Many
Manuals
search
Categories
Brands
Home
ACRONIS
Backup recovery software
Backup & Recovery 10 Advanced Server Virtual Edition
User's Guide
ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User's Guide Page 27
Download
Share
Sharing
Add to my manuals
Print
Page
/
389
Table of contents
TROUBLESHOOTING
BOOKMARKS
Rated
.
/ 5. Based on
customer reviews
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
Copyr
ight © Acronis, I
nc., 2000
-
2010
27
The following diagram illus
trates
the n
otions discu
ssed
above. For
more def
initio
ns please r
efer to
the Glossary.
1
2
...
22
23
24
25
26
27
28
29
30
31
32
...
388
389
User's Guide
1
Table of contents
3
1.2 Getting started
8
Name Description
10
"Navigation" pane
11
Shortcuts bar
12
Actions
13
Operations with panes
14
Action pages
15
Action page - Controls
16
Navigation buttons
16
1.3.1 Agent for Windows
17
1.3.2 Agent for Linux
18
1.3.3 Agent for ESX/ESXi
18
Management Server
19
Storage Node
20
1.3.5 Management Console
21
1.4 Supported file systems
22
1.6 System requirements
24
1.7 Technical support
25
2.1 Basic concepts
26
Backup using bootable media
28
Windows
30
2.3 Owners and credentials
31
Full backup
32
Incremental backup
33
Differential backup
33
2.5 GFS backup scheme
34
The resulting archive: ideal
36
The resulting archive: real
36
Tower of Hanoi overview
38
Tower of Hanoi by Acronis
38
2.7 Retention rules
39
1. Delete backups older than
40
Combination of rules 1 and 2
41
Best practices
42
Backing up dynamic volumes
42
Recovering dynamic volumes
43
Software RAID arrays
46
Hardware RAID arrays
47
Virtual machines backup
47
Guest operating systems
48
Guest HDD
49
Troubleshooting
49
2.12 Tape support
50
2.13.1 Acronis Secure Zone
51
Advantages
52
Limitation
52
Universal Restore)
53
Getting Universal Restore
54
Supported operating systems
55
How it works
55
Usage scenarios
55
2.14.1 Basic concepts
56
Protecting the servers
59
Protecting the workstations
60
Static and dynamic groups
61
Dynamic grouping criteria
61
Using custom groups
62
Policy on a machine
64
Policy on a group
64
Operations with a machine
65
Inheritance of policies
66
Policy status on a machine
69
Policy status on a group
70
2.14.6 Deduplication
71
How deduplication works
72
Deduplication best practices
73
Deduplication ratio
74
Deduplication restrictions
74
Local connection
75
Remote connection
76
Example 1
77
Acronis security groups
78
On a domain controller
79
Rights for Acronis services
81
Secure communication
82
Remote Agent ports
83
Client Encryption options
84
Server Encryption options
84
Network port configuration
85
SSL certificates
86
Self-signed certificates
87
Non-self-signed certificates
87
3 Options
88
3.1.3 Time-based alerts
89
3.1.4 Number of tasks
89
3.1.5 Fonts
89
3.2.1 Logging level
90
3.2.2 Log cleanup rules
90
3.2.3 Event tracing
91
3.2.5 Acronis WOL Proxy
92
3.2.6 VM protection options
92
3.3 Machine options
93
3.3.1 Machine management
94
3.3.2 Event tracing
94
3.3.3 Log cleanup rules
96
Archive protection
99
Source files exclusion
100
Pre/Post commands
101
Pre-backup command
101
Post-backup command
102
Pre-data capture command
103
Post-data capture command
103
Multi-volume snapshot
104
File-level backup snapshot
104
Volume Shadow Copy Service
105
Compression level
105
Backup performance
106
Backup priority
106
HDD writing speed
106
Network connection speed
107
Notifications
107
Messenger service (WinPopup)
108
Event tracing
109
Windows event log
109
SNMP notifications
109
Backup splitting
110
File-level security
111
Media components
112
Error handling
112
Dual destination
113
Task start conditions
114
Task failure handling
115
Tape support
115
Always use a free tape
116
Additional settings
117
Use FTP in Active mode
118
Pre-recovery command
120
Post-recovery command
121
Recovery priority
121
VM power management
126
4 Vaults
128
4.1 Centralized vaults
129
Vault toolbar
130
Pie chart with legend
130
Vault content
130
Vault path
133
Vault database path
133
Vault encryption
134
Attaching a managed vault
135
4.1.3 Tape libraries
136
Hardware
137
Limitations
137
RSM Media Pools
137
Prerequisites
138
Backing up to tape library
140
Recovering from tape library
140
Managing a tape library
141
Inventory
141
Labeling
142
Tape rotation
144
Choosing a backup scheme
144
Criteria of the choice
145
Case to analyze
145
GFS Example 1
146
GFS Example 2
149
GFS Example 3
151
ToH Example 1
152
ToH Example 2
153
ToH Example 3
154
Tape planning
155
Tape planning: Example 1
156
Tape planning: Example 2
156
What if
157
4.2 Personal vaults
158
Creating a personal vault
160
4.3 Common operations
161
To show or hide columns
164
5 Scheduling
165
5.1 Daily schedule
166
first at 8 AM
167
second at 12 PM (noon)
167
third at 3 PM
167
fourth at 5 PM
167
fifth at 7 PM
167
5.2 Weekly schedule
168
5.3 Monthly schedule
170
Examples
171
Parameters
172
Use Wake-On-LAN
174
5.6 Conditions
175
5.6.1 User is idle
176
5.6.3 Fits time interval
177
5.6.4 User logged off
178
6 Direct management
180
Activities
181
Tasks need interaction
182
Backup plan execution states
183
Backup plan statuses
183
Task states
184
Task statuses
185
Backup plan (p. 195)
186
Recovery task (p. 215)
186
Validation task (p. 235)
186
Run backup plan
190
Task details
190
Archive
191
Settings
191
Progress
191
Backup plan details
192
6.1.3 Log
193
Configuring the log table
194
6.2 Creating a backup plan
195
What to backup
196
Where to back up
196
How to back up
196
Archive validation
196
Backup options
196
Convert to VM
197
6.2.3 Source type
198
6.2.4 Items to back up
199
Selecting files and folders
200
6.2.6 Exclusions
201
6.2.7 Archive
202
2. Using the archives table
203
3. Naming the new archive
203
6.2.9 Backup schemes
204
Back up now scheme
205
Back up later scheme
205
Simple scheme
205
Tower of Hanoi scheme
209
Custom backup scheme
210
6.2.10 Archive validation
213
6.3 Recovering data
215
General
216
What to recover
216
Where to recover
216
6.3.1 Task credentials
217
6.3.2 Archive selection
218
6.3.3 Data type
219
6.3.4 Content selection
219
6.3.6 Destination selection
220
Disk destination
221
NT signature
221
Volumes
222
MBR destination
223
Volume destination
223
Volume properties
223
Properties
224
Virtual machine settings
225
File destination
226
Recovery exclusions
226
Overwriting
226
6.3.8 When to recover
227
6.3.9 Universal Restore
227
Preparation
228
Universal Restore settings
228
About Windows loaders
232
Windows Vista/2008
233
What to validate
235
6.4.1 Task credentials
236
6.4.2 Archive selection
236
6.4.3 Backup selection
237
6.4.4 Location selection
237
6.4.6 When to validate
238
6.5 Mounting an image
239
6.5.2 Backup selection
240
6.5.3 Access credentials
240
6.6 Managing mounted images
241
What to export
243
6.7.1 Task credentials
244
6.7.2 Archive selection
244
6.7.3 Backup selection
245
6.7.5 Location selection
246
6.8 Acronis Secure Zone
248
Acronis Secure Zone Size
249
Result confirmation
249
Deleting Acronis Secure Zone
251
6.10 Bootable media
252
Linux-based bootable media
253
PE-based bootable media
253
Kernel parameters
255
Network settings
256
Network port
257
Setting up a display mode
261
Linux commands and utilities
262
Example
265
Mounting backup volumes
266
6.10.6 Acronis PXE Server
267
6.11 Disk management
268
6.11.1 Basic precautions
269
Starting the operations
270
Displaying operation results
270
6.11.5 Disk operations
271
Disk conversion: MBR to GPT
273
Disk conversion: GPT to MBR
274
System disk conversion
275
6.11.6 Volume operations
276
Creating a volume
277
Types of dynamic volumes
277
Create volume wizard
278
Select destination disks
278
Set the volume size
279
Set the volume options
279
Delete volume
280
Set active volume
281
Change volume letter
281
Change volume label
282
Format volume
282
6.11.7 Pending operations
283
7 Centralized management
284
7.1.2 Backup policies
286
Backup policy statuses
287
Actions on backup policies
288
Machines selection
289
Policy details
290
7.1.3 Physical machines
291
Actions on machines
292
Applying policies
293
Grouping actions
293
Other actions
294
Text file requirements
296
Adding machines to a group
297
Machine details
298
Backup policies
299
Plans and tasks
299
Member of
302
Hosted virtual machines
302
Inheritance order
303
Actions on groups
303
To create a group
304
Operating system
304
Adding multiple criteria
305
Move one group to another
306
Editing custom groups
306
Group details
307
7.1.4 Virtual machines
308
VMware vCenter integration
310
Support for vCenter clusters
312
Removing Agent for ESX/ESXi
315
7.1.5 Storage nodes
316
Actions on storage nodes
317
Adding a storage node
318
Storage node details
318
7.1.6 Tasks
319
7.1.7 Log
321
Local event log
322
Centralized event log
322
Actions on log entries
323
7.1.8 Reporting
325
Report about the machines
326
Report about the tasks
327
Filters
328
Report view
328
Column selection
330
Connection parameters
342
Event tracing parameters
344
When to modify
345
What to back up
346
7.3.1 Policy credentials
348
7.3.2 Items to back up
349
7.3.4 Exclusions
353
7.3.5 Archive
354
2. Naming the archives
355
Roll-back period
361
Resulting tasks
364
7.3.8 Archive validation
365
Glossary
366
Backup plan (Plan)
368
Backup policy (Policy)
368
Backup scheme
369
Bootable agent
369
Bootable media
369
Built-in group
369
Centralized backup plan
370
Centralized management
370
Centralized task
370
Centralized vault
370
Cleanup
370
Disk backup (Image)
372
Disk group
372
Dynamic disk
373
Dynamic group
373
Dynamic volume
374
Encrypted archive
374
Encrypted vault
374
Storage node-side validation
378
Tower of Hanoi
378
Windows Vista (PE 2.0)
380
Comments to this Manuals
No comments
Publish
Related products and manuals for Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition
Backup recovery software ACRONIS Backup & Recovery 10 Server, Windows User's Guide
(217 pages)
Backup recovery software ACRONIS Recovery MS SQL Server - Upgrade AAS to AAP Specifications
(94 pages)
Backup recovery software ACRONIS True Image Home 2010 User's Guide
(197 pages)
Backup recovery software ACRONIS Backup & Recovery 10 Workstation User's Guide
(215 pages)
Backup recovery software ACRONIS Backup & Recovery 10 Server fr/ Windows, AAP, GOV/SV, RNW, PrmMNT, 50-499u, FRE User's Guide
(242 pages)
Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG User's Guide
(412 pages)
Backup recovery software ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User's Guide
(410 pages)
Backup recovery software ACRONIS Backup & Recovery 10 UR Advanced Server Manual
(10 pages)
Backup recovery software ACRONIS Disk Director 11 Home User's Guide
(96 pages)
Backup recovery software ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Installation Guide
(59 pages)
Backup recovery software ACRONIS TRUE IMAGE 9.0 - HOME User's Guide
(124 pages)
Backup recovery software ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU User's Guide
(182 pages)
Backup recovery software ACRONIS TRUE IMAGE 9.0 - HOME User Manual
(16 pages)
Backup recovery software ACRONIS TRUE IMAGE 9.0 - HOME User's Guide
(31 pages)
Backup recovery software ACRONIS BACKUP AND RECOVERY 10 ONLINE STAND-ALONE User's Guide
(31 pages)
Backup recovery software ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Installation Guide
(69 pages)
Backup recovery software ACRONIS BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Installation Guide
(31 pages)
Backup recovery software ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3 User's Guide
(16 pages)
Backup recovery software ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS User Manual
(10 pages)
Backup recovery software ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Specifications
(88 pages)
Print document
Print page 27
Comments to this Manuals