ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User's Guide

Browse online or download User's Guide for Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition. Acronis Backup & Recovery 10 Advanced Server Virtual Edition User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 389
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User's Guide

User's Guide Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition

Page 2

10 Copyright © Acronis, Inc., 2000-2010 4. Ensure that the backup plans you create use the managed vault as destination for the backup archives. 

Page 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 used for verification purposes. With this two-level security, the backup data is protected from any unauth

Page 4

Copyright © Acronis, Inc., 2000-2010 101 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable m

Page 5

102 Copyright © Acronis, Inc., 2000-2010 Perform the backup only after the command is successfully executed. Fail the task if the command execution

Page 6

Copyright © Acronis, Inc., 2000-2010 103  Execute after the data capture 2. Do any of the following:  Click Edit to specify a new command or a

Page 7

104 Copyright © Acronis, Inc., 2000-2010 Do not back up until the command execution is complete Selected Selected Cleared Cleared Result Preset

Page 8 - 1.2 Getting started

Copyright © Acronis, Inc., 2000-2010 105 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously

Page 9

106 Copyright © Acronis, Inc., 2000-2010 compressed files, such as .jpg, .pdf or .mp3. However, formats such as .doc or .xls will be compressed wel

Page 10 - Name Description

Copyright © Acronis, Inc., 2000-2010 107 Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operatin

Page 11 - "Navigation" pane

108 Copyright © Acronis, Inc., 2000-2010 2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can en

Page 12 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2010 109 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple

Page 13 - Actions

Copyright © Acronis, Inc., 2000-2010 11 Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate to the different

Page 14 - Operations with panes

110 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects

Page 15 - Action pages

Copyright © Acronis, Inc., 2000-2010 111 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a

Page 16 - Navigation buttons

112 Copyright © Acronis, Inc., 2000-2010 To completely eliminate this kind of problem, disable preserving file security settings in archives. The r

Page 17 - 1.3.1 Agent for Windows

Copyright © Acronis, Inc., 2000-2010 113 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se

Page 18 - 1.3.3 Agent for ESX/ESXi

114 Copyright © Acronis, Inc., 2000-2010 You might have to provide the access credentials for the secondary destination. Enter the credentials on p

Page 19 - Management Server

Copyright © Acronis, Inc., 2000-2010 115 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up dat

Page 20 - Storage Node

116 Copyright © Acronis, Inc., 2000-2010 Separate tape set is a tape set which contains only backups of the specific protected data. Other backups

Page 21 - 1.3.5 Management Console

Copyright © Acronis, Inc., 2000-2010 117 Additional settings Specify the additional settings for the backup operation by selecting or clearing the

Page 22 - 1.4 Supported file systems

118 Copyright © Acronis, Inc., 2000-2010 Restart the machine automatically after backup is finished This option is available only when operating un

Page 23

Copyright © Acronis, Inc., 2000-2010 119 3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is

Page 24 - 1.6 System requirements

12 Copyright © Acronis, Inc., 2000-2010  Dashboard. Use this view to estimate at a glance whether the data is successfully protected on the mach

Page 25 - 1.7 Technical support

120 Copyright © Acronis, Inc., 2000-2010 Check file system after recovery + - + - + - Reboot machine automatically if it is required for recov

Page 26 - 2.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 121 4. Depending on the result you want to obtain, select the appropriate options as described in the table b

Page 27

122 Copyright © Acronis, Inc., 2000-2010 To specify the recovery process priority Select one of the following:  Low – to minimize resources taken

Page 28 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2010 123  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types

Page 29

124 Copyright © Acronis, Inc., 2000-2010 Windows event log This option is effective only in Windows operating systems. This option is not availab

Page 30 - Windows

Copyright © Acronis, Inc., 2000-2010 125  Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Er

Page 31 - 2.3 Owners and credentials

126 Copyright © Acronis, Inc., 2000-2010 This option defines whether to validate a backup to ensure that the backup is not corrupted, before data i

Page 32 - Full backup

Copyright © Acronis, Inc., 2000-2010 127 Recovery to an existing virtual machine is not possible if the machine is online, and so the machine is po

Page 33 - Differential backup

Copyright © Acronis, Inc., 2000-2010 128 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i

Page 34 - 2.5 GFS backup scheme

Copyright © Acronis, Inc., 2000-2010 129 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau

Page 35

Copyright © Acronis, Inc., 2000-2010 13 All actions can also be accessed in the respective menu items. A menu item appears on the menu bar when you

Page 36 - The resulting archive: real

130 Copyright © Acronis, Inc., 2000-2010 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.

Page 37

Copyright © Acronis, Inc., 2000-2010 131 Operations with backups (p. 162) Filtering and sorting archives (p. 163) Bars of the "Actions and too

Page 38 - Tower of Hanoi by Acronis

132 Copyright © Acronis, Inc., 2000-2010 another storage node. Explore an unmanaged vault 1. Select the unmanaged vault. 2. Click Explore. The

Page 39 - 2.7 Retention rules

Copyright © Acronis, Inc., 2000-2010 133 Path (p. 133) Specify where the vault will be created. Managed centralized vaults can reside on a network

Page 40 - 1. Delete backups older than

134 Copyright © Acronis, Inc., 2000-2010 To create a new folder for the database, click Create folder. 2. Click OK. When choosing a folder for th

Page 41 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2010 135 Enter the distinctive description of the vault. Type Select the Unmanaged type. Path (p. 135) Specify whe

Page 42 - Backing up dynamic volumes

136 Copyright © Acronis, Inc., 2000-2010 For the vault that was encrypted, provide the encryption password. After you have performed all the requir

Page 43 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2010 137 Hardware A tape library (robotic library) is a high-capacity storage device that contains the following: 

Page 44

138 Copyright © Acronis, Inc., 2000-2010 System media pools include Free pool, Import pool and Unrecognized pool. The System pools hold media that

Page 45

Copyright © Acronis, Inc., 2000-2010 139 1. Click Administrative Tools > Server Manager > Features > Add Feature. 2. Select the Removabl

Page 46 - Software RAID arrays

14 Copyright © Acronis, Inc., 2000-2010 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the

Page 47 - Virtual machines backup

140 Copyright © Acronis, Inc., 2000-2010 It should be noted, these functions have some specific features for a tape library. So the Edit operation

Page 48 - Guest operating systems

Copyright © Acronis, Inc., 2000-2010 141 When recovering, you start creating a recovery task, select the tape device vault, and select the archive

Page 49 - Troubleshooting

142 Copyright © Acronis, Inc., 2000-2010 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage

Page 50 - 2.12 Tape support

Copyright © Acronis, Inc., 2000-2010 143 To define your own label for a tape, select a related data field, type in a new label, click Eject tape, w

Page 51 - 2.13.1 Acronis Secure Zone

144 Copyright © Acronis, Inc., 2000-2010 Always use a free tape If you leave the options below unchanged, then each backup will be written onto the

Page 52 - Limitation

Copyright © Acronis, Inc., 2000-2010 145 If your backup archive must provide recovery with daily resolution for the last several days, weekly resol

Page 53 - Universal Restore)

146 Copyright © Acronis, Inc., 2000-2010 Weekly/differential backups (40 GB) are displayed as a blue rectangle: . Any full monthly backup (320 GB)

Page 54 - Getting Universal Restore

Copyright © Acronis, Inc., 2000-2010 147 loaded especially for backing up the data. The tape is marked with number 01 in the figure below. In accor

Page 55 - Usage scenarios

148 Copyright © Acronis, Inc., 2000-2010 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f

Page 56 - 2.14.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 149 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and

Page 57

Copyright © Acronis, Inc., 2000-2010 15 Common way of working with views Generally, every view contains a table of items, a table toolbar with butt

Page 58

150 Copyright © Acronis, Inc., 2000-2010 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup

Page 59 - Protecting the servers

Copyright © Acronis, Inc., 2000-2010 151 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF

Page 60 - Protecting the workstations

152 Copyright © Acronis, Inc., 2000-2010 The main drawback is the large number of required tapes that is used 5-10%. If we have to keep a daily bac

Page 61 - Dynamic grouping criteria

Copyright © Acronis, Inc., 2000-2010 153  the Use a separate tape set option is selected  the Always use a free tape: For each full backup opti

Page 62 - Using custom groups

154 Copyright © Acronis, Inc., 2000-2010  the Use a separate tape set option is selected  the Always use a free tape: For each full backup opti

Page 63

Copyright © Acronis, Inc., 2000-2010 155  the Always use a free tape: For each full backup option is selected  the Always use a free tape: For

Page 64 - Policy on a group

156 Copyright © Acronis, Inc., 2000-2010  compression level specified for backing up the data  tape rotation scheme ( frequency of backups, ret

Page 65 - Operations with a machine

Copyright © Acronis, Inc., 2000-2010 157  compression level provides CL average reduction coefficient  selected tape rotation scheme is Custom

Page 66 - Inheritance of policies

158 Copyright © Acronis, Inc., 2000-2010 node cannot be read by an agent in a locally attached tape device. However the storage node can read tapes

Page 67

Copyright © Acronis, Inc., 2000-2010 159 Vault toolbar The toolbar contains operational buttons that let you perform operations with the selected p

Page 68

16 Copyright © Acronis, Inc., 2000-2010 the available fields are displayed. You can switch between the views by selecting the Advanced view check b

Page 69 - Policy status on a machine

160 Copyright © Acronis, Inc., 2000-2010 The following is a guideline for you to perform operations with personal vaults. To Do Create a personal

Page 70 - Policy status on a group

Copyright © Acronis, Inc., 2000-2010 161 Merging and moving personal vaults What if I need to move the existing vault from a one place to another?

Page 71 - 2.14.6 Deduplication

162 Copyright © Acronis, Inc., 2000-2010 or multiple archives 2. Click Delete. The program duplicates your selection in the Backups deletion (p.

Page 72 - How deduplication works

Copyright © Acronis, Inc., 2000-2010 163 if need be (select the check boxes for the desired backups), then confirm the deletion. Delete all archive

Page 73 - Deduplication best practices

164 Copyright © Acronis, Inc., 2000-2010 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar

Page 74 - Deduplication restrictions

Copyright © Acronis, Inc., 2000-2010 165 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Page 75 - Local connection

166 Copyright © Acronis, Inc., 2000-2010 The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not

Page 76 - Remote connection

Copyright © Acronis, Inc., 2000-2010 167 1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on t

Page 77 - Example 1

168 Copyright © Acronis, Inc., 2000-2010 From: 09/20/2009. To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:0

Page 78 - Acronis security groups

Copyright © Acronis, Inc., 2000-2010 169 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009.

Page 79 - On a domain controller

Copyright © Acronis, Inc., 2000-2010 17 Console The console provides Graphical User Interface and remote connection to the agents and other Acronis

Page 80

170 Copyright © Acronis, Inc., 2000-2010 From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1. Every

Page 81 - Rights for Acronis services

Copyright © Acronis, Inc., 2000-2010 171 Advanced scheduling settings (p. 174) are available only for machines registered on Acronis Backup & R

Page 82 - Secure communication

172 Copyright © Acronis, Inc., 2000-2010  During northern summer, the task runs every first and fifteenth of every month at 10 PM. Thus, the foll

Page 83 - Remote Agent ports

Copyright © Acronis, Inc., 2000-2010 173 Specifies the event type: Error, Warning, Information, Audit success, or Audit failure. Event ID Specifies

Page 84 - Server Encryption options

174 Copyright © Acronis, Inc., 2000-2010 2. In the Computer Management console, expand System Tools, and then expand Event Viewer. 3. In Event Vi

Page 85 - Network port configuration

Copyright © Acronis, Inc., 2000-2010 175 Run the task: Daily Once at: 09:00:00 AM Distribute start time within the time window Maximum delay: 1 Hou

Page 86 - SSL certificates

176 Copyright © Acronis, Inc., 2000-2010 task anyway. With this setting, the program will automatically handle the situation when the conditions ar

Page 87 - Non-self-signed certificates

Copyright © Acronis, Inc., 2000-2010 177 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&ap

Page 88 - 3 Options

178 Copyright © Acronis, Inc., 2000-2010 In this case, whether and when the task will run depends on the task start conditions:  If the task star

Page 89 - 3.1.5 Fonts

Copyright © Acronis, Inc., 2000-2010 179 (2) if the free space changes by more than 1GB after 12 hours pass since the last backup successful comple

Page 90 - 3.2.2 Log cleanup rules

18 Copyright © Acronis, Inc., 2000-2010 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Back

Page 91 - 3.2.3 Event tracing

Copyright © Acronis, Inc., 2000-2010 180 6 Direct management This section covers operations that can be performed directly on a managed machine by

Page 92 - 3.2.6 VM protection options

Copyright © Acronis, Inc., 2000-2010 181 Please make sure you have a valid license on Acronis License Server. working. Trial version of product ex

Page 93 - 3.3 Machine options

182 Copyright © Acronis, Inc., 2000-2010 Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "War

Page 94 - 3.3.2 Event tracing

Copyright © Acronis, Inc., 2000-2010 183  Use the Information panel to review detailed information on the selected plan (task). The panel is coll

Page 95

184 Copyright © Acronis, Inc., 2000-2010 Otherwise, see 2 following:  Remove the reason of the failure -> [optionally] Start the failed task m

Page 96 - 3.3.3 Log cleanup rules

Copyright © Acronis, Inc., 2000-2010 185 The user can stop a running task or a task that needs interaction. The task changes to the Stopping state

Page 97

186 Copyright © Acronis, Inc., 2000-2010 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you

Page 98

Copyright © Acronis, Inc., 2000-2010 187 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Page 99 - Archive protection

188 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Page 100 - Source files exclusion

Copyright © Acronis, Inc., 2000-2010 189 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Page 101 - Pre-backup command

Copyright © Acronis, Inc., 2000-2010 19 Management Server Acronis Backup & Recovery 10 Management Server is the central server that drives data

Page 102 - Post-backup command

190 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Page 103 - Post-data capture command

Copyright © Acronis, Inc., 2000-2010 191 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove

Page 104 - File-level backup snapshot

192 Copyright © Acronis, Inc., 2000-2010 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Page 105 - Compression level

Copyright © Acronis, Inc., 2000-2010 193 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m

Page 106 - HDD writing speed

194 Copyright © Acronis, Inc., 2000-2010 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click

Page 107 - Notifications

Copyright © Acronis, Inc., 2000-2010 195 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d

Page 108 - Messenger service (WinPopup)

196 Copyright © Acronis, Inc., 2000-2010 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo

Page 109 - SNMP notifications

Copyright © Acronis, Inc., 2000-2010 197 After any of the settings is changed against the default value, a new line that displays the newly set val

Page 110 - Backup splitting

198 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Run under the current user The tasks will run u

Page 111 - File-level security

Copyright © Acronis, Inc., 2000-2010 199 Backing up a virtual machine means backing up all the machine's disks plus the machine configuration.

Page 112 - Error handling

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Page 113 - Dual destination

20 Copyright © Acronis, Inc., 2000-2010 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various r

Page 114 - Task start conditions

200 Copyright © Acronis, Inc., 2000-2010 Linux A volume backup stores all files and folders of the selected volume independent of their attributes,

Page 115 - Tape support

Copyright © Acronis, Inc., 2000-2010 201 Selecting a virtual machine's disks and volumes To back up individual disks or volumes within a virtu

Page 116 - Always use a free tape

202 Copyright © Acronis, Inc., 2000-2010 To specify which files and folders to exclude: Set up any of the following parameters:  Exclude all hidd

Page 117 - Additional settings

Copyright © Acronis, Inc., 2000-2010 203 Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a

Page 118 - Use FTP in Active mode

204 Copyright © Acronis, Inc., 2000-2010 2. Applying multiple retention rules to an archive makes the archive content in some way unpredictable. S

Page 119

Copyright © Acronis, Inc., 2000-2010 205 rollback period by deleting the expired backups and keeping the most recent backups of each level.  Cust

Page 120 - Pre-recovery command

206 Copyright © Acronis, Inc., 2000-2010 Mo Tu We Th Fr Sa Su Jan 1—Jan 7 D D D D W - - Jan 8—Jan 14 D D D D W - - Jan 15—Jan 2

Page 121 - Recovery priority

Copyright © Acronis, Inc., 2000-2010 207 Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that m

Page 122

208 Copyright © Acronis, Inc., 2000-2010 Work schedule Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thurs

Page 123

Copyright © Acronis, Inc., 2000-2010 209 Tower of Hanoi scheme At a glance  Up to 16 levels of full, differential, and incremental backups  Nex

Page 124

Copyright © Acronis, Inc., 2000-2010 21 If the archive is already encrypted by the agent, the storage node-side encryption is applied over the encr

Page 125

210 Copyright © Acronis, Inc., 2000-2010 Roll-back period The number of days we can go back in the archive is different on different days. The mini

Page 126 - VM power management

Copyright © Acronis, Inc., 2000-2010 211 Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perfor

Page 127

212 Copyright © Acronis, Inc., 2000-2010 Cleanup schedule (only if On schedule is selected) Specifies a schedule for archive cleanup. For example,

Page 128 - 4 Vaults

Copyright © Acronis, Inc., 2000-2010 213 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup

Page 129 - 4.1 Centralized vaults

214 Copyright © Acronis, Inc., 2000-2010 2. What to validate – select either to validate the entire archive or the latest backup in the archive. V

Page 130 - Vault content

Copyright © Acronis, Inc., 2000-2010 215 integration is enabled, such machines appear as unmanageable. A backup policy cannot be applied to them. 

Page 131

216 Copyright © Acronis, Inc., 2000-2010 A dynamic volume can be recovered over an existing volume, to unallocated space of a disk group, or to una

Page 132

Copyright © Acronis, Inc., 2000-2010 217 machine becomes operational and ready to provide necessary services. The data required to serve incoming r

Page 133 - Vault database path

218 Copyright © Acronis, Inc., 2000-2010  Run under the current user The task will run under the credentials with which the user who starts the t

Page 134 - Vault encryption

Copyright © Acronis, Inc., 2000-2010 219  If the archive is stored on a locally attached tape device, expand the Tape drives group, then click th

Page 135 - Attaching a managed vault

22 Copyright © Acronis, Inc., 2000-2010 1.3.7 Acronis Wake-On-LAN Proxy Acronis Wake-On-LAN Proxy enables Acronis Backup & Recovery 10 Managem

Page 136 - 4.1.3 Tape libraries

220 Copyright © Acronis, Inc., 2000-2010 Files selection To select a backup and files to recover: 1. Select one of the successive backups by its c

Page 137 - RSM Media Pools

Copyright © Acronis, Inc., 2000-2010 221 The selected disks will be recovered to the physical disks of the machine the console is connected to. On

Page 138 - Prerequisites

222 Copyright © Acronis, Inc., 2000-2010 volumes on the second disk will lose their letters, all paths will be invalid on the disk, and programs wo

Page 139

Copyright © Acronis, Inc., 2000-2010 223 On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed

Page 140 - Recovering from tape library

224 Copyright © Acronis, Inc., 2000-2010 Tip: A volume cannot be resized when being recovered from a backup split into multiple removable media. To

Page 141 - Inventory

Copyright © Acronis, Inc., 2000-2010 225 To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the

Page 142 - Labeling

226 Copyright © Acronis, Inc., 2000-2010 multicore host CPU or hyperthreading may enable multiple virtual processors on a single-processor host. F

Page 143

Copyright © Acronis, Inc., 2000-2010 227  Overwrite existing file if it is older - this will give priority to the most recent file modification,

Page 144 - Choosing a backup scheme

228 Copyright © Acronis, Inc., 2000-2010 Preparation Before recovering Windows to dissimilar hardware, make sure that you have the drivers for the

Page 145 - Case to analyze

Copyright © Acronis, Inc., 2000-2010 229 When recovering the system to an existing virtual machine that uses SCSI hard drive controller, be sure to

Page 146 - GFS Example 1

Copyright © Acronis, Inc., 2000-2010 23  Windows 2000 Server/2000 Advanced Server/Server 2003/Server 2008*  Windows SBS 2003/SBS 2008*  Windo

Page 147

230 Copyright © Acronis, Inc., 2000-2010 10. In When to recover, specify when to start the recovery task. 11. [Optionally] Review Recovery options

Page 148

Copyright © Acronis, Inc., 2000-2010 231 several sectors of the disk and on the file system to which direct access is possible. In other cases, the

Page 149 - GFS Example 2

232 Copyright © Acronis, Inc., 2000-2010 vi /mnt/system/boot/grub/menu.lst 6. In the menu.lst file (respectively grub.conf), find the menu item th

Page 150

Copyright © Acronis, Inc., 2000-2010 233 [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)d

Page 151 - GFS Example 3

234 Copyright © Acronis, Inc., 2000-2010  Recover the files as two or more groups. For example, if the problem occurs when recovering 1 million f

Page 152 - ToH Example 1

Copyright © Acronis, Inc., 2000-2010 235 2. Add the storage node to the management server again, by specifiying the machine on which the recovered

Page 153 - ToH Example 2

236 Copyright © Acronis, Inc., 2000-2010 Access Credentials (p. 238) [Optional] Provide credentials for accessing the source if the task account do

Page 154 - ToH Example 3

Copyright © Acronis, Inc., 2000-2010 237 Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a

Page 155 - Tape planning

238 Copyright © Acronis, Inc., 2000-2010 Using the archives table To assist you with choosing the right location, the table displays the names of t

Page 156 - Tape planning: Example 2

Copyright © Acronis, Inc., 2000-2010 239 6.5 Mounting an image Mounting volumes from a disk backup (image) lets you access the volumes as though t

Page 157 - What if

24 Copyright © Acronis, Inc., 2000-2010  x64 versions of the above Linux distributions and other Linux distributions are also supported. The agen

Page 158 - 4.2 Personal vaults

240 Copyright © Acronis, Inc., 2000-2010 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis

Page 159

Copyright © Acronis, Inc., 2000-2010 241 Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify

Page 160 - Creating a personal vault

242 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient

Page 161 - 4.3 Common operations

Copyright © Acronis, Inc., 2000-2010 243 When the console is connected to a managed machine, you can export an archive or part of an archive to and

Page 162

244 Copyright © Acronis, Inc., 2000-2010 Backups (p. 245) - specify the archive first, and then select the desired backup(s) in this archive Access

Page 163

Copyright © Acronis, Inc., 2000-2010 245  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Page 164 - To show or hide columns

246 Copyright © Acronis, Inc., 2000-2010  Use the task credentials The program will access the location using the credentials of the task account

Page 165 - 5 Scheduling

Copyright © Acronis, Inc., 2000-2010 247  To export data to a locally attached tape device, expand the Tape drives group, then click the required

Page 166 - 5.1 Daily schedule

248 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Page 167 -  fifth at 7 PM

Copyright © Acronis, Inc., 2000-2010 249 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to select any size between

Page 168 - 5.2 Weekly schedule

Copyright © Acronis, Inc., 2000-2010 25 Agent for Linux 65 MB 150 MB 70 MB Bootable Media Builder 70 MB 240 MB 140 MB Management Console

Page 169

250 Copyright © Acronis, Inc., 2000-2010 As is apparent from the above, setting the maximum possible zone size is not advisable. You will end up wi

Page 170 - 5.3 Monthly schedule

Copyright © Acronis, Inc., 2000-2010 251  dragging the slider and selecting any size between the current and minimum values. The minimum size is

Page 171 - Examples

252 Copyright © Acronis, Inc., 2000-2010 6.10 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media s

Page 172 - Parameters

Copyright © Acronis, Inc., 2000-2010 253 6.10.1 How to create bootable media To enable creating physical media, the machine must have a CD/DVD rec

Page 173

254 Copyright © Acronis, Inc., 2000-2010 3. Install the Microsoft .NET Framework v.2.0 from this kit (NETFXx86 or NETFXx64, depending on your hard

Page 174 - Use Wake-On-LAN

Copyright © Acronis, Inc., 2000-2010 255 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 257). This window appear

Page 175 - 5.6 Conditions

256 Copyright © Acronis, Inc., 2000-2010 nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing

Page 176 - 5.6.1 User is idle

Copyright © Acronis, Inc., 2000-2010 257 customized. When you select an existing NIC in the wizard window, its settings are selected for saving on

Page 177 - 5.6.3 Fits time interval

258 Copyright © Acronis, Inc., 2000-2010 The drivers will be placed in the visible Drivers folder on the bootable media. The drivers are not loaded

Page 178 - 5.6.4 User logged off

Copyright © Acronis, Inc., 2000-2010 259  Adding the Acronis Plug-in to a WIM file for any future purpose (manual ISO building, adding other tool

Page 179

Copyright © Acronis, Inc., 2000-2010 26 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Page 180 - 6 Direct management

260 Copyright © Acronis, Inc., 2000-2010 Building Bart PE with Acronis Plug-in from Windows distribution 1. Get the Bart PE builder. 2. Install B

Page 181 - Activities

Copyright © Acronis, Inc., 2000-2010 261 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. 2. The Linu

Page 182 - Tasks need interaction

262 Copyright © Acronis, Inc., 2000-2010 2. Click Configure iSCSI/NDAS devices (in a Linux-based media) or Run the iSCSI Setup (in a PE-based medi

Page 183 - Backup plan statuses

Copyright © Acronis, Inc., 2000-2010 263 dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap

Page 184 - Task states

264 Copyright © Acronis, Inc., 2000-2010 If disk configuration has changed. An MD device or a logical volume resides on one or more disks, each of

Page 185 - Task statuses

Copyright © Acronis, Inc., 2000-2010 265 6. If you previously mounted the backup by using the trueimagemnt utility, use this utility again to unmo

Page 186 -  Validation task (p. 235)

266 Copyright © Acronis, Inc., 2000-2010 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgroup /dev/md0 /dev/md1 lvm vgdisplay The output of the

Page 187

Copyright © Acronis, Inc., 2000-2010 267 Num Idx Partition Flags Start Size Type ---- --- --------- ----- ----- --------- ------ Disk 1:

Page 188

268 Copyright © Acronis, Inc., 2000-2010 Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supports networ

Page 189

Copyright © Acronis, Inc., 2000-2010 269 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c

Page 190 - Task details

Copyright © Acronis, Inc., 2000-2010 27 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Page 191 - Progress

270 Copyright © Acronis, Inc., 2000-2010 6.11.3 Choosing the operating system for disk management On a machine with two or more operating systems,

Page 192 - Backup plan details

Copyright © Acronis, Inc., 2000-2010 271 6.11.5 Disk operations Acronis Disk Director Lite includes the following operations that can be performed

Page 193 - 6.1.3 Log

272 Copyright © Acronis, Inc., 2000-2010 case, the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the

Page 194 - Configuring the log table

Copyright © Acronis, Inc., 2000-2010 273 (To finish the added operation you will have to commit (p. 283) it. Exiting the program without committing

Page 195 - 6.2 Creating a backup plan

274 Copyright © Acronis, Inc., 2000-2010 2. Right-click on the selected volume, and then click Convert to GPT in the context menu. You will receiv

Page 196 - Backup options

Copyright © Acronis, Inc., 2000-2010 275 If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right

Page 197 - Convert to VM

276 Copyright © Acronis, Inc., 2000-2010 In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when

Page 198 - 6.2.3 Source type

Copyright © Acronis, Inc., 2000-2010 277 The full version of Acronis Disk Director will provide more tools and utilities for working with volumes.

Page 199 - 6.2.4 Items to back up

278 Copyright © Acronis, Inc., 2000-2010 Mirrored-Striped Volume A fault-tolerant volume, also sometimes called RAID 1+0, combining the advantage o

Page 200 - Selecting files and folders

Copyright © Acronis, Inc., 2000-2010 279 To create a basic volume:  Select a destination disk and specify the unallocated space to create the bas

Page 201 - 6.2.6 Exclusions

28 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Page 202 - 6.2.7 Archive

280 Copyright © Acronis, Inc., 2000-2010 The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size

Page 203 - 3. Naming the new archive

Copyright © Acronis, Inc., 2000-2010 281 (To finish the added operation you will have to commit (p. 283) it. Exiting the program without committing

Page 204 - 6.2.9 Backup schemes

282 Copyright © Acronis, Inc., 2000-2010 Change volume label The volume label is an optional attribute. It is a name assigned to a volume for easie

Page 205 - Simple scheme

Copyright © Acronis, Inc., 2000-2010 283 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the

Page 206

Copyright © Acronis, Inc., 2000-2010 284 7 Centralized management This section covers operations that can be performed centrally by using the comp

Page 207

Copyright © Acronis, Inc., 2000-2010 285 less than 10% free space. View vaults will take you to the Centralized vaults (p. 130) view where you can

Page 208

286 Copyright © Acronis, Inc., 2000-2010 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in

Page 209 - Tower of Hanoi scheme

Copyright © Acronis, Inc., 2000-2010 287 Backup policy deployment states A backup policy deployment state is a combination of the policy deployment

Page 210 - Custom backup scheme

288 Copyright © Acronis, Inc., 2000-2010 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e

Page 211

Copyright © Acronis, Inc., 2000-2010 289 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 346). Once the po

Page 212

Copyright © Acronis, Inc., 2000-2010 29 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Page 213 - 6.2.10 Archive validation

290 Copyright © Acronis, Inc., 2000-2010 Filter backup policies by name/owner Type a policy's name / owner's name in the fields below the

Page 214

Copyright © Acronis, Inc., 2000-2010 291 machine (group). View log of the machine (group) Click View log. The Log (p. 321) view will display a lis

Page 215 - 6.3 Recovering data

292 Copyright © Acronis, Inc., 2000-2010 existing machines' properties and will analyze every newly registered machine. The machine that meets

Page 216 - Where to recover

Copyright © Acronis, Inc., 2000-2010 293 In the Import machines from file (p. 297) window, browse for a .txt or .csv file, containing the names (or

Page 217 - 6.3.1 Task credentials

294 Copyright © Acronis, Inc., 2000-2010 actions will be performed on the machine as soon as the machine becomes available to the management server

Page 218 - 6.3.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 295 Note for Virtual Edition users: When adding a VMware ESX/ESXi host, enter the IP of the virtual appliance

Page 219 - 6.3.4 Content selection

296 Copyright © Acronis, Inc., 2000-2010  Deletes and then tries again to add registered machines that are present in the list, but their current

Page 220 - 6.3.6 Destination selection

Copyright © Acronis, Inc., 2000-2010 297  {username password} belong to a user who is a member of the Administrators group on all machines listed

Page 221 - NT signature

298 Copyright © Acronis, Inc., 2000-2010 Once the machines appear in the group, the policy that was applied to the group (if any), is deployed to t

Page 222 - Volumes

Copyright © Acronis, Inc., 2000-2010 299 Backup policies Displays a list of backup policies applied to the selected machine and lets the management

Page 223 - Volume properties

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...7 1.1 A

Page 224 - Properties

30 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Page 225 - Virtual machine settings

300 Copyright © Acronis, Inc., 2000-2010 You will be taken to the Log (p. 193) view containing the list of the plan-related log entries. Click Task

Page 226 - Overwriting

Copyright © Acronis, Inc., 2000-2010 301 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Page 227 - 6.3.9 Universal Restore

302 Copyright © Acronis, Inc., 2000-2010  Task belongs to a backup plan A task belonging to a backup plan cannot be deleted separately from the p

Page 228 - Universal Restore settings

Copyright © Acronis, Inc., 2000-2010 303 You can create a dynamic group based on the list of the hosted virtual machines. To do this, click Create

Page 229

304 Copyright © Acronis, Inc., 2000-2010 Create a custom static or a dynamic group Click Create group. In the Create group (p. 304) window, specif

Page 230

Copyright © Acronis, Inc., 2000-2010 305 All the machines running the selected operating system will be members of the dynamic group.  Organizati

Page 231

306 Copyright © Acronis, Inc., 2000-2010 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it manually. If

Page 232 - About Windows loaders

Copyright © Acronis, Inc., 2000-2010 307 Changing the type of group will result in its conversion. Any custom group can be converted to a dynamic g

Page 233 - Windows Vista/2008

308 Copyright © Acronis, Inc., 2000-2010 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Page 234

Copyright © Acronis, Inc., 2000-2010 309 3. Register (p. 294) the Hyper-V host on the management server. If the machine is already registered, ski

Page 235 - What to validate

Copyright © Acronis, Inc., 2000-2010 31  View and manage backup plans and tasks owned by any user on the machine. Linux When managing a machine r

Page 236 - 6.4.2 Archive selection

310 Copyright © Acronis, Inc., 2000-2010 Grouping of virtual machines The Virtual machines section of the navigation tree contains one built-in gro

Page 237 - 6.4.4 Location selection

Copyright © Acronis, Inc., 2000-2010 311 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an e

Page 238 - 6.4.6 When to validate

312 Copyright © Acronis, Inc., 2000-2010 The management server will use this account to establish a trusted relationship with the agent during regi

Page 239 - 6.5 Mounting an image

Copyright © Acronis, Inc., 2000-2010 313  Server 3 uses storages B, C, D The VA can be deployed to either C or D. If there is no storage shared b

Page 240 - 6.5.3 Access credentials

314 Copyright © Acronis, Inc., 2000-2010 Global Licenses + (required on ESX host only) + (required on ESX host only) + + Network Assign netwo

Page 241 - 6.6 Managing mounted images

Copyright © Acronis, Inc., 2000-2010 315 Privileges for a folder To enable a user to operate within a specific vCenter folder, assign the user the

Page 242

316 Copyright © Acronis, Inc., 2000-2010 To remove Agent for ESX/ESXi automatically: 1. In the Navigation tree, right click the group that has the

Page 243 - What to export

Copyright © Acronis, Inc., 2000-2010 317 3. Add (p. 318) the storage node to the Acronis Backup & Recovery 10 Management Server. 4. Create a

Page 244 - 6.7.2 Archive selection

318 Copyright © Acronis, Inc., 2000-2010 the Information panel), examine information about the storage node and the vaults managed by this node. Yo

Page 245 - 6.7.3 Backup selection

Copyright © Acronis, Inc., 2000-2010 319  Offline - the storage node is unavailable.  Withdrawn - the storage node was registered on another ma

Page 246 - 6.7.5 Location selection

32 Copyright © Acronis, Inc., 2000-2010 You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run unde

Page 247

320 Copyright © Acronis, Inc., 2000-2010 View details of a task Click View details. In the Tasks details (p. 190) window, examine all information

Page 248 - 6.8 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 321 task cannot be deleted. Refresh tasks table Click Refresh. The management console will update the list of

Page 249 - Result confirmation

322 Copyright © Acronis, Inc., 2000-2010 added to the log. When the software executes a task, it adds multiple entries saying what it is currently

Page 250

Copyright © Acronis, Inc., 2000-2010 323 Actions on log entries All the operations described below are performed by clicking the corresponding item

Page 251 - Deleting Acronis Secure Zone

324 Copyright © Acronis, Inc., 2000-2010 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to

Page 252 - 6.10 Bootable media

Copyright © Acronis, Inc., 2000-2010 325  Message - The event text description. The log entry's details that you copy will have the followin

Page 253 - PE-based bootable media

326 Copyright © Acronis, Inc., 2000-2010 The report will contain the information selected, grouped and sorted according to the template settings. T

Page 254

Copyright © Acronis, Inc., 2000-2010 327  Schedule: The types of the backup policies' schedules—Manual and/or Scheduled. Manual schedule mea

Page 255 - Kernel parameters

328 Copyright © Acronis, Inc., 2000-2010 Filters Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter cr

Page 256 - Network settings

Copyright © Acronis, Inc., 2000-2010 329 Report view Under Report view, choose how the report will look:  Select whether to show all items in a s

Page 257 - Network port

Copyright © Acronis, Inc., 2000-2010 33 Example: An Internet cafe, school or university lab where the administrator often undoes changes made by th

Page 258

330 Copyright © Acronis, Inc., 2000-2010  Backup policies (centralized tasks only): The backup policies on which the tasks are based. The default

Page 259

Copyright © Acronis, Inc., 2000-2010 331  By using the graphical user interface (GUI)  By modifying the Windows registry In Linux, instead of u

Page 260

332 Copyright © Acronis, Inc., 2000-2010 http://msdn2.microsoft.com/en-us/library/aa374177.aspx Acronis Backup & Recovery 10 Storage Node Th

Page 261 - Setting up a display mode

Copyright © Acronis, Inc., 2000-2010 333 Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as

Page 262 - Linux commands and utilities

334 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the amount of free space, in megabytes, on the volume containing a managed vault&ap

Page 263

Copyright © Acronis, Inc., 2000-2010 335 Specifies how to clean up the centralized event log stored in the management server's reporting datab

Page 264

336 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the network name or IP address of the SNMP server. Possible values: Any string 0 to

Page 265 - Example

Copyright © Acronis, Inc., 2000-2010 337 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for

Page 266 - Mounting backup volumes

338 Copyright © Acronis, Inc., 2000-2010 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att

Page 267 - 6.10.6 Acronis PXE Server

Copyright © Acronis, Inc., 2000-2010 339 If this setting is 0, the snapshot storage will not be created. The initial size will not exceed the avail

Page 268 - 6.11 Disk management

34 Copyright © Acronis, Inc., 2000-2010 2.5 GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme

Page 269 - 6.11.1 Basic precautions

340 Copyright © Acronis, Inc., 2000-2010 If the value is 0, no reconnection attempts will be performed; the agent will only check for the license a

Page 270 - Displaying operation results

Copyright © Acronis, Inc., 2000-2010 341 Description: Specifies the minimum level of severity of events for sending SNMP notifications about them.

Page 271 - 6.11.5 Disk operations

342 Copyright © Acronis, Inc., 2000-2010 Possible values: Any integer number between 0 and 100 Default value: 50 If this setting is 0, the snapshot

Page 272

Copyright © Acronis, Inc., 2000-2010 343 Authentication parameters Selecting the Trust self-signed certificates check box allows the client to conn

Page 273 - Disk conversion: MBR to GPT

344 Copyright © Acronis, Inc., 2000-2010 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Page 274 - Disk conversion: GPT to MBR

Copyright © Acronis, Inc., 2000-2010 345 Specifies whether the machine where the Acronis Backup & Recovery 10 component is installed will parti

Page 275 - System disk conversion

346 Copyright © Acronis, Inc., 2000-2010 This database contains a list of vaults that are managed by the storage node, other than tape vaults (see

Page 276 - 6.11.6 Volume operations

Copyright © Acronis, Inc., 2000-2010 347 Where to back up Archive (p. 354) Specify the path to the location, where the backup archive will be store

Page 277 - Types of dynamic volumes

348 Copyright © Acronis, Inc., 2000-2010 When to convert (p. 214) [Optional] Specify whether to convert every full, every incremental or every diff

Page 278 - Select destination disks

Copyright © Acronis, Inc., 2000-2010 349 7.3.2 Items to back up Specify selection rules for backing up items, selected in the Source type field of

Page 279 - Set the volume options

Copyright © Acronis, Inc., 2000-2010 35 created on this day of the week will be considered as a monthly backup. Backups created on the other days w

Page 280 - Delete volume

350 Copyright © Acronis, Inc., 2000-2010 All fixed volumes Type or select: [Fixed Volumes] Refers to all volumes other than removable media. Fixe

Page 281 - Change volume letter

Copyright © Acronis, Inc., 2000-2010 351 Operating systems starting from Windows 7 and Windows Server 2008 R2 create a dedicated system volume call

Page 282 - Format volume

352 Copyright © Acronis, Inc., 2000-2010 /dev/mda1 Files to back up selection rules Define file selection rules, according to which the files and

Page 283 - 6.11.7 Pending operations

Copyright © Acronis, Inc., 2000-2010 353 All files on all volumes on a machine [All Files] Points to all files on all volumes of the machine. All

Page 284 - 7 Centralized management

354 Copyright © Acronis, Inc., 2000-2010  Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden at

Page 285

Copyright © Acronis, Inc., 2000-2010 355 Enter the full path to the folder in the Path field. This path will be created on each machine the policy

Page 286 - 7.1.2 Backup policies

356 Copyright © Acronis, Inc., 2000-2010  Password. The password for the account. 2. Click OK. Warning: According to the original FTP specificat

Page 287 - Backup policy statuses

Copyright © Acronis, Inc., 2000-2010 357 The task will be started manually Select this check box, if you do not need to put the backup task on a sc

Page 288 - Actions on backup policies

358 Copyright © Acronis, Inc., 2000-2010 Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies

Page 289 - Machines selection

Copyright © Acronis, Inc., 2000-2010 359  Weekly: 1 month  Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups

Page 290 - Policy details

36 Copyright © Acronis, Inc., 2000-2010 The resulting archive: ideal Assume you select to keep daily backups for 7 days, weekly backups for 2 weeks

Page 291 - 7.1.3 Physical machines

360 Copyright © Acronis, Inc., 2000-2010  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Here, daily incremental backup

Page 292 - Actions on machines

Copyright © Acronis, Inc., 2000-2010 361 levels you select. See the example below for details. Example Schedule parameters are set as follows  Re

Page 293 - Grouping actions

362 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup

Page 294 - Other actions

Copyright © Acronis, Inc., 2000-2010 363 When there is insufficient space while backing up The archive will be cleaned up only during backup and on

Page 295

364 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y

Page 296 - Text file requirements

Copyright © Acronis, Inc., 2000-2010 365 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil

Page 297 - Adding machines to a group

Copyright © Acronis, Inc., 2000-2010 366 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Page 298 - Machine details

Copyright © Acronis, Inc., 2000-2010 367 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e

Page 299 - Plans and tasks

368 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 367), such as pre/post backup commands,

Page 300

Copyright © Acronis, Inc., 2000-2010 369 5. On each machine, the agent installed on the machine creates a backup plan (p. 368) using other rules s

Page 301

Copyright © Acronis, Inc., 2000-2010 37 When using the incremental and differential backup methods, you cannot delete a backup as soon as the schem

Page 302 - Hosted virtual machines

370 Copyright © Acronis, Inc., 2000-2010 built-in group except for deleting the machine from the management server. Virtual machines are deleted as

Page 303 - Actions on groups

Copyright © Acronis, Inc., 2000-2010 371 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 368) that produc

Page 304 -  Operating system

372 Copyright © Acronis, Inc., 2000-2010 operations are configured on the management server (p. 376) and propagated by the server to the managed ma

Page 305 - Adding multiple criteria

Copyright © Acronis, Inc., 2000-2010 373 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with

Page 306 - Editing custom groups

374 Copyright © Acronis, Inc., 2000-2010 Dynamic volume Any volume located on dynamic disks (p. 372), or more precisely, on a disk group (p. 372)

Page 307 - Group details

Copyright © Acronis, Inc., 2000-2010 375 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 369) aimed to maintain the optimal balance bet

Page 308 - 7.1.4 Virtual machines

376 Copyright © Acronis, Inc., 2000-2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n

Page 309

Copyright © Acronis, Inc., 2000-2010 377 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi

Page 310 - VMware vCenter integration

378 Copyright © Acronis, Inc., 2000-2010 Since the cleanup schedule exists on the machine (p. 375) the agent (p. 366) resides on, and therefore use

Page 311

Copyright © Acronis, Inc., 2000-2010 379  the image being recovered is located in Acronis Secure Zone (p. 366) or  when using Acronis Active Re

Page 312 - Support for vCenter clusters

38 Copyright © Acronis, Inc., 2000-2010 Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In th

Page 313

380 Copyright © Acronis, Inc., 2000-2010  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Win

Page 314

Index A A policy on a machine or a group • 66 About Windows loaders • 238 Access credentials • 245, 246 Access credentials for archive location • 20

Page 315 - Removing Agent for ESX/ESXi

382 Copyright © Acronis, Inc., 2000-2010 Archive • 201, 208, 357, 365, 379, 380 Archive protection • 100, 101 Archive selection • 222, 224, 241, 24

Page 316 - 7.1.5 Storage nodes

Copyright © Acronis, Inc., 2000-2010 383 Client and server applications • 83 Cloning method and advanced options • 278 Collecting system informatio

Page 317 - Actions on storage nodes

384 Copyright © Acronis, Inc., 2000-2010 Disk destination • 227 Disk group • 43, 385, 387 Disk initialization • 276, 277 Disk management • 45, 222,

Page 318 - Storage node details

Copyright © Acronis, Inc., 2000-2010 385 How to load Acronis Administrative Template • 84, 341 How to reactivate GRUB and change its configuration

Page 319 - 7.1.6 Tasks

386 Copyright © Acronis, Inc., 2000-2010 Network port configuration • 85, 86 Network settings • 260, 262 Notifications • 110, 125 NT signature • 22

Page 320

Copyright © Acronis, Inc., 2000-2010 387 Recovering the storage node • 240 Recovery exclusions • 232, 233 Recovery point • 388, 390, 391 Recovery p

Page 321 - 7.1.7 Log

388 Copyright © Acronis, Inc., 2000-2010 System requirements • 25 T Tape compatibility table • 51, 140, 141, 162 Tape libraries • 51, 139 Tape libr

Page 322 - Centralized event log

Copyright © Acronis, Inc., 2000-2010 389 Virtual machines • 316 Virtual machines on a management server • 63, 310, 317 VM power management • 49, 13

Page 323 - Actions on log entries

Copyright © Acronis, Inc., 2000-2010 39  incremental backups on first level (A) - to gain time and storage savings for the most frequent backup o

Page 324

2.14.6 Deduplication ...

Page 325 - 7.1.8 Reporting

40 Copyright © Acronis, Inc., 2000-2010 The retention rules are effective if the archive contains more than one backup. This means that the last ba

Page 326 - Report about the machines

Copyright © Acronis, Inc., 2000-2010 41 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Page 327 - Report about the tasks

42 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Page 328 - Report view

Copyright © Acronis, Inc., 2000-2010 43 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Page 329

44 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing

Page 330 - Column selection

Copyright © Acronis, Inc., 2000-2010 45 For detailed instructions on how to recover logical volumes, see Recovering MD devices and logical volumes

Page 331

46 Copyright © Acronis, Inc., 2000-2010 2.10 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recov

Page 332

Copyright © Acronis, Inc., 2000-2010 47 Recovery Parameters of software RAID arrays are not backed up, so they can only be recovered over a basic v

Page 333

48 Copyright © Acronis, Inc., 2000-2010 A virtual machine can be online (running), offline (stopped), suspended, or switch between the three states

Page 334

Copyright © Acronis, Inc., 2000-2010 49  Microsoft Windows 7 Linux platform. Guest HDD The following virtual disk configurations are supported. P

Page 335

5.6.5 Time since last backup ...

Page 336

50 Copyright © Acronis, Inc., 2000-2010 4. Right click the virtual machine and select Install/Upgrate VMware Tools. 5. Follow the onscreen instru

Page 337

Copyright © Acronis, Inc., 2000-2010 51 Backup to a locally attached tape device When creating a backup plan, you are able to select the locally at

Page 338

52 Copyright © Acronis, Inc., 2000-2010 Should the disk experience a physical failure, the zone and the archives located there will be lost. That&a

Page 339

Copyright © Acronis, Inc., 2000-2010 53 Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboo

Page 340

54 Copyright © Acronis, Inc., 2000-2010 1. Instant recovery of a failed system on different hardware. 2. Hardware-independent cloning and deploym

Page 341

Copyright © Acronis, Inc., 2000-2010 55 Universal Restore for the other product editions is purchased separately, has its own license, and is insta

Page 342 - Connection parameters

56 Copyright © Acronis, Inc., 2000-2010 If you opt for Acronis Active Restore, the system will be operational in a short time. Users will be able t

Page 343

Copyright © Acronis, Inc., 2000-2010 57 What if you have to manage hundreds of machines? It takes time to create a backup plan on each machine, whi

Page 344 - Event tracing parameters

58 Copyright © Acronis, Inc., 2000-2010 2.14.2 Setting up centralized data protection in a heterogeneous network Assume that the network infrastru

Page 345 - When to modify

Copyright © Acronis, Inc., 2000-2010 59 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor

Page 346 - What to back up

6.8 Acronis Secure Zone ...248 6.8.1 Cr

Page 347

60 Copyright © Acronis, Inc., 2000-2010 b. select the server c. select the Backup plans and tasks tab on the Information pane. When you need and

Page 348 - 7.3.1 Policy credentials

Copyright © Acronis, Inc., 2000-2010 61  Register the virtual appliance (Agent for ESX/ESXi) on the management server. All virtual machines, exce

Page 349 - 7.3.2 Items to back up

62 Copyright © Acronis, Inc., 2000-2010 Using custom groups Grouping helps the administrator to organize data protection by company departments, by

Page 350

Copyright © Acronis, Inc., 2000-2010 63 a backup policy to the group. Any server, that is added to the network and registered on the management ser

Page 351

64 Copyright © Acronis, Inc., 2000-2010 Operations with groups to which backup policies are applied will result in changing the policies on the mem

Page 352

Copyright © Acronis, Inc., 2000-2010 65 3. A policy applied to a group cannot be revoked from a machine. 4. To revoke the policy from the machine

Page 353 - 7.3.4 Exclusions

66 Copyright © Acronis, Inc., 2000-2010 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a

Page 354 - 7.3.5 Archive

Copyright © Acronis, Inc., 2000-2010 67 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Page 355 - 2. Naming the archives

68 Copyright © Acronis, Inc., 2000-2010 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines

Page 356

Copyright © Acronis, Inc., 2000-2010 69 Backup policy state diagram Policy status on a machine To see this parameter, select any group of machine

Page 357

Copyright © Acronis, Inc., 2000-2010 7 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Page 358

70 Copyright © Acronis, Inc., 2000-2010 /dev/sda1 volume (since the [System] volume is not found). The policy will get the Error status on Linux ma

Page 359

Copyright © Acronis, Inc., 2000-2010 71 Cumulative state and status of a policy In addition to the deployment state and status as related to a spec

Page 360

72 Copyright © Acronis, Inc., 2000-2010 Performed in the vault after a backup is completed. The storage node analyses the vault's archives and

Page 361 - Roll-back period

Copyright © Acronis, Inc., 2000-2010 73 1. It moves the items (disk blocks or files) from the archives to a special folder within the vault, stori

Page 362

74 Copyright © Acronis, Inc., 2000-2010  Indexing of a backup requires that the vault have free space with a minimum size of 1.1 multiplied by th

Page 363

Copyright © Acronis, Inc., 2000-2010 75  If the volume is a compressed volume  If the volume's allocation unit size—also known as cluster

Page 364 - Resulting tasks

76 Copyright © Acronis, Inc., 2000-2010 Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Co

Page 365 - 7.3.8 Archive validation

Copyright © Acronis, Inc., 2000-2010 77 Privileges for remote connection in Windows To establish a remote connection to a machine running Windows,

Page 366 - Glossary

78 Copyright © Acronis, Inc., 2000-2010 2. Add the names of the non-root users, whom you want to allow to connect to the machine remotely, to the

Page 367

Copyright © Acronis, Inc., 2000-2010 79 Acronis Backup & Recovery 10 Management Server When Acronis Backup & Recovery 10 Management Server

Page 368 - Backup policy (Policy)

8 Copyright © Acronis, Inc., 2000-2010 Overview of all configured and running operations with color-coding for successful and failed operations 

Page 369 - Built-in group

80 Copyright © Acronis, Inc., 2000-2010 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10

Page 370 - Cleanup

Copyright © Acronis, Inc., 2000-2010 81 Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Backup & Re

Page 371

82 Copyright © Acronis, Inc., 2000-2010 This section also provides information on configuring communication settings, selecting a network port for

Page 372 - Disk group

Copyright © Acronis, Inc., 2000-2010 83 Acronis Backup & Recovery 10 Bootable Agent Yes Yes Configuring communication settings You can config

Page 373 - Dynamic group

84 Copyright © Acronis, Inc., 2000-2010 Client Encryption options Specifies whether to encrypt the transferred data when the component acts as a cl

Page 374 - Encrypted vault

Copyright © Acronis, Inc., 2000-2010 85 The component will use the default setting, which is to use encryption if possible (see the following optio

Page 375

86 Copyright © Acronis, Inc., 2000-2010 Linux Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the Acronis_agent daemon. Co

Page 376

Copyright © Acronis, Inc., 2000-2010 87 Tip: Alternatively, you can manage the list of certificates of a remote machine. To do this, click Another

Page 377

Copyright © Acronis, Inc., 2000-2010 88 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Page 378 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2010 89 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Page 379

Copyright © Acronis, Inc., 2000-2010 9 have a choice between Windows and Linux console distributions. Install Acronis Bootable Media Builder. 4. S

Page 380 -  Windows Vista (PE 2.0)

90 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Page 381

Copyright © Acronis, Inc., 2000-2010 91 3.2.3 Event tracing You can configure the management server to log events in the Application Event Log of

Page 382

92 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser

Page 383

Copyright © Acronis, Inc., 2000-2010 93 VMware vCenter integration This option defines whether to show virtual machines managed by a VMware vCenter

Page 384

94 Copyright © Acronis, Inc., 2000-2010 To access the machine options, connect the console to the managed machine and then select Options > Mach

Page 385

Copyright © Acronis, Inc., 2000-2010 95 This option defines whether the agent(s) operating on the managed machine have to log events in the Applica

Page 386

96 Copyright © Acronis, Inc., 2000-2010  Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. 

Page 387

Copyright © Acronis, Inc., 2000-2010 97 3.3.4 Customer Experience Program This option defines whether the machine will participate in the Acronis

Page 388

98 Copyright © Acronis, Inc., 2000-2010 Source files exclusion (p. 100) + + + + + + Pre/Post backup commands (p. 101) + + + + PE only PE

Page 389

Copyright © Acronis, Inc., 2000-2010 99 Additional settings (p. 117): Overwrite data on a tape without prompting user for confirmation Dest: Tape

Comments to this Manuals

No comments