Acronis Backup Advanced Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS Advanced for Windows Server Advanced for Linux Server A
10 Copyright © Acronis International GmbH, 2002-2014 17 Glossary ...
100 Copyright © Acronis International GmbH, 2002-2014 2. Select whether to delete the backups or to move them to another location if the specified
101 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set
102 Copyright © Acronis International GmbH, 2002-2014 You want to occasionally back up your machine to a local folder. You want to keep a copy
103 Copyright © Acronis International GmbH, 2002-2014 the Location field. Under Retention rules, select Move backups older than 1 week. Then, specif
104 Copyright © Acronis International GmbH, 2002-2014 To disable backup cataloging These steps can be performed in any order. 1. Modify the Windows
105 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File
106 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File
107 Copyright © Acronis International GmbH, 2002-2014 The preset is: Disabled. In Windows operating systems, each file has the File is ready for arc
108 Copyright © Acronis International GmbH, 2002-2014 When you specify an already existing archive as the destination of the backup plan. When
109 Copyright © Acronis International GmbH, 2002-2014 For a file-level backup - nothing. For an Exchange database-level backup - only database
11 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5 Acronis Backup Advanced for V
110 Copyright © Acronis International GmbH, 2002-2014 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the followin
111 Copyright © Acronis International GmbH, 2002-2014 If the destination disk runs out of free space while creating the backup, the task enters the
112 Copyright © Acronis International GmbH, 2002-2014 Maximum – the data will be compressed as much as possible. The backup duration will be maxi
113 Copyright © Acronis International GmbH, 2002-2014 To set up saving DRPs as files: 1. Select the Save DRP as file check box. 2. Click Browse to
114 Copyright © Acronis International GmbH, 2002-2014 a. From – type the name of the sender. If you leave this field empty, the messages will conta
115 Copyright © Acronis International GmbH, 2002-2014 of the data will be backed up and you will be able to mount the resulting disk backup and extr
116 Copyright © Acronis International GmbH, 2002-2014 To select whether to log the backup operations events in the Application Event Log of Windows:
117 Copyright © Acronis International GmbH, 2002-2014 Always back up files directly. Administrator or Backup Operator privileges are not required. T
118 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Acronis Backup will take the snapshot on its own. With this setting, a backu
119 Copyright © Acronis International GmbH, 2002-2014 <key name="LVMSnapshots"> <value name="MinimalVGFreeRelative&quo
12 Copyright © Acronis International GmbH, 2002-2014 OS support Support for Windows MultiPoint Server 2012 and Windows Storage Server 2012 R2.
120 Copyright © Acronis International GmbH, 2002-2014 The preset is: Disabled. Tip. You can back up Hyper-V virtual machines residing on a cluster s
121 Copyright © Acronis International GmbH, 2002-2014 Selectively copy backups from an archive to another location. This option may be useful bec
122 Copyright © Acronis International GmbH, 2002-2014 4.7.18.2 Post-backup command To specify a command/executable file to be executed after the ba
123 Copyright © Acronis International GmbH, 2002-2014 4.7.19.1 Pre-data capture command To specify a command/batch file to be executed before data
124 Copyright © Acronis International GmbH, 2002-2014 Preset Continue the backup only after the command is successfully executed. Delete the TIB fi
125 Copyright © Acronis International GmbH, 2002-2014 If you leave this option disabled, data from different machines will be backed up on all tapes
126 Copyright © Acronis International GmbH, 2002-2014 Always use a free tape By default, the software tries to write a backup onto a tape containing
127 Copyright © Acronis International GmbH, 2002-2014 The program will try to execute the failed task again if you select the Restart a failed task
128 Copyright © Acronis International GmbH, 2002-2014 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might b
129 Copyright © Acronis International GmbH, 2002-2014 In most cases, VSS will use Acronis VSS Provider. Software - Acronis VSS Provider VSS wil
13 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 and Windows Server 2012 (p. 49) Install Agent for Windows, Agent
130 Copyright © Acronis International GmbH, 2002-2014 If you use third-party software for backing up the SQL Server data. The reason for this is
131 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect
132 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da
133 Copyright © Acronis International GmbH, 2002-2014 5.1.1 What to recover 1. Specifying the archive location In the Data path field, specify the
134 Copyright © Acronis International GmbH, 2002-2014 There are probably other times when you may need to recover the MBR, but the above are the mos
135 Copyright © Acronis International GmbH, 2002-2014 Location Details FTP, SFTP If the archive is stored on an FTP or SFTP server, type the serve
136 Copyright © Acronis International GmbH, 2002-2014 Select Microsoft Exchange Information Store to browse and search for information stores, in
137 Copyright © Acronis International GmbH, 2002-2014 On a managed machine: Enable cataloging in the Backup cataloging option (Options > Machi
138 Copyright © Acronis International GmbH, 2002-2014 Password. The password for the account. 2. Click OK. According to the original FTP specifi
139 Copyright © Acronis International GmbH, 2002-2014 virtualization product brand and settings. VMware ESX(i) may have multiple storages. A Microso
14 Copyright © Acronis International GmbH, 2002-2014 Express full backup method This method is based on monitoring changes of the Exchange databa
140 Copyright © Acronis International GmbH, 2002-2014 The software will keep the NT signature of the target disk if it is the same as the NT signatu
141 Copyright © Acronis International GmbH, 2002-2014 If there is enough unallocated space, the volumes will be recovered "as is". If unal
142 Copyright © Acronis International GmbH, 2002-2014 3. Examine the first value in the Sector size (logical/physical) line. For example, the outpu
143 Copyright © Acronis International GmbH, 2002-2014 Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 143
144 Copyright © Acronis International GmbH, 2002-2014 Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes an
145 Copyright © Acronis International GmbH, 2002-2014 When recovering basic MBR and GPT volumes, you can select the alignment method manually if the
146 Copyright © Acronis International GmbH, 2002-2014 If you allow files to be overwritten, you still have an option to prevent overwriting of speci
147 Copyright © Acronis International GmbH, 2002-2014 Use current user credentials The task will run under the credentials with which the user wh
148 Copyright © Acronis International GmbH, 2002-2014 Limitations Transferring a Linux system between UEFI and BIOS is not supported. Transferring a
149 Copyright © Acronis International GmbH, 2002-2014 system BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: convertible Solut
15 Copyright © Acronis International GmbH, 2002-2014 Installation Remote installation of Acronis Backup & Recovery 11.5 Agent for Linux. Supp
150 Copyright © Acronis International GmbH, 2002-2014 Green background means that the system will be bootable. No user action is required. Yel
151 Copyright © Acronis International GmbH, 2002-2014 5.3 Acronis Active Restore Active Restore is the Acronis proprietary technology that brings a
152 Copyright © Acronis International GmbH, 2002-2014 If you opt for Acronis Active Restore, the system will be operational in a short time. Users w
153 Copyright © Acronis International GmbH, 2002-2014 Why a recovered operating system may be unbootable The machine BIOS is configured to boot f
154 Copyright © Acronis International GmbH, 2002-2014 Such system cannot boot because its kernel tries to mount the root file system at the LVM volu
155 Copyright © Acronis International GmbH, 2002-2014 or chroot /mnt/system/ /usr/sbin/grub 9. Specify the disk on which GRUB is located—typically,
156 Copyright © Acronis International GmbH, 2002-2014 Once you confirm the operation, Acronis Backup will re-deploy the factory image located in Acr
157 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery Fil
158 Copyright © Acronis International GmbH, 2002-2014 The preset is Enabled. This option defines whether to recover the files’ date and time from th
159 Copyright © Acronis International GmbH, 2002-2014 The option enables you to receive e-mail notifications about the recovery task's successf
16 Copyright © Acronis International GmbH, 2002-2014 Components for centralized management These components, included in Acronis Backup Advanced, pr
160 Copyright © Acronis International GmbH, 2002-2014 9. Click Send test e-mail message to check whether e-mail notifications work correctly with t
161 Copyright © Acronis International GmbH, 2002-2014 Send SNMP notifications individually for recovery operation events – to send the events of
162 Copyright © Acronis International GmbH, 2002-2014 5.6.6 Mount points This option is effective only in Windows for recovering data from a file-l
163 Copyright © Acronis International GmbH, 2002-2014 5. Click Test command to check if the command is correct. Check box Selection Fail the task i
164 Copyright © Acronis International GmbH, 2002-2014 To specify the recovery process priority Select one of the following: Low – to minimize res
165 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk
166 Copyright © Acronis International GmbH, 2002-2014 During conversion which is part of a backup plan (p. 167), the software creates the virtual
167 Copyright © Acronis International GmbH, 2002-2014 Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo
168 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac
169 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker
17 Copyright © Acronis International GmbH, 2002-2014 Disk backup Disk-level data protection is based on backing up either a disk or a volume file sy
170 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr
171 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso
172 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak
173 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A
174 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio
175 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F
176 Copyright © Acronis International GmbH, 2002-2014 'Vaults' view Vaults (on the navigation pane) - top item of the vaults tree. Click
177 Copyright © Acronis International GmbH, 2002-2014 What does the icon mean? When browsing archives on the Archive view tab, you may encounter
178 Copyright © Acronis International GmbH, 2002-2014 FTP/SFTP server No Yes 7.1.2.1 Actions on centralized vaults To access actions 1. Connect
179 Copyright © Acronis International GmbH, 2002-2014 To Do Validate a vault 1. Select the vault. 2. Click Validate. You will be taken to the V
18 Copyright © Acronis International GmbH, 2002-2014 The agent uses Microsoft VSS to ensure the consistency of the backed-up databases. After a succ
180 Copyright © Acronis International GmbH, 2002-2014 [Optional] Select whether to protect the vault with encryption. Anything written to the vault
181 Copyright © Acronis International GmbH, 2002-2014 catalog, click the update the catalog now link on the Data view tab of the vault. Please be aw
182 Copyright © Acronis International GmbH, 2002-2014 Vault encryption If you protect a vault with encryption, anything written to the vault will be
183 Copyright © Acronis International GmbH, 2002-2014 At first, the software tries to find the entered names in the list of local users and groups o
184 Copyright © Acronis International GmbH, 2002-2014 After you have performed all the required steps, click OK to commit creating the unmanaged cen
185 Copyright © Acronis International GmbH, 2002-2014 If the vault is deduplicating, we recommend that you move the deduplication database from the
186 Copyright © Acronis International GmbH, 2002-2014 7.1.3 Personal vaults A vault is called personal if it was created using direct connection of
187 Copyright © Acronis International GmbH, 2002-2014 for accessing a vault In the appearing dialog box, provide the credentials required for access
188 Copyright © Acronis International GmbH, 2002-2014 4. Edit the backup plans and tasks: redirect their destination to the new vault. 5. Delete t
189 Copyright © Acronis International GmbH, 2002-2014 To specify a new cache folder in Linux: Add the following element inside the Configuration tag
19 Copyright © Acronis International GmbH, 2002-2014 The most important function of a storage node is deduplication (p. 226) of backups stored in it
190 Copyright © Acronis International GmbH, 2002-2014 Offers a cost-effective and handy method for protecting data from software malfunction, vir
191 Copyright © Acronis International GmbH, 2002-2014 7.2.1.2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to sel
192 Copyright © Acronis International GmbH, 2002-2014 As is apparent from the above, setting the maximum possible zone size is not advisable. You wi
193 Copyright © Acronis International GmbH, 2002-2014 7.2.2.3 Deleting Acronis Secure Zone To delete Acronis Secure Zone: 1. On the Manage Acronis
194 Copyright © Acronis International GmbH, 2002-2014 You can set the option to clean up the archive "When there is insufficient space while ba
195 Copyright © Acronis International GmbH, 2002-2014 7.4.2.1 Compatibility with RSM and third-party software Coexistence with third-party software
196 Copyright © Acronis International GmbH, 2002-2014 Registry value: ArsmDmlDbProtocol Possible data values: Any string 0 to 32765 characters long.
197 Copyright © Acronis International GmbH, 2002-2014 Set up the custom scheme so that it creates full backups with a reasonable frequency. Otherwis
198 Copyright © Acronis International GmbH, 2002-2014 7.4.2.7 Readability of tapes written by the older Acronis products The following table summar
199 Copyright © Acronis International GmbH, 2002-2014 a. Click Inventory to detect the loaded tapes. Select the Full inventorying method. Do not se
2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr
20 Copyright © Acronis International GmbH, 2002-2014 1.7.9 Bootable Media Builder Acronis Bootable Media Builder is a dedicated tool for creating b
200 Copyright © Acronis International GmbH, 2002-2014 c. Decide whether you want to back up to the default Acronis pool (p. 203) or to create a new
201 Copyright © Acronis International GmbH, 2002-2014 What if I do not see backups stored on tapes? It may mean that the database with the contents
202 Copyright © Acronis International GmbH, 2002-2014 11. If the tapes contain a password-protected archive, select the corresponding check box, and
203 Copyright © Acronis International GmbH, 2002-2014 After you have attached or re-attached a tape device. After you have installed or reinst
204 Copyright © Acronis International GmbH, 2002-2014 Separating filled tapes You may want to separate filled tapes from incomplete ones. Let's
205 Copyright © Acronis International GmbH, 2002-2014 3. You can change the pool name (except the name of the Acronis pool) or settings. For more i
206 Copyright © Acronis International GmbH, 2002-2014 To move tapes to another pool: 1. In the Navigation tree, click Tape management. If connected
207 Copyright © Acronis International GmbH, 2002-2014 Erasing Erasing a tape physically deletes all backups stored on the tape and removes the infor
208 Copyright © Acronis International GmbH, 2002-2014 4. Click Rescan. 5. Select the vault where the newly detected archives will be placed. 6.
209 Copyright © Acronis International GmbH, 2002-2014 Tape was used by... Tape is read by... Tape is sent to pool... Agent the same Agent where the
21 Copyright © Acronis International GmbH, 2002-2014 ReiserFS3 - particular files cannot be recovered from disk backups located on Acronis Backup
210 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select tape libraries and stand-alone drives to be inventoried. By default, all
211 Copyright © Acronis International GmbH, 2002-2014 To create a personal vault: 1. In the Navigation tree, click Vaults. 2. Click Create. 3.
212 Copyright © Acronis International GmbH, 2002-2014 5. Create a personal vault (p. 210) and associate your pool with it. 6. When creating a back
213 Copyright © Acronis International GmbH, 2002-2014 In Clean up archive, select Using retention rules, and then click Retention rules. Specify
214 Copyright © Acronis International GmbH, 2002-2014 You want to back up a machine to a tape device attached to a storage node. You want to u
215 Copyright © Acronis International GmbH, 2002-2014 are required to protect enterprise data. This goal is achieved by organizing and managing the
216 Copyright © Acronis International GmbH, 2002-2014 7.5.4 Getting started with a storage node Prerequisites Make sure that: The management ser
217 Copyright © Acronis International GmbH, 2002-2014 3. Select the storage node; then, perform the required operations as described in "Actio
218 Copyright © Acronis International GmbH, 2002-2014 7.5.6 Operations with storage nodes 7.5.6.1 Actions on storage nodes To access actions 1. C
219 Copyright © Acronis International GmbH, 2002-2014 Refresh the list of storage nodes Click Refresh. The management console will update the lis
22 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to
220 Copyright © Acronis International GmbH, 2002-2014 Archives - the total number of archives stored in all the vaults managed by the storage nod
221 Copyright © Acronis International GmbH, 2002-2014 Every time the compacting task starts, the storage node determines whether to perform compacti
222 Copyright © Acronis International GmbH, 2002-2014 Other parameters Log Cleanup Rules Specifies how to clean up the storage node log. This parame
223 Copyright © Acronis International GmbH, 2002-2014 Components of Acronis Backup may connect to the storage node for viewing the contents of a vau
224 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to check the hash values of data blocks that are sent to a dedu
225 Copyright © Acronis International GmbH, 2002-2014 node's log, indicating the vault in question. You can view storage node warnings in the D
226 Copyright © Acronis International GmbH, 2002-2014 Enabled Possible values: 0 (disables cataloging) or 1 (enables cataloging) Registry key: HKEY_
227 Copyright © Acronis International GmbH, 2002-2014 If the database is corrupted or the storage node is lost, while the vault retains its contents
228 Copyright © Acronis International GmbH, 2002-2014 The following diagram illustrates the result of deduplication at target. The indexing activit
229 Copyright © Acronis International GmbH, 2002-2014 When performing incremental backups of similar data from different sources, provided that t
23 Copyright © Acronis International GmbH, 2002-2014 c. Follow the on-screen instructions. Step 2. Running Run Acronis Backup Management Console.
230 Copyright © Acronis International GmbH, 2002-2014 The disk space required for a deduplication database can be estimated by using the followin
231 Copyright © Acronis International GmbH, 2002-2014 Back up a typical machine before backing up several machines with similar contents When backin
232 Copyright © Acronis International GmbH, 2002-2014
233 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an
234 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 235) [Optional] Provide credentials for accessing the source if the task accou
235 Copyright © Acronis International GmbH, 2002-2014 To select a centralized vault (either managed or unmanaged), expand the Centralized group a
236 Copyright © Acronis International GmbH, 2002-2014 According to the original FTP specification, credentials required for access to FTP servers ar
237 Copyright © Acronis International GmbH, 2002-2014 8.2 Exporting archives and backups The export operation creates a copy of an archive or a sel
238 Copyright © Acronis International GmbH, 2002-2014 The exported archive inherits the options of the original archive, including encryption and th
239 Copyright © Acronis International GmbH, 2002-2014 Select the type of objects to export: Archive - in this case, you need to specify the archive
24 Copyright © Acronis International GmbH, 2002-2014 Tip. Using the bootable media, you can do off-line ("cold") backups in the same way a
240 Copyright © Acronis International GmbH, 2002-2014 8.2.3 Access credentials for source Specify credentials required for access to the location w
241 Copyright © Acronis International GmbH, 2002-2014 After entering access credentials, the folders on the server become available. Click the appro
242 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if
243 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or
244 Copyright © Acronis International GmbH, 2002-2014 Specify: User name. When entering the name of an Active Directory user account, be sure to
245 Copyright © Acronis International GmbH, 2002-2014 8.4 Operations available in vaults By using vaults, you can easily access archives and backup
246 Copyright © Acronis International GmbH, 2002-2014 8.4.2 Operations with backups To perform any operation with a backup 1. In the Navigation pa
247 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes
248 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele
249 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or
25 Copyright © Acronis International GmbH, 2002-2014 If you opt for storing all backup archives in a single or a few networked locations, create
250 Copyright © Acronis International GmbH, 2002-2014 When a machine is booted with a PE-based bootable media, you cannot select optical media su
251 Copyright © Acronis International GmbH, 2002-2014 User name and password to be entered on the console side at the connection to the agent. If
252 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The
253 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con
254 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p
255 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI
256 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from
257 Copyright © Acronis International GmbH, 2002-2014 VLANs are mainly used to divide a local area network into segments. A NIC that is connected to
258 Copyright © Acronis International GmbH, 2002-2014 8. The log lifetime is limited to the current session. You can save the entire log or the fil
259 Copyright © Acronis International GmbH, 2002-2014 4. Specify the 20-character device ID. 5. If you want to allow writing data onto the device,
26 Copyright © Acronis International GmbH, 2002-2014 Menu bar Appears across the top of the program window. Lets you perform most of operations ava
260 Copyright © Acronis International GmbH, 2002-2014 gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunz
261 Copyright © Acronis International GmbH, 2002-2014 9.6 Acronis PXE Server Acronis PXE Server allows for booting machines to Acronis bootable com
262 Copyright © Acronis International GmbH, 2002-2014 On a machine that has an operating system on the hard disk, the BIOS must be configured so tha
263 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co
264 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d
265 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di
266 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit
267 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a
268 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume
269 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t
27 Copyright © Acronis International GmbH, 2002-2014 Dashboard. Use this view to estimate at a glance whether the data is successfully protecte
270 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot
271 Copyright © Acronis International GmbH, 2002-2014 safe conversion of a dynamic disk to basic when it contains volumes with data for simple an
272 Copyright © Acronis International GmbH, 2002-2014 Store backups (images) of other volumes/disks on a special volume; Install a new operati
273 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to
274 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume: Select three destination disks to create the volume on. After yo
275 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be
276 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the
277 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of
278 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit
279 Copyright © Acronis International GmbH, 2002-2014 11 Protecting applications with disk-level backup This section describes how to use a disk-lev
28 Copyright © Acronis International GmbH, 2002-2014 2.1.2 Main area, views and action pages The main area is a basic place where you work with the
280 Copyright © Acronis International GmbH, 2002-2014 If the application databases are located on a number of machines, back up all of the machines
281 Copyright © Acronis International GmbH, 2002-2014 option is effective on a physical machine and on a virtual machine where Agent for Windows is
282 Copyright © Acronis International GmbH, 2002-2014 Create Table ##temp ( DatabaseName sysname, Name sysname, physical_name nvarchar(5
283 Copyright © Acronis International GmbH, 2002-2014 Tracks how far Exchange has progressed in writing logged information to the database file. To
284 Copyright © Acronis International GmbH, 2002-2014 11.1.1.4 SharePoint database files SharePoint stores content, auxiliary SharePoint services&a
285 Copyright © Acronis International GmbH, 2002-2014 Log file shrinking. Log file shrinking reduces the physical size of a log file by removing
286 Copyright © Acronis International GmbH, 2002-2014 Where: myServer - name of the server instanceName - name of the instance C:\myScrip
287 Copyright © Acronis International GmbH, 2002-2014 1. Dismount the database (in Exchange 2010) or all databases of the storage group (in Exchang
288 Copyright © Acronis International GmbH, 2002-2014 2. In the mounted volumes, determine which logs have been committed to the database by using
289 Copyright © Acronis International GmbH, 2002-2014 The volumes where the Active Directory database and the transaction logs (p. 283) are locat
29 Copyright © Acronis International GmbH, 2002-2014 To Do the following Sort items by any column Click a column's header to sort items in asce
290 Copyright © Acronis International GmbH, 2002-2014 To bring a backed-up database back to production, recover the database files from a disk backu
291 Copyright © Acronis International GmbH, 2002-2014 b. Select the volume(s) containing the SQL Server database files. For the instructions on how
292 Copyright © Acronis International GmbH, 2002-2014 By using Acronis Backup, you can recover Exchange database files from a disk backup. To bring
293 Copyright © Acronis International GmbH, 2002-2014 11.3.3 Granular recovery of mailboxes RDB (RSG) is a special administrative database (storage
294 Copyright © Acronis International GmbH, 2002-2014 Steps to perform If the domain has other domain controllers, you can perform nonauthoritative
295 Copyright © Acronis International GmbH, 2002-2014 Changes to Active Directory that occurred after the backup had been made will be lost.
296 Copyright © Acronis International GmbH, 2002-2014 d. On the General tab, click Start. After the service starts, click OK. Details. This change
297 Copyright © Acronis International GmbH, 2002-2014 A USN rollback is unlikely to occur when you recover an entire domain controller from a VSS-ba
298 Copyright © Acronis International GmbH, 2002-2014 Value name: Database restored from backup Value data: 1 6. Restart the domain controlle
299 Copyright © Acronis International GmbH, 2002-2014 3. If you have recovered the database to a non-original SQL server of the original SharePoint
3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...
30 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery
300 Copyright © Acronis International GmbH, 2002-2014 stsadm.exe -o addcontentdb -url <site url> -databasename <database> -databaseserve
301 Copyright © Acronis International GmbH, 2002-2014 c. To change the server on which you want to stop the service, in the Server list, click Chan
302 Copyright © Acronis International GmbH, 2002-2014 5. Detach the database and unmount the previously mounted volume as described in steps 7-8 of
303 Copyright © Acronis International GmbH, 2002-2014 12 Protecting Microsoft SQL Server with single-pass backup This section describes how to use s
304 Copyright © Acronis International GmbH, 2002-2014 Mounting databases By using the agent, you can temporarily attach a backed-up database to a ru
305 Copyright © Acronis International GmbH, 2002-2014 Granting the permissions to the agent During installation, the setup program includes the agen
306 Copyright © Acronis International GmbH, 2002-2014 12.2 Installation of Agent for SQL Agent for SQL can only be installed on a machine running M
307 Copyright © Acronis International GmbH, 2002-2014 Follow these recommendations to ensure that a single-pass backup is successful. Back up ent
308 Copyright © Acronis International GmbH, 2002-2014 Leave the setting disabled if you use a third-party application, such as the SQL Server backup
309 Copyright © Acronis International GmbH, 2002-2014 Rename the recovered database This setting lets you retain the existing database. A recover
31 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console
310 Copyright © Acronis International GmbH, 2002-2014 Active Restore supports the following backup locations: A local folder on the machine where
311 Copyright © Acronis International GmbH, 2002-2014 12.5 Mounting SQL Server databases from a single-pass backup When you mount a backed-up SQL d
312 Copyright © Acronis International GmbH, 2002-2014 If the selected database is in use, Acronis Backup forcibly disconnects all users from the dat
313 Copyright © Acronis International GmbH, 2002-2014
314 Copyright © Acronis International GmbH, 2002-2014 13 Protecting Microsoft Active Directory with single-pass backup This section describes how to
315 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup for Windows Server Essentials Acronis Backup Advanced for VMware / Hyper-
316 Copyright © Acronis International GmbH, 2002-2014 13.5.1 Re-promoting the domain controller This method of recovering the data is available onl
317 Copyright © Acronis International GmbH, 2002-2014 b. Copy all of the contents from each of these folders to the root of the corresponding disk
318 Copyright © Acronis International GmbH, 2002-2014 14 Administering a managed machine This section describes the views that are available through
319 Copyright © Acronis International GmbH, 2002-2014 To Do Validation task (p. 233) View details of a plan/task Click Details. In the respect
32 Copyright © Acronis International GmbH, 2002-2014 Notify when the management console is connected to a component of a different version This opti
320 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea
321 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At
322 Copyright © Acronis International GmbH, 2002-2014 Running A task changes to the Running state when the event specified by the schedule occurs AN
323 Copyright © Acronis International GmbH, 2002-2014 Usage examples Agent reinstallation Export the backup plans before reinstalling the agent a
324 Copyright © Acronis International GmbH, 2002-2014 access credentials for the backed-up data – the <plan><targets><inclusions&g
325 Copyright © Acronis International GmbH, 2002-2014 2. Edit the value of the <Path> tag , which contains information about data to back up;
326 Copyright © Acronis International GmbH, 2002-2014 14.1.4 Deploying backup plans as files Assume that for some reason you cannot run Acronis Bac
327 Copyright © Acronis International GmbH, 2002-2014 <key name="Import"> <value name="FolderPath" type="T
328 Copyright © Acronis International GmbH, 2002-2014 History The History tab lets you examine the history of all the backup plan's accomplishe
329 Copyright © Acronis International GmbH, 2002-2014 14.2.1 Actions on log entries All the operations described below are performed by clicking th
33 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding
330 Copyright © Acronis International GmbH, 2002-2014 To view details of the next or the previous log entry, click the down arrow button or correspo
331 Copyright © Acronis International GmbH, 2002-2014 To export entire table contents to a *.txt or *.csv file, click Save all to file. Configuring
332 Copyright © Acronis International GmbH, 2002-2014 To change a license for a virtualization host (except for a clustered host), connect the co
333 Copyright © Acronis International GmbH, 2002-2014 It determines Acronis Backup behavior when the system is shutting down. The system shutdown oc
334 Copyright © Acronis International GmbH, 2002-2014 14.6.3.2 Time-based alerts Last backup This option is effective when the console is connected
335 Copyright © Acronis International GmbH, 2002-2014 5. If the outgoing mail server requires authentication, enter User name and Password of the s
336 Copyright © Acronis International GmbH, 2002-2014 You can override the settings set here, exclusively for the events that occur during backup or
337 Copyright © Acronis International GmbH, 2002-2014 1. Start > Control Panel > Add or Remove Programs > Add/Remove Windows Components.
338 Copyright © Acronis International GmbH, 2002-2014 In Windows XP and Server 2003: %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery
339 Copyright © Acronis International GmbH, 2002-2014 To set up proxy server settings 1. Select the Use a proxy server check box. 2. In Address, s
34 Copyright © Acronis International GmbH, 2002-2014 enter the credentials next time. The credentials are cached independently for each user who use
340 Copyright © Acronis International GmbH, 2002-2014 15 Centralized management This section covers operations that can be performed centrally by us
341 Copyright © Acronis International GmbH, 2002-2014 Storage Node (p. 441) and configure it to manage a centralized vault or multiple centralized v
342 Copyright © Acronis International GmbH, 2002-2014 15.1.2.2 Privileges for local connection Windows Local connection on a machine running Window
343 Copyright © Acronis International GmbH, 2002-2014 To disable UAC Do one of the following depending on the operating system: In a Windows oper
344 Copyright © Acronis International GmbH, 2002-2014 2. Add the names of the non-root users, whom you want to allow to connect to the machine remo
345 Copyright © Acronis International GmbH, 2002-2014 Acronis Centralized Admins A user who is a member of this group is a management server adminis
346 Copyright © Acronis International GmbH, 2002-2014 This section also provides information on configuring communication settings, selecting a netw
347 Copyright © Acronis International GmbH, 2002-2014 15.1.3.3 Configuring communication settings You can configure communication settings, such as
348 Copyright © Acronis International GmbH, 2002-2014 Linux Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the acronis_age
349 Copyright © Acronis International GmbH, 2002-2014 "%CommonProgramFiles%\Acronis\Utils\acroniscert" --reinstall When using a 64-bit
35 Copyright © Acronis International GmbH, 2002-2014 In Linux You do not need to specify task credentials. In Linux, tasks always run under the root
350 Copyright © Acronis International GmbH, 2002-2014 15.3 Creating a centralized backup plan A centralized backup plan can be applied to both Wind
351 Copyright © Acronis International GmbH, 2002-2014 Backing up an entire virtual machine, its disks, or volumes yields a standard disk backup (p.
352 Copyright © Acronis International GmbH, 2002-2014 Notes for Linux users: Logical volumes and MD devices are shown under Dynamic volumes. For
353 Copyright © Acronis International GmbH, 2002-2014 Some environment variables point to Windows folders. Using such variables instead of full fold
354 Copyright © Acronis International GmbH, 2002-2014 To define volume selection rules 1. Select the rule from the drop-down list (or type it manua
355 Copyright © Acronis International GmbH, 2002-2014 first IDE hard disk of a Linux machine first partition of the first IDE hard disk drive. For m
356 Copyright © Acronis International GmbH, 2002-2014 Standard names for Linux partitions Names such as /dev/hda1 reflect the standard way of naming
357 Copyright © Acronis International GmbH, 2002-2014 Prior to backing up to the cloud storage, you need to buy a subscription (p. 422) to the cloud
358 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following: Use Acronis service credentials The
359 Copyright © Acronis International GmbH, 2002-2014 15.4 Administering Acronis Backup Management Server This section describes the views that are
36 Copyright © Acronis International GmbH, 2002-2014 of user rights, membership in security groups, and the Full Control permissions on respective r
360 Copyright © Acronis International GmbH, 2002-2014 An application on a machine is considered protected if the respective agent is installed on th
361 Copyright © Acronis International GmbH, 2002-2014 Built-in group As soon as a machine is registered on the management server, the machine appear
362 Copyright © Acronis International GmbH, 2002-2014 Adding and importing actions are available when you select the Machines with agents view or
363 Copyright © Acronis International GmbH, 2002-2014 To Do Add machines to a static group Click Add machines to group. In the Add machines to gr
364 Copyright © Acronis International GmbH, 2002-2014 To Do Refresh a list of machines Click Refresh. The management console will update the list
365 Copyright © Acronis International GmbH, 2002-2014 Adds machines that are present in the list but are not registered Deletes registered mac
366 Copyright © Acronis International GmbH, 2002-2014 [path_to_the_file] is the path to a .txt or .csv file containing the list of machines. The
367 Copyright © Acronis International GmbH, 2002-2014 Drive health status - the state of the machine's drives health. This field is set to N
368 Copyright © Acronis International GmbH, 2002-2014 Member of This tab appears only if the selected machine is added to one or more custom groups
369 Copyright © Acronis International GmbH, 2002-2014 To Do Click Synchronize with file. Specify a text file with the list of machines. After syn
37 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr
370 Copyright © Acronis International GmbH, 2002-2014 Creating a custom static or dynamic group To create a group 1. In the Name field, enter a nam
371 Copyright © Acronis International GmbH, 2002-2014 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it
372 Copyright © Acronis International GmbH, 2002-2014 Changing the type of group will result in its conversion. Any custom group can be converted to
373 Copyright © Acronis International GmbH, 2002-2014 To Do Refresh table Click Refresh. The management console will update the list of backup pl
374 Copyright © Acronis International GmbH, 2002-2014 Virtual machines added to the management server as virtual machines are present under the Virt
375 Copyright © Acronis International GmbH, 2002-2014 To Do log The Log (p. 385) view will display a list of the log entries related to the select
376 Copyright © Acronis International GmbH, 2002-2014 To Do Export a plan Click Export. Specify the path and name of the resulting file. See Expo
377 Copyright © Acronis International GmbH, 2002-2014 Right-click on the column headings bar to choose the details to display: License key, Expirati
378 Copyright © Acronis International GmbH, 2002-2014 15.4.6.4 Removing licenses To completely remove a license from the Acronis License Server, se
379 Copyright © Acronis International GmbH, 2002-2014 Active and inactive alerts An alert can be either in an active, or inactive state. The active
38 Copyright © Acronis International GmbH, 2002-2014 Acronis Scheduler2 Service Providing scheduling for tasks performed by Acronis components Local
380 Copyright © Acronis International GmbH, 2002-2014 15.4.8 Reporting Reporting provides the management server administrator with detailed and wel
381 Copyright © Acronis International GmbH, 2002-2014 Filters Under Filters, choose which machines to include in the report. Only the machines that
382 Copyright © Acronis International GmbH, 2002-2014 Report view Under Report view, choose how the report will look: Select whether to show all
383 Copyright © Acronis International GmbH, 2002-2014 Type: The archive types—disk-level archives and/or file-level archives. Owner: The list
384 Copyright © Acronis International GmbH, 2002-2014 Report coverage Under Report coverage, choose the time interval for which you want to generate
385 Copyright © Acronis International GmbH, 2002-2014 15.4.9 Log The centralized event log stores the history of operations performed by the manage
386 Copyright © Acronis International GmbH, 2002-2014 be saved to the specified file. Save all the filtered log entries to a file 1. Set filters to
387 Copyright © Acronis International GmbH, 2002-2014 To access the management server options, connect the console to the management server and then
388 Copyright © Acronis International GmbH, 2002-2014 Time-based alerts Last backup This option is effective when the console is connected to a mana
389 Copyright © Acronis International GmbH, 2002-2014 Note: Alerts warn only about problems. Therefore, e-mail notifications about successful backup
39 Copyright © Acronis International GmbH, 2002-2014 Incremental backup An incremental backup stores changes to the data against the latest backup.
390 Copyright © Acronis International GmbH, 2002-2014 Set up the notification Frequency and Time. 2. Click OK. 15.4.10.5 Event tracing You can co
391 Copyright © Acronis International GmbH, 2002-2014 15.4.10.6 Logging level This option defines whether the management server has to collect log
392 Copyright © Acronis International GmbH, 2002-2014 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy serv
393 Copyright © Acronis International GmbH, 2002-2014 In a 32-bit version of Windows: %CommonProgramFiles%\Acronis\Agent\Acronis_agent.adm or %Pr
394 Copyright © Acronis International GmbH, 2002-2014 Enabled The component will use the specified port; type the port number in the Server TCP Port
395 Copyright © Acronis International GmbH, 2002-2014 Not Configured The component will use the default setting, which is to use encryption if possi
396 Copyright © Acronis International GmbH, 2002-2014 5 Critical Event that resulted in the termination of a process such as the agent's proces
397 Copyright © Acronis International GmbH, 2002-2014 Specifies how often the agent checks its license on the license server, and how long it can wo
398 Copyright © Acronis International GmbH, 2002-2014 Default value: 1048576 (that is, 1 GB) Percentage To Keep Description: Specifies the percentag
399 Copyright © Acronis International GmbH, 2002-2014 Default value: public Snapshot Storage Specifies the location and initial size of the snapshot
4 Copyright © Acronis International GmbH, 2002-2014 4 Backup ...
40 Copyright © Acronis International GmbH, 2002-2014 A volume backup stores all files and folders of the selected volume independent of their attrib
400 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to use a proxy server Possible values: Enabled or Disabled Defa
401 Copyright © Acronis International GmbH, 2002-2014 Specifies when to collect log entries from machines managed by Acronis Backup Management Serve
402 Copyright © Acronis International GmbH, 2002-2014 Specifies the types of the management server's events to send notifications about by mean
403 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies the maximum number of threads to use for synchronization. Possible valu
404 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to try to connect to a registered machine by using its last-kno
405 Copyright © Acronis International GmbH, 2002-2014 or %PROGRAMDATA%\Acronis\BackupAndRecovery\MMS\Temp (in Windows Vista and later versions of Wi
406 Copyright © Acronis International GmbH, 2002-2014 Default value: Empty string Password Description: Specifies the password for authentication wi
407 Copyright © Acronis International GmbH, 2002-2014 Possible values: 0 (disables cataloging) or 1 (enables cataloging) Registry key: HKEY_LOCAL_MA
408 Copyright © Acronis International GmbH, 2002-2014 16 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th
409 Copyright © Acronis International GmbH, 2002-2014 For effective use of the storage space, you have the option to set up the "Delete backups
41 Copyright © Acronis International GmbH, 2002-2014 acrocmd backup disk --volume=DYN --loc=\\srv1\backups --credentials=netuser1,pass1 --arc=alldyn
410 Copyright © Acronis International GmbH, 2002-2014 you want to back up a pass-through disk of a Hyper-V virtual machine you want to use pre
411 Copyright © Acronis International GmbH, 2002-2014 Virtualization products (host-based backup of virtual machines) VMware ESX(i) 5.0, 5.1, and 5.
412 Copyright © Acronis International GmbH, 2002-2014 16.1.7.4 What if a network connection is lost during cloud backup or recovery? The software w
413 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t
414 Copyright © Acronis International GmbH, 2002-2014 16.1.8.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac
415 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,
416 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa
417 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo
418 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis
419 Copyright © Acronis International GmbH, 2002-2014 16.1.9.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens
42 Copyright © Acronis International GmbH, 2002-2014 Basic volume or unallocated space on a basic disk Basic volume Basic volume Moving and resizing
420 Copyright © Acronis International GmbH, 2002-2014 16.1.10.1 How do I access my account management webpage? Go to http://www.acronis.com/my/clou
421 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli
422 Copyright © Acronis International GmbH, 2002-2014 16.1.10.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are
423 Copyright © Acronis International GmbH, 2002-2014 To get a trial subscription, do either of the following: On the account management webpage,
424 Copyright © Acronis International GmbH, 2002-2014 You no longer need to back up one of your machines and you want to reuse that machine’s sub
425 Copyright © Acronis International GmbH, 2002-2014 Before reassigning Delete backups from Subscription 1 using Machine 1 (if it is available and
426 Copyright © Acronis International GmbH, 2002-2014 To retrieve files from the cloud storage: 1. Go to the account management webpage (p. 420) an
427 Copyright © Acronis International GmbH, 2002-2014 Setting up regular conversion of backups to a virtual machine Operations with backups: V
428 Copyright © Acronis International GmbH, 2002-2014 Increase storage quota Replace a subscription with another one that has a greater storage quot
429 Copyright © Acronis International GmbH, 2002-2014 Subscription period The period during which the subscription remains activated. You can back u
43 Copyright © Acronis International GmbH, 2002-2014 Recovering volume contents only. The type or other properties of the target volume will not
430 Copyright © Acronis International GmbH, 2002-2014 17 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o
431 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b
432 Copyright © Acronis International GmbH, 2002-2014 the backup archive (p. 431) name and location the backup scheme (p. 432). This includes
433 Copyright © Acronis International GmbH, 2002-2014 access and back up the data that has survived in a corrupted system deploy an operating
434 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 439) administrato
435 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 439) contains all data stored o
436 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 431) that contains a sector-based copy of a disk or a volume
437 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di
438 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil
439 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli
44 Copyright © Acronis International GmbH, 2002-2014 3.7.2.4 Assembling MD devices for recovery (Linux) In Linux, when performing recovery from a d
440 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect
441 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req
442 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 432) aimed to maintain the optimal balance between
45 Copyright © Acronis International GmbH, 2002-2014 Creating the volume structure automatically Use the following procedure to automatically recrea
46 Copyright © Acronis International GmbH, 2002-2014 Note: This procedure will not work if you connect to Acronis Backup Bootable Agent remotely, be
47 Copyright © Acronis International GmbH, 2002-2014 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable .
48 Copyright © Acronis International GmbH, 2002-2014 type: disk Num Partition Flags Size Type GUID ------
49 Copyright © Acronis International GmbH, 2002-2014 4K native (4Kn) disks have a 4-KB logical sector size. Modern operating systems can store da
5 Copyright © Acronis International GmbH, 2002-2014 4.7.21 Sector-by-sector backup ...
50 Copyright © Acronis International GmbH, 2002-2014 The information in this section also applies to Windows 8.1 and Windows Server 2012 R2. Limitat
51 Copyright © Acronis International GmbH, 2002-2014 Data Deduplication In Windows Server 2012, you can enable the Data Deduplication feature for an
52 Copyright © Acronis International GmbH, 2002-2014 2. Recover the system. The recovered data will be unencrypted. 3. Reboot the recovered system
53 Copyright © Acronis International GmbH, 2002-2014 About the test message When configuring SNMP notifications, you can send a test message to chec
54 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i
55 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 193) If the specified location is an R
56 Copyright © Acronis International GmbH, 2002-2014 Set up a regular conversion of a disk or volume backup to a virtual machine. Plan parameters Pl
57 Copyright © Acronis International GmbH, 2002-2014 Microsoft SQL databases by means of single-pass disk and application backup, if Acronis Back
58 Copyright © Acronis International GmbH, 2002-2014 For more information about backing up Microsoft Exchange data see "Backing up Microsoft Ex
59 Copyright © Acronis International GmbH, 2002-2014 4.2.3 Source files exclusion This option is effective for Windows and Linux operating systems
6 Copyright © Acronis International GmbH, 2002-2014 7.3 Removable devices ...
60 Copyright © Acronis International GmbH, 2002-2014 Wildcard characters You can use one or more wildcard characters * and ? in the criterion. These
61 Copyright © Acronis International GmbH, 2002-2014 added, deleted or modified by another user or by the program itself according to scheduled oper
62 Copyright © Acronis International GmbH, 2002-2014 Destination Details Cloud storage To back up data to Acronis Cloud Storage, click Log in and
63 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address
64 Copyright © Acronis International GmbH, 2002-2014 Warning: According to the original FTP specification, credentials required for access to FTP se
65 Copyright © Acronis International GmbH, 2002-2014 Full - selected by default for all backup locations (except for Acronis Cloud Storage). I
66 Copyright © Acronis International GmbH, 2002-2014 Keep backups Specifies how long you want the backups to be stored in the archive. A term can be
67 Copyright © Acronis International GmbH, 2002-2014 available through next Sunday, January 8; the first weekly backup, the one of Saturday, January
68 Copyright © Acronis International GmbH, 2002-2014 Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays,
69 Copyright © Acronis International GmbH, 2002-2014 Clean up archive Specifies how to get rid of old backups: either to apply retention rules (p. 9
7 Copyright © Acronis International GmbH, 2002-2014 9.5 Acronis Startup Recovery Manager ...
70 Copyright © Acronis International GmbH, 2002-2014 Here, all parameters except Schedule in Full backup are left empty. All backups in the archive
71 Copyright © Acronis International GmbH, 2002-2014 By default, a backup is not deleted as long as it has dependent backups that must be kept. For
72 Copyright © Acronis International GmbH, 2002-2014 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have d
73 Copyright © Acronis International GmbH, 2002-2014 On day 14, the interval is five days. It increases on subsequent days before decreasing again,
74 Copyright © Acronis International GmbH, 2002-2014 protection strategy and you prefer to be immediately informed whether the backed-up data is not
75 Copyright © Acronis International GmbH, 2002-2014 To add a text label to a backup: 1. On the Create backup plan (p. 54) page, click Show plan&ap
76 Copyright © Acronis International GmbH, 2002-2014 acronisTag.hostname = “superserver.corp.local” acronisTag.os.type = “windows7Server64Guest” acr
77 Copyright © Acronis International GmbH, 2002-2014 When you back up to a locally attached RDX drive or USB flash drive, the Name backup files usin
78 Copyright © Acronis International GmbH, 2002-2014 are kept. This means you can store multiple full backups with or without incremental ones, but
79 Copyright © Acronis International GmbH, 2002-2014 Result. The archive consists of a single file: MyMachine.tib. This file is deleted before creat
8 Copyright © Acronis International GmbH, 2002-2014 11.5.3 Recovering individual items...
80 Copyright © Acronis International GmbH, 2002-2014 You want each new backup to replace the backup on the currently attached drive. In this scen
81 Copyright © Acronis International GmbH, 2002-2014 In Windows, if you choose to back up to locally attached RDX drives or USB flash drives, the Na
82 Copyright © Acronis International GmbH, 2002-2014 Event Windows Linux Time: Daily, Weekly, Monthly + + Time since completion of the last successf
83 Copyright © Acronis International GmbH, 2002-2014 4.4.1 Daily schedule Daily schedule is effective in Windows and Linux operating systems. To sp
84 Copyright © Acronis International GmbH, 2002-2014 From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 times a da
85 Copyright © Acronis International GmbH, 2002-2014 To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows:
86 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: <Workdays> - selecting the <Workdays> check box automatica
87 Copyright © Acronis International GmbH, 2002-2014 2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. 4.4.3 Monthly schedule M
88 Copyright © Acronis International GmbH, 2002-2014 once a week and incremental on workdays. For more details, see the Monthly full, weekly differe
89 Copyright © Acronis International GmbH, 2002-2014 Third schedule 1. Months: June, July, August. 2. Days: 1, 15. 3. Once at: 10:00:00 PM. 4. E
9 Copyright © Acronis International GmbH, 2002-2014 14.6.8 Cloud backup proxy ...
90 Copyright © Acronis International GmbH, 2002-2014 Event type: Error Event ID: 7 Important: To ensure that such a task will complete despite
91 Copyright © Acronis International GmbH, 2002-2014 Use Wake-on-LAN When this setting is enabled, Acronis Backup Management Server will use the Wak
92 Copyright © Acronis International GmbH, 2002-2014 Distribute start time within the time window Maximum delay: 1 Hour(s) Distribution method: Rand
93 Copyright © Acronis International GmbH, 2002-2014 4.4.6.1 User is idle Applies to: Windows "User is idle" means that a screen saver is
94 Copyright © Acronis International GmbH, 2002-2014 Example A company uses different locations on the same network-attached storage for backing up
95 Copyright © Acronis International GmbH, 2002-2014 Task start conditions: Wait until the conditions are met, Run the task anyway after 3 hour(s
96 Copyright © Acronis International GmbH, 2002-2014 The following picture illustrates this example. Usage scenarios Reliable disaster recovery
97 Copyright © Acronis International GmbH, 2002-2014 4.5.1 Supported locations You can copy or move a backup from any of these locations: A loca
98 Copyright © Acronis International GmbH, 2002-2014 Copying and moving backups between managed vaults Copying or moving a backup from one managed v
99 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi scheme Each backup is retained based on its level (p. 71), and then deleted. You
Commentaires sur ces manuels