User's Guide Acronis® Backup & Recovery ™ 10 Workstation
10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac
100 Copyright © Acronis, Inc., 2000-2010 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite
Copyright © Acronis, Inc., 2000-2010 101 Task states A task can be in one of the following states: Idle; Waiting; Running; Stopping; Need interacti
102 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta
Copyright © Acronis, Inc., 2000-2010 103 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you
104 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
Copyright © Acronis, Inc., 2000-2010 105 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
106 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'
Copyright © Acronis, Inc., 2000-2010 107 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
108 Copyright © Acronis, Inc., 2000-2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove
Copyright © Acronis, Inc., 2000-2010 109 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i
Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
110 Copyright © Acronis, Inc., 2000-2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m
Copyright © Acronis, Inc., 2000-2010 111 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click
112 Copyright © Acronis, Inc., 2000-2010 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d
Copyright © Acronis, Inc., 2000-2010 113 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo
114 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val
Copyright © Acronis, Inc., 2000-2010 115 To specify credentials 1. Select one of the following: Run under the current user The tasks will run u
116 Copyright © Acronis, Inc., 2000-2010 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a
Copyright © Acronis, Inc., 2000-2010 117 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going
118 Copyright © Acronis, Inc., 2000-2010 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na
Copyright © Acronis, Inc., 2000-2010 119 unique within the selected location. If you are satisfied with the automatically generated name, click OK.
12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
120 Copyright © Acronis, Inc., 2000-2010 6.2.9 Backup schemes Choose one of the available backup schemes: Back up now – to create a backup task
Copyright © Acronis, Inc., 2000-2010 121 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup
122 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
Copyright © Acronis, Inc., 2000-2010 123 Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r
124 Copyright © Acronis, Inc., 2000-2010 Start backup at: 12:00 PM Back up on: Friday Weekly/monthly: Friday Keep backups: Daily: 1
Copyright © Acronis, Inc., 2000-2010 125 Backups of different levels have different types: Last-level (in this case, level 4) backups are full;
126 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio
Copyright © Acronis, Inc., 2000-2010 127 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm
128 Copyright © Acronis, Inc., 2000-2010 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai
Copyright © Acronis, Inc., 2000-2010 129 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron
130 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent
Copyright © Acronis, Inc., 2000-2010 131 If the managed machine's operating system fails to start or you need to recover data to bare metal, b
132 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc
Copyright © Acronis, Inc., 2000-2010 133 default one. When the default value is set, the line disappears and so you always see only the settings th
134 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
Copyright © Acronis, Inc., 2000-2010 135 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh
136 Copyright © Acronis, Inc., 2000-2010 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical mach
Copyright © Acronis, Inc., 2000-2010 137 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot
138 Copyright © Acronis, Inc., 2000-2010 The new virtual machine will be configured automatically, the source machine configuration being copied wh
Copyright © Acronis, Inc., 2000-2010 139 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and
14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil
140 Copyright © Acronis, Inc., 2000-2010 Virtual machine type / virtualization server selection The new virtual machine can be created either on a
Copyright © Acronis, Inc., 2000-2010 141 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of
142 Copyright © Acronis, Inc., 2000-2010 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th
Copyright © Acronis, Inc., 2000-2010 143 you have chosen to use Acronis Active Restore (p. 196) because these features are primarily meant for i
144 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
Copyright © Acronis, Inc., 2000-2010 145 The same type of machines with the same name cannot be created in the same folder. Change either the VM na
146 Copyright © Acronis, Inc., 2000-2010 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too
Copyright © Acronis, Inc., 2000-2010 147 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub
148 Copyright © Acronis, Inc., 2000-2010 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t
Copyright © Acronis, Inc., 2000-2010 149 Credentials (p. 149) [Optional] The validation task will run on behalf of the user who is creating the tas
Copyright © Acronis, Inc., 2000-2010 15 XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di
150 Copyright © Acronis, Inc., 2000-2010 6.4.2 Archive selection Selecting the archive 1. Enter the full path to the location in the Path field,
Copyright © Acronis, Inc., 2000-2010 151 6.4.4 Location selection To select a location Enter the full path to the location in the Path field or se
152 Copyright © Acronis, Inc., 2000-2010 6.4.6 When to validate As validation is a resource-intensive operation, it makes sense to schedule valida
Copyright © Acronis, Inc., 2000-2010 153 [Optional] Provide credentials for the archive location. To access this option, select the Advanced view c
154 Copyright © Acronis, Inc., 2000-2010 6.5.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. T
Copyright © Acronis, Inc., 2000-2010 155 6.6 Managing mounted images Once a volume is mounted, you can browse files and folders contained in the b
156 Copyright © Acronis, Inc., 2000-2010 The resulting archive's name By default, the exported archive inherits the name of the original archi
Copyright © Acronis, Inc., 2000-2010 157 You can access the Export page from the Vaults view. Right-click the object to export (archive or backup)
158 Copyright © Acronis, Inc., 2000-2010 Specify: User name. When entering the name of an Active Directory user account, be sure to also specify
Copyright © Acronis, Inc., 2000-2010 159 3. Click OK. 6.7.3 Backup selection To specify a backup(s) to export 1. At the top of the window, sele
16 Copyright © Acronis, Inc., 2000-2010 1.7 Technical support As part of a purchased annual Support charge you are entitled to Technical Support a
160 Copyright © Acronis, Inc., 2000-2010 To export data to a network share, expand the Network folders group, select the required networked mach
Copyright © Acronis, Inc., 2000-2010 161 The program will access the location using the credentials of the task account specified in the General se
162 Copyright © Acronis, Inc., 2000-2010 Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free
Copyright © Acronis, Inc., 2000-2010 163 Acronis Secure Zone is always created at the end of the hard disk. When calculating the final layout of
164 Copyright © Acronis, Inc., 2000-2010 If there is not enough unallocated space, the program will take free space from the selected volumes, p
Copyright © Acronis, Inc., 2000-2010 165 Unless you use the GRUB boot loader and it is installed in the Master Boot Record (MBR), Acronis Startup R
166 Copyright © Acronis, Inc., 2000-2010 WinPE proved to be the most convenient bootable solution in large environments with heterogeneous hardware
Copyright © Acronis, Inc., 2000-2010 167 1. Download and install Windows Automated Installation Kit (WAIK). Automated Installation Kit (AIK) for W
168 Copyright © Acronis, Inc., 2000-2010 TCP/IP settings to be assigned to the machine network adapters. 6. [optional] Network port (p. 170):
Copyright © Acronis, Inc., 2000-2010 169 This parameter is implicitly specified when creating the bootable media, but you can remove this parameter
Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
170 Copyright © Acronis, Inc., 2000-2010 DNS server WINS server. Once the bootable agent starts on a machine, the configuration is applied to
Copyright © Acronis, Inc., 2000-2010 171 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to
172 Copyright © Acronis, Inc., 2000-2010 5. Specify the full path to the resulting ISO file including the file name. 6. Check your settings in th
Copyright © Acronis, Inc., 2000-2010 173 8. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int
174 Copyright © Acronis, Inc., 2000-2010 To connect to the machine remotely, select Connect -> Manage a remote machine in the console menu and s
Copyright © Acronis, Inc., 2000-2010 175 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Computer System
176 Copyright © Acronis, Inc., 2000-2010 cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map2
Copyright © Acronis, Inc., 2000-2010 177 Manually by using the lvm utility—see Creating the volume structure manually (p. 177). Creating the vo
178 Copyright © Acronis, Inc., 2000-2010 2. Click Acronis Bootable Agent. Then, click Run management console. 3. On the toolbar, click Actions, a
Copyright © Acronis, Inc., 2000-2010 179 Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the mac
18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
180 Copyright © Acronis, Inc., 2000-2010 To mount a backup volume 1. Use the --list command to list the volumes which are stored in the backup. Fo
Copyright © Acronis, Inc., 2000-2010 181 1. Create a disk image of the disk on which volumes will be created or managed. Having your most importan
182 Copyright © Acronis, Inc., 2000-2010 The top part of the view contains a disks and volumes table enabling data sorting and columns customizatio
Copyright © Acronis, Inc., 2000-2010 183 Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be initialized
184 Copyright © Acronis, Inc., 2000-2010 If there is some data on the disk that was chosen as the target, the user will receive a warning: “The sel
Copyright © Acronis, Inc., 2000-2010 185 If you need to copy the NT signature: 1. Select the Copy NT signature check box. You receive the warning:
186 Copyright © Acronis, Inc., 2000-2010 2. Basic disk conversion: MBR to GPT using the Convert to GPT operation. 3. GPT disk conversion: basic
Copyright © Acronis, Inc., 2000-2010 187 2. The machine runs this operating system. Basic to dynamic conversion of the disk, comprising of system
188 Copyright © Acronis, Inc., 2000-2010 Changing disk status Changing disk status is effective for Windows Vista SP1, Windows Server 2008, Windows
Copyright © Acronis, Inc., 2000-2010 189 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can
Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
190 Copyright © Acronis, Inc., 2000-2010 Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to
Copyright © Acronis, Inc., 2000-2010 191 If you are creating a dynamic volume and select one or several basic disks, as its destination, you will r
192 Copyright © Acronis, Inc., 2000-2010 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve
Copyright © Acronis, Inc., 2000-2010 193 Please note, that due to setting the new active volume, the former active volume letter might be changed a
194 Copyright © Acronis, Inc., 2000-2010 If when setting a new volume label you use characters that are unsupported by the currently installed oper
Copyright © Acronis, Inc., 2000-2010 195 All planned operations are added to the pending operation list. The Undo action lets you undo the latest o
Copyright © Acronis, Inc., 2000-2010 196 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
Copyright © Acronis, Inc., 2000-2010 197 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e
198 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 197), such as pre/post backup commands,
Copyright © Acronis, Inc., 2000-2010 199 5. On each machine, the agent installed on the machine creates a backup plan (p. 198) using other rules s
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
200 Copyright © Acronis, Inc., 2000-2010 built-in group except for deleting the machine from the management server. Virtual machines are deleted as
Copyright © Acronis, Inc., 2000-2010 201 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 198) that produc
202 Copyright © Acronis, Inc., 2000-2010 operations are configured on the management server (p. 206) and propagated by the server to the managed ma
Copyright © Acronis, Inc., 2000-2010 203 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
204 Copyright © Acronis, Inc., 2000-2010 Dynamic volume Any volume located on dynamic disks (p. 202), or more precisely, on a disk group (p. 202)
Copyright © Acronis, Inc., 2000-2010 205 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 199) aimed to maintain the optimal balance bet
206 Copyright © Acronis, Inc., 2000-2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n
Copyright © Acronis, Inc., 2000-2010 207 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi
208 Copyright © Acronis, Inc., 2000-2010 Since the cleanup schedule exists on the machine (p. 205) the agent (p. 196) resides on, and therefore use
Copyright © Acronis, Inc., 2000-2010 209 the image being recovered is located in Acronis Secure Zone (p. 196) or when using Acronis Active Re
Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
210 Copyright © Acronis, Inc., 2000-2010 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Win
Index A About Windows loaders • 151 Access credentials • 156, 158 Access credentials for archive location • 117, 123 Access credentials for destinat
212 Copyright © Acronis, Inc., 2000-2010 Basic precautions • 184 Bootability troubleshooting • 149 Bootable agent • 38, 168, 200, 203 Bootable medi
Copyright © Acronis, Inc., 2000-2010 213 Disk management • 35, 135, 184 Disk operations • 186 Disks • 135, 139 Disks/volumes selection • 138 Driver
214 Copyright © Acronis, Inc., 2000-2010 M Machine • 201, 202, 203, 204, 206, 207, 209, 210, 211, 212, 213 Machine options • 45, 60, 61, 74, 75 Mai
Copyright © Acronis, Inc., 2000-2010 215 S Scheduling • 65, 86, 124, 133, 156 Select destination disks • 194, 195 Select the type of volume being c
216 Copyright © Acronis, Inc., 2000-2010 Vaults • 33, 78, 152, 167 Views • 11 Virtual machine • 203, 213 Virtual machine settings • 140, 141, 144,
22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
Copyright © Acronis, Inc., 2000-2010 23 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Mediu
24 Copyright © Acronis, Inc., 2000-2010 Click Cancel and create your own plan or task. The original task will remain intact. Continue editing
Copyright © Acronis, Inc., 2000-2010 25 how many tapes you need to enable recovery with the desired resolution (time interval between recovery p
26 Copyright © Acronis, Inc., 2000-2010 Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so
Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A
30 Copyright © Acronis, Inc., 2000-2010 the scheme forces every backup level to keep only the most recent backup, other backups from the level h
Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this
32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing
36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE
Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
38 Copyright © Acronis, Inc., 2000-2010 mount a disk backup to copy files from the backup to a physical disk safely delete archives and backu
Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac
4 Vaults ... 77 4.1
40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w
Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even
42 Copyright © Acronis, Inc., 2000-2010
Copyright © Acronis, Inc., 2000-2010 43 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
44 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
Copyright © Acronis, Inc., 2000-2010 45 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
46 Copyright © Acronis, Inc., 2000-2010 All events - all events (information, warnings and errors) Errors and warnings Errors only. To dis
Copyright © Acronis, Inc., 2000-2010 47 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine running
48 Copyright © Acronis, Inc., 2000-2010 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set
Copyright © Acronis, Inc., 2000-2010 49 Compression level (p. 56) + + + + Backup performance: Backup priority (p. 57) + + - - HDD writing spe
6.4.1 Task credentials ...
50 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 58) + + - - Win Pop-up (p. 59) + + - - Event tracing: Windows events log (p. 60) + + -
Copyright © Acronis, Inc., 2000-2010 51 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it
52 Copyright © Acronis, Inc., 2000-2010 The program does not support interactive commands, i.e. commands that require user input (for example, &quo
Copyright © Acronis, Inc., 2000-2010 53 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i
54 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table be
Copyright © Acronis, Inc., 2000-2010 55 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operati
56 Copyright © Acronis, Inc., 2000-2010 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut
Copyright © Acronis, Inc., 2000-2010 57 Backup performance Use this group of options to specify the amount of network and system resources to alloc
58 Copyright © Acronis, Inc., 2000-2010 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server
Copyright © Acronis, Inc., 2000-2010 59 Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a
Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
60 Copyright © Acronis, Inc., 2000-2010 Event tracing It is possible to duplicate log events of the backup operations, performed on the managed mac
Copyright © Acronis, Inc., 2000-2010 61 Send SNMP notifications individually for backup operation events – to send the events of the backup oper
62 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):
Copyright © Acronis, Inc., 2000-2010 63 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.
64 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto
Copyright © Acronis, Inc., 2000-2010 65 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
66 Copyright © Acronis, Inc., 2000-2010 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen
Copyright © Acronis, Inc., 2000-2010 67 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam
68 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information
Copyright © Acronis, Inc., 2000-2010 69 File-level security (p. 71): Recover files with their security settings - + - + Error handling (p. 74):
Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G
70 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options: E
Copyright © Acronis, Inc., 2000-2010 71 When the check box is not selected, the command execution result does not affect the task execution failure
72 Copyright © Acronis, Inc., 2000-2010 The option enables you to receive e-mail notifications about the recovery task's successful completion
Copyright © Acronis, Inc., 2000-2010 73 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e
74 Copyright © Acronis, Inc., 2000-2010 This option is not available when operating under the bootable media. The option defines whether the agent(
Copyright © Acronis, Inc., 2000-2010 75 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac
76 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.
Copyright © Acronis, Inc., 2000-2010 77 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
78 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
Copyright © Acronis, Inc., 2000-2010 79 Vault content The Vault content section contains the archives table and toolbar. The archives table display
8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o
80 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault
Copyright © Acronis, Inc., 2000-2010 81 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,
82 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
Copyright © Acronis, Inc., 2000-2010 83 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap
Copyright © Acronis, Inc., 2000-2010 84 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
Copyright © Acronis, Inc., 2000-2010 85 What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not c
86 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P
Copyright © Acronis, Inc., 2000-2010 87 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.
88 Copyright © Acronis, Inc., 2000-2010 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b
Copyright © Acronis, Inc., 2000-2010 89 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0
Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel
90 Copyright © Acronis, Inc., 2000-2010 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m
Copyright © Acronis, Inc., 2000-2010 91 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not
92 Copyright © Acronis, Inc., 2000-2010 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block
Copyright © Acronis, Inc., 2000-2010 93 To view properties of an event, including the event source and event number 1. In Event Viewer, click the
94 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If
Copyright © Acronis, Inc., 2000-2010 95 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b
96 Copyright © Acronis, Inc., 2000-2010 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h
Copyright © Acronis, Inc., 2000-2010 97 6 Direct management This section covers operations that can be performed directly on a managed machine by
98 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 206). No backups have been created for X days Back u
Copyright © Acronis, Inc., 2000-2010 99 6.1.2 Backup plans and tasks The Backup plans and tasks view keeps you informed of data protection on a gi
Commentaires sur ces manuels