Manuale d’uso / di manutenzione del prodotto Backup & Recovery 11 del fabbricante Acronis
Vai alla pagina of 379
A c r o n i s B a c k u p & R e c o v e r y 1 1 Update 0 User Guide Applies to th e followin g edit i ons: Advanc ed Server Virtual E dition Advanc ed Server SBS Edition Advanc ed .
2 Copyr i ght © Acronis , In c., 2000-20 1 1 Copyright © Acronis, Inc . , 2000-2011. All rights reserve d. .
3 Copyr i ght © Acronis , In c., 2000-20 1 1 Table o f conten ts 1 Introducing Acro nis Backup & Rec o very 11 ................................ ................................................ 9 1.1 What's new in Acron i s Backup & Recovery 1 1 .
4 Copyr i ght © Acronis , In c., 2000-20 1 1 4 .3 .2 T he [D AT E] va ria b le ................................................................................................................................ 69 4 .3 .3 Ba ck up s pl it ti ng an d s i mp lif ie d fi le na m ing .
5 Copyr i ght © Acronis , In c., 2000-20 1 1 5 .1 .5 W he n t o rec ov er ................................ ................................................................................................... 133 5 .1 .6 T as k cre de nt ia ls ........
6 Copyr i ght © Acronis , In c., 2000-20 1 1 7 .1 .1 A rch iv e s el ect io n ................................................................................................................................ ... 212 7 .1 .2 Ba ck up s ele ct io n ....
7 Copyr i ght © Acronis , In c., 2000-20 1 1 9 .6 .3 Di sk co n ver si on : MBR t o G PT ................................ ............................................................................... 247 9 .6 .4 Di sk co n ver si on : GPT t o MB R .
8 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1. 3 .4 Ba ck up p lan s an d ta sk s ................................................................................................ ......................... 313 1 1. 3 .5 S to rag e no des ..........
9 Copyr i ght © Acronis , In c., 2000-20 1 1 1 In tro duc in g Acro n is Back up & Rec ove ry 1 1 1. 1 Wh at 's n ew in Ac ro nis B a ck up & Re cov er y 11 Acronis Bac kup & Recover.
10 Copyr i ght © Acronis , In c., 2000-20 1 1 Using boo table media, you c an apply Acronis Universal Restore to an operating system without performing the rec overy. Linux L VM support (p. 36 ) LVM stru cture i s saved in a backup and can be recovered.
11 Copyr i ght © Acronis , In c., 2000-20 1 1 When installing an agent, you can enter the license key i nstead of specifyi ng the l icense server. As soon as the machine is registered on th e managem ent server, the key will be added t o the li st of licenses hand l ed by t he server.
12 Copyr i ght © Acronis , In c., 2000-20 1 1 Console The c onsole provides Graphical User Interfac e and remote c onne ction to the agent s and other Acronis Bac kup & Recovery 11 component s.
13 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 2.1 .1 U ni ver sal R esto re The Universal Restore ad d-on enables you to use the restore t o dissim ilar hardware func tionali ty on the mac hi ne where t he agent is installed and c reate bootable media with this fu nctio nality.
14 Copyr i ght © Acronis , In c., 2000-20 1 1 For o ff-loaded bac kup, Agent for VMware vSphere ESX(i) (Windows) can be installed on a machine running Windows . Acronis Bac kup & Recovery 11 Agent for VM ware vSph ere ESX(i) is referred as A gent for ESX(i) later in this do cument.
15 Copyr i ght © Acronis , In c., 2000-20 1 1 The st orage nodes enable creat i ng highly scalable and flexi ble, in terms of the hardware suppor t, storage infrast ruct ure. Up to 5 0 sto rage nodes can be set up, ea ch being able to manage up to 20 vaults.
16 Copyr i ght © Acronis , In c., 2000-20 1 1 The c onsole has two distributions: for installation on Windows and install ation o n Linux. While bot h distributions enab l e conn ection to any Acro n.
17 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 4 Te ch ni ca l S upp or t Maintenance and Support Program If you need assi stance with your Acronis product , please go to http://www.
18 Copyr i ght © Acronis , In c., 2000-20 1 1 2 G ett ing st ar ted Step 1. Installation These brief installation i nstruct i ons enable yo u to st art u si ng the pro duc t qu i ckly. For th e complete d escription o f installation methods an d procedures, please refer to t he Installation document ation.
19 Copyr i ght © Acronis , In c., 2000-20 1 1 a. Run t he setup program and c l ick Install Acr onis Backup & Recovery 1 1 . b. After ac cepting the t erm s of the license a greem ent, select t he Connect to remote machines check box. c. Follow th e on-screen instruc tions.
20 Copyr i ght © Acronis , In c., 2000-20 1 1 To save your mac h ine to a fi le: Under Where to back up , c l ick Location , an d select the location where the backup will be saved. Click OK t o confirm your sel ection. Click OK at the bot tom of the window to start the backup.
21 Copyr i ght © Acronis , In c., 2000-20 1 1 Administering t h e manag ement server Use the Machines w ith agents view t o manage machines registered on the management server. To effec tiv ely work w i th a l arge number of mach i nes, organize t hem into groups (p.
22 Copyr i ght © Acronis , In c., 2000-20 1 1 Key elements of the console wo rkspac e Na me D es cri pti on Navigati o n pane Contains the Navig at i o n tree and th e Shortcut s ba r . Lets you navi g ate to the different views. For deta il s, see Navigati on pane ( p.
23 Copyr i ght © Acronis , In c., 2000-20 1 1 Mounted i mages . This no de is displaye d if at least one volume is mount ed. Use this view to manage mounted i mages. Views for a management serve r When th e console is connect ed to a management serv er, the fo l lowing vi ews are avai lable in t he navigation tree.
24 Copyr i ght © Acronis , In c., 2000-20 1 1 Operations with pane Ho w to ex pa nd/ min im iz e p an es By default, the Navigation pane appears expanded. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( ).
25 Copyr i ght © Acronis , In c., 2000-20 1 1 In the information pan el (collapsed by d efaul t), v iew the item's detail s. To expan d the panel, cli ck the arro w mark ( ).
26 Copyr i ght © Acronis , In c., 2000-20 1 1 Action p a ge - Create backup pla n Using controls and specifying s ettings Use active co ntrols to specify a bac kup plan or recovery t ask settings and paramet ers. By default, such fi elds as credent i als, opt i ons, comment s, an d some others are hidden.
27 Copyr i ght © Acronis , In c., 2000-20 1 1 Navigati o n b uttons 2 . 1 . 3 C o n s o l e o p t i o n s The c onsole options define the way information is repr ese nted in the Grap hi cal User Interfac e of Acronis Bac kup & Recovery 11. To access the conso l e options, select Options > C o nsole options from the t op menu.
28 Copyr i ght © Acronis , In c., 2000-20 1 1 To make a selection, choose the font fr om the respec ti v e co mbo-box and set the fon t's pro per ties.
29 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Enabled for all results. To make a sett i ng for eac h result (succ essful c ompletion, fai lure or suc cess with warnings) individually, sel ect o r clear the respective c heck box. 2. 1.3 .
30 Copyr i ght © Acronis , In c., 2000-20 1 1 3 U nde rst and ing Ac ron is Bac kup & Rec ov ery 1 1 This sect i on at tempts to gi ve its readers a clear unders tanding of the product so t ha t they can use the pro duc t in various circumst ances without step- by - step inst ructions.
31 Copyr i ght © Acronis , In c., 2000-20 1 1 1. In the P lan parameters (or Task parameter s ) section, cli ck Show plan 's cr ed entials, c o mments , label (or S how task c redentials ). 2. Click Pl a n's (Task) cre d entials . 3. Enter the credent i als under which the pl an (task) will run.
32 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 3 F ul l , i ncr e me nta l a nd d i ffe ren tia l ba ck ups Acronis Bac kup & Recovery 11 provides the capabili ty to use popular backup schemes, such as Grandfather-Fa ther-Son and Tower of Hanoi, as well as to create cus tom bac kup s chemes.
33 Copyr i ght © Acronis , In c., 2000-20 1 1 Differential backup A differential backup stores changes to t he data against th e latest full backup . Yo u need access to the c orresponding full backup to recover the data from a d i fferential backup.
34 Copyr i ght © Acronis , In c., 2000-20 1 1 Linux A volume backup stores all files and folders of the select ed volume independent of their attribut es; a boot record an d the file system super block. A disk backup sto res all disk volumes as we l l as the zero track wi th the master boo t reco rd.
35 Copyr i ght © Acronis , In c., 2000-20 1 1 When reco v ering a dynamic volu me to disk group unall ocat ed space, the so ftware preserves the volume's original type and size. If the disk group configuration does not allow for t he origi nal volume type, the volume will be reco v ered as a si mple or spanned volume.
36 Copyr i ght © Acronis , In c., 2000-20 1 1 3 . 5 . 2 B a c k u p a n d r e c o v e r y o f l o g i c a l v o l u m e s a n d MD d e v i c e s ( L i n u x ) This sect i on explains how y ou wou l d.
37 Copyr i ght © Acronis , In c., 2000-20 1 1 For det ai led instruct i ons on h ow to recover l ogical volumes, see Recovering MD devices and logi cal volumes (p. 38 ). 3. 5.2 .2 B ack ing up MD dev ic es MD d ev ices, kno wn as Linux Software RAID, c ombine s everal volumes and m ake sol i d block devices ( /dev/md0, /dev/md1, .
38 Copyr i ght © Acronis , In c., 2000-20 1 1 automat i cally assembled follow i ng the reboot. To v iew or ch ang e the partition type, use a disk partitioning ut i lity suc h as fdisk . Otherwise (suc h as in the sec ond example), perfo rm the recovery from boo table media.
39 Copyr i ght © Acronis , In c., 2000-20 1 1 To crea t e t he vo lum e str uc tur e manu al ly 1. Boot the machine fro m a L inux-based bootable media. 2. Click Acronis Ba ckup & Rec ov ery 11 . T hen, cli ck Run managemen t console . 3. On t he toolbar, click Actions , and then click Start s hell .
40 Copyr i ght © Acronis , In c., 2000-20 1 1 Th e following picture illust rates this co nfiguration. Do t he followi ng to recover data from t hi s archive. Step 1: Cr eating the volume structure 1. Boot the machine fro m a L inux-based bootable media.
41 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In Archive , click Change and then specify the name of the archive. 3. In Backup , click Cha ng e and then select t he backup from which y ou want to recover dat a. 4. In Data type , selec t Volumes . 5.
42 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 6 C omp at ib il ity wi th e ncry pt io n s of tw ar e Acronis Bac kup & Recovery 11 fully retains its func tion ality when interac ting with fil e -level encryption software. Disk-level encryption software encrypt s data on the fly.
43 Copyr i ght © Acronis , In c., 2000-20 1 1 You can recover an encrypted system part i tion by u si n g boot abl e media only. If the rec overed system fails to bo ot , rebu ild Master Boot Record .
44 Copyr i ght © Acronis , In c., 2000-20 1 1 OID: 1. 3.6.1.4.1.2476 9. 100.20 0.2.0 Value: "? 00000000".
45 Copyr i ght © Acronis , In c., 2000-20 1 1 4 Ba cku p 4. 1 B ac k u p now Use the Back up now featu re to co nfi gure and ru n a one-tim e backup in a few simple steps. The backup process will start immediately aft er you perform the requ i red steps and click OK .
46 Copyr i ght © Acronis , In c., 2000-20 1 1 To access these settings, cli ck Show backup fil e naming, acce ss credentials, archive com ments . File n aming (p.
47 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Configure parameters o f the backup operat i on, such as pre/post backup commands, maxi mum network bandwi dth al located for t he backup stream or t he backup archive co mpression level. If you d o not hing in t his section, the default values (p.
48 Copyr i ght © Acronis , In c., 2000-20 1 1 In order t o recover your operat i ng system along with all the settings and applications, you have to perform a disk bac kup. Virtual machines Available if Acro ni s Backup & Recovery 1 1 Agent for E S X(i) or Acronis Bac kup & Recovery 11 Hyper-V is installed.
49 Copyr i ght © Acronis , In c., 2000-20 1 1 Use the following cr edentials The pro g ram will access t he source dat a using the c red entials you specify. Use this opt i on if t he plan's acco unt does n o t have access permissions t o the data.
50 Copyr i ght © Acronis , In c., 2000-20 1 1 C ri ter i on E xa mpl e D es cri pti on W i ndow s an d Li nu x By name F.log F Excludes a l l files named "F.log" Excludes a l l folders named "F" By mask ( *) *.log F* Excludes a l l files wi th the .
51 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . Warning: Acc ordi n g to t h e ori g inal FTP spec i fic ation, cred entials require d for access to FTP servers are transferred throu gh a network a s pl aintext. Th is me a ns th a t th e user na me and password can be i nter cepted b y an eavesdr opper using a packet sniffer.
52 Copyr i ght © Acronis , In c., 2000-20 1 1 To access this set ting , click Show backup type, 2 nd l o cation, vali d ation, c o nvert to virtual machine . Select t he backup type. Full - sel ected by default for all backup loc ations (except for Ac ronis Online Backup St orage).
53 Copyr i ght © Acronis , In c., 2000-20 1 1 Start back up at Specifies when to start a backup. The default v alue is 12:0 0 PM. Back u p on Specifies t he days on whi ch to perfor m a backu p.
54 Copyr i ght © Acronis , In c., 2000-20 1 1 Keep backup s: Daily: 1 w eek Weekly: 1 month Mont hl y: indefinitely As a result, an archive of dai ly, weekly, and m onthly bac kups will be c reated. Daily backups will be available for seven days since creation.
55 Copyr i ght © Acronis , In c., 2000-20 1 1 Start backup at: 11:30 PM Back up on: Tuesday, Thursday, Friday Weekly/monthly: Fr iday Keep backup s: Daily: 6 m on ths Weekly: .
56 Copyr i ght © Acronis , In c., 2000-20 1 1 Dif ferential backu p schedule Specifies on what schedule and under which conditions to p er form a differ ential backup. If the arch i ve conta i ns no fu ll backups at the time of the task run, a full backup i s created instead of the dif ferential backup .
57 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples Weekly full backu p The fo l lowing scheme yields a fu ll backup p erformed every Friday night. Full backup : Schedule: Weekl y , every Fri d ay , at 10:00 PM Here, all parameters exc ept Schedule in Full ba ckup are l eft empty.
58 Copyr i ght © Acronis , In c., 2000-20 1 1 Finally, we create retent i on rules for the arc hi ve: let us retain o nl y backups tha t are no older th an six months, and let the cleanup be performed aft er each backup task and also on the l ast day o f every month.
59 Copyr i ght © Acronis , In c., 2000-20 1 1 Recur: Every 1 day Frequency: Once at 6 PM Number o f levels : 4 Backup type : Fu l l/Differentia l /Increment al This is how the first 14 days (or 14 sessions) o f this scheme's schedule look.
60 Copyr i ght © Acronis , In c., 2000-20 1 1 A new level 3 differential backup has not yet b een crea ted, so the b ackup of day fi ve is still stored. Since it depends on the full backup of day on e, that backup is available as we l l. Th is enables us t o go as far b ack as 11 days, which is t he best- case scenar i o.
61 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Selecting the destination In the P ath field, enter the full path to the d estination, or select t he desired destination i n the location tree as described in " Sel ecting bac kup destinations" (p.
62 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Onli ne backup storage To back up da ta to Acronis O nline Backup Sto rage, c lick Log i n and spe c ify the cred enti als to log in to the onl ine storage. Then, expand the Online b a ckup sto ra ge group and se l ect the account .
63 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Stora ge nodes When you need to back up data to a stora ge node that i s no t registe r ed on t he managem ent serve r, or wh.
64 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . To learn more abou t operations av ailable depending on the user privileges, see the Users' privileges on a m anaged machine (p.
65 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows XP All Editions winXPP roGuest Windows XP All Editions (64 bit ) winXPP ro64Guest Windows Se rver 2003, Al l Editions winNetStanda rdGuest Window.
66 Copyr i ght © Acronis , In c., 2000-20 1 1 This behavior is useful when you rotat e USB hard drives and want each drive to keep a single full backup (p. 67 ) or all backups created during a week (p. 67 ). But you might end up with no backups i f a full bac kup to your only drive fails.
67 Copyr i ght © Acronis , In c., 2000-20 1 1 Result: The bac kups of January 1, 201 1 , January 2, 20 11, and s o on, are st ored respectively as MyMach i ne-1.1.2011.t ib, MyM achine-1.2. 2011 . tib, and so on. Your script can move older bac kups based on the date stamp.
68 Copyr i ght © Acronis , In c., 2000-20 1 1 You want to back up to the arc hiv e MyMachine on an external h ard disk drive . You have two such drives. Either of them has drive letter D in the operating system when attac hed to the mac hi ne.
69 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 3 . 2 T h e [ D A T E ] v a r i a b l e If you spec i fy the [DATE] variable in t he archive name, t he fil e name of each backup wi ll include that .
70 Copyr i ght © Acronis , In c., 2000-20 1 1 The sc heduler uses local time of the machine th e bac k up plan exists on. Befo re creat i ng a sch edul e, be sure t h .
71 Copyr i ght © Acronis , In c., 2000-20 1 1 What- ifs What if an event o ccurs (and a con d ition, if a n y, is me t) whil e the previous task run has not completed? The event will be ignored. What if an event o ccurs while the sc h eduler i s waiting for the con dition required by the previous event? The event will be ignored.
72 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: not s et . The t ask wil l be start ed on the current day, if it has b ee n creat ed before 6PM . If you have c reated the task aft er 6 PM, the task will be s tarted for the fi rst t i me on the next day a t 6 PM.
73 Copyr i ght © Acronis , In c., 2000-20 1 1 To: no t set . Second dail y schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 0 3:00:00 PM Until: 07 :00:00 PM . 3. Effect i ve: From: 0 9/20/2009 . To: no t set . 4 . 4 . 2 W e e k l y s c h e d u l e Weekly sc hedule i s effect i ve in Windows and Linux operating systems .
74 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: 0 5/13/2009 . The t ask wil l be start ed on the nea rest Friday at 10 PM. To: 1 1/13/200 9 . The task will be performed for the last time on this date, bu t the task it self will still be availabl e in th e Tasks view after th is date.
75 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Every: 9 hours From: 1 2:00:00 PM Until: 09 :00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Second sched u le 1. Every 1 week(s) on: Tu e , Wed , T hu . 2. Every 3 hours From 09 : 00:00 AM u ntil 09:00:00 PM .
76 Copyr i ght © Acronis , In c., 2000-20 1 1 Advanced sc heduli ng settings (p. 79 ) are availab l e only for machines registered on A cronis Bac kup & Recovery 11 Management Server. To specify these settings, c l ick Cha nge in the Adv a nced settings area.
77 Copyr i ght © Acronis , In c., 2000-20 1 1 During nort hern spring and aut umn, the task runs every 12 hours on all workdays. During nort hern summer, the task runs every first and fifteenth o f every month at 10 PM. Thus, the following three sc hedules are added to the task.
78 Copyr i ght © Acronis , In c., 2000-20 1 1 Event type Specifies the ev ent t y pe: Error , Warning , Info rmation , Audit success , o r Audit fa ilure . Event ID Specifies the ev ent number, which typically identifies the particular kind of events among events from th e same source.
79 Copyr i ght © Acronis , In c., 2000-20 1 1 How to view events in Event viewe r T o ope n a l og i n E ve nt Vi ewe r 1. On t he Desktop or in the Start menu, right-click My Computer , and t hen click Manage . 2. In the C ompu ter M a nagement console, expan d System To ols , an d then expand Event Viewer .
80 Copyr i ght © Acronis , In c., 2000-20 1 1 Distribute start time within the tim e window When th i s setting is enabled, the backup task on each registered machine w ill start wi th a specifi c delay from th e start time set in th e backup plan. T hi s distributes the tasks' actual st art times wi thin a time interval.
81 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy a dv an ced s et ti ng s 1. Connect to the manag ement server or to a mac hi ne regi stered on i t, and then start creat i ng a backup pl an. 2. In How to back up , select t he Simpl e, T ower of Hanoi, or Custom scheme, and then c li ck Schedule to specify a schedule for the scheme.
82 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4.7 .1 U se r i s i dle Applies to: Windows "User is idle" means t hat a screen saver is running on the managed mac hine or t he machine is locked. Example: Run t he backup task on the manag ed machine every d ay at 9PM, preferably when the user is idle.
83 Copyr i ght © Acronis , In c., 2000-20 1 1 Example A company uses different locations on the same network-attac hed s torage for backing up users data and servers. Th e workday st arts at 8AM and end s a t 5 PM. Users' data should be backed up as soon as the users log off, but not earl ier than 4 : 30 PM and not later t han 10 PM.
84 Copyr i ght © Acronis , In c., 2000-20 1 1 Task st art conditions: Wait until th e conditions are met , Run the task anyway after 3 hour(s). As a result, (1) If all users are l ogged o ff at 8PM, t he backup task will start at 8PM.
85 Copyr i ght © Acronis , In c., 2000-20 1 1 The fo l lowing picture illustrat es this example. Usage sc enarios Reliable d isaster recovery (p. 90 ) Store y our bac kups both on-site (fo r imm ediate reco very) and off-site (t o secure the backups from local st orage fail ure or a natural disaster).
86 Copyr i ght © Acronis , In c., 2000-20 1 1 A local folder o n a fixed or removable drive A network folder An FTP o r SFTP server Acronis Bac kup & Recovery 11 Storage Node .
87 Copyr i ght © Acronis , In c., 2000-20 1 1 If allowed by the backup sch eme, you can al so spec i fy when to aut omatically delete t he backups from each of the locations. 4 . 5 . 3 S e t t i n g u p r e t e n t i o n o f b a c k u p s You can set ret ention rules for backups when creating a backup plan (p.
88 Copyr i ght © Acronis , In c., 2000-20 1 1 You can cho ose to apply the ret ention rules before c re ating a backup, af ter c reating a bac kup , on a schedule, or combine th ese options. For the second an d next loc ations, creating a bac kup means copying or movi ng a bac kup there from the previous locat i on.
89 Copyr i ght © Acronis , In c., 2000-20 1 1 The o utda ted bac kup will be kept until all backups t hat depend o n it also become out da ted. Then, all the chain wil l be deleted at once during the reg ular cleanup. If you chose moving outdat ed ba ckups to the n ex t location, th e ba ckup will b e cop i ed there without delay.
90 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 5.6 .1 Ex am ple 1. Rep li cati ng bac kup s t o a n etwo rk f old er Consider the fo l lowing scenar i o: You want to perform a full backup of your machine manually. You want to store the backups i n Acronis Secu re Zone (p.
91 Copyr i ght © Acronis , In c., 2000-20 1 1 the P ath fi eld. Under Rete ntion rules , select Move backups older than 1 week . Then, specify the tape d evice in the 2 n d location field.
92 Copyr i ght © Acronis , In c., 2000-20 1 1 Restric tion s Conversion is not avai lable on machines running Linux. Conversion of a backup from t he f ollowing locat i ons is not available: CD, DVD, tape devices and Acronis On l ine Backup St orage.
93 Copyr i ght © Acronis , In c., 2000-20 1 1 or Hyper-V virtual mac hi ne is bac ked up at a hypervisor level), the task wil l be creat ed on the machine where t he agent is. The t arget virtual machine must be powered off b y the time of conversion, otherwise the conversion task will fail.
94 Copyr i ght © Acronis , In c., 2000-20 1 1 Storage space Disks of t he resulting virtual machine will use as much storage spa ce as the ori ginal data oc cupies. Assuming that the original disk size is 100 GB and t he d isk stores 1 0 GB of data, th e corresponding virtual disk w i ll oc cupy ab ou t 10 GB.
95 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7 De f a ult ba ck up opt i ons Each Acronis agent has i ts own default b a ckup opt ions. Onc e an agent is installed, the default op tions have pre-defined value s, which are referred to as presets in the document ation.
96 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up HDD writing spee d (p.
97 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Pre/Post ba ckup comman ds (p.
98 Copyr i ght © Acronis , In c., 2000-20 1 1 When th e Reset archive bit check box is selected, A cronis Backup & Recovery 11 will reset the archive bits o f all files being b acked u p. Acronis Bac kup & Reco very 11 itself does no t use the archive bit value.
99 Copyr i ght © Acronis , In c., 2000-20 1 1 When you specify an already ex isting archive as the destinat i on of the backup plan. When you edi t a backup plan t hat has already resulted in a backup. The preset is: Disabled. To pro te ct the a rch iv e f ro m u nau tho ri ze d a cc ess 1.
100 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 4 B a c k u p p e r f o r m a n c e Use this group of options to spec i fy the am ount of network and syst em resourc es to allocate to the backup process. Bac kup performance options mi ght have a m ore or l es s not i ceable effect on the speed of the ba ckup process.
101 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7.4 .3 Ne tw ork con ne c t ion sp eed This opt i on is effec tive for Windows and Linux operat i ng systems an d boo table media. This opt i on is available when a loc ation on the n etwor k (network sha re, managed vault or an FTP/SFTP server) is selected as the backup destination.
102 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixed size Enter the desired file size or sel ect it fro m the drop-down list. The bac kup wil l then b e spli t into multiple files of t he specified size. T hi s comes in handy when creating a bac kup that you plan to burn to multiple CDs or DVD s later on.
103 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding informatio n to a DRP tem plate You can append additional information to a DRP template i f you are we ll familiar with XML and HTML. T he default path s to the DRP template are: %ProgramFil es% AcronisBackupA nd Recover y drp.
104 Copyr i ght © Acronis , In c., 2000-20 1 1 Ignore bad sectors The preset is: Disabled . When th e option is disabled, the program will display a pop-up window each time it c omes across a bad sec tor and ask for a user d ecision as t o whether to cont i nue or stop the ba ckup pro cedure.
105 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on is no t availabl e when o perating under the boot able medi a. This opt i on defines whet her the agent(s) o perating on the managed mach i ne have to log events of the bac kup operations in the A pplication E vent Log of Windows (t o see this log, ru n eventv wr.
106 Copyr i ght © Acronis , In c., 2000-20 1 1 plan has t o run under the acc o unt with the A dministrator or Ba ckup O perat or privileges. If a snapshot cannot be taken, the backup will fail. Create a snapshot if it is possible Back up fil es directly if t aking a snapshot is not possible.
107 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on defines ho w to take and to work with a snapshot o f a logical volume. Use of snapsho ts ensures a t i me-consistent backup of volumes whose dat a may change during t he backup process.
108 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r a file -level bac kup of a data sour ce that inc ludes mounted v olumes or clust er shared volumes.
109 Copyr i ght © Acronis , In c., 2000-20 1 1 When th i s option i s set to Disable , the volumes' sna ps hots will be taken one after the other. As a result, if the d ata spans ac ross several volumes, t he re sulting backup m ay be no t consistent.
110 Copyr i ght © Acronis , In c., 2000-20 1 1 Pass word ent er the password. d. Click OK . 11. Click Send test e -mail message to check if t he settings are c orrect.
111 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram does n ot support interac tive commands, i.e. commands that require user i nput (for example, "pau se").
112 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Ar g uments field, spec i fy the command execution arguments, if required. 4. Select t he Fail the task if the c o mmand exec u tion fails check bo x if successful execu tion of the command is critical for you.
113 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the Worki n g direc to ry field, specify a p ath to a directory where t he command/batch file will be execut ed.
114 Copyr i ght © Acronis , In c., 2000-20 1 1 successful ly executed. Delete the TIB file and temporary files and fail the tas k if the command execution fails. execution f ai lure or success . command execution result. * A co m mand is co nsi dered failed if its exit c ode is not equal to zero.
115 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption applies to backing up to a sto rag e node. Eject tape The preset is: Disabled . When th i s check box is selected, the software will ejec t tapes after a successful bac kup and/or when a tape i s full.
116 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram will try to execute the fai led task again if you sel ect t he Restart a failed tas k check box and spec i fy the n umber of attempts and th e time interval bet ween the attempts.
11 7 Cop yright © Acr o nis, In c., 200 0 -2011 Time d iagram: Wait until con ditio n s are met Skip the task execution Delaying a b ackup might be un acceptable, for example, when you need to back up data strict l y at the specified time .
118 Copyr i ght © Acronis , In c., 2000-20 1 1 Software - Acronis VSS Pr ovider VSS will use Acronis VSS Provi der for taking snapshots. Software - Sy stem p rovider VSS will use the sy stem provider (M i crosoft Software Shadow Copy pro vi der) for t aki ng snapshot s.
119 Copyr i ght © Acronis , In c., 2000-20 1 1 5 Re cov er y When it c omes to data rec overy, first consider the mos t functional method : connect the console t o the managed m a chine running t he operating system and c reate the recovery task.
120 Copyr i ght © Acronis , In c., 2000-20 1 1 Select dat a to recover. Access c redentials (p. 125 ) [Opt i onal] Provide credent i als for t he archive location i f the task accou n t does not have the right to access it. To access t his op tion, click Show access cred entials .
121 Copyr i ght © Acronis , In c., 2000-20 1 1 [Optional] Universal Re s tore for Wind ows/Linux Applies to: sy stem disk or vo l ume recovery. Using Acronis Univers a l Restore req uires a separate license.
122 Copyr i ght © Acronis , In c., 2000-20 1 1 You are recovering custo m or non-Windows boo t load ers (such as L I LO and GRUB). The disk geometry i s different t o that s tored in t he backup. There are probably other t i mes when you m ay need to recover the MBR, but the ab ove are the most common.
123 Copyr i ght © Acronis , In c., 2000-20 1 1 Lo ca ti on D et ai l s FTP, SF TP If the arch i ve is stored on an FTP or SFTP ser ver , type the server na m e or address in the Path field as follows.
124 Copyr i ght © Acronis , In c., 2000-20 1 1 In the search string, type t he information that helps t o i dentify the requi red dat a items (this can be a mac hi ne name, a file or folder name, or a disk label) and t he n click Search . You can use the asterisks (*) and question marks (?) wildcards.
125 Copyr i ght © Acronis , In c., 2000-20 1 1 Solution: To be able to bro wse such dat a , connect direct ly to a machine, sel ect the required personal vault and then select Data view . 5 . 1 . 2 A c c e s s c r e d e n t i a l s f o r l o c a t i o n Specify th e credentials required for access to the locat ion where t he backup is stored.
126 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 1.4 .1 S ele ctin g targ et dis ks Available disk o r volume destinations depend on the agents operat i ng on t he machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 11 Agent fo r Windows or A gen t for Li nu x is installed.
127 Copyr i ght © Acronis , In c., 2000-20 1 1 D isk d esti nat ion To sp eci fy a d est ina ti on di sk : 1. Select a di sk where you want the select ed disk to rec o ver to. Th e destination disk's space should be at l east t he same size as the uncompressed i mage data.
128 Copyr i ght © Acronis , In c., 2000-20 1 1 Also, you have to map the volumes manually if t hey are Linux logical volumes, or Linux soft ware RAI D (MD d ev ices). For more information on recovering logical volumes and MD devices, see Recovering MD d ev ices and logical volumes (p .
129 Copyr i ght © Acronis , In c., 2000-20 1 1 Available when the Acronis Backup & Recovery 11 Agent fo r Hyper-V or Agent fo r ESX(i) is installed. On select i ng this, you specify the v irtualization server and the target v irtual machine. Then you proceed to the reg ular volume mappin g proc edure described below.
130 Copyr i ght © Acronis , In c., 2000-20 1 1 Be careful ! To be on the saf e side, it is advisable t o a ssi gn unique nam es to the volumes. The L i nux-style boot abl e media shows loc al disks and volumes as unmount ed (sda1, sda 2.
131 Copyr i ght © Acronis , In c., 2000-20 1 1 Vo lu me ( pa rtit ion ) a li gnm ent Acronis Bac kup & Recovery 11 automat i cally eliminates v olume misalignment a situation, when volume clusters are not aligned with disk sect ors.
132 Copyr i ght © Acronis , In c., 2000-20 1 1 Files and folders wi l l be recovered to the same path(s) as they are in t he ba ckup. Fo r example, if you h av e backed up all fil es and folders in C: DocumentsF i nanceReports , the files will be recovered to t he same path.
133 Copyr i ght © Acronis , In c., 2000-20 1 1 By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith "F" (such as folders F, F1 and f iles F .l og, F1. log) By mask ( ?) F?? ?.
134 Copyr i ght © Acronis , In c., 2000-20 1 1 To learn more abou t using credent i als in Acronis Backup & Recovery 1 1 , see t he Owners and credent ials (p. 30 ) section. To learn more abou t operations av ailable depending on the user privileges, see the User privileges on a managed mach ine section.
135 Copyr i ght © Acronis , In c., 2000-20 1 1 Sometimes Universa l Restore i s applied i n the background bec ause the soft war e knows what dri vers or modules are required for the suppor ted virtual mac hi nes.
136 Copyr i ght © Acronis , In c., 2000-20 1 1 Universal Restore settings Automatic driver search Specify where t he program will search for the Hardware Abst raction Layer (HAL), HDD controller driver and net work adapter driver(s): If the d rivers are on a vendor's disc or ot her removable media, turn on the Searc h rem o vable media .
137 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 2.2 .2 U ni ver sal R esto re i n Linu x When Universal Resto re is applied to a Linux operat i ng system, i t updat es a temporary fi le system known as the initial RAM disk (initrd). T hi s ensures t hat the operating system can boot on the new hardware.
138 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 3 . 1 R e c o v e r i n g v o l u m e s Let's assume you backed up the system an d boot volumes (or t he entire machine) and want to recover t hese volumes to a d ifferent platform.
139 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: non- convertible Solution Recover the oper ati ng system to an MB R disk. 2. Perform th e recovery under the bootable media.
140 Copyr i ght © Acronis , In c., 2000-20 1 1 The plus (+ ) sign on a green background means t hat the sourc e disk wil l be recovered wi thout any limitations. The plus (+ ) sign on a yellow background means that the so urce d isk will be rec overed with some limitations.
141 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB UEFI OS: convertible + The target di sk wi ll be initialized as MBR .
142 Copyr i ght © Acronis , In c., 2000-20 1 1 Customers familiar w ith Acronis Reco v ery for M i crosoft E xchange can no te that t hi s product uses Active Restore to achieve immediate availabil ity of an Exchange information store after star ting the recovery.
143 Copyr i ght © Acronis , In c., 2000-20 1 1 If your op erating syste m and i ts loader reside on d i ffere nt volumes, al ways include bot h volumes i n the backup. The volumes must also be rec overed toget h er; other wise the re is a high risk that the operat i ng system wi ll not start.
144 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. Micros o ft V i rtual PC does not s u pport disks t h at are larg er than 127 GB . Acro n is enab l es yo u to cr ea te a Virtual PC machi n e wit h l a rger disks s o th at you can attac h the disks to a M i crosoft Hyper -V virtu a l m a chine.
145 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 5 . 1 V i r t u a l m a c h i n e t y p e / v i r t u a l i z a t i o n s e r v e r s e l e c t i o n The new vi rtual machine c an be creat ed eith.
146 Copyr i ght © Acronis , In c., 2000-20 1 1 When adding a n ew virtual disk, al ong with interfac e and capacity, you c an specify its fo rmat. Thin format. The disk occ upies as much st orage space as the dat a it stores. T hi s saves th e s torage space.
147 Copyr i ght © Acronis , In c., 2000-20 1 1 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompt s whether you want to rec over the MBR along with t he system volume. Opt for no t re covering, on l y if you do not want the system to b e bo otable.
148 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Mount the system yo u are rec overi ng: mkdir /mnt/system/ mount - t ext3 / dev/sda2 /mnt/system/ # root partition mount - t ext3 / dev/sda1 /m nt/system/ boot/ # bo ot partiti on 3.
149 Copyr i ght © Acronis , In c., 2000-20 1 1 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure th e bootloader by usi ng too l s and documentation fro m the Linux d i stribution t hat you use.
150 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k re co ve ry F il e re cov er y ( al so fr om .
151 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 1 A d d i t i o n a l s e t t i n g s Specify th e additional settings for the recovery operat i on by selecting or clearing the fo l lowing check boxes. Validate backup archiv e before recovery The preset is Disabled .
152 Copyr i ght © Acronis , In c., 2000-20 1 1 Set current date and time for recov ered files This opt i on is effec tive only when rec overi ng files.
153 Copyr i ght © Acronis , In c., 2000-20 1 1 To sel ect w het he r t o se nd th e rec ov ery op er ati on s e ven t s t o the SN MP ma na ge rs : Choose one of the followi ng: Use the setting set i n the Machine o ptions to use the setting spec i fied for t he machine.
154 Copyr i ght © Acronis , In c., 2000-20 1 1 If the file NTFS permi ssions were preserved during backup (p. 106 ), you c an choose whether to recover t he permissi ons or l et th e fil es inherit the N TFS permissions from the folder to which they are reco vered.
155 Copyr i ght © Acronis , In c., 2000-20 1 1 8. In the P assword field, enter the password. 9. Click Additional e-mail pa rameter s... to co nfi gure the additional e-mail parameters as follows: a. From - type the e-mail address of th e user from whom the message will be sent.
156 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption enables you to define t he commands t o be automatically executed before and after the data rec overy.
157 Copyr i ght © Acronis , In c., 2000-20 1 1 * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 5. 7.7 .2 Po st -rec ove ry co mman d To sp eci fy a com ma nd/ exe cu tab le fi le to b e exe cut ed a fte r th e rec o ve ry is co mpl et ed 1.
158 Copyr i ght © Acronis , In c., 2000-20 1 1 6 S tor in g t he bac k ed u p da ta 6. 1 Va ul ts A vault is a loc ation for st oring backup arc hi ves.
159 Copyr i ght © Acronis , In c., 2000-20 1 1 'Vaults ' view Vaults (on the navi gation pane) - t op item of the vaults tree. Click this item t o display centralized an d personal vaults. To perform actions o n any vault, use the toolbar that i s located at the t op of t he Vaults view.
160 Copyr i ght © Acronis , In c., 2000-20 1 1 6 . 1 . 2 C e n t r a l i z e d v a u l t s A centralized vault is a net worked location allott ed by the management server adm i nistrator to serve as sto rage for t he ba ckup archive s. A centralized vau lt can be managed by a sto rage node or be unmanaged.
161 Copyr i ght © Acronis , In c., 2000-20 1 1 All the operations described here are performed by c l ic ki ng the c orresponding buttons o n the vaults toolbar. T hese operations c an be also acc essed from t he [Vault name] actions item of t he main menu.
162 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Delete a vault 1. Select the vault. 2. Click Dele t e . The vault w ill be delet ed along with a ll the archiv es stor ed in there. The plans and tasks that use this vault will fa i l. Change use r credent ials for accessin g a vau lt Click Chang e user .
163 Copyr i ght © Acronis , In c., 2000-20 1 1 The dedu pl ication d atabase stores the hash values of al l items stored i n the v ault except fo r those that can no t be dedu pl icated, suc h as encrypted files.
164 Copyr i ght © Acronis , In c., 2000-20 1 1 Va ult pa th To sp eci fy t h e pa th w her e the ma nag ed va ul t w ill be cr ea te d 1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree. Managed vaults can be organized: On the hard drives local to the storage nod e.
165 Copyr i ght © Acronis , In c., 2000-20 1 1 The AES cryptographic algorithm operat es in the C ipher-block c hai ning (CBC) mode and uses a randomly generated key with a user-defined size o f 128, 192 or 25 6 bits.
166 Copyr i ght © Acronis , In c., 2000-20 1 1 If no o bjects were foun d, delete the name and enter another one. If several objec ts for the entered name we re found , select one of them and click OK , or click Cancel and specify another name.
167 Copyr i ght © Acronis , In c., 2000-20 1 1 At ta chi ng a m ana g ed va ult A vault managed by a storage node can b e a ttach ed to another storage no de. You might need to do so when retiri ng the st orage node hardware, when the storage nod e is lost or when balancing loads between st orage nodes.
168 Copyr i ght © Acronis , In c., 2000-20 1 1 Zone is con si dered as a personal vault available to al l users th at can log on t he system. Personal vaults are c reated automat i cally when backing up any of th e above locations. Personal vaults c an be used by local backup plans or local tasks.
169 Copyr i ght © Acronis , In c., 2000-20 1 1 Validate a vault Click Validate . You will be taken to the Val idation (p. 211 ) page, wh ere this vault is already pre-selecte d as a source . The vault va l idation c hecks all the arc hives sto red in the vault.
170 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Make sure that none of the b ackup plans uses vault A while m erging, or disable th e gi ven plans. See Actions on backup plans and tasks (p. 2 58). 2. Move t he content of vault A folder t o vault B manually by means of a third-party file manager.
171 Copyr i ght © Acronis , In c., 2000-20 1 1 After you configure the required settings, cli ck O K. In the Resul t co nfi rmation (p. 172 ) window, review the expect ed layout and cli ck O K t o start c reati ng the zon e. 6. 2.1 .1 Ac ron is Se cu re Zo ne Dis k The Acro ni s Secure Z one c an be located on any fixed h ard drive.
172 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 2.1 .4 R es ult co nfi rma tio n The Res u lt confirmati on wi ndow displa ys the expect ed partition layout ac cording t o the sett i ngs you have cho sen. Click OK , if you are satisfied with the layout and the Acronis Sec ure Zone creation will start.
173 Copyr i ght © Acronis , In c., 2000-20 1 1 If there is n ot enough un allocated space, the program will take free spa ce from the sel ected volumes, propo rtionall y reducing t he volumes' size. Re si zing of loc ke d part i tions requires a reboot.
1 74 Cop yright © Acronis, In c., 200 0 -2011 An autoloader is a p articular case of tape libraries. It c ontains one drive, several slots, a changer and a barc ode reader (optional). A s ta nd-a l on e tape drive (al so called streamer ) contains one slot and can hold only one tap e a t a time.
175 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Add the reg istry key described bel ow. Sp ecify the new locat ion path in the registry value TapesDatabase Path . Registry key: HKEY_L OCAL_MACH I NESOFTWAREAc ronis ARSMSet tings Registry value: Tapes DatabasePat h Possible data val u es: Any string 0 to 327 65 characters l ong.
176 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.2 .5 Pa ral l el op erat ion s Acronis Bac kup & Recovery 11 can simultaneously perf orm operations with v arious co m ponents of a tape d evice. During an op eration that uses a drive (backing up, reco v ering, rescanning (p.
177 Copyr i ght © Acronis , In c., 2000-20 1 1 ABR11 Bootable Media ABR11 Agent for Windows ABR11 Agent for Linux ABR11 Storage Node Ta pe wr it te n on a l oca ll y a tt ac he d ta pe de vi ce (t ap e d ri ve or ta pe li br ar y) by .. . Bootable M edia 9.
178 Copyr i ght © Acronis , In c., 2000-20 1 1 Backing up On t he Actions menu, click Back up now or Create backup plan . Confi g ure (p. 45 ) th e backup settings. When spec i fying t he backup dest i nation, sel ect t he tape d evice. Results The resulting b ackups wi ll be loc ated in an aut omatically created personal vault (p.
179 Copyr i ght © Acronis , In c., 2000-20 1 1 6. In the N a vigation tree, c l ick Storage nodes . Select the storage n ode t o which your tape device is attac hed, and then click Cre a te vault . Proceed as descr ibed in the "Creating a m anaged centralized vault" (p.
180 Copyr i ght © Acronis , In c., 2000-20 1 1 5. If any of the detected backups c on tinue on o ther tap es that have not been rescanned yet, l oad these t apes as prompted a nd rescan them. 6. After th at, you can select t he required backup. If the backup is located on a stora g e node 1.
181 Copyr i ght © Acronis , In c., 2000-20 1 1 15. Click OK t o s tart the recovery. 16. If any of the required tapes are n ot loaded for some reason, the software will show you a message with the identifier of th e needed tape. Load the tap e, and click Retry to c on tinue the recovery.
182 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .2 Ta p e p oo l s Acronis Bac kup & Recovery 11 uses tape p ools that are logical groups of tapes. The software contains the fo l lowing predefined t ape pools: Unrecognized tap es , I mported tapes , Free tapes , and Acronis .
183 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .3 O p era ti ons wit h p ool s Cr eat in g a p ool To crea t e a po ol : 1. In the N a vigation tree, c l ick Tape managem en t . If connect ed to the management server, select the st orage node to which y our tape device is attached.
184 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Select t he required pool and click Remove . 3. Select t he pool to which the t apes of the pool being deleted will be moved after the deletion.
185 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to take several tapes out of a tape devi ce simultaneously . Your tape dev ice does not have a mail slot and t he tapes to be taken o ut are locat ed in slots of non-det achable magazine(s).
186 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o s tart the operation. R es cann in g The informat i on abo ut the c o ntents of t apes is st ored in a dedicated database. The rescanning operation reads the content s of tapes and u pda tes the database i f the information in it mi smatches the dat a s tored o n tapes.
187 Copyr i ght © Acronis , In c., 2000-20 1 1 Result. T he selected tap es are moved to the pool associated with the sel ected vault. The b a ckups stored on the t apes can be fo und in th i s vault. A backup spread over several tapes will not appear in the vault until all of th ese tapes are rescanned.
188 Copyr i ght © Acronis , In c., 2000-20 1 1 Combination of fast an d full inventorying Full inventory i ng of an entire tape device may t ake a long time. If you need t o inventory only a few tapes, proceed as follows: 1. Perform the fast inventorying of t he tape device.
189 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat to d o if I re mov ed a t ap e b y mis ta ke? Unlike an erased (p. 185 ) tape, the data from a remove d tape i s not physically deleted. Hence, you can make backups stored on such tape available again.
190 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. If you back u p multipl e machines t o a tape library with multiple drives, assoc iate the vaul t with the who l e library. This wil l allow you t o back up the m achines simul taneousl y via different dri ves.
191 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .2 Ex am ple 2. Bac kin g u p t o ta p es o n a w e ek ly r o ta tio nal ba sis Consider the fo l lowing scenar i o: You want to back up several machines to a tap e devi ce at tached to Acronis Backup & Recovery 11 Storage Node.
192 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .3 Ex am ple 3. Dis k- to -di sk- to tap e wi th se ndin g tap es to an off- sit e st ora ge Consider the fo l lowing scenar i o: You want to back up a machine t o a hard di sk and replicat e each backup to t he locally attach ed tape d evice.
193 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Perform the fast inventorying (p. 187 ) with the Mov e newly detected tapes f rom the 'Unrecognized ta p es' or ' Imported tapes' pools to the 'Fr ee tapes' pool chec k box select ed.
194 Copyr i ght © Acronis , In c., 2000-20 1 1 Up to 50 storage nodes c an be set up. 6 . 4 . 2 S u p p o r t e d t y p e s o f s t o r a g e A managed vault c an be organized: On t he hard drive.
195 Copyr i ght © Acronis , In c., 2000-20 1 1 The mac hi ne where t he storage node i s planned to be installed meet s the system requirements described in t he installation document ation . You downloaded the setup p rogram of Ac ronis Backup & Recovery 11.
196 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Select t he storage node; th en, perform t he required operations as described i n "Actions o n storage no des" (p.
197 Copyr i ght © Acronis , In c., 2000-20 1 1 However, if UserA i s a memb er of the Administrato rs group on the mac hi ne, t hi s user can additionally ac cess the archives creat ed from this machine by UserB even though UserA's accou nt on t he storage node is a regular one.
198 Copyr i ght © Acronis , In c., 2000-20 1 1 Refresh th e list of storage nodes Click Refresh . The manage ment conso l e will update the list of sto r age nodes from the managem ent serve r with the most r ecent in format i on. The list of storag e nodes is refreshed auto m atically based on even ts.
199 Copyr i ght © Acronis , In c., 2000-20 1 1 Withdrawn - the storage node was registered on ano t her management server . As a result, it is not possibl e to c ontrol t he node from t he current management server . Archives - the total number of archives stored i n all the vaults managed by the storage no de.
200 Copyr i ght © Acronis , In c., 2000-20 1 1 Parameters related to compac ting As backups are deleted from a d edupli cating vault, its dedupli cation data store (p. 205) may contain unused dat a blocks (items) th at are no l onger referred to fro m any backup.
201 Copyr i ght © Acronis , In c., 2000-20 1 1 The C o mpacting Trigger Threshold parameter enables you to set up a balance between t he extra space requ i red to store unused i tems and the compacting frequency.
202 Copyr i ght © Acronis , In c., 2000-20 1 1 Fast Operation C on nection Limit Description: Specifi es the maximum number of si multaneous co nnec tions to t he st orage node for purposes o ther than backup, rec overy, and operations with arc hi ves.
203 Copyr i ght © Acronis , In c., 2000-20 1 1 The C h eck Hash Va lue On Ser v er Si d e parameter determines whether the storage node must ensure th at the hash value matc hes the data block. Such check puts an additional load on th e storage no de.
204 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the am ount of free space in a managed vault, in megabytes, below which an error is recorded i n the storage node's log and any backup to the vault bec omes prohibited.
205 Copyr i ght © Acronis , In c., 2000-20 1 1 deduplicati ng vault . The D edupli cation add-on t o the agent must be installed on any mach i ne that backs u p to such vault. Without the add -on backing up t o the vault i s not possible. The dedu pl ication is p erformed on data blocks.
206 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e the backup pr ocess is c ompl eted, the v ault c onta ins the resulting backup and the temporary file with the unique data blocks. T he temporary file will be pro cessed on the next stage. The ba ckup (TIB file) cont ai ns hash values and the data that cannot be d edupli cated.
207 Copyr i ght © Acronis , In c., 2000-20 1 1 Compac ting After one or more backup s or archives have been del eted fro m the vaul t either manually or during cleanup the dat a store may c on tain blocks whi ch are no longer referred to from any arch i ve.
208 Copyr i ght © Acronis , In c., 2000-20 1 1 To increase deduplicat i on performanc e, follow the rec ommendations b el ow. Place the deduplication databas e and dedupl icating va ult on separate p.
209 Copyr i ght © Acronis , In c., 2000-20 1 1 64 -bit opera ting sys tem For o ptimal deduplication performance, install t he sto r ag e node i n a 6 4 -bi t o pera ting system.
210 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip: The al l ocati o n unit si ze on most NTFS and ext3 volumes is 4 KB. This al l ows f o r block-le v el de duplicat i on. Other exam p les o f all o cation u nit sizes allowing f o r block-lev el dedu p licati o n incl u de 8 KB, 16 KB, and 64 KB.
211 Copyr i ght © Acronis , In c., 2000-20 1 1 7 Op er ati ons wi th a rchiv es and ba ckup s 7. 1 Va l ida ti ng ar chi ve s a nd ba ck ups Validation is an o peration that checks t he possibili ty of data rec overy from a backup. Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on.
212 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. When to validate Start validation (p. 213 ) Specify when and ho w often to perform validation.
213 Copyr i ght © Acronis , In c., 2000-20 1 1 To select a cent ral ized vault, ex pand t he Centrali zed group and click th e appropriat e vault.
214 Copyr i ght © Acronis , In c., 2000-20 1 1 Ch oo se on e o f th e f o llo win g : Now - to start t he val idation t ask rig ht aft er its creation, t ha t is, aft er clicking OK on the Validation page . Later - to start t he one-time validation task, at the date and time you specify.
215 Copyr i ght © Acronis , In c., 2000-20 1 1 Your choice o f backups belonging t o the same arch i ve - the resul ting archive will c ontain only the specified backup s. Consolidat i on is performed as required, so the resulting archive may co ntain full, incremental an d differential bac kups.
216 Copyr i ght © Acronis , In c., 2000-20 1 1 personal vaults, locally att ached tape dev ices, removable media and , in the ad v anced produ ct versions, managed an d unmanaged c entralized vaults. When th e console is connect ed to a management server , two export methods are available: Export from a manag ed vault .
217 Copyr i ght © Acronis , In c., 2000-20 1 1 Backups - you n ee d to specify the archive first, and then select t he desired backup(s) in this archive.
218 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy cr ede nt ia ls 1. Select o ne of the following: Use the curre nt user credentials The so ftware wil l access the location usi ng the credentials of th e current u ser. Use the following cr edentials The pro g ram will access t he location using t he credential s you spec ify.
219 Copyr i ght © Acronis , In c., 2000-20 1 1 To export data t o a locally att ac hed tap e devi ce, expan d the Tape drives group, t hen click the required device. I n stan d- al one editions of A cronis Backup & Recovery 11, t ape devices are available only if you have upgraded from Acro ni s Back up & Rec overy 10.
220 Copyr i ght © Acronis , In c., 2000-20 1 1 Pass word . The passwor d for the account. 2. Click OK . Acc o rding to the original FTP s p ecif i catio n , crede ntials requir ed for acces s to FTP servers are transferr ed through a n etwork as plaintext .
221 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 1 A r c h i v e s e l e c t i o n Selecting the archive 1. Enter the full path to the l ocation in t he Path field, or sel ect the desired folder in th e folders tree.
222 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 2 B a c k u p s e l e c t i o n To sel ect a ba ck up : 1. Select o ne of the backups by its creation date/time. 2. To assist you wi th choosing th e rig ht bac kup , th e bottom table d isplays the volume s contained in the select ed backup.
223 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 5 M a n a g i n g m o u n t e d i m a g e s Onc e a volume is mount ed, you can b r owse files and folders co ntained in the backup usi ng a file manager and c opy the desired files to any destination.
224 Copyr i ght © Acronis , In c., 2000-20 1 1 source. Validation of an a r chive will check all the a rc hive's backups . Export an archiv e Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted archive as a sou rce.
225 Copyr i ght © Acronis , In c., 2000-20 1 1 data block sav ed in the backup . Export a backup Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted backup as a source . The expo r t of a backup c r eates a new archiv e with a se l f -sufficient c opy of the backup in the locat i on you speci fy.
226 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 4 . 4 D e l e t i n g a r c h i v e s a n d b a ck u p s The Backups del etion window disp l ays the same tab as for the vaults view, but with check boxes for each arc hive and backup. The arc hiv e or b ackup you have cho sen to delete has th e check mark.
227 Copyr i ght © Acronis , In c., 2000-20 1 1 8 Bo ot ab le med ia Bootable media Bootab l e media is physical media (C D, D VD, U SB drive or other m edia support ed by a machine BIO S as a bo ot d.
228 Copyr i ght © Acronis , In c., 2000-20 1 1 PE -based bootable media does n ot support UEFI. 8. 1 Ho w to c rea te bo ota bl e med ia To enable creat ing physical media, t he machine must have a CD/DVD recording drive or allow a flash drive to b e attached.
229 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// www.microsoft . com/downloads/detai l s.aspx?fa m ilyid=696DD 665 -9F76 - 4177 -A 811-39C26 D3B3B3 4&displayl ang=en You can find system requirements for installation b y follow ing the abo v e links.
230 Copyr i ght © Acronis , In c., 2000-20 1 1 build an ISO i mage of a b ootab le disc to burn it later on a blank d isc upload t he selected co mponents to Acronis PXE Server upload t he selected co mponents to a WDS/RIS. 8. [optional] Wi ndows system drivers to be used by Acronis Universal Restore (p.
231 Copyr i ght © Acronis , In c., 2000-20 1 1 nousb2 Disables USB 2.0 sup port. USB 1.1 devices st i ll work wit h this parameter. This p arame ter allows you t o use some USB drives in th e U SB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard d isk drives.
232 Copyr i ght © Acronis , In c., 2000-20 1 1 Pre-configuring multiple netwo rk connection s You can pre-con fi gure TCP/I P settings fo r up to ten network interface cards. To ensu re that each NIC will be assigned th e appropriate sett i ngs, c reate the media on the serv er for whic h the media is custo m ized.
233 Copyr i ght © Acronis , In c., 2000-20 1 1 to get the mass-storage drivers t hat you explicitly specify fro m the m edia. This is necessary when the t arget hardware has a spe cific mass storage cont ro ll er (such as a SCSI, RAID, o r Fi ber Channel adapter) for t he hard disk.
234 Copyr i ght © Acronis , In c., 2000-20 1 1 8 . 1 . 3 A d d i n g t h e A c r o n i s P l u g - i n t o W i n P E 2. x o r 3 . 0 Bootab l e Media Builder provides t hree methods of integrating Acron i s Backup & Recovery 11 with WinPE 2.x or 3.
235 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e a mac hine boots into WinPE, Acronis Backup & Recovery 11 starts automatic al ly. To crea t e a PE i mag e (ISO fil e) fr om th e resu lt ing W IM f ile : replace th e default boot .wim file in your Windo ws PE fo l der with t he newly created WIM fi le.
236 Copyr i ght © Acronis , In c., 2000-20 1 1 Remote connection To connect to the m achine remot el y, select Connect -> M a nage a remote machine in the console menu and specify one of the mac hine's IP addresses. P rovi de the user name and password if these have been configured when creat i ng the boo table media.
237 Copyr i ght © Acronis , In c., 2000-20 1 1 3. From t he list of suppor ted video mod es, choose the ap propriate one b y typing its number (for example, 318 ), an d then press ENT ER.
238 Copyr i ght © Acronis , In c., 2000-20 1 1 acronis asamba lash Linux commands and utilities busybox ifco nfig rm cat init rmmod cdre cord insmod route chmod iscs iadm scp chown kill s.
239 Copyr i ght © Acronis , In c., 2000-20 1 1 8. 5 A cro ni s Sta rtu p Re cov ery Man age r Acronis St artup Recovery Manager is a modificat i on of the boot abl e agent (p. 368), residi ng on the system disk in Windows, or on t he /boot partition in Linux and co nfi gured to start at boot time on pressing F11.
240 Copyr i ght © Acronis , In c., 2000-20 1 1 Bootab l e compon ents are u ploaded to Acro nis PXE Server using Acronis Boo table Media Builder. To upload bo otable component s , start th e Bootable.
241 Copyr i ght © Acronis , In c., 2000-20 1 1 If the h ardware has multiple network interfac e cards, make sure t hat the card suppor ted by the BIO S has th e network cable plugged in.
242 Copyr i ght © Acronis , In c., 2000-20 1 1 9 D isk m ana gem ent Acronis Disk D irector Lite is a tool for prepa ri ng a machine disk/volume co nfi guration fo r recovering the volume ima g es saved by t he Acronis Backup & Recovery 11 software.
243 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Back up the disk on whi ch volumes will b e created or managed. Havin g your most i mportant data backed up to ano ther hard disk, network share o r rem ovable media will allo w you to wor k on disk volumes b ei ng reassured th at your dat a is safe.
244 Copyr i ght © Acronis , In c., 2000-20 1 1 The t op part of the view co ntains a disks and v olumes table enabling data sorting and c ol umns custo m ization and toolbar.
245 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis Disk D irector Lite wil l detect that the disk is u n usable by the syst em and n ee ds to be initialized. The Dis k management view will show t he newly detected hardware as a gray block with a grayed icon, thus indicating t hat the di sk is unusable by the sy stem.
246 Copyr i ght © Acronis , In c., 2000-20 1 1 .
247 Copyr i ght © Acronis , In c., 2000-20 1 1 I f you ne ed to co p y th e NT si gna tu re: 1. Select t he Copy NT signature .
248 Copyr i ght © Acronis , In c., 2000-20 1 1 1. MBR disk c onversi on: dynami c to basic (p. 249) using t he Convert to basic operat i on. 2. Basic disk c onversi on: M BR to GPT using the Convert to G PT operation. 3. GPT disk c onversi on: b asi c t o dynamic (p.
249 Copyr i ght © Acronis , In c., 2000-20 1 1 Sys tem disk conversion Acronis Disk D irector Lite does not require an operat i ng system rebo ot after basic to dynamic conversion o f the disk, if: 1. There is a si ngle Windows 2008 /Vi sta op erating syste m installed on the di sk.
250 Copyr i ght © Acronis , In c., 2000-20 1 1 safe co nversion of a dynami c disk t o basic when it co n t ains volumes with data for simp l e and mirrored volumes in multiboot systems, boot ability of a syst em that was offline during t he operation 9 .
251 Copyr i ght © Acronis , In c., 2000-20 1 1 Store coll ections of simi lar files separately for exam ple, an MP3 c ollection or vi deo files on a separate volume; Store backups (images.
252 Copyr i ght © Acronis , In c., 2000-20 1 1 data it self. If a physical disk fai l s, t he portion of the RA ID -5 volume t hat was on that failed disk can be re-creat ed from the rem aining data and the parity.
253 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a S triped volume: Select t wo or more dest i nation disks to create the v olum e on. To create a RA ID-5 volume: Select t hree destination disks t o create the volume o n.
254 Copyr i ght © Acronis , In c., 2000-20 1 1 In setting t he cluster size you can ch oose between any number in t he preset amount for each file system. Note, t he program suggests the cluster size best sui ted t o the volume with the chosen file system.
255 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 3 S e t a c t i v e v o l u m e If you have several pri mary volumes, you must specify one to be the boot vol ume.
256 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 5 C h a n g e v o l u m e l a b e l The volume label i s an optional at tribute. It is a name a ssi gned to a volume for easier recognition.
257 Copyr i ght © Acronis , In c., 2000-20 1 1 If you set a 64K cl uster size for FAT16/F AT32 or an 8KB-64KB cluster size f o r NTFS, W indows ca n mo u nt the volume, b ut s o me pro g rams (e.g. Setup pro grams) might ca lculate its disk s pa ce incorr ectly.
258 Copyr i ght © Acronis , In c., 2000-20 1 1 10 Ad mi nis ter ing a man ag e d mac hin e This sect i on desc ri bes the v iews that are avail able through the navigation tree o f the console connec ted to a managed machine and ex plains how to work with each vi ew.
259 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a plan/tas k Click Det a ils . In the respect ive Plan De t ails (p. 267 ) or Task De t ails (p. 26 8) wi ndo w, revie w the plan or task deta i ls. View plan' s/task's log Click Log .
260 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/task Click Edi t . Backup plan editin g is perform ed in the same way as creation (p . 45 ) , except f or the follow i ng limita t ions : It is not always pos sible to use all sch eme options, when ed iting a backup pl an if the creat ed arch i ve is not empty (i.
261 Copyr i ght © Acronis , In c., 2000-20 1 1 1 Need intera ction At least one task ne eds user interactio n. Otherwise, see 2. Identify the tasks that need i ntera ction (the p r ogram wil l displa.
262 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 2.3 Ta s k st ate s A task c an be in one of the fo llowing stat es: Idle ; Waiting ; Running ; Need i nteraction .
263 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 1 . 3 E x p o r t a n d i m p o r t o f b a c k u p p l a n s The expo rt operation creates a fil e with c ompl ete c onf ig uration of the bac kup plan. You can import the file to reuse the export ed backup pl an on another machine.
264 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 3.1 Ed it ing th e exp ort f il e The expo rt file is an .xml file and c an be edited with a text editor.
265 Copyr i ght © Acronis , In c., 2000-20 1 1 </lo gin> <pas sword e n crypted= "true"> XXXY YYZZZ888 </pa ssword> How to change item s to back up Replacing a directly spec ified item with another directly s pecified item Inside the <plan><target s><in clusi ons> section: 1.
266 Copyr i ght © Acronis , In c., 2000-20 1 1 <specific> <backup_type > disks </backup_typ e> <disk_level_ options /> <file_level_ options /> <inclusion_r ules> &.
267 Copyr i ght © Acronis , In c., 2000-20 1 1 The default path to the dedicat ed f older is %ALLUSERSPROFI LE%AcronisBa ck u pAndReco v eryim p ort . The pat h is stored in the reg istry key HKEY_LOC AL_MACHINESOFTWAREAcronis MMS Configur a tionImport f olderPath .
268 Copyr i ght © Acronis , In c., 2000-20 1 1 Last finis h time - how much time has passed since the last plan o r task end. Last r esult - the result o f the last plan or t ask run.
269 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .2 Lo g The loc al event log st ores the history of o perations performed by Acronis Bac kup & Recovery 11 o n the mac hi ne. To view a plain list of log ent ri es, select Events in the D isplay drop-down l ist; to view log entries grouped by activities, select Activities .
270 Copyr i ght © Acronis , In c., 2000-20 1 1 Save all the filtered log entries to a file 1. Set filters to get a list of the log entri es that satisfy the filteri ng criteria. 2. Click Save all to file . 3. In the opened window, spec if y a path and a na m e for the f ile.
271 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixing issues that caused ale rts To find and fi x the issue that caused th e alert , click Fix th e is sue . You wi ll be t aken to the correspo nding view,where you c an examine the issue and take t he ne cessary steps to resolve it.
272 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 5 . 1 C u s t o m e r E x p e r i e n c e P r o g r a m This opt i on defines whet her the machine will participa te in th e Acronis Customer Experienc e Program (ACEP).
273 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts view of the Navigation pane. When the c onsole is connected to the management serv er, t hi s sett i ng will also co ntrol the color sc heme of the Last backup column's value for eac h machine.
274 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p .
275 Copyr i ght © Acronis , In c., 2000-20 1 1 You can override the set tings set here, ex clusively for the events th at occ ur during backup or during recovery, i n the D efaul t backup and recovery options.
276 Copyr i ght © Acronis , In c., 2000-20 1 1 /etc/snmp/snmpd.conf - co nfi guration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd . conf - c onfiguration file for th e Net-SN MP trap daemon. 10 .5. 4.3 W ind ows ev ent l o g This opt i on is effec tive only in Windows o perating systems.
277 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to use this option, you must be l ogged on as a member of the Administrators g roup on the mac hi ne. You have the opportunity to register the mac hi ne on the management server when i nsta l ling an Acronis Bac kup & Recovery 11 agent.
278 Copyr i ght © Acronis , In c., 2000-20 1 1 Google Chr o me. In Options , click Under th e Hood . Under Netw o rk , click Change proxy s ettings .
279 Copyr i ght © Acronis , In c., 2000-20 1 1 11 Ce nt ral ize d m ana gem ent This sect i on c overs operations that can be performed centrally by using the components fo r centralized manage ment. The c ontent of this section i s only applicable t o advanced editions of Acronis Bac kup & Recovery 11.
280 Copyr i ght © Acronis , In c., 2000-20 1 1 Organizing a manag ed archive storage What sho uld the capacity o f your cent ral ized vault be? What if tran sferri ng size able backups t o the vault .
281 Copyr i ght © Acronis , In c., 2000-20 1 1 3. To specify creden tials for c on nection, c lick Options and then type the u ser name and password in the Us er name and Password boxes respec tivel y. In Windows, if you leave the User na me box empty, the c redentials under which the co ns ole is running will be used.
282 Copyr i ght © Acronis , In c., 2000-20 1 1 For informat i on abou t Acronis security g roups and t hei r default mem bers, see Acronis security groups (p.
283 Copyr i ght © Acronis , In c., 2000-20 1 1 Example 2 The ab ove auth entication policy might not work on Linux distributions with kernel version 2.4 because the p am_succeed_if.
284 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to c onne ct to the management serv er remotely , an admi nistrator of the management server must also b e a member of the A cronis Remot e Users group.
285 Copyr i ght © Acronis , In c., 2000-20 1 1 New accounts If you c hoose to create dedicated user accounts for the services, th e setup program wil l create the following user ac counts: For t .
286 Copyr i ght © Acronis , In c., 2000-20 1 1 In addition, there are two Acronis services which ru n under a syst em acc oun t: The Acr on is Scheduler 2 Servi ce provides scheduling fo r Acronis compon ents' tasks. It runs und er the L ocal System account and cannot run u nder a different ac count.
287 Copyr i ght © Acronis , In c., 2000-20 1 1 C omp on en t na me C an be cl ien t C an be s erv er Acronis Backup & Recover y 11 Management Console Yes No Acronis Backup & Recover y 11 Agen.
288 Copyr i ght © Acronis , In c., 2000-20 1 1 the Acro ni s client. Du ring component installation you mig ht b e asked to c onfirm the port opening o r to open the po r t manually, in case y ou are usi ng a firewall other than Windows Firewall.
289 Copyr i ght © Acronis , In c., 2000-20 1 1 For self-signed cert ificates, the c ertifi cate thumbprint (also known as fingerprint or hash) is used for future host identification: if a client has .
290 Copyr i ght © Acronis , In c., 2000-20 1 1 When selecting what data to back up, you can either s el ect items on the registered mac hi nes directly or use the selection rul es. For more i nformation, see "Selecting data to ba ck up" (p.
291 Copyr i ght © Acronis , In c., 2000-20 1 1 Selecting a c heck box for a mac hi ne means bac ki ng up all the machine's disks. To select individual disks and/or v olumes, expand the m achine item an d select check boxes next to t he disks and/or volumes .
292 Copyr i ght © Acronis , In c., 2000-20 1 1 Point t o t he folders and files to be ba cked up . If you specified a pat h to a file or folder explicitly, t he plan will back up this item on each machine where this exact path will be foun d. To i nc l ude I n th e Fi l es and f ol de rs co lum n, t yp e or se le ct : File Text.
293 Copyr i ght © Acronis , In c., 2000-20 1 1 The root user's home directory /root Directory for all user-related prog ram s /usr Directory for system configurat i on fi l es /etc 1 1 .
294 Copyr i ght © Acronis , In c., 2000-20 1 1 Boot volu me Type or sel ec t: [ B OOT] Refers to the re g iste red machin e's boot volume. The boot volu me contains th e W indows folder and the suppo rting files for th e Windows op erating sys tem ( typ i cally located in the Wi ndowsSystem32 folder ) .
295 Copyr i ght © Acronis , In c., 2000-20 1 1 Note on Li nu x machines You can include bo th Windows and Linux volumes (partitions) in on e centrali zed backup plan. For example, i t is possible to set up a cent rali zed backup plan to back up volume C: on Windows machines and partition /dev/hda1 on Linux machines.
296 Copyr i ght © Acronis , In c., 2000-20 1 1 /dev/vg_mymachine/lv_root /dev/vg_mymachine/lv_bin To see the l ist of logical volumes on a machine, run the lvdisplay ut ili ty.
297 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to create Acronis Secu re Z one in ad v ance o n each mac hi ne the cen tralized plan is created for. For information on how to c reate Acronis Secure Zone, see t he C reating Acronis Secure Zone (p.
298 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 2 . 6 W h a t i f a m a c h i n e d o e s n o t h a v e d a t a m e e t i n g t h e s e l e c t i o n r u l e s A centralized b ackup plan can be deployed to a machi ne that does not have data meeting the selection rules.
299 Copyr i ght © Acronis , In c., 2000-20 1 1 from th e regi stered machines and fro m the m anagement server. The c hart shows the n umber of log entries of each t ype ( Su cceeded , With warnings , Failed ) for a part i cular day. Statistic s for the selected date are displaye d to the right o f the ch art.
300 Copyr i ght © Acronis , In c., 2000-20 1 1 Select a m achine (or group) to perform ac tions on it. See "Actions on machines" (p. 301) and "Actions on groups" (p.
301 Copyr i ght © Acronis , In c., 2000-20 1 1 Example: T he accounting depart m ent fo rm s a separate Act i ve Directory organizational unit (OU). You si mply specify the ac counting O U as the group m e mbership criterion and create t he centralized b ackup pl an for i t.
302 Copyr i ght © Acronis , In c., 2000-20 1 1 deleted fro m the m achine . If the machi ne is not ava i lable at the m oment, these actions will be per formed on the ma c hine as soon as the mach ine becomes ava il ab l e to th e manage m ent serv er.
303 Copyr i ght © Acronis , In c., 2000-20 1 1 Other actions To Do View deta i led i nformat i on on a ma chine Click Det a ils . In the Machi ne details (p . 306 ) window, exa mine infor mati o n on the ma chine. View log entries of a machine Click L og .
304 Copyr i ght © Acronis , In c., 2000-20 1 1 Select t he Sav e passw o rd check box to store t he pass word fo r futu re connections. 5. Click Next , and then click Proceed . Initiating registration on the machine side The registrat i on proc edure can be initiated on the machine side.
305 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the P ath field, enter a path to the .txt or . csv file, or click Browse and select the file in the Browse window. 4. Under Logon setti ngs , specify t he user name and p assword of a user who is a member of the Administrato rs group on all machines th at are listed in the file.
306 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o add machines. Onc e the machines app ear in th e group, the centralized backup plans created for the group (if any) are deployed t o the mach ines.
307 Copyr i ght © Acronis , In c., 2000-20 1 1 Installed a gents - full name of A cronis agents, installed on the machine. Proces sor - the type of CPU used in t he managed machine. CPU clock - c l ock rate of the C PU. RAM - m emory size.
308 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 2.3 Ac ti ons on gr oup s Actions are avai lable when y ou select the Machines with agents vi ew i n the N av igation tree. You sel ect a g roup in the Navigation tree o r in the Machines wi th agents view to perform an action on t he group.
309 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Move one c ustom group to another Click Move to . In the Move t o gro up (p. 311 ) window, sp ecify a group that will be a new parent of the sele cted group. Delete a custom group Click Dele t e . Deletion of a pa r ent g r oup wi l l delete i ts chi ld groups as w ell.
310 Copyr i ght © Acronis , In c., 2000-20 1 1 Operating system: Windows Server 2 008 Operating syst em : Windows Server 2003 will add t o the same group all the m achines whose operating system is W indows 20 00 OR Windows 200 3.
311 Copyr i ght © Acronis , In c., 2000-20 1 1 A registered machin e has to be specified by its registration address, that is, you need t o provide exactly t he same host name, full y qualified domain na me (FQDN), or I P address as was specified when th e machine was i nitially added t o the management server.
312 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a backup plan Click Det a ils . In the Backup plans and tasks window, exa mine all infor m ati on related to the selected ba ckup plan. View log o f a back up plan Click Log . The Log vie w wil l display a list of the l og ent r ies related to the selected backu p plan.
313 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding a virtu al machine as a virtual machi n e On Ac ronis Backup & Recovery 11 Management Server, a machine is considered virtual i f it c an be backed up from t he virtualization host without inst alli ng an agent on the machine.
314 Copyr i ght © Acronis , In c., 2000-20 1 1 To review detailed informat i on on the sel ected plan (task), use t he information panel at the bott om of the wi ndow. The pan el is collapsed by defaul t. To expand the panel, c l ick the arrow mark ( ).
315 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/tas k Click Edi t . Centralized backup pla n The editing of centra lized backu p plans is performe d in th e same way as creating . Once the plan is ed ited, the m ana g ement serv er updates the plan on all machin es the plan was deployed to .
316 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 3 . 6 L i c e n s e s The L icenses view enables you to m anage licenses stored on Acronis Lic ense Server. The l icense server can be either integrated with A cronis Backup & Recovery 11 Management Server, or installed as a separat e component .
317 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Acti on s menu, sel ect C h ange licens e server . 4. Specify th e name or IP address of the machine with th e license server .
318 Copyr i ght © Acronis , In c., 2000-20 1 1 LicenseServerCmdLine .exe supports t he followi ng para meters: --status <IP -ad dress or ho stname> Displays the t otal number of l icenses and t he number of available licenses for eac h Acronis produc t.
319 Copyr i ght © Acronis , In c., 2000-20 1 1 A predefined report template is preset so that you can generate a repo rt with one click. To start generating a report , select a report template in the Repo rts view, an d then c l ick Generate on the toolbar.
320 Copyr i ght © Acronis , In c., 2000-20 1 1 Origin : The types of origin of t he ba ckup plans Local and/or Ce n tralized . Machines : The list of machines on which the backup plans exis t. Backed up data ty pe : Th e types of backed up data Machines/Disks/Volum es and/or Files .
321 Copyr i ght © Acronis , In c., 2000-20 1 1 Select whet her to show all items in a sing l e table or to group them by a particular column. Specify which table columns to show, and in which order. Specify how to sort the table. 11 .3. 7.
322 Copyr i ght © Acronis , In c., 2000-20 1 1 With th e default filter settings, the report includes informat ion about all centralized manage d vaults plus the combined total. Report view Under Report view , choose ho w the report will look: Specify which table columns to show, and in which order.
323 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 7.8 R ep ort v iew In order fo r your web bro wse r to correct ly display dates and other information i n generated repo rts , enable act i ve cont ent (JavaScript). You can all ow act i ve cont ent to run t emporar i ly for t he currently displayed webpa ge, or enable i t permanent l y.
324 Copyr i ght © Acronis , In c., 2000-20 1 1 To export en tire table cont en ts to a *.txt or *.csv file, click Save all to fil e . Alerts view on the management s erver When th e console is connect ed to the management server, the Alerts view displays a l erts c ol lected from bot h the registered machines and t he management server.
325 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Select a s i ngle a c tivity Select Activi t ies in the Dis play drop-down list and click an a cti vity. The Informa t ion pane wi l l show l og ent r ies for the se lected activ i ty. Select a s i ngle log entry Click on it.
326 Copyr i ght © Acronis , In c., 2000-20 1 1 To copy the d etail s, c l ick the Copy to clipboard button . Log entry data fields A log entry c ontains the fo l lowing data fields: Type - Type o f event (Error; Warning; I nformation). Date and time - Date and time when t he event took place.
327 Copyr i ght © Acronis , In c., 2000-20 1 1 You al so have t he abili ty to delete proxies from th e list. Please keep i n mind th at an y chan ge to this option affects the entire management server.
328 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts sec tion of the Dashbo ard . When t he console is c onnected to the management serv er, t hi s sett i ng will also c ontrol the color scheme o f the Last c onnect column's value for eac h machine.
329 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p .
330 Copyr i ght © Acronis , In c., 2000-20 1 1 To disable this opt i on, clear t he Log events check box. S NMP not ifi cat ion s This opt i on defines whet her the management server h as to send it s own log events t o the specified Simple Network Management Protoc ol (SNMP) manag ers.
331 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Maximum log si ze: 1 GB . On cleanup , keep 95% of the maximum log size . When th e option is enabled, the program compares the act ual log size with the maximum size aft er every 100 l og entries.
332 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 4 . 1 P a r a m e t e r s s e t t h r o u g h a d m i n i s t r a t i v e t e m p l a t e The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 component s that can be set by using Acronis Adm i nistrative Template.
333 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// msdn2.microsoft.c om/en-us/library/aa374 177.aspx 11 .4. 1.2 Ac ron is Ba ckup & Re cov ery 11 Ag ent f or Wind ow s The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 Agent that can be set by using Acronis Administrat iv e Temp la te.
334 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 11 will cont i nue working with full func tionali ty for the number of days specified in Maximum T ime W ithout License S erver , as count ed fr om the m oment o f installation or from the last successful check.
335 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), or 5 (Critical error) Default value: 4 (only er.
336 Copyr i ght © Acronis , In c., 2000-20 1 1 An empty st ri ng means the folder %AllUsersProfile%Application DataAcron isBackupAndRecovery MMS Temp.
337 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the password for aut hen tication wi th t he proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Important.
338 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es whether to record Acronis Bac ku p & Rec overy 11 Management Serve r's events into the event log.
339 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 200 If the t otal number of online registered machines d oes not exceed the value in Maximum Con nections , c onnections to those m achines are always kept , and the management serv er periodical l y performs sync hronization wi th eac h machine.
340 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: T rue or Fa lse Default value: Fal se By default, Acronis Backup & Recovery 11 Management Server c onnec ts t o registered machines to perform synchronizat i on in particular, t o retrieve data such as backup l ogs.
341 Copyr i ght © Acronis , In c., 2000-20 1 1 Specifies the l ocation and initial size of the snapshot storage a temporary file that i s used when backing up data by taking a snapsho t.
342 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the name or IP address of the proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string.
343 Copyr i ght © Acronis , In c., 2000-20 1 1 The c omponent wil l use the default settings, whic h is to use encryption if possible and to trust sel f-signed SSL c ertifi cates (se e the foll owing option).
344 Copyr i ght © Acronis , In c., 2000-20 1 1 Disabled Enc ryption is disabled; any connection t o a client ap pl ication which requires encryption will not be established. Required Data transfer will be perfo rm ed only if enc ryption is enabled on the client application (see "Client Enc ryption options" ); it will be encrypt ed.
345 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the minimum sever i ty level o f events to b e recorded in the file. Only events of levels great er than or equal to File Trace Mi n imal Level will be recorded.
346 Copyr i ght © Acronis , In c., 2000-20 1 1 12 On lin e bac kup This sect i on pro v ides details about using the Acronis Backup & Recovery Online service. T his service enables you t o do online backups t o Acronis Online Backup St orage. Acr o nis Backup & Rec o very On line might be un a vailable in y ou r region.
347 Copyr i ght © Acronis , In c., 2000-20 1 1 directly from the o nl ine storage. Files c an be recovered from disk -lev el bac kups as well as from file-level bac kups. For informat i on abou t backing up v irtual machines see "How to back up virtual machines to the online storage? (p.
348 Copyr i ght © Acronis , In c., 2000-20 1 1 Install Acronis software into the guest syst e m The mac hi ne will be treated as a physical one. Y ou wil l need a separa te server or workst ation subscription for this machine.
349 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 6.5 W hat ha ppen s if I ru n out of spa ce? When a mac hi ne's bac kups are about to exceed the storage space allowed by its subsc ri ption, you receive an e-mail n otification wi th an al ert.
350 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 7.3 Is I niti al S eedi ng a pa id s ervi ce? Ye s, you need to buy one Initial Seeding l icense per ma chine.
351 Copyr i ght © Acronis , In c., 2000-20 1 1 In Backup scheme , select Initial seeding . Specify t he s aid media as the b ackup destination. [Opt i onal, bu t strongly recommended] Enable backup encryption in Backup options > Archive protec tion .
352 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 1 Delicately remo v e your hard di sk drive from t he machine. S tep 2 Place the hard drive into an anti -static bag to pro tect the drive from electrostat ic discharge. If y ou do not have an anti-static bag, si mply wrap the hard drive into aluminum foil.
353 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 4 Choose the transport company t hat you will use for shi pping. On that company's web si te, prepare and print two prepaid shipping labels: 1. Shipping l abel for se nding your hard driv e. T his label is pl aced o n the top of the box.
354 Copyr i ght © Acronis , In c., 2000-20 1 1 An order w a s cr eated The backup is about t o start and t he license cannot be used for the same or any other machine. From t his point on, you can cancel th e order if something goes wron g . This will return the license to the po ol of available licenses.
355 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e you o r der Large Scale Rec overy for a par ticular machine, Ac ronis sends yo u a USB hard disk drive with all of t he bac kups made from t his machine. You can recover data directly fro m the di sk or copy the backups to a local or network folder.
356 Copyr i ght © Acronis , In c., 2000-20 1 1 can cancel the o rder if something goes wrong. This will return t he l icense to t he pool of available licenses. The order i s being process ed - Order processing in t he datacent er s tarted. Writing data Your backups are b ei ng written o nto the media.
357 Copyr i ght © Acronis , In c., 2000-20 1 1 If you purc hased your subscriptions o nl ine using the Ac ronis Web site, t hey are available immediate ly on your ac count management Web page. The newl y o btained subscriptions are li sted at the Man age Subscriptions tab .
358 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat doe s " Aut o- rene w" mean? Auto-renewal means t hat when th e curren t subscription expires, t he next subscription will be automat i cally selected from the available subscript ions. The n ext subscription must be ident i cal to the c urrent subscription.
359 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 9.8 Ca n I r evo ke a su bsc rip ti on f ro m a machi n e? You cann ot retur n an activated subscription to th e list of av ailable subsc ri ptions, but you can reassig n (p. 361 ) it to a di fferent mac hi ne in Acro ni s Backup & R ecovery 11 GUI .
360 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows Server 20 08/2008 R2 (x64) with Hy per- V. Microsoft Hyper-V Server 2008 / 2008 R2 . If your bac kups are likely to exceed the storage quota f or this type of subscription, you may want to use a sub scription with larger storage quota.
361 Copyr i ght © Acronis , In c., 2000-20 1 1 To act iv ate s ubs cri pt io n s 1. Connect the console to the management server. 2. In the Acti on s pane, click Activate online backu p subsc riptions . 3. Specify th e credentials to l og in to the onli ne storage.
362 Copyr i ght © Acronis , In c., 2000-20 1 1 Depending on your settings, t his backup wil l be either fu l l or incremental. But its size is not l ikely to be less than a full backup size. T herefore, it is not practical to reassi gn a subsc ri ption t o a machine whose first backup was done as an initial seeding.
363 Copyr i ght © Acronis , In c., 2000-20 1 1 To con fig ur e p ro xy se tti ng s f or an ag en t 1. Connect the console to the mac hi ne for whi ch you want to c onfig ure proxy set tings. 2. In the Opti o ns menu, l ocated on the toolbar, click Machine options .
364 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup and recovery options Some bac kup and recovery options are not supported by online backups. For example, Backup splitting (p. 101 ). By using the Backup perf ormance > Network con nection speed opt ion, you can vary the tran sferri ng speed as kilobytes p er second, but not as a per centage.
365 Copyr i ght © Acronis , In c., 2000-20 1 1 Permission for a machine to use an extra service of Ac r onis Backup & Recovery Online. You can buy Initial Seeding lic enses and/or Large Scale Recovery licenses . Reassign a subs cription Assign a sub scription that is already ac tivated, to a d iffe rent mach i ne.
366 Copyr i ght © Acronis , In c., 2000-20 1 1 13 G los sary A Ac ron is A c t ive Re stor e The Acro ni s proprietary technology that brings a system online immediately aft er the system recovery is st arted. The system b oots fr om the backup (p. 372 ) and the m achine bec omes operational an d ready t o provide necessary services.
367 Copyr i ght © Acronis , In c., 2000-20 1 1 Ac ron is Uni ve rsa l R est ore The Acro ni s proprietary technology that helps b oot up Windows or Linux on dissimilar hardware o r a virtual machine .
368 Copyr i ght © Acronis , In c., 2000-20 1 1 B ack up opti on s Configuration parameters of a backup o peration (p. 3 6 7), suc h as pre/post backup commands, maximum net work bandwidth all otted for the backup stream o r data compression level. Backup options are a part of a backup pl an (p.
369 Copyr i ght © Acronis , In c., 2000-20 1 1 B oota bl e medi a A physical med i a (CD, D VD, USB flash drive o r ot her m edia supported by a machine (p. 375 ) as a bo ot device) that contains the bootable agent (p. 368 ) or Windows Preinstallat ion Environment (Wi nPE) (p.
370 Copyr i ght © Acronis , In c., 2000-20 1 1 creating and managi ng centralized vau lts (p. 370 ) for storing archives managing sto rage nodes (p. 378 ) monitoring act i vities of the Acronis Bac kup & Reco v ery 11 compo nents, creating report s, viewing the c entralized log and more.
371 Copyr i ght © Acronis , In c., 2000-20 1 1 Consolidation m i ght be n ee ded when deleting backups , either manu al ly or during cleanup (p. 370 ) . For example, the retention rul es require to delete a ful l bac kup (p. 374 ) that has expired b ut retain the next incremental (p.
372 Copyr i ght © Acronis , In c., 2000-20 1 1 viewing the st ate, progress and properties of the centrali zed tasks (p. 370 ) exi sting on t he machine viewing and manag i ng the l og of t he agent's operat ions disk management operations, suc h as clone a disk, create volume, c onvert volume.
37 3 Cop yright © Acr o nis, In c., 200 0 -2011 D ynam ic dis k A hard disk managed by Logical Disk Manager (LD M) that i s available in Windows st arting with Windows 200 0. LDM helps flexibly allocate v olumes o n a storage device for bet ter fault t ol erance, better performance or larger volume size.
374 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic vol um e Any volume loc ated on dynamic d isks (p. 372 ), or more precisely, on a d isk group (p.
375 Copyr i ght © Acronis , In c., 2000-20 1 1 I Im ag e The same as Disk backup (p. 372). In cr eme nta l ba cku p A bac kup (p. 367 ) that stores changes to the data ag ainst t he latest bac kup. You need ac cess to ot her backups from the same arch ive (p.
376 Copyr i ght © Acronis , In c., 2000-20 1 1 M Ma ch ine A physical or v irtual comput er uniquely identified by an operat i ng system installation . Machines with multiple op erating systems (mu lti -boot syst em s) are c onsidered as multipl e machines.
377 Copyr i ght © Acronis , In c., 2000-20 1 1 P Pe rs ona l va ult A local or networked vault (p. 379 ) created using direct managem ent (p. 371 ). On ce a personal vault is created, a shortcut to it appears on the managed machine i n the Vaults list.
378 Copyr i ght © Acronis , In c., 2000-20 1 1 S S tat ic gr o u p A group of machines which a management server (p. 376 ) ad ministrator po pulates by manually adding machines t o the group. A mac hi ne remains in a static group until the administrator rem oves it from th e group or from the m anagement server.
379 Copyr i ght © Acronis , In c., 2000-20 1 1 Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validation of a disk backup c al culates a chec ksum for ev ery data bl ock saved in th e backup .
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il Acronis Backup & Recovery 11 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del Acronis Backup & Recovery 11 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso Acronis Backup & Recovery 11 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul Acronis Backup & Recovery 11 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il Acronis Backup & Recovery 11, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del Acronis Backup & Recovery 11.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il Acronis Backup & Recovery 11. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo Acronis Backup & Recovery 11 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.