ACRONIS Backup & Recovery 10 Advanced Server User's Guide Page 54

  • Download
  • Add to my manuals
  • Print
  • Page
    / 381
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 53
54 Copyright © Acronis, Inc., 2000-2010
If you try to log off, shut down or hibernate the machine using the Start Menu commands, the end of the
current session will be automatically postponed until the recovery is completed. Should you decide to switch
off the machine with the Power button though, all the changes made to the system since the last boot up
would be lost, the system will not be recovered, not even partially, and the only possible solution in this
case will be to start the recovery process anew, from a bootable media.
6. The background recovery continues until all the selected volumes are recovered, the log entry is
made and the Acronis Active Restore icon disappears from the system tray.
2.13 Understanding centralized management
This section contains an overview of centralized data protection with Acronis Backup & Recovery 10.
Please be sure you have an understanding of how data is protected on a single machine (p. 26)
before reading this section.
2.13.1 Basic concepts
Applying backup policies and tracking their execution
To protect data on a single machine, you install on the machine an agent (p. 358) or multiple agents
for various data types you want to protect. You connect the console to the machine and create a
backup plan (p. 360) or multiple backup plans.
What if you have to manage hundreds of machines? It takes time to create a backup plan on each
machine, while the plans may be quite similar you need to back up, say, the system drive and the
users' documents. Tracking the plans' execution on each machine separately is also time-consuming.
To be able to propagate the management operations to multiple machines, you install Acronis
Backup & Recovery 10 Management Server (p. 368) and register (p. 369) the machines on the server.
After that you can create groups of machines and thus manage multiple machines as a whole. You
can protect all of them or your selection by setting up a common backup plan, which is called a
backup policy (p. 360).
Once you apply the policy to a group of machines, the management server deploys the policy to each
of the machines. On each machine the agents find the items to back up and create corresponding
centralized backup plans (p. 362). You will be able to monitor the policies’ statuses on a single screen
and navigate, if required, to each machine, plan or task to see their status and log entries. The
management server also enables you to monitor and manage the agent's locally originated activities.
Since you connect the console to the management server rather than to each machine and perform
all management operations through the central management unit, this way of management is called
centralized management (p. 362).
Centralized management does not rule out the direct management (p. 363) of each machine. You can
connect the console to each machine and perform any direct management operation. However,
centralized backup plans can be managed through the management server only, since a well-thought
out policy functions automatically and rarely requires human intervention.
Using the management server, you can create one or more centralized archive storages (centralized
vaults (p. 362)), which will be shared by the registered machines. A centralized vault can be used by
any backup policy as well as by any backup plan created on the registered machines using direct
management.
Page view 53
1 2 ... 49 50 51 52 53 54 55 56 57 58 59 ... 380 381

Comments to this Manuals

No comments