ACRONIS Backup & Recovery 10 Workstation Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Logiciel de sauvegarde et de récupération ACRONIS Backup & Recovery 10 Workstation. Acronis Backup & Recovery 10 Workstation Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 216
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Workstation

User's Guide Acronis® Backup & Recovery ™ 10 Workstation

Page 2

10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac

Page 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite

Page 4

Copyright © Acronis, Inc., 2000-2010 101 Task states A task can be in one of the following states: Idle; Waiting; Running; Stopping; Need interacti

Page 5

102 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta

Page 6 - 1.2 Getting started

Copyright © Acronis, Inc., 2000-2010 103 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you

Page 7

104 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Page 8 - "Navigation" pane

Copyright © Acronis, Inc., 2000-2010 105 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Page 9 - Actions

106 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Page 10 - Operations with panes

Copyright © Acronis, Inc., 2000-2010 107 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Page 11 - Action pages

108 Copyright © Acronis, Inc., 2000-2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove

Page 12 - Action page - Controls

Copyright © Acronis, Inc., 2000-2010 109 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Page 13 - 1.3.1 Agent for Windows

Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Page 14 - 1.4 Supported file systems

110 Copyright © Acronis, Inc., 2000-2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m

Page 15 - 1.6 System requirements

Copyright © Acronis, Inc., 2000-2010 111 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click

Page 16 - 1.7 Technical support

112 Copyright © Acronis, Inc., 2000-2010 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d

Page 17 - 2.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 113 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo

Page 18

114 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val

Page 19 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2010 115 To specify credentials 1. Select one of the following:  Run under the current user The tasks will run u

Page 20

116 Copyright © Acronis, Inc., 2000-2010 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a

Page 21

Copyright © Acronis, Inc., 2000-2010 117 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going

Page 22 - Differential backup

118 Copyright © Acronis, Inc., 2000-2010 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na

Page 23 - 2.4 Owners and credentials

Copyright © Acronis, Inc., 2000-2010 119 unique within the selected location. If you are satisfied with the automatically generated name, click OK.

Page 24 - 2.5 GFS backup scheme

12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Page 25 - GFS by Acronis

120 Copyright © Acronis, Inc., 2000-2010 6.2.9 Backup schemes Choose one of the available backup schemes:  Back up now – to create a backup task

Page 26 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2010 121 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup

Page 27 - The resulting archive: real

122 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Page 28 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2010 123  Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r

Page 29 - Tower of Hanoi by Acronis

124 Copyright © Acronis, Inc., 2000-2010  Start backup at: 12:00 PM  Back up on: Friday  Weekly/monthly: Friday  Keep backups:  Daily: 1

Page 30 - 2.7 Retention rules

Copyright © Acronis, Inc., 2000-2010 125 Backups of different levels have different types:  Last-level (in this case, level 4) backups are full;

Page 31

126 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio

Page 32 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2010 127 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm

Page 33 - Backing up dynamic volumes

128 Copyright © Acronis, Inc., 2000-2010 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai

Page 34 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2010 129 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Page 35 - 2.9 Tape support

Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron

Page 36

130 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent

Page 37 - 2.10.1 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 131 If the managed machine's operating system fails to start or you need to recover data to bare metal, b

Page 38 - Universal Restore)

132 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc

Page 39

Copyright © Acronis, Inc., 2000-2010 133 default one. When the default value is set, the line disappears and so you always see only the settings th

Page 40 - How it works

134 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Page 41 - How to use

Copyright © Acronis, Inc., 2000-2010 135 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh

Page 42

136 Copyright © Acronis, Inc., 2000-2010 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical mach

Page 43 - 3 Options

Copyright © Acronis, Inc., 2000-2010 137 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot

Page 44 - 3.1.5 Fonts

138 Copyright © Acronis, Inc., 2000-2010 The new virtual machine will be configured automatically, the source machine configuration being copied wh

Page 45 - 3.2 Machine options

Copyright © Acronis, Inc., 2000-2010 139 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and

Page 46 - SNMP notifications

14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil

Page 47 - 3.2.2 Log cleanup rules

140 Copyright © Acronis, Inc., 2000-2010 Virtual machine type / virtualization server selection The new virtual machine can be created either on a

Page 48

Copyright © Acronis, Inc., 2000-2010 141 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of

Page 49

142 Copyright © Acronis, Inc., 2000-2010 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th

Page 50 - Source files exclusion

Copyright © Acronis, Inc., 2000-2010 143  you have chosen to use Acronis Active Restore (p. 196) because these features are primarily meant for i

Page 51 - Pre/Post commands

144 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec

Page 52 - Post-backup command

Copyright © Acronis, Inc., 2000-2010 145 The same type of machines with the same name cannot be created in the same folder. Change either the VM na

Page 53 - Pre-data capture command

146 Copyright © Acronis, Inc., 2000-2010 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too

Page 54 - Post-data capture command

Copyright © Acronis, Inc., 2000-2010 147 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub

Page 55 - Volume Shadow Copy Service

148 Copyright © Acronis, Inc., 2000-2010 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t

Page 56 - Compression level

Copyright © Acronis, Inc., 2000-2010 149 Credentials (p. 149) [Optional] The validation task will run on behalf of the user who is creating the tas

Page 57 - Network connection speed

Copyright © Acronis, Inc., 2000-2010 15  XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di

Page 58 - Notifications

150 Copyright © Acronis, Inc., 2000-2010 6.4.2 Archive selection Selecting the archive 1. Enter the full path to the location in the Path field,

Page 59 - Messenger service (WinPopup)

Copyright © Acronis, Inc., 2000-2010 151 6.4.4 Location selection To select a location Enter the full path to the location in the Path field or se

Page 60 - Windows event log

152 Copyright © Acronis, Inc., 2000-2010 6.4.6 When to validate As validation is a resource-intensive operation, it makes sense to schedule valida

Page 61 - Backup splitting

Copyright © Acronis, Inc., 2000-2010 153 [Optional] Provide credentials for the archive location. To access this option, select the Advanced view c

Page 62 - Media components

154 Copyright © Acronis, Inc., 2000-2010 6.5.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. T

Page 63 - Error handling

Copyright © Acronis, Inc., 2000-2010 155 6.6 Managing mounted images Once a volume is mounted, you can browse files and folders contained in the b

Page 64 - Task start conditions

156 Copyright © Acronis, Inc., 2000-2010 The resulting archive's name By default, the exported archive inherits the name of the original archi

Page 65 - Task failure handling

Copyright © Acronis, Inc., 2000-2010 157 You can access the Export page from the Vaults view. Right-click the object to export (archive or backup)

Page 66 - Additional settings

158 Copyright © Acronis, Inc., 2000-2010 Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify

Page 67 - Reset archive bit

Copyright © Acronis, Inc., 2000-2010 159 3. Click OK. 6.7.3 Backup selection To specify a backup(s) to export 1. At the top of the window, sele

Page 68 - Use FTP in Active mode

16 Copyright © Acronis, Inc., 2000-2010 1.7 Technical support As part of a purchased annual Support charge you are entitled to Technical Support a

Page 69

160 Copyright © Acronis, Inc., 2000-2010  To export data to a network share, expand the Network folders group, select the required networked mach

Page 70 - Post-recovery command

Copyright © Acronis, Inc., 2000-2010 161 The program will access the location using the credentials of the task account specified in the General se

Page 71 - Recovery priority

162 Copyright © Acronis, Inc., 2000-2010 Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free

Page 72

Copyright © Acronis, Inc., 2000-2010 163  Acronis Secure Zone is always created at the end of the hard disk. When calculating the final layout of

Page 73

164 Copyright © Acronis, Inc., 2000-2010  If there is not enough unallocated space, the program will take free space from the selected volumes, p

Page 74

Copyright © Acronis, Inc., 2000-2010 165 Unless you use the GRUB boot loader and it is installed in the Master Boot Record (MBR), Acronis Startup R

Page 75

166 Copyright © Acronis, Inc., 2000-2010 WinPE proved to be the most convenient bootable solution in large environments with heterogeneous hardware

Page 76

Copyright © Acronis, Inc., 2000-2010 167 1. Download and install Windows Automated Installation Kit (WAIK). Automated Installation Kit (AIK) for W

Page 77 - 4 Vaults

168 Copyright © Acronis, Inc., 2000-2010  TCP/IP settings to be assigned to the machine network adapters. 6. [optional] Network port (p. 170): 

Page 78 - 4.1 Personal vaults

Copyright © Acronis, Inc., 2000-2010 169 This parameter is implicitly specified when creating the bootable media, but you can remove this parameter

Page 79 - Vault content

Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Page 80 - Creating a personal vault

170 Copyright © Acronis, Inc., 2000-2010  DNS server  WINS server. Once the bootable agent starts on a machine, the configuration is applied to

Page 81 - 4.2 Common operations

Copyright © Acronis, Inc., 2000-2010 171 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to

Page 82

172 Copyright © Acronis, Inc., 2000-2010 5. Specify the full path to the resulting ISO file including the file name. 6. Check your settings in th

Page 83 - To show or hide columns

Copyright © Acronis, Inc., 2000-2010 173 8. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int

Page 84 - 5 Scheduling

174 Copyright © Acronis, Inc., 2000-2010 To connect to the machine remotely, select Connect -> Manage a remote machine in the console menu and s

Page 85 - 5.1 Daily schedule

Copyright © Acronis, Inc., 2000-2010 175 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Computer System

Page 86 -  fifth at 7 PM

176 Copyright © Acronis, Inc., 2000-2010 cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map2

Page 87 - 5.2 Weekly schedule

Copyright © Acronis, Inc., 2000-2010 177  Manually by using the lvm utility—see Creating the volume structure manually (p. 177). Creating the vo

Page 88

178 Copyright © Acronis, Inc., 2000-2010 2. Click Acronis Bootable Agent. Then, click Run management console. 3. On the toolbar, click Actions, a

Page 89 - 5.3 Monthly schedule

Copyright © Acronis, Inc., 2000-2010 179 Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the mac

Page 90

18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Page 91

180 Copyright © Acronis, Inc., 2000-2010 To mount a backup volume 1. Use the --list command to list the volumes which are stored in the backup. Fo

Page 92

Copyright © Acronis, Inc., 2000-2010 181 1. Create a disk image of the disk on which volumes will be created or managed. Having your most importan

Page 93 - 5.5 Conditions

182 Copyright © Acronis, Inc., 2000-2010 The top part of the view contains a disks and volumes table enabling data sorting and columns customizatio

Page 94 - 5.5.3 Fits time interval

Copyright © Acronis, Inc., 2000-2010 183 Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be initialized

Page 95 - 5.5.4 User logged off

184 Copyright © Acronis, Inc., 2000-2010 If there is some data on the disk that was chosen as the target, the user will receive a warning: “The sel

Page 96 - Example:

Copyright © Acronis, Inc., 2000-2010 185 If you need to copy the NT signature: 1. Select the Copy NT signature check box. You receive the warning:

Page 97 - 6 Direct management

186 Copyright © Acronis, Inc., 2000-2010 2. Basic disk conversion: MBR to GPT using the Convert to GPT operation. 3. GPT disk conversion: basic

Page 98 - Tasks need interaction

Copyright © Acronis, Inc., 2000-2010 187 2. The machine runs this operating system. Basic to dynamic conversion of the disk, comprising of system

Page 99 - Backup plan execution states

188 Copyright © Acronis, Inc., 2000-2010 Changing disk status Changing disk status is effective for Windows Vista SP1, Windows Server 2008, Windows

Page 100 - Backup plan statuses

Copyright © Acronis, Inc., 2000-2010 189 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can

Page 101 - Task states

Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Page 102 - Task statuses

190 Copyright © Acronis, Inc., 2000-2010 Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to

Page 103 -  Validation task (p. 148)

Copyright © Acronis, Inc., 2000-2010 191 If you are creating a dynamic volume and select one or several basic disks, as its destination, you will r

Page 104

192 Copyright © Acronis, Inc., 2000-2010 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve

Page 105

Copyright © Acronis, Inc., 2000-2010 193 Please note, that due to setting the new active volume, the former active volume letter might be changed a

Page 106

194 Copyright © Acronis, Inc., 2000-2010 If when setting a new volume label you use characters that are unsupported by the currently installed oper

Page 107 - Run backup plan

Copyright © Acronis, Inc., 2000-2010 195 All planned operations are added to the pending operation list. The Undo action lets you undo the latest o

Page 108 - Progress

Copyright © Acronis, Inc., 2000-2010 196 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Page 109 - Backup plan details

Copyright © Acronis, Inc., 2000-2010 197 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e

Page 110 - 6.1.3 Log

198 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 197), such as pre/post backup commands,

Page 111 - Configuring the log table

Copyright © Acronis, Inc., 2000-2010 199 5. On each machine, the agent installed on the machine creates a backup plan (p. 198) using other rules s

Page 112 - 6.2 Creating a backup plan

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Page 113 - Backup options

20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Page 114 - Convert to VM

200 Copyright © Acronis, Inc., 2000-2010 built-in group except for deleting the machine from the management server. Virtual machines are deleted as

Page 115 - 6.2.4 Items to back up

Copyright © Acronis, Inc., 2000-2010 201 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 198) that produc

Page 116 - Selecting files and folders

202 Copyright © Acronis, Inc., 2000-2010 operations are configured on the management server (p. 206) and propagated by the server to the managed ma

Page 117 - 6.2.6 Exclusions

Copyright © Acronis, Inc., 2000-2010 203 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with

Page 118 - 6.2.7 Archive

204 Copyright © Acronis, Inc., 2000-2010 Dynamic volume Any volume located on dynamic disks (p. 202), or more precisely, on a disk group (p. 202)

Page 119

Copyright © Acronis, Inc., 2000-2010 205 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 199) aimed to maintain the optimal balance bet

Page 120 - 6.2.9 Backup schemes

206 Copyright © Acronis, Inc., 2000-2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n

Page 121 - Parameters

Copyright © Acronis, Inc., 2000-2010 207 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi

Page 122 - Examples

208 Copyright © Acronis, Inc., 2000-2010 Since the cleanup schedule exists on the machine (p. 205) the agent (p. 196) resides on, and therefore use

Page 123

Copyright © Acronis, Inc., 2000-2010 209  the image being recovered is located in Acronis Secure Zone (p. 196) or  when using Acronis Active Re

Page 124 - Tower of Hanoi scheme

Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Page 125 - Roll-back period

210 Copyright © Acronis, Inc., 2000-2010  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Win

Page 126 - Custom backup scheme

Index A About Windows loaders • 151 Access credentials • 156, 158 Access credentials for archive location • 117, 123 Access credentials for destinat

Page 127

212 Copyright © Acronis, Inc., 2000-2010 Basic precautions • 184 Bootability troubleshooting • 149 Bootable agent • 38, 168, 200, 203 Bootable medi

Page 128 - Resulting tasks

Copyright © Acronis, Inc., 2000-2010 213 Disk management • 35, 135, 184 Disk operations • 186 Disks • 135, 139 Disks/volumes selection • 138 Driver

Page 129 - 6.2.10 Archive validation

214 Copyright © Acronis, Inc., 2000-2010 M Machine • 201, 202, 203, 204, 206, 207, 209, 210, 211, 212, 213 Machine options • 45, 60, 61, 74, 75 Mai

Page 130 - 6.3 Recovering data

Copyright © Acronis, Inc., 2000-2010 215 S Scheduling • 65, 86, 124, 133, 156 Select destination disks • 194, 195 Select the type of volume being c

Page 131 - What to recover

216 Copyright © Acronis, Inc., 2000-2010 Vaults • 33, 78, 152, 167 Views • 11 Virtual machine • 203, 213 Virtual machine settings • 140, 141, 144,

Page 132 - Recovery options

22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Page 133 - 6.3.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 23 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Mediu

Page 134 - 6.3.4 Content selection

24 Copyright © Acronis, Inc., 2000-2010  Click Cancel and create your own plan or task. The original task will remain intact.  Continue editing

Page 135 - 6.3.6 Destination selection

Copyright © Acronis, Inc., 2000-2010 25  how many tapes you need to enable recovery with the desired resolution (time interval between recovery p

Page 136 - Disk destination

26 Copyright © Acronis, Inc., 2000-2010 Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so

Page 137 - Volumes

Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Page 138 - Volume destination

28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Page 139 - Volume properties

Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Page 140 - Virtual machine settings

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A

Page 141 - Recovery exclusions

30 Copyright © Acronis, Inc., 2000-2010  the scheme forces every backup level to keep only the most recent backup, other backups from the level h

Page 142 - 6.3.9 Universal Restore

Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this

Page 143 - Universal Restore settings

32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Page 144

Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Page 145

34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Page 146

Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing

Page 147

36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE

Page 148 - About Windows loaders

Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Page 149 - 6.4.1 Task credentials

38 Copyright © Acronis, Inc., 2000-2010  mount a disk backup to copy files from the backup to a physical disk  safely delete archives and backu

Page 150 - 6.4.3 Backup selection

Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac

Page 152 - 6.5 Mounting an image

40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w

Page 153 - 6.5.1 Archive selection

Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even

Page 154 - 6.5.4 Volume selection

42 Copyright © Acronis, Inc., 2000-2010

Page 155 - 6.6 Managing mounted images

Copyright © Acronis, Inc., 2000-2010 43 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Page 156

44 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Page 157 - 6.7.1 Task credentials

Copyright © Acronis, Inc., 2000-2010 45 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Page 158 - 6.7.2 Archive selection

46 Copyright © Acronis, Inc., 2000-2010  All events - all events (information, warnings and errors)  Errors and warnings  Errors only. To dis

Page 159 - 6.7.5 Location selection

Copyright © Acronis, Inc., 2000-2010 47 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine running

Page 160 - 3. Naming the new archive

48 Copyright © Acronis, Inc., 2000-2010 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set

Page 161 - 6.8 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 49 Compression level (p. 56) + + + + Backup performance: Backup priority (p. 57) + + - - HDD writing spe

Page 162 - Result confirmation

6.4.1 Task credentials ...

Page 163

50 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 58) + + - - Win Pop-up (p. 59) + + - - Event tracing: Windows events log (p. 60) + + -

Page 164 - Deleting Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 51 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it

Page 165 - 6.10 Bootable media

52 Copyright © Acronis, Inc., 2000-2010 The program does not support interactive commands, i.e. commands that require user input (for example, &quo

Page 166 - PE-based bootable media

Copyright © Acronis, Inc., 2000-2010 53 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i

Page 167

54 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table be

Page 168 - Kernel parameters

Copyright © Acronis, Inc., 2000-2010 55 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operati

Page 169 - Network settings

56 Copyright © Acronis, Inc., 2000-2010 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut

Page 170 - Network port

Copyright © Acronis, Inc., 2000-2010 57 Backup performance Use this group of options to specify the amount of network and system resources to alloc

Page 171

58 Copyright © Acronis, Inc., 2000-2010 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server

Page 172

Copyright © Acronis, Inc., 2000-2010 59  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a

Page 173

Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Page 174 - Setting up a display mode

60 Copyright © Acronis, Inc., 2000-2010 Event tracing It is possible to duplicate log events of the backup operations, performed on the managed mac

Page 175 - Linux commands and utilities

Copyright © Acronis, Inc., 2000-2010 61  Send SNMP notifications individually for backup operation events – to send the events of the backup oper

Page 176

62 Copyright © Acronis, Inc., 2000-2010  When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):

Page 177

Copyright © Acronis, Inc., 2000-2010 63 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.

Page 178 - Example

64 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto

Page 179 - Mounting backup volumes

Copyright © Acronis, Inc., 2000-2010 65 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Page 180 - 6.11 Disk management

66 Copyright © Acronis, Inc., 2000-2010 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen

Page 181

Copyright © Acronis, Inc., 2000-2010 67 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam

Page 182 - 6.11.5 Disk operations

68 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information

Page 183 - Basic disk cloning

Copyright © Acronis, Inc., 2000-2010 69 File-level security (p. 71): Recover files with their security settings - + - + Error handling (p. 74):

Page 184 - Using advanced options

Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G

Page 185 - Disk conversion: MBR to GPT

70 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  E

Page 186 - Disk conversion: GPT to MBR

Copyright © Acronis, Inc., 2000-2010 71 When the check box is not selected, the command execution result does not affect the task execution failure

Page 187 - System disk conversion

72 Copyright © Acronis, Inc., 2000-2010 The option enables you to receive e-mail notifications about the recovery task's successful completion

Page 188 - 6.11.6 Volume operations

Copyright © Acronis, Inc., 2000-2010 73 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e

Page 189 - Create volume wizard

74 Copyright © Acronis, Inc., 2000-2010 This option is not available when operating under the bootable media. The option defines whether the agent(

Page 190 - Select destination disks

Copyright © Acronis, Inc., 2000-2010 75 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac

Page 191 - Set the volume options

76 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.

Page 192 - Set active volume

Copyright © Acronis, Inc., 2000-2010 77 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Page 193 - Change volume label

78 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Page 194 - 6.11.7 Pending operations

Copyright © Acronis, Inc., 2000-2010 79 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Page 195

8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o

Page 196 - Glossary

80 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault

Page 197

Copyright © Acronis, Inc., 2000-2010 81 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,

Page 198 - Backup policy (Policy)

82 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Page 199 - Built-in group

Copyright © Acronis, Inc., 2000-2010 83 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap

Page 200 - Cleanup

Copyright © Acronis, Inc., 2000-2010 84 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Page 201

Copyright © Acronis, Inc., 2000-2010 85 What-ifs  What if an event occurs (and a condition, if any, is met) while the previous task run has not c

Page 202 - Disk group

86 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P

Page 203 - Dynamic group

Copyright © Acronis, Inc., 2000-2010 87 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.

Page 204 - Full backup

88 Copyright © Acronis, Inc., 2000-2010 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b

Page 205

Copyright © Acronis, Inc., 2000-2010 89 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0

Page 206

Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel

Page 207

90 Copyright © Acronis, Inc., 2000-2010 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m

Page 208 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2010 91 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not

Page 209

92 Copyright © Acronis, Inc., 2000-2010 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block

Page 210 -  Windows Vista (PE 2.0)

Copyright © Acronis, Inc., 2000-2010 93 To view properties of an event, including the event source and event number 1. In Event Viewer, click the

Page 211

94 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If

Page 212

Copyright © Acronis, Inc., 2000-2010 95 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b

Page 213

96 Copyright © Acronis, Inc., 2000-2010 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h

Page 214

Copyright © Acronis, Inc., 2000-2010 97 6 Direct management This section covers operations that can be performed directly on a managed machine by

Page 215

98 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 206). No backups have been created for X days Back u

Page 216

Copyright © Acronis, Inc., 2000-2010 99 6.1.2 Backup plans and tasks The Backup plans and tasks view keeps you informed of data protection on a gi

Commentaires sur ces manuels

Pas de commentaire