ACRONIS Backup & Recovery 11.5 Server for Windows User's Guide Page 1

Browse online or download User's Guide for Backup recovery software ACRONIS Backup & Recovery 11.5 Server for Windows. Acronis Backup & Recovery 11.5 Server for Windows User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 275
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User Guide

Acronis Backup & Recovery 11.5 User Guide Applies to the following editions:  Advanced Server  Virtual Edition  Advanced Server SBS Editi

Page 2

10 Copyright © Acronis International GmbH, 2002-2012 1 Introducing Acronis Backup & Recovery 11.5 1.1 What's new in Acronis Backup &

Page 3 - Copyright Statement

100 Copyright © Acronis International GmbH, 2002-2012  Software - Acronis VSS Provider VSS will use Acronis VSS Provider for taking snapshots.

Page 4 - Table of contents

101 Copyright © Acronis International GmbH, 2002-2012 5 Recovery When it comes to data recovery, first consider the most functional method: connec

Page 5

102 Copyright © Acronis International GmbH, 2002-2012 Disks (p. 107) Volumes (p. 109) Files (p. 113) Acronis Active Restore [Optional] The Acronis

Page 6

103 Copyright © Acronis International GmbH, 2002-2012 5.1.1 What to recover 1. Specifying the archive location In the Data path field, specify the

Page 7

104 Copyright © Acronis International GmbH, 2002-2012 5.1.1.1 Selecting archive location Location Details Online backup storage If the archive i

Page 8

105 Copyright © Acronis International GmbH, 2002-2012 Acronis Backup & Recovery 11.5 may upload data catalog files from a vault to a local cach

Page 9

106 Copyright © Acronis International GmbH, 2002-2012 The data is not supported by the catalog The following data cannot be displayed in the catalo

Page 10 - 1.2.1 Agent for Windows

107 Copyright © Acronis International GmbH, 2002-2012  Password. The password for the account. 2. Click OK. 5.1.4 Where to recover Specify the

Page 11 - 1.2.2 Management Console

108 Copyright © Acronis International GmbH, 2002-2012 Acronis Backup & Recovery 11.5 attempts to map the selected disks to the target disks as

Page 12 - 1.5 Technical Support

109 Copyright © Acronis International GmbH, 2002-2012  Acronis Backup & Recovery 11.5 schedules tasks using the signature of the source hard

Page 13 - Product Updates

11 Copyright © Acronis International GmbH, 2002-2012 Disk backup Disk-level data protection is based on backing up either a disk or a volume file s

Page 14 - 2 Getting started

110 Copyright © Acronis International GmbH, 2002-2012 The selected volumes will be recovered to the physical disks of the machine the console is co

Page 15 - Step 6. Management

111 Copyright © Acronis International GmbH, 2002-2012 Recover [Volume] [Letter] to: Disk # /Volume Sequentially map each of the source volumes to a

Page 16 - Navigation tree

112 Copyright © Acronis International GmbH, 2002-2012  Primary. Information about primary volumes is contained in the MBR partition table. Most o

Page 17 - Operations with pane

113 Copyright © Acronis International GmbH, 2002-2012 Use the following options only if you absolutely need to.  CHS (63 sectors) - select this o

Page 18 - 2.1.2.1 Views

114 Copyright © Acronis International GmbH, 2002-2012  Do not overwrite existing file - this will give the file on the hard disk priority over th

Page 19 - 2.1.2.2 Action pages

115 Copyright © Acronis International GmbH, 2002-2012 To specify credentials 1. Select one of the following:  Run under the current user The tas

Page 20 - 2.1.3 Console options

116 Copyright © Acronis International GmbH, 2002-2012 5.2.2 Using Universal Restore During recovery Universal Restore is available when configurin

Page 21 - 2.1.3.4 Pop-up messages

117 Copyright © Acronis International GmbH, 2002-2012 What if you do not have drivers Windows 7 includes more drivers than the older Windows operat

Page 22

118 Copyright © Acronis International GmbH, 2002-2012 Once Windows boots, it will initialize the standard procedure for installing new hardware. Th

Page 23 - 3.1 Owners

119 Copyright © Acronis International GmbH, 2002-2012  Tape device  Optical discs (CDs, DVDs, or Blu-ray discs) When transferring a system betw

Page 24 - Task credentials

12 Copyright © Acronis International GmbH, 2002-2012 1.3 About the trial product version Before buying an Acronis Backup & Recovery 11.5 licen

Page 25

120 Copyright © Acronis International GmbH, 2002-2012 Original system Target hardware BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT B

Page 26

121 Copyright © Acronis International GmbH, 2002-2012 The following table summarizes all cases of recovering disks of a BIOS-based system to UEFI-b

Page 27 - Incremental backup

122 Copyright © Acronis International GmbH, 2002-2012 and then performing the recovery. The disk is initialized as GPT. The 2-TB limitation for GPT

Page 28

123 Copyright © Acronis International GmbH, 2002-2012 Some machines are being used as storage facilities, where the operating system claims a small

Page 29 - (Windows)

124 Copyright © Acronis International GmbH, 2002-2012 Recovery 11.5 automatically updates Windows loaders after recovery. Other loaders might also

Page 30

125 Copyright © Acronis International GmbH, 2002-2012 Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders.

Page 31

126 Copyright © Acronis International GmbH, 2002-2012  The path to the kernel on that device and the root partitionin this example, the path is

Page 32 - 3.10 Support for SNMP

127 Copyright © Acronis International GmbH, 2002-2012 5.6 Reverting a Windows system to its factory settings If your Windows operating system was

Page 33 - About the test message

128 Copyright © Acronis International GmbH, 2002-2012 The following table summarizes the availability of the recovery options. Agent for Windows B

Page 34 - 4 Backup

129 Copyright © Acronis International GmbH, 2002-2012 5.7.1 Additional settings Specify the additional settings for the recovery operation by sele

Page 35 - How to back up

13 Copyright © Acronis International GmbH, 2002-2012 Product Updates You can download the latest updates for all your registered Acronis software p

Page 36 - Plan parameters

130 Copyright © Acronis International GmbH, 2002-2012 With the silent mode enabled, the program will automatically handle situations requiring user

Page 37

131 Copyright © Acronis International GmbH, 2002-2012  Do not send SNMP notifications  to disable sending the log events of the recovery operati

Page 38 - Wildcard characters

132 Copyright © Acronis International GmbH, 2002-2012 This option is effective only when you select for backup a folder that is higher in the folde

Page 39 - 1. Selecting the destination

133 Copyright © Acronis International GmbH, 2002-2012 c. Some Internet service providers require authentication on the incoming mail server before

Page 40

134 Copyright © Acronis International GmbH, 2002-2012 The program does not support interactive commands, i.e. commands that require user input (for

Page 41

135 Copyright © Acronis International GmbH, 2002-2012 2. In the Working directory field, specify a path to a directory where the command/batch fil

Page 42 - 4.2.6 Backup schemes

136 Copyright © Acronis International GmbH, 2002-2012  If you want the backup and the conversion to be executed on a schedule. This helps you mai

Page 43 - Parameters

137 Copyright © Acronis International GmbH, 2002-2012  Parallels Workstation  Kernel-based Virtual Machine  Red Hat Enterprise Virtualization

Page 44 - Examples

138 Copyright © Acronis International GmbH, 2002-2012 6.2.2 Setting up regular conversion to a virtual machine When creating a backup plan (p. 34)

Page 45

139 Copyright © Acronis International GmbH, 2002-2012 If the management server is integrated with vCenter Server, the resultant virtual machines wi

Page 46

14 Copyright © Acronis International GmbH, 2002-2012 2 Getting started Step 1. Installation These brief installation instructions enable you t

Page 47

140 Copyright © Acronis International GmbH, 2002-2012 What storage will be used for the virtual machines? Network usage As opposed to ordinary ba

Page 48

141 Copyright © Acronis International GmbH, 2002-2012 Intermediate snapshots To be able to update the virtual machine, the software stores a few in

Page 49

142 Copyright © Acronis International GmbH, 2002-2012 4. In Recover to, select New virtual machine. 5. Click Browse. In the VM/VS Selection (p. 1

Page 50 - Roll-back period

143 Copyright © Acronis International GmbH, 2002-2012 [Only if the console is connected to the management server] You can select the machine that w

Page 51 - 4.2.7 Archive validation

144 Copyright © Acronis International GmbH, 2002-2012 This is the number of processors of the new virtual machine. In most cases, it is set to one.

Page 52

145 Copyright © Acronis International GmbH, 2002-2012 2. Create a bootable media (p. 172) with the Universal Restore functionality by using Acroni

Page 53 - Parameters specification

146 Copyright © Acronis International GmbH, 2002-2012 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives.

Page 54 - Restrictions

147 Copyright © Acronis International GmbH, 2002-2012 7.1.1 Working with vaults This section briefly describes the main GUI elements of the select

Page 55 - 4.3.1 The [DATE] variable

148 Copyright © Acronis International GmbH, 2002-2012 A personal vault can be organized on a network share, FTP server, detachable media or removab

Page 56 - 4.3.3 Usage examples

149 Copyright © Acronis International GmbH, 2002-2012 Validate a vault Click Validate. You will be taken to the Validation (p. 155) page, where

Page 57

15 Copyright © Acronis International GmbH, 2002-2012 Create a backup plan if you need a long-term backup strategy including backup schemes, schedul

Page 58

150 Copyright © Acronis International GmbH, 2002-2012 1. Make sure that none of the backup plans uses vault A while merging, or disable the given

Page 59 - 4.4 Scheduling

151 Copyright © Acronis International GmbH, 2002-2012 After you configure the required settings, click OK. In the Result confirmation (p. 152) wind

Page 60 - 4.4.1 Daily schedule

152 Copyright © Acronis International GmbH, 2002-2012 7.2.1.4 Result confirmation The Result confirmation window displays the expected partition l

Page 61

153 Copyright © Acronis International GmbH, 2002-2012  If there is not enough unallocated space, the program will take free space from the select

Page 62 - 4.4.2 Weekly schedule

154 Copyright © Acronis International GmbH, 2002-2012  Vaults created on removable devices do not have the Data view (p. 104) tab. Usage modes of

Page 63

155 Copyright © Acronis International GmbH, 2002-2012 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Page 64 - 4.4.3 Monthly schedule

156 Copyright © Acronis International GmbH, 2002-2012 Vault (p. 156) - select a vault (or other location), to validate archives from. Credentials (

Page 65

157 Copyright © Acronis International GmbH, 2002-2012  To select a local folder (CD/DVD drive, or locally attached tape device), expand the Lo

Page 66

158 Copyright © Acronis International GmbH, 2002-2012 Choose one of the following:  Now - to start the validation task right after its creation,

Page 67

159 Copyright © Acronis International GmbH, 2002-2012  Your choice of backups belonging to the same archive - the resulting archive will contain

Page 68 - 4.4.5 Conditions

16 Copyright © Acronis International GmbH, 2002-2012 Acronis Backup & Recovery 11.5 Management Console - Welcome screen Key elements of the co

Page 69 - 4.4.5.1 User is idle

160 Copyright © Acronis International GmbH, 2002-2012 When the console is connected to a management server, two export methods are available:  Ex

Page 70 - 4.4.5.3 Fits time interval

161 Copyright © Acronis International GmbH, 2002-2012 Select the Archive (p. 161) or the Backups (p. 161). Show access credentials (p. 161) [Opti

Page 71 - 4.4.5.4 User logged off

162 Copyright © Acronis International GmbH, 2002-2012 To specify credentials 1. Select one of the following:  Use the current user credentials T

Page 72 - Usage scenarios

163 Copyright © Acronis International GmbH, 2002-2012  To export data to a locally attached tape device, expand the Tape drives group, then click

Page 73 - 4.5.1 Supported locations

164 Copyright © Acronis International GmbH, 2002-2012 8.3 Mounting an image Mounting volumes from a disk backup (image) lets you access the volume

Page 74 - Custom scheme

165 Copyright © Acronis International GmbH, 2002-2012  If the archive is stored in a local folder on the machine, expand the Local folders group

Page 75

166 Copyright © Acronis International GmbH, 2002-2012 1. Select the check box for each volume you need to mount. 2. Click on the selected volume

Page 76 -  Consolidate these backups

167 Copyright © Acronis International GmbH, 2002-2012 8.4.1 Operations with archives To perform any operation with an archive 1. In the Navigatio

Page 77 - 4.5.6 Usage examples

168 Copyright © Acronis International GmbH, 2002-2012 a separate window In the Backup Content window, examine the backup content. Recover Click

Page 78 - 4.6 Default backup options

169 Copyright © Acronis International GmbH, 2002-2012 You have the following backup chain in your archive: F1 I2 I3 I4 D5 I6 I7 I8 F9 I10 I11 D12

Page 79

17 Copyright © Acronis International GmbH, 2002-2012  Backup plans and tasks. Use this view to manage backup plans and tasks on the managed mac

Page 80

170 Copyright © Acronis International GmbH, 2002-2012 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or othe

Page 81 - 4.6.1 Additional settings

171 Copyright © Acronis International GmbH, 2002-2012 PE-based bootable media does not support UEFI. 9.1 How to create bootable media To enable c

Page 82 - 4.6.3 Backup cataloging

172 Copyright © Acronis International GmbH, 2002-2012 http://www.microsoft.com/downloads/details.aspx?FamilyID=94bb6e34-d890-4932-81a5-5b50c657de08

Page 83 - 4.6.4 Backup performance

173 Copyright © Acronis International GmbH, 2002-2012  create CD, DVD or other bootable media such as removable USB flash drives if the hardware

Page 84 - 4.6.5 Backup splitting

174 Copyright © Acronis International GmbH, 2002-2012 nousb Disables loading of the USB (Universal Serial Bus) subsystem. nousb2 Disables USB 2.0 s

Page 85 - 4.6.6 Compression level

175 Copyright © Acronis International GmbH, 2002-2012 Once the bootable ag

Page 86

176 Copyright © Acronis International GmbH, 2002-2012 You will be able to configure the Universal Restore:  to search the media for the drivers t

Page 87 - 4.6.9 Event tracing

177 Copyright © Acronis International GmbH, 2002-2012 Adding Acronis Plug-in to WinPE 2.x or 3.x ISO To add Acronis Plug-in to WinPE 2.x or 3.x ISO

Page 88 - 4.6.9.2 Windows event log

178 Copyright © Acronis International GmbH, 2002-2012 9.2 Connecting to a machine booted from media Once a machine boots from bootable media, the

Page 89 - 4.6.12 File-level security

179 Copyright © Acronis International GmbH, 2002-2012 1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask

Page 90 - 4.6.13 Media components

18 Copyright © Acronis International GmbH, 2002-2012 2.1.2.1 Views A view appears on the main area when clicking any item in the Navigation tree i

Page 91 - 4.6.14 Mount points

180 Copyright © Acronis International GmbH, 2002-2012 Acronis command-line utilities  acrocmd  acronis  asamba  lash Linux commands and uti

Page 92 - 4.6.16 Notifications

181 Copyright © Acronis International GmbH, 2002-2012 hotplug reboot 9.5 Acronis Startup Recovery Manager Acronis Startup Recovery Manager is a

Page 93 - 4.6.17 Pre/Post commands

182 Copyright © Acronis International GmbH, 2002-2012 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume c

Page 94 - 4.6.17.1 Pre-backup command

183 Copyright © Acronis International GmbH, 2002-2012 1. Back up the disk on which volumes will be created or managed. Having your most important

Page 95

184 Copyright © Acronis International GmbH, 2002-2012 The top part of the view contains a disks and volumes table enabling data sorting and columns

Page 96

185 Copyright © Acronis International GmbH, 2002-2012 Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to b

Page 97

186 Copyright © Acronis International GmbH, 2002-2012 

Page 98

187 Copyright © Acronis International GmbH, 2002-2012 If you need to copy the NT signature: 1. Select the Copy NT signature 

Page 99 - Use VSS

188 Copyright © Acronis International GmbH, 2002-2012 1. MBR disk conversion: dynamic to basic (p. 189) using the Convert to basic operation. 2

Page 100 - Volume shadow copy writers

189 Copyright © Acronis International GmbH, 2002-2012 System disk conversion Acronis Disk Director Lite does not require an operating system reboot

Page 101 - 5 Recovery

19 Copyright © Acronis International GmbH, 2002-2012 Filter items by predefined column value In a field below the corresponding column's heade

Page 102 - Task parameters

190 Copyright © Acronis International GmbH, 2002-2012  safe conversion of a dynamic disk to basic when it contains volumes with data for simple a

Page 103 - 5.1.1 What to recover

191 Copyright © Acronis International GmbH, 2002-2012  Store collections of similar files separately  for example, an MP3 collection or video fi

Page 104 - 5.1.1.2 Data catalog

192 Copyright © Acronis International GmbH, 2002-2012 data itself. If a physical disk fails, the portion of the RAID-5 volume that was on that fail

Page 105

193 Copyright © Acronis International GmbH, 2002-2012 To create a Striped volume:  Select two or more destination disks to create the volume on.

Page 106

194 Copyright © Acronis International GmbH, 2002-2012 In setting the cluster size you can choose between any number in the preset amount for eac

Page 107 - 5.1.4 Where to recover

195 Copyright © Acronis International GmbH, 2002-2012 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the

Page 108 - NT signature

196 Copyright © Acronis International GmbH, 2002-2012 10.7.5 Change volume label The volume label is an optional attribute. It is a name assigned

Page 109

197 Copyright © Acronis International GmbH, 2002-2012 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows c

Page 110 - Disks/volumes

198 Copyright © Acronis International GmbH, 2002-2012 11 Protecting applications with disk-level backup This section describes how to use a disk-le

Page 111 - Size and location

199 Copyright © Acronis International GmbH, 2002-2012 If the application databases are located on a number of machines, back up all of the machines

Page 113 - Where to recover

20 Copyright © Acronis International GmbH, 2002-2012 Using controls and specifying settings Use active controls to specify a backup plan or recover

Page 114 - 5.1.6 Task credentials

200 Copyright © Acronis International GmbH, 2002-2012 1. Truncating the logs manually or by using a script. 2. For Microsoft SQL Server, tempor

Page 115

201 Copyright © Acronis International GmbH, 2002-2012 Determining locations of database files by using SQL Server Management Studio Default locatio

Page 116 - Preparation

202 Copyright © Acronis International GmbH, 2002-2012 Exchange 2003 1. Start Exchange System Manager. 2. Click Administrative Groups. Note: If Ad

Page 117 - The recovery process

203 Copyright © Acronis International GmbH, 2002-2012 4. Selecta database. In the opened page you will see the database server and database name.

Page 118 - Limitations

204 Copyright © Acronis International GmbH, 2002-2012 d. In the Recovery Model list box, select the Simple model list. 2. The transaction log fil

Page 119 - 5.3.1 Recovering volumes

205 Copyright © Acronis International GmbH, 2002-2012 3. In the Post-backup command, specify the path to the batch file. 11.1.2.2 Transaction lo

Page 120 - 5.3.2 Recovering disks

206 Copyright © Acronis International GmbH, 2002-2012 a. Execute the eseutil /mk <path to checkpoint file> command, where the <path to ch

Page 121

207 Copyright © Acronis International GmbH, 2002-2012 a. Dismount the databases. b. Run Eseutil /K and review the verification results. c. If

Page 122 - 5.4 Acronis Active Restore

208 Copyright © Acronis International GmbH, 2002-2012  The tombstone lifetime was changed administratively. The reason for this additional backup

Page 123 - How to use

209 Copyright © Acronis International GmbH, 2002-2012 5. On the recovery page under What to recover section: a. In Data paths, select Custom. b.

Page 124

21 Copyright © Acronis International GmbH, 2002-2012 2.1.3.2 Credentials cache The option specifies whether to store the credentials entered while

Page 125

210 Copyright © Acronis International GmbH, 2002-2012 11.2.3 Attaching SQL Server databases This section describes how to attach a database in SQL

Page 126 - 5.5.2 About Windows loaders

211 Copyright © Acronis International GmbH, 2002-2012 To recover Exchange Server databases 1. Connect the console to the machine on which you ar

Page 127

212 Copyright © Acronis International GmbH, 2002-2012  Exchange 2007: http://technet.microsoft.com/en-us/library/aa997694(v=exchg.80)  Exchange

Page 128

213 Copyright © Acronis International GmbH, 2002-2012 Recovery vs. re-creation Recreation does not require having a backup. Recovery is normally fa

Page 129 - 5.7.2 Error handling

214 Copyright © Acronis International GmbH, 2002-2012 3. Restart the domain controller. Make sure that the Active Directory service has started su

Page 130 - 5.7.3 Event tracing

215 Copyright © Acronis International GmbH, 2002-2012 7. Restart the domain controller in normal mode. Make sure that the Active Directory service

Page 131 - 5.7.5 Mount points

216 Copyright © Acronis International GmbH, 2002-2012 USN rollback After you perform a nonauthoritative restore of a domain controller or of its da

Page 132 - 5.7.6 Notifications

217 Copyright © Acronis International GmbH, 2002-2012 11.5 Recovering SharePoint data Different SharePoint servers and databases are recovered in

Page 133 - 5.7.7 Pre/Post commands

218 Copyright © Acronis International GmbH, 2002-2012 2. Recover the database files as described in "Recovering SQL Server database files fro

Page 134

219 Copyright © Acronis International GmbH, 2002-2012  Office Document Conversions Launcher Service  Office Document Conversions Load Balancer

Page 135 - 6.1 Conversion methods

22 Copyright © Acronis International GmbH, 2002-2012 Notify when the management console is connected to a component of a different version This opt

Page 136

220 Copyright © Acronis International GmbH, 2002-2012 2. Attach the content database to a non-original SharePoint farm. To do this: a. Make sure

Page 137 - Custom loader reactivation

221 Copyright © Acronis International GmbH, 2002-2012 12 Administering a managed machine This section describes the views that are available throug

Page 138 - 6.2.2.1 Conversion settings

222 Copyright © Acronis International GmbH, 2002-2012 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 230) o

Page 139

223 Copyright © Acronis International GmbH, 2002-2012 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as cre

Page 140

224 Copyright © Acronis International GmbH, 2002-2012 1 Need interaction At least one task needs user interaction. Otherwise, see 2. Identify the t

Page 141 - 6.2.3.1 Steps to perform

225 Copyright © Acronis International GmbH, 2002-2012 12.1.2.3 Task states A task can be in one of the following states: Idle; Waiting; Running; N

Page 142

226 Copyright © Acronis International GmbH, 2002-2012 12.1.3 Export and import of backup plans The export operation creates a file with complete c

Page 143 - Processors

227 Copyright © Acronis International GmbH, 2002-2012 How to modify credentials In the export file, the <login> tags include the user name an

Page 144 - 6.3.2 Steps to perform

228 Copyright © Acronis International GmbH, 2002-2012 How to change items to back up Replacing a directly specified item with another directly spec

Page 145

229 Copyright © Acronis International GmbH, 2002-2012 <specific> <backup_type> disks </backup_type> <disk_level

Page 146 - 7.1 Vaults

23 Copyright © Acronis International GmbH, 2002-2012 3 Understanding Acronis Backup & Recovery 11.5 This section attempts to give its readers

Page 147 - 7.1.2 Personal vaults

230 Copyright © Acronis International GmbH, 2002-2012 The default path to the dedicated folder is %ALLUSERSPROFILE%\Acronis\BackupAndRecovery\impor

Page 148 - Metadata

231 Copyright © Acronis International GmbH, 2002-2012  Last start time - how much time has passed since the last plan or task start.  Deploymen

Page 149 - Creating a personal vault

232 Copyright © Acronis International GmbH, 2002-2012 When a task or activity requires user interaction, a message and action buttons appear above

Page 150 - 7.2 Acronis Secure Zone

233 Copyright © Acronis International GmbH, 2002-2012 Save all the log entries to a file 1. Make sure, that the filters are not set. 2. Click

Page 151 - To disable password

234 Copyright © Acronis International GmbH, 2002-2012 Active and inactive alerts An alert can be either in an active, or inactive state. The active

Page 152 - 7.2.1.4 Result confirmation

235 Copyright © Acronis International GmbH, 2002-2012 trial > backing up to the online storage** After trying the product, you decided to back u

Page 153 - 7.3 Removable devices

236 Copyright © Acronis International GmbH, 2002-2012 If you select Wait for task completion, all of the running Acronis Backup & Recovery 11.5

Page 154

237 Copyright © Acronis International GmbH, 2002-2012 The alert is displayed in the Alerts view of the Navigation pane. 12.6.4 E-mail settings Th

Page 155 - What to validate

238 Copyright © Acronis International GmbH, 2002-2012 When using this option, make sure that the e-mail settings are properly configured in Machine

Page 156 - 8.1.3 Vault selection

239 Copyright © Acronis International GmbH, 2002-2012 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Sp

Page 157 - 8.1.5 When to validate

24 Copyright © Acronis International GmbH, 2002-2012 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user.

Page 158 - 8.1.6 Task credentials

240 Copyright © Acronis International GmbH, 2002-2012 You can override the settings set here, exclusively for the events that occur during backup o

Page 159

241 Copyright © Acronis International GmbH, 2002-2012 If you do not know the proxy server settings, contact your network administrator or Internet

Page 160 - What to export

242 Copyright © Acronis International GmbH, 2002-2012 13 Online backup This section provides details about using the Acronis Backup & Recovery

Page 161 - 8.2.2 Backup selection

243 Copyright © Acronis International GmbH, 2002-2012 13.1.3 How long will my backups be kept in the online storage? Your backups remain in the on

Page 162 - 8.2.4 Destination selection

244 Copyright © Acronis International GmbH, 2002-2012  Recovering disks or files by using Acronis Backup & Recovery 11.5 GUI or command line

Page 163 - 3. Naming the new archive

245 Copyright © Acronis International GmbH, 2002-2012 To continue backing up the machine to the same subscription, reassign (p. 256) the subscripti

Page 164 - 8.3 Mounting an image

246 Copyright © Acronis International GmbH, 2002-2012 13.1.6.7 How to buy an Initial Seeding license? You can buy an Initial Seeding license from

Page 165 - 8.3.4 Volume selection

247 Copyright © Acronis International GmbH, 2002-2012 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Page 166 - Unmounting images

248 Copyright © Acronis International GmbH, 2002-2012 Step 4 Choose the transport company that you will use for shipping. On that company's

Page 167

249 Copyright © Acronis International GmbH, 2002-2012 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending y

Page 168

25 Copyright © Acronis International GmbH, 2002-2012 3.3 User privileges on a managed machine When managing a machine running Windows, the scope

Page 169 - Tips on usage

250 Copyright © Acronis International GmbH, 2002-2012  The order has been completed. The media has been returned (or: Returning the media was not

Page 170 - 9 Bootable media

251 Copyright © Acronis International GmbH, 2002-2012 13.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A

Page 171 - PE-based bootable media

252 Copyright © Acronis International GmbH, 2002-2012 13.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscri

Page 172

253 Copyright © Acronis International GmbH, 2002-2012 An expired subscription can be renewed within five days after expiration. In such cases, the

Page 173 - 9.1.1.1 Kernel parameters

254 Copyright © Acronis International GmbH, 2002-2012  Qo  old subscription storage quota  Qn  new subscription storage quota. Example. You h

Page 174 - 9.1.1.2 Network settings

255 Copyright © Acronis International GmbH, 2002-2012  Windows 2000 SP4  all editions except for the Datacenter and Professional editions.  Wi

Page 175 - 9.1.1.3 Network port

256 Copyright © Acronis International GmbH, 2002-2012  As soon as a subscription is activated, its subscription period starts. To avoid losing su

Page 176

257 Copyright © Acronis International GmbH, 2002-2012 Depending on your settings, this backup will be either full or incremental. But its size is n

Page 177

258 Copyright © Acronis International GmbH, 2002-2012 13.6 Retrieving files from the online storage by using a Web browser By using a Web browser,

Page 178

259 Copyright © Acronis International GmbH, 2002-2012 Operations The following operations are not possible. Backup operations:  Backing up from b

Page 179

26 Copyright © Acronis International GmbH, 2002-2012 Service name Purpose Account used by the service Privileges added to the account User rights G

Page 180 - Linux commands and utilities

260 Copyright © Acronis International GmbH, 2002-2012 Assign a subscription to a machine Reserve a subscription for a particular machine. Subscript

Page 181 - Do not activate

261 Copyright © Acronis International GmbH, 2002-2012 Renew a subscription Assign a subscription that has the same storage quota as the current, ac

Page 182 - 10 Disk management

262 Copyright © Acronis International GmbH, 2002-2012 14 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system

Page 183

263 Copyright © Acronis International GmbH, 2002-2012 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Acronis U

Page 184 - 10.6 Disk operations

264 Copyright © Acronis International GmbH, 2002-2012 Backup operation An operation that creates a copy of the data that exists on a machine's

Page 185 - 10.6.2 Basic disk cloning

265 Copyright © Acronis International GmbH, 2002-2012 Bootable agent A bootable rescue utility that includes most of the functionality of the Acron

Page 186 - Using advanced options

266 Copyright © Acronis International GmbH, 2002-2012 Centralized management Management of the Acronis Backup & Recovery 11.5 infrastructure th

Page 187

267 Copyright © Acronis International GmbH, 2002-2012 Having connected the console to the management server, the administrator sets up centralized

Page 188

268 Copyright © Acronis International GmbH, 2002-2012 Direct management An operation that is performed on a managed machine (p. 272) using the dire

Page 189 - System disk conversion

269 Copyright © Acronis International GmbH, 2002-2012 and the foreign disks so that they form a single entity. A foreign group is imported as is (w

Page 190 - 10.7 Volume operations

27 Copyright © Acronis International GmbH, 2002-2012 Dependencies on other services Acronis Managed Machine Service depends on the following standa

Page 191

270 Copyright © Acronis International GmbH, 2002-2012  IP address range  Listed in txt/csv file. A machine remains in a dynamic group as long a

Page 192 - Select destination disks

271 Copyright © Acronis International GmbH, 2002-2012 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 264) aimed to maintain the optima

Page 193 - Set the volume options

272 Copyright © Acronis International GmbH, 2002-2012  A volume, information about which is stored in the extended partition table. (In contrast

Page 194 - 10.7.2 Delete volume

273 Copyright © Acronis International GmbH, 2002-2012 P Personal vault A local or networked vault (p. 275) created using direct management (p. 267

Page 195 - 10.7.4 Change volume letter

274 Copyright © Acronis International GmbH, 2002-2012 S Static group A group of machines which a management server (p. 272) administrator populates

Page 196 - 10.7.6 Format volume

275 Copyright © Acronis International GmbH, 2002-2012 Validation of a file backup imitates recovery of all files from the backup to a dummy destina

Page 197 - 10.8 Pending operations

28 Copyright © Acronis International GmbH, 2002-2012  you need the possibility to roll back to any one of multiple saved states  the data chang

Page 198 - Back up entire machines

29 Copyright © Acronis International GmbH, 2002-2012 The following items are not included in a disk or volume backup (as well as in a file-level ba

Page 199 - Truncating transaction logs

3 Copyright © Acronis International GmbH, 2002-2012 Copyright Statement Copyright © Acronis International GmbH, 2002-2012. All rights reserved. 

Page 200

30 Copyright © Acronis International GmbH, 2002-2012  Over any type of existing volume.  To unallocated space of a disk group.  To unallocate

Page 201 - Exchange 2007

31 Copyright © Acronis International GmbH, 2002-2012 Preparing disk groups and volumes Before recovering dynamic volumes to bare metal you should c

Page 202 - Exchange 2003

32 Copyright © Acronis International GmbH, 2002-2012 Common installation rule The strong recommendation is to install the encryption software bef

Page 203

33 Copyright © Acronis International GmbH, 2002-2012 Syntax: OctetString The value contains the text description of the event (it looks identical t

Page 204

34 Copyright © Acronis International GmbH, 2002-2012 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup

Page 205

35 Copyright © Acronis International GmbH, 2002-2012 plan. The default archive name is Archive(N) where N is the sequence number of the archive in

Page 206

36 Copyright © Acronis International GmbH, 2002-2012 Plan parameters Plan name [Optional] Enter a unique name for the backup plan. A conscious name

Page 207 - Considerations for backup

37 Copyright © Acronis International GmbH, 2002-2012 Available if Acronis Backup & Recovery 11.5 Agent for Windows or Acronis Backup & Reco

Page 208

38 Copyright © Acronis International GmbH, 2002-2012 Note: Exclusions override selection of data items to back up. For example, if you select to ba

Page 209

39 Copyright © Acronis International GmbH, 2002-2012 Exclusion examples Criterion Example Description Windows and Linux By name F.log F Excludes al

Page 210 - To attach a database

4 Copyright © Acronis International GmbH, 2002-2012 Table of contents 1 Introducing Acronis Backup & Recovery 11.5 ...

Page 211

40 Copyright © Acronis International GmbH, 2002-2012 Backing up to an existing archive You can configure the backup plan to back up to an existing

Page 212 - Steps to perform

41 Copyright © Acronis International GmbH, 2002-2012 Destination Details RDX, USB To back up data to an RDX drive or USB flash drive, expand

Page 213 - Recovery vs. re-creation

42 Copyright © Acronis International GmbH, 2002-2012 2. Click OK. Warning: According to the original FTP specification, credentials required for a

Page 214

43 Copyright © Acronis International GmbH, 2002-2012 Backup type To access this setting, click Show backup type, 2nd location, validation, convert

Page 215 - Replication and USNs

44 Copyright © Acronis International GmbH, 2002-2012 Weekly/Monthly Specifies which of the days selected in the Back up on field you want to reserv

Page 216 - USN rollback

45 Copyright © Acronis International GmbH, 2002-2012 available through next Sunday, January 8; the first weekly backup, the one of Saturday, Januar

Page 217

46 Copyright © Acronis International GmbH, 2002-2012  Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays,

Page 218

47 Copyright © Acronis International GmbH, 2002-2012 Clean up archive Specifies how to get rid of old backups: either to apply retention rules (p.

Page 219

48 Copyright © Acronis International GmbH, 2002-2012 Here, all parameters except Schedule in Full backup are left empty. All backups in the archive

Page 220

49 Copyright © Acronis International GmbH, 2002-2012 By default, a backup is not deleted as long as it has dependent backups that must be kept. For

Page 221 - 12.1 Backup plans and tasks

5 Copyright © Acronis International GmbH, 2002-2012 4.4 Scheduling ...

Page 222

50 Copyright © Acronis International GmbH, 2002-2012 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have

Page 223

51 Copyright © Acronis International GmbH, 2002-2012 On day 14, the interval is five days. It increases on subsequent days before decreasing again,

Page 224

52 Copyright © Acronis International GmbH, 2002-2012 not corrupted and can be successfully recovered, think of starting the validation right after

Page 225 - 12.1.2.4 Task statuses

53 Copyright © Acronis International GmbH, 2002-2012 Let's assume you migrate your office or datacenter to a virtual environment. By using thi

Page 226 - Adjusting credentials

54 Copyright © Acronis International GmbH, 2002-2012 Other Operating System (64 bit) otherGuest64 Example 

Page 227 - How to modify credentials

55 Copyright © Acronis International GmbH, 2002-2012  Setting up full, incremental and differential backups within a single backup plan. You need

Page 228 - Example

56 Copyright © Acronis International GmbH, 2002-2012 4.3.2 Backup splitting and simplified file naming When a backup is split according to backup

Page 229 - Editing the export file

57 Copyright © Acronis International GmbH, 2002-2012  You want to perform hourly backups of your server's critical files every day.  You w

Page 230 - 12.1.5 Backup plan details

58 Copyright © Acronis International GmbH, 2002-2012  You want to swap the drives each Monday so that one drive contains backups of the current w

Page 231

59 Copyright © Acronis International GmbH, 2002-2012  The 10 differential backups of January 31, 2012, will be stored as ServerFiles[2012-01-31]2

Page 232 - 12.2 Log

6 Copyright © Acronis International GmbH, 2002-2012 5.5 Bootability troubleshooting ...

Page 233 - 12.3 Alerts

60 Copyright © Acronis International GmbH, 2002-2012 User is idle (a screen saver is running or the machine is locked) Location's host is avai

Page 234 - 12.4 Changing a license

61 Copyright © Acronis International GmbH, 2002-2012 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's

Page 235 - 12.6.1 Additional settings

62 Copyright © Acronis International GmbH, 2002-2012 task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In thi

Page 236 - 12.6.3 Alerts

63 Copyright © Acronis International GmbH, 2002-2012 Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending af

Page 237 - 12.6.4 E-mail settings

64 Copyright © Acronis International GmbH, 2002-2012  Sunday: once at 9 PM Combining the identical times, the following three schedules can be ad

Page 238 - 12.6.5 Event tracing

65 Copyright © Acronis International GmbH, 2002-2012 From: <...> Set up a date when this schedule will be enabled (an effective date). If thi

Page 239 - 12.6.5.3 Windows event log

66 Copyright © Acronis International GmbH, 2002-2012 Suppose that the task goes into effect on 11/01/2009.  During northern winter, the task runs

Page 240 - 12.6.7 Online backup proxy

67 Copyright © Acronis International GmbH, 2002-2012 Event source Specifies the event source, which typically indicates the program or the system c

Page 241

68 Copyright © Acronis International GmbH, 2002-2012 Tip: To set up a similar backup plan for machines running Microsoft Windows XP, replace the te

Page 242 - 13 Online backup

69 Copyright © Acronis International GmbH, 2002-2012 Set the schedule, conditions and the Task start conditions backup option as follows:  Schedu

Page 243

7 Copyright © Acronis International GmbH, 2002-2012 8.3.4 Volume selection ...

Page 244

70 Copyright © Acronis International GmbH, 2002-2012 (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on

Page 245 - 13.1.6 Initial Seeding FAQ

71 Copyright © Acronis International GmbH, 2002-2012 4.4.5.4 User logged off Applies to: Windows Enables to put a backup task run on hold until al

Page 246

72 Copyright © Acronis International GmbH, 2002-2012  Replicate (copy) each backup to a second location immediately after creation.  Retain the

Page 247 - Packaging

73 Copyright © Acronis International GmbH, 2002-2012 Initial seeding (p. 51) No No No Notes:  Setting up both copying and moving backups from the

Page 248

74 Copyright © Acronis International GmbH, 2002-2012 If allowed by the backup scheme, you can also specify when to automatically delete the backups

Page 249

75 Copyright © Acronis International GmbH, 2002-2012 You can choose to apply the retention rules before creating a backup, after creating a backup,

Page 250

76 Copyright © Acronis International GmbH, 2002-2012 The outdated backup (marked with the icon) will be kept until all backups that depend on it

Page 251

77 Copyright © Acronis International GmbH, 2002-2012 4.5.6 Usage examples This section provides examples of how you can replicate backups and set

Page 252

78 Copyright © Acronis International GmbH, 2002-2012 Consider the following scenario:  You want to occasionally back up your machine to a local f

Page 253 - To renew a subscription

79 Copyright © Acronis International GmbH, 2002-2012 You can also customize a default option itself by changing its value against the pre-defined o

Page 254 - 13.2 Where do I start?

8 Copyright © Acronis International GmbH, 2002-2012 11.2.2 Accessing SQL Server databases from a disk backup ...

Page 255 - Trial subscriptions

80 Copyright © Acronis International GmbH, 2002-2012 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk back

Page 256

81 Copyright © Acronis International GmbH, 2002-2012 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk back

Page 257

82 Copyright © Acronis International GmbH, 2002-2012 For example, if the machine boots from a hard disk drive by default and you select this check

Page 258 - Web browser

83 Copyright © Acronis International GmbH, 2002-2012 If you select Full cataloging, the backup contents are cataloged to the highest possible level

Page 259 - 13.8 Terminology reference

84 Copyright © Acronis International GmbH, 2002-2012  Normal  to run the backup process with normal speed, allocating resources on a par with ot

Page 260

85 Copyright © Acronis International GmbH, 2002-2012 This option is not effective when the backup destination is a managed vault or Acronis Online

Page 261 - Unassign a subscription

86 Copyright © Acronis International GmbH, 2002-2012 The option defines the level of compression applied to the data being backed up. The preset is

Page 262 - 14 Glossary

87 Copyright © Acronis International GmbH, 2002-2012 2. Enter the e-mail address in the E-mail Address field. You can enter several e-mail address

Page 263

88 Copyright © Acronis International GmbH, 2002-2012 This option is not available when operating under the bootable media. The option defines wheth

Page 264 - Backup scheme

89 Copyright © Acronis International GmbH, 2002-2012  Errors only  Do not log - to disable logging events of the backup operations in the Appli

Page 265 - Centralized backup plan

9 Copyright © Acronis International GmbH, 2002-2012 13.3 Choosing a subscription ...

Page 266 - Cleanup

90 Copyright © Acronis International GmbH, 2002-2012 Simply ignore this option if you do not use the encryption. Enable the option if encrypted fil

Page 267 - Differential backup

91 Copyright © Acronis International GmbH, 2002-2012 you are planning to use Acronis One-Click Restore, include all the volumes in the backup. Any

Page 268 - Disk group

92 Copyright © Acronis International GmbH, 2002-2012 When this option is set to Enable, snapshots of all volumes being backed up will be created si

Page 269 - Dynamic group

93 Copyright © Acronis International GmbH, 2002-2012 b. Use encryption  you can opt for encrypted connection to the mail server. SSL and TLS encr

Page 270 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2012 Pre-backup command Backup Post-backup command Examples of how you can use the pre/post command

Page 271

95 Copyright © Acronis International GmbH, 2002-2012 4.6.17.2 Post-backup command To specify a command/executable file to be executed after the ba

Page 272 - Media builder

96 Copyright © Acronis International GmbH, 2002-2012 4.6.18.1 Pre-data capture command To specify a command/batch file to be executed before data

Page 273

97 Copyright © Acronis International GmbH, 2002-2012 Result Preset Continue the backup only after the command is successfully executed. Delete the

Page 274

98 Copyright © Acronis International GmbH, 2002-2012 This option determines the program behavior when any of the backup plan's tasks fails. Th

Page 275 - Virtual machine

99 Copyright © Acronis International GmbH, 2002-2012 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might b

Comments to this Manuals

No comments