22

1.5. Supported file systems

24

1.6. Hardware requirements

24

1.7. Technical support

26

2.1. Basic concepts

27

Backup using bootable media

29

2.3. Owners and credentials

32

Full backup

34

Incremental backup

34

Differential backup

34

2.5. GFS backup scheme

35

The resulting archive: ideal

37

The resulting archive: real

38

Tower of Hanoi overview

39

Tower of Hanoi by Acronis

40

2.7. Retention rules

41

Combination of rules 1 and 2

43

Best practices

44

Backing up dynamic volumes

44

Recovering dynamic volumes

45

Software RAID arrays

48

Hardware RAID arrays

49

2.11. Tape support

50

2.12.1. Acronis Secure Zone

52

Limitation

53

Restore)

54

Limitations

55

Getting Universal Restore

55

Supported operating systems

55

How it works

56

Usage scenarios

56

How to use

56

2.13.1. Basic concepts

57

Setting up the storage node

60

2.13.3.4. Example

63

Policy on a machine

66

Policy on a group

66

Backup policy state diagram

71

2.13.6. Deduplication

73

Deduplication database

74

Deduplication at source

74

Deduplication at target

75

What ratio to expect

77

Local connection

78

Remote connection

78

Example 1

80

Example 2

81

On a domain controller

82

Remote Agent ports

86

Client Encryption options

87

Server Encryption options

88

2.13.8.5. SSL certificates

89

Self-signed certificates

90

Non-self-signed certificates

91

3. Options

92

3.1.3. Time-based alerts

93

3.1.4. Number of tasks

93

3.1.5. Fonts

94

3.2.1. Logging level

94

3.2.2. Log cleanup rules

94

3.2.3. Event tracing

95

3.2.5. Acronis WOL Proxy

96

3.3. Machine options

98

3.3.2. Event tracing

99

Windows

100

3.3.3. Log cleanup rules

101

3.4.1.1. Archive protection

104

3.4.1.3. Pre/Post commands

105

Pre-backup command

106

Post-backup command

107

Post-data capture command

108

Pre-data capture command

108

• Always create a snapshot

109

• Do not create a snapshot

109

Volume shadow copy writers

110

3.4.1.8. Compression level

111

3.4.1.9. Backup performance

111

Backup priority

111

HDD writing speed

112

Network connection speed

112

3.4.1.10. Notifications

113

Messenger service (WinPopup)

114

3.4.1.11. Event tracing

114

Windows event log

114

SNMP notifications

115

3.4.1.13. Backup splitting

116

3.4.1.15. Media components

117

3.4.1.16. Error handling

118

3.4.1.17. Dual destination

119

Skip the task execution

120

3.4.1.20. Tape support

121

Always use a free tape

122

Reset archive bit

123

Use FTP in Active mode

124

3.4.2.1. Pre/Post commands

126

Pre-recovery command

127

Post-recovery command

127

3.4.2.2. Recovery priority

128

3.4.2.4. Notifications

128

3.4.2.5. Event tracing

130

3.4.2.6. Error handling

131

4. Vaults

134

4.1. Centralized vaults

135

Vault toolbar

136

Pie chart with legend

136

Vault content

137

Vault path

139

Vault database path

140

Vault encryption

140

4.1.3. Tape libraries

142

4.1.3.1. Overview

143

4.1.3.2. Hardware

143

4.1.3.3. Limitations

144

4.1.3.4. RSM Media Pools

144

Prerequisites

145

Backing up to tape library

147

Recovering from tape library

147

Inventory

148

Labeling

149

4.1.3.7. Tape support

150

4.1.3.8. Tape rotation

151

Choosing a backup scheme

151

Criteria of the choice

152

Case to analyze

152

GFS Example 1

154

GFS Example 2

157

GFS Example 3

158

ToH Example 1

160

ToH Example 2

161

ToH Example 3

162

Tape planning

163

Tape planning: Example 1

164

Tape planning: Example 2

164

4.1.3.9. What if

165

4.2. Personal vaults

166

4.3. Common operations

169

To show or hide columns

172

5. Scheduling

173

5.1. Daily schedule

174

Examples

175

5.2. Weekly schedule

176

5.3. Monthly schedule

179

Parameters

181

Use Wake-On-LAN

183

5.6. Conditions

184

5.6.1. User is idle

185

5.6.3. Fits time interval

186

5.6.4. User logged off

187

Example:

188

6. Direct management

189

Activities

190

System view

191

Way of working

191

Backup plan execution states

192

Task states

193

Backup plan statuses

193

Task statuses

194

• Backup plan (p. 205)

195

• Recovery task (p. 225)

195

• Validation task (p. 246)

195

Run backup plan

199

Task details

199

Archive

200

Backup plan details

201

6.1.3. Log

202

• Click View Details

203

6.1.3.3. Log entry details

204

6.2. Creating a backup plan

205

How to back up

206

Archive validation

206

Backup options

206

Convert to VM

206

To specify credentials

207

6.2.3. Source type

208

6.2.4. Items to back up

208

6.2.6. Exclusions

210

6.2.7. Archive

211

6.2.9. Backup schemes

213

6.2.9.3. Simple scheme

214

At a glance

217

Example

218

Roll-back period

219

Resulting tasks

222

6.2.10. Archive validation

223

6.3. Recovering data

225

Where to recover

226

When to recover

226

6.3.1. Task credentials

227

6.3.2. Archive selection

228

6.3.3. Data type

228

6.3.4. Content selection

229

6.3.6.1. Disks

230

Disk destination

231

NT signature

231

6.3.6.2. Volumes

232

MBR destination

233

Volume destination

233

Volume properties

233

Properties

234

Storage

235

Processors

235

6.3.6.5. File destination

236

Exclusions

236

Overwriting

237

6.3.8. When to recover

238

6.3.9. Universal Restore

238

Windows NT/2000/XP/2003

243

Windows Vista/2008

244

General

246

6.4.1. Task credentials

247

6.4.2. Archive selection

248

6.4.3. Backup selection

248

6.4.4. Location selection

249

6.5. Mounting an image

250

6.5.1. Archive selection

251

6.5.2. Backup selection

252

6.5.3. Access credentials

252

6.5.4. Volume selection

252

6.6. Managing mounted images

253

What to export

255

6.7.1. Task credentials

256

6.7.2. Archive selection

256

6.7.3. Backup selection

257

6.7.5. Location selection

258

2. Using the archives table

259

3. Naming the new archive

259

6.8. Acronis Secure Zone

260

Activate

263

6.10. Bootable media

264

PE-based bootable media

265

Linux-based bootable media

265

Using Bart PE

266

Kernel parameters

267

Network settings

269

Network port

270

2.0 is 512MB

271

To add an iSCSI device

274

Linux commands and utilities

275

Mounting backup volumes

280

6.10.6. Acronis PXE Server

281

6.11. Disk management

282

6.11.1. Basic precautions

283

Starting the operations

284

Displaying operation results

284

6.11.5. Disk operations

285

Using advanced options

287

System disk conversion

289

6.11.6. Volume operations

291

Create volume wizard

292

Select destination disks

293

Set the volume size

294

Set the volume options

294

6.11.6.2. Delete volume

295

6.11.6.3. Set active volume

295

6.11.7. Pending operations

297

7. Centralized management

299

7.1.2. Backup policies

301

Machines selection

304

7.1.2.4. Policy details

305

7.1.3. Physical machines

306

Applying policies

308

Grouping actions

308

Other actions

309

To add a machine

310

• installing the agent

310

Text file requirements

311

Adding machines to a group

313

Machine details

313

Plans and tasks

315

Member of

317

Inheritance order

318

7.1.3.2. Actions on groups

319

Adding multiple criteria

320

Move one group to another

322

Editing custom groups

322

Group details

322

7.1.4. Virtual machines

324

Grouping of virtual machines

325

• Host/VA

326

7.1.5. Storage nodes

328

Adding a storage node

330

7.1.6. Tasks

331

7.1.7. Log

333

Configuring the log table

336

7.1.8. Reporting

337

Generating reports

338

Filters

338

Report view

338

Report coverage

341

7.1.8.8. Column selection

342

7.1.8.9. Report view

342

Connection parameters

355

Event tracing parameters

357

When to modify

359

What to back up

360

Where to back up

360

7.3.1. Policy credentials

362

7.3.2. Items to back up

363

7.3.4. Exclusions

367

7.3.5. Archive

368

2. Naming the archives

369

7.3.7.1. Back up now scheme

370

7.3.7.3. Simple scheme

371

7.3.8. Archive validation

380

Glossary

381

Backup plan (Plan)

383

Backup policy (Policy)

383

Backup scheme

384

Bootable agent

384

Bootable media

384

Built-in group

384

Centralized backup plan

385

Centralized management

385

Centralized task

385

Centralized vault

385

Cleanup

386

Consolidation

386

Deduplicating vault

386

Deduplication

386

Direct management

387

Disk backup (Image)

387

Disk group

387

Dynamic disk

388

Dynamic group

388

Dynamic volume

389

Encrypted archive

389

Encrypted vault

389

Managed vault

391

Media builder

391

Personal vault

391

Physical machine

391

Storage node-side cleanup

393

Storage node-side validation

393

Tower of Hanoi

393

Unmanaged vault

394

Validation

394

Validation rules

394

Virtual machine

395

Table of contents

Advanced Server

1

Table of contents

3

1.2 Getting started

8

"Navigation" pane

11

Shortcuts bar

12

Actions

13

Operations with panes

14

Action pages

15

Action page - Controls

16

Navigation buttons

16

1.3.1 Agent for Windows

17

1.3.2 Agent for Linux

18

Storage Node

19

PXE Server

20

License Server

20

1.4 Supported file systems

21

Acronis License Server

22

10 Storage Node

22

1.6 System requirements

23

1.7 Technical support

24

2.1 Basic concepts

26

Backup using bootable media

28

Windows

30

2.3 Owners and credentials

31

Full backup

32

Incremental backup

33

Differential backup

33

2.5 GFS backup scheme

34

The resulting archive: ideal

36

The resulting archive: real

36

Tower of Hanoi overview

38

Tower of Hanoi by Acronis

38

2.7 Retention rules

39

1. Delete backups older than

40

Combination of rules 1 and 2

41

Best practices

42

Backing up dynamic volumes

42

Recovering dynamic volumes

43

Software RAID arrays

46

2.11 Tape support

47

2.12.1 Acronis Secure Zone

49

Limitation

50

Universal Restore)

51

Usage scenarios

53

How to use

53

2.13.1 Basic concepts

54

Protecting the servers

57

Protecting the workstations

58

Static and dynamic groups

59

Dynamic grouping criteria

59

Using custom groups

59

Policy on a machine

62

Policy on a group

62

Operations with a machine

63

Inheritance of policies

64

Policy status on a machine

67

Policy status on a group

68

2.13.6 Deduplication

69

How deduplication works

70

Deduplication best practices

71

Deduplication ratio

72

Deduplication restrictions

72

Local connection

73

Remote connection

74

Example 1

75

Acronis security groups

76

On a domain controller

77

Rights for Acronis services

79

Secure communication

80

Remote Agent ports

81

Client Encryption options

82

Server Encryption options

82

Network port configuration

83

SSL certificates

84

Self-signed certificates

85

Non-self-signed certificates

85

3 Options

86

3.1.3 Time-based alerts

87

3.1.4 Number of tasks

87

3.1.5 Fonts

87

3.2.1 Logging level

88

3.2.2 Log cleanup rules

88

3.2.3 Event tracing

89

3.2.5 Acronis WOL Proxy

90

3.2.6 VM protection options

90

3.3 Machine options

91

3.3.1 Machine management

92

3.3.2 Event tracing

92

3.3.3 Log cleanup rules

94

Archive protection

97

Source files exclusion

98

Pre-backup command

99

Post-backup command

100

Pre-data capture command

101

Post-data capture command

101

File-level backup snapshot

102

Multi-volume snapshot

102

Volume Shadow Copy Service

103

Compression level

103

Backup performance

104

Backup priority

104

HDD writing speed

104

Network connection speed

105

Notifications

105

Messenger service (WinPopup)

106

Event tracing

107

Windows event log

107

SNMP notifications

107

Backup splitting

108

File-level security

109

Media components

110

Error handling

110

Dual destination

111

Task start conditions

112

Task failure handling

113

Tape support

113

Always use a free tape

114

Additional settings

115

Use FTP in Active mode

116

Pre/Post commands

118

Pre-recovery command

118

Post-recovery command

119

Recovery priority

119

4 Vaults

125

4.1 Centralized vaults

126

Vault toolbar

127

Pie chart with legend

127

Vault content

127

Vault path

130

Vault database path

130

Vault encryption

131

Attaching a managed vault

132

4.1.3 Tape libraries

133

Hardware

134

Limitations

134

RSM Media Pools

134

Prerequisites

135

Backing up to tape library

137

Recovering from tape library

137

Managing a tape library

138

Inventory

138

Labeling

139

Tape rotation

141

Choosing a backup scheme

141

Criteria of the choice

142

Case to analyze

142

GFS Example 1

143

GFS Example 2

146

GFS Example 3

148

ToH Example 1

149

ToH Example 2

150

ToH Example 3

151

Tape planning

152

Tape planning: Example 1

153

Tape planning: Example 2

153

What if

154

4.2 Personal vaults

155

Creating a personal vault

157

4.3 Common operations

158

To show or hide columns

161

5 Scheduling

162

5.1 Daily schedule

163

 first at 8 AM

164

 second at 12 PM (noon)

164

 third at 3 PM

164

 fourth at 5 PM

164

 fifth at 7 PM

164

5.2 Weekly schedule

165

5.3 Monthly schedule

167

Examples

168

Parameters

169

Use Wake-On-LAN

171

5.6 Conditions

172

5.6.1 User is idle

173

5.6.3 Fits time interval

174

5.6.4 User logged off

175

6 Direct management

177

Activities

178

Tasks need interaction

179

Backup plan execution states

180

Backup plan statuses

180

Task states

181

Task statuses

182

 Backup plan (p. 192)

183

 Recovery task (p. 210)

183

 Validation task (p. 230)

183

Run backup plan

187

Task details

187

Archive

188

Settings

188

Progress

188

Backup plan details

189

6.1.3 Log

190

Configuring the log table

191

6.2 Creating a backup plan

192

What to backup

193

Where to back up

193

How to back up

193

Archive validation

193

Backup options

193

Convert to VM

194

6.2.3 Source type

195

6.2.4 Items to back up

195

Selecting disks and volumes

196

Selecting files and folders

196

6.2.6 Exclusions

197

6.2.7 Archive

198

6.2.9 Backup schemes

200

At a glance

201

Description

201

Tower of Hanoi scheme

204

Roll-back period

205

Custom backup scheme

206

Resulting tasks

208

6.2.10 Archive validation

209

6.3 Recovering data

210

General

211

What to recover

211

Where to recover

212

When to recover

212

Recovery options

212

6.3.1 Task credentials

213

6.3.2 Archive selection

213

6.3.3 Data type

214

6.3.4 Content selection

214

6.3.6 Destination selection

215

Disk destination

216

NT signature

217

Volumes

217

MBR destination

218

Volume destination

218

Volume properties

219

Virtual machine settings

220

File destination

221

Recovery exclusions

221

6.3.8 When to recover

222

6.3.9 Universal Restore

222

Preparation

223

Universal Restore settings

223

About Windows loaders

228

What to validate

230

6.4.1 Task credentials

231

6.4.2 Archive selection

231

6.4.3 Backup selection

232

6.4.4 Location selection

232

6.4.6 When to validate

233

6.5 Mounting an image

234

6.5.2 Backup selection

235

6.5.3 Access credentials

235

6.6 Managing mounted images

236

6.7.1 Task credentials

239

6.7.2 Archive selection

239

6.7.3 Backup selection

240

6.7.5 Location selection

241

2. Using the archives table

242

3. Naming the new archive

242

6.8 Acronis Secure Zone

243

Acronis Secure Zone Size

244

Result confirmation

244

Deleting Acronis Secure Zone

246

6.10 Bootable media

247

Linux-based bootable media

248

PE-based bootable media

248

Kernel parameters

250

Network settings

251

Network port

252

Setting up a display mode

256

Linux commands and utilities

257

Example

260

Mounting backup volumes

261

6.10.6 Acronis PXE Server

262

6.11 Disk management

263

6.11.1 Basic precautions

264

Starting the operations

265

Displaying operation results

265

6.11.5 Disk operations

266

Disk conversion: MBR to GPT

268

Disk conversion: GPT to MBR

269

System disk conversion

270

6.11.6 Volume operations

271

Creating a volume

272

Types of dynamic volumes

272

Create volume wizard

273

Select destination disks

273

Set the volume size

274

Set the volume options

274

Delete volume

275

Set active volume

276

Change volume letter

276

Change volume label

277

Format volume

277

6.11.7 Pending operations

278

7 Centralized management

279

7.1.2 Backup policies

281

Backup policy statuses

282

Actions on backup policies

283

Machines selection

284

Policy details

285

7.1.3 Physical machines

286

Actions on machines

287

Applying policies

288

Grouping actions

288

Other actions

289

Text file requirements

291

Adding machines to a group

292

Machine details

293

Backup policies

294

Plans and tasks

294

Member of

297

Hosted virtual machines

297

Inheritance order

298

Actions on groups

298

To create a group

299

 Operating system

299

Adding multiple criteria

300

Move one group to another

301

Editing custom groups

301

Group details

302

7.1.4 Virtual machines

303

VMware vCenter integration

305

Support for vCenter clusters

307

7.1.5 Storage nodes

308

Actions on storage nodes

309

Adding a storage node

310

Storage node details

310

7.1.6 Tasks

311

7.1.7 Log

313

Local event log

314

Centralized event log

314

Actions on log entries

315

7.1.8 Reporting

317

Report about the machines

318

Report about the tasks

319

Filters

320

Report view

320

Column selection

322

Connection parameters

334

Event tracing parameters

336

When to modify

337

What to back up

338

7.3.1 Policy credentials

340

7.3.2 Items to back up

341

7.3.4 Exclusions

345

7.3.5 Archive

346

2. Naming the archives

347

Back up now scheme

348

Back up later scheme

348

Simple scheme

349

7.3.8 Archive validation

357

Glossary

358

Backup plan (Plan)

360

Backup policy (Policy)

360

Backup scheme

361

Bootable agent

361

Bootable media

361

Built-in group

361

Centralized backup plan

362

Centralized management

362

Centralized task

362

Centralized vault

362

Cleanup

362

Disk backup (Image)

364

Disk group

364

Dynamic disk

365

Dynamic group

365

Dynamic volume

366

Encrypted archive

366

Encrypted vault

366

Storage node-side validation

370

Tower of Hanoi

370

 Windows Vista (PE 2.0)

372





More products and manuals for Backup recovery software ACRONIS

Models Document Type
Backup & Recovery 10 Advanced Server, UR, AAS, RNW, L2, 500-1249u, FRE User's Guide   Acronis Backup & Recovery 10 Advanced Workstation, 402 pages
Backup & Recovery 10 Workstation User's Guide   Acronis Backup & Recovery 10 Workstation, 226 pages
True Image Home 2011, Win, Mini Box, 1PC, EN User's Guide   Acronis True Image Home 2011, DVD, FR, 217 pages
Disk Director Server 10.0, AAP, MNT, L4, 2500-4999u, FRE User's Guide   Acronis Disk Director Server 10, AAP, Box, ENG, 96 pages
Disk Director 11 Home User's Guide   Acronis Disk Director 11 Home, 87 pages
Backup & Recovery 10 Advanced Server Virtual Edition Manual   Acronis Backup & Recovery 10 Advanced Server Virtual Edition, 17 pages
True Image Home 2011 Netbook Edition, Win, MiniBox, DEU + 2GB USB-Stick User's Guide   Acronis True Image Home 2011 Netbook Edition, Win, ENG, 166 pages
Backup & Recovery 10 Adv Workstation, AAS, RNW Std MNT, 50-499u, ENG User's Guide   Acronis Backup & Recovery 10 Adv Workstation, NFR, UnRest, DEU, 402 pages
Snap Deploy 3 for PCs, ESD, 1u, STD, FRE Specifications   Acronis Snap Deploy 3 for PCs, AAS, GOV/EDU, UPG SD 2.0, 50-499u, DEU, 103 pages
Backup & Recovery 10 Workstation User's Guide   Acronis Backup & Recovery 10 Workstation, 216 pages
Acronis Backup & Recovery 10 Advanced Workstation User's Guide   Acronis Backup & Recovery 10 Advanced Workstation, 390 pages
True Image Home 2010 Netbook Edition User's Guide   Acronis True Image Home 2010 Netbook Edition, 154 pages
Backup & Recovery 10 Advanced Workstation User's Guide   Acronis Backup & Recovery 10 Advanced Workstation, 369 pages
Backup & Recovery 10 Advanced Server Virtual Edition User's Guide   Acronis Backup & Recovery 10 Advanced Server Virtual Edition, 389 pages
Backup & Recovery 10 Server, Windows User's Guide   Acronis Backup & Recovery 10 Server, Windows, 217 pages
Recovery MS SQL Server - Upgrade AAS to AAP Specifications   Acronis Recovery MS SQL Server, 94 pages
True Image Home 2010 User's Guide   Acronis True Image Home 2010, 197 pages
Backup & Recovery 10 Workstation User's Guide   Acronis Backup & Recovery 10 Workstation [en] , 215 pages
Backup & Recovery 10 Server fr/ Windows, AAP, GOV/SV, RNW, PrmMNT, 50-499u, FRE User's Guide   Acronis Backup & Recovery 10 Server f/ Windows w/ UR, NFR, Box, DEU, 242 pages
Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG User's Guide   Acronis Backup & Recovery 10 Advanced Server, AAP, UPG, 50-499u, ENG, 412 pages