Acronis Backup for Windows Server Essentials - User Guide Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel Acronis Backup for Windows Server Essentials - User Guide. Acronis Backup for Windows Server Essentials - User Guide User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 442
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Acronis Backup Advanced
Version 11.5 Update 5
USER GUIDE
APPLIES TO THE FOLLOWING PRODUCTS
Advanced for Windows Server
Advanced for Linux Server
Advanced for PC
Advanced for VMware / Hyper-V / RHEV / Citrix XenServer / Oracle VM
Advanced for Exchange
Advanced for SQL
Advanced for SharePoint
Advanced for Active Directory
For Windows Server Essentials
Vue de la page 0
1 2 3 4 5 6 ... 441 442

Résumé du contenu

Page 1 - Version 11.5 Update 5

Acronis Backup Advanced Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS Advanced for Windows Server Advanced for Linux Server A

Page 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 17 Glossary ...

Page 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014 2. Select whether to delete the backups or to move them to another location if the specified

Page 4

101 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set

Page 5

102 Copyright © Acronis International GmbH, 2002-2014  You want to occasionally back up your machine to a local folder.  You want to keep a copy

Page 6

103 Copyright © Acronis International GmbH, 2002-2014 the Location field. Under Retention rules, select Move backups older than 1 week. Then, specif

Page 7

104 Copyright © Acronis International GmbH, 2002-2014 To disable backup cataloging These steps can be performed in any order. 1. Modify the Windows

Page 8

105 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File

Page 9

106 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File

Page 10

107 Copyright © Acronis International GmbH, 2002-2014 The preset is: Disabled. In Windows operating systems, each file has the File is ready for arc

Page 11 - Cloud backup

108 Copyright © Acronis International GmbH, 2002-2014  When you specify an already existing archive as the destination of the backup plan.  When

Page 12 - OS support

109 Copyright © Acronis International GmbH, 2002-2014  For a file-level backup - nothing.  For an Exchange database-level backup - only database

Page 13 - Virtualization

11 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5  Acronis Backup Advanced for V

Page 14

110 Copyright © Acronis International GmbH, 2002-2014 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the followin

Page 15

111 Copyright © Acronis International GmbH, 2002-2014 If the destination disk runs out of free space while creating the backup, the task enters the

Page 16 - 1.7.2 Agent for Linux

112 Copyright © Acronis International GmbH, 2002-2014  Maximum – the data will be compressed as much as possible. The backup duration will be maxi

Page 17 - 1.7.5 Agent for SQL

113 Copyright © Acronis International GmbH, 2002-2014 To set up saving DRPs as files: 1. Select the Save DRP as file check box. 2. Click Browse to

Page 18 - 1.7.7.2 Storage Node

114 Copyright © Acronis International GmbH, 2002-2014 a. From – type the name of the sender. If you leave this field empty, the messages will conta

Page 19 - 1.7.8 Management Console

115 Copyright © Acronis International GmbH, 2002-2014 of the data will be backed up and you will be able to mount the resulting disk backup and extr

Page 20 - 1.9 Supported file systems

116 Copyright © Acronis International GmbH, 2002-2014 To select whether to log the backup operations events in the Application Event Log of Windows:

Page 21 - 1.10 Technical Support

117 Copyright © Acronis International GmbH, 2002-2014 Always back up files directly. Administrator or Backup Operator privileges are not required. T

Page 22 - 2 Getting started

118 Copyright © Acronis International GmbH, 2002-2014  Acronis Backup Acronis Backup will take the snapshot on its own. With this setting, a backu

Page 23 - Step 5. Backup

119 Copyright © Acronis International GmbH, 2002-2014 <key name="LVMSnapshots"> <value name="MinimalVGFreeRelative&quo

Page 24 - Step 7. Management

12 Copyright © Acronis International GmbH, 2002-2014 OS support  Support for Windows MultiPoint Server 2012 and Windows Storage Server 2012 R2. 

Page 25

120 Copyright © Acronis International GmbH, 2002-2014 The preset is: Disabled. Tip. You can back up Hyper-V virtual machines residing on a cluster s

Page 26 - Navigation tree

121 Copyright © Acronis International GmbH, 2002-2014  Selectively copy backups from an archive to another location. This option may be useful bec

Page 27 - Operations with pane

122 Copyright © Acronis International GmbH, 2002-2014 4.7.18.2 Post-backup command To specify a command/executable file to be executed after the ba

Page 28 - 2.1.2.1 Views

123 Copyright © Acronis International GmbH, 2002-2014 4.7.19.1 Pre-data capture command To specify a command/batch file to be executed before data

Page 29 - 2.1.2.2 Action pages

124 Copyright © Acronis International GmbH, 2002-2014 Preset Continue the backup only after the command is successfully executed. Delete the TIB fi

Page 30 - 2.1.3 Console options

125 Copyright © Acronis International GmbH, 2002-2014 If you leave this option disabled, data from different machines will be backed up on all tapes

Page 31 - 2.1.3.4 Pop-up messages

126 Copyright © Acronis International GmbH, 2002-2014 Always use a free tape By default, the software tries to write a backup onto a tape containing

Page 32 - 2.1.3.5 Startup page

127 Copyright © Acronis International GmbH, 2002-2014 The program will try to execute the failed task again if you select the Restart a failed task

Page 33 - 3.1 Owners

128 Copyright © Acronis International GmbH, 2002-2014 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might b

Page 34 - Task credentials

129 Copyright © Acronis International GmbH, 2002-2014 In most cases, VSS will use Acronis VSS Provider.  Software - Acronis VSS Provider VSS wil

Page 35

13 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 and Windows Server 2012 (p. 49)  Install Agent for Windows, Agent

Page 36

130 Copyright © Acronis International GmbH, 2002-2014  If you use third-party software for backing up the SQL Server data. The reason for this is

Page 37 - Common services

131 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect

Page 38 - Full backup

132 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da

Page 39 - Differential backup

133 Copyright © Acronis International GmbH, 2002-2014 5.1.1 What to recover 1. Specifying the archive location In the Data path field, specify the

Page 40 - Backing up dynamic volumes

134 Copyright © Acronis International GmbH, 2002-2014 There are probably other times when you may need to recover the MBR, but the above are the mos

Page 41 - Recovering dynamic volumes

135 Copyright © Acronis International GmbH, 2002-2014 Location Details FTP, SFTP If the archive is stored on an FTP or SFTP server, type the serve

Page 42 - (Linux)

136 Copyright © Acronis International GmbH, 2002-2014  Select Microsoft Exchange Information Store to browse and search for information stores, in

Page 43

137 Copyright © Acronis International GmbH, 2002-2014  On a managed machine: Enable cataloging in the Backup cataloging option (Options > Machi

Page 44

138 Copyright © Acronis International GmbH, 2002-2014  Password. The password for the account. 2. Click OK. According to the original FTP specifi

Page 45

139 Copyright © Acronis International GmbH, 2002-2014 virtualization product brand and settings. VMware ESX(i) may have multiple storages. A Microso

Page 46

14 Copyright © Acronis International GmbH, 2002-2014  Express full backup method This method is based on monitoring changes of the Exchange databa

Page 47 - Mounting backup volumes

140 Copyright © Acronis International GmbH, 2002-2014 The software will keep the NT signature of the target disk if it is the same as the NT signatu

Page 48 - To unmount a backup volume

141 Copyright © Acronis International GmbH, 2002-2014 If there is enough unallocated space, the volumes will be recovered "as is". If unal

Page 49

142 Copyright © Acronis International GmbH, 2002-2014 3. Examine the first value in the Sector size (logical/physical) line. For example, the outpu

Page 50 - Storage spaces

143 Copyright © Acronis International GmbH, 2002-2014 Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 143

Page 51 - Common backup rule

144 Copyright © Acronis International GmbH, 2002-2014 Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes an

Page 52 - 3.12 Support for SNMP

145 Copyright © Acronis International GmbH, 2002-2014 When recovering basic MBR and GPT volumes, you can select the alignment method manually if the

Page 53 - About the test message

146 Copyright © Acronis International GmbH, 2002-2014 If you allow files to be overwritten, you still have an option to prevent overwriting of speci

Page 54 - 4 Backup

147 Copyright © Acronis International GmbH, 2002-2014  Use current user credentials The task will run under the credentials with which the user wh

Page 55 - How to back up

148 Copyright © Acronis International GmbH, 2002-2014 Limitations Transferring a Linux system between UEFI and BIOS is not supported. Transferring a

Page 56 - Plan parameters

149 Copyright © Acronis International GmbH, 2002-2014 system BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: convertible Solut

Page 57

15 Copyright © Acronis International GmbH, 2002-2014 Installation  Remote installation of Acronis Backup & Recovery 11.5 Agent for Linux. Supp

Page 58

150 Copyright © Acronis International GmbH, 2002-2014  Green background means that the system will be bootable. No user action is required.  Yel

Page 59 - Criteria: name

151 Copyright © Acronis International GmbH, 2002-2014 5.3 Acronis Active Restore Active Restore is the Acronis proprietary technology that brings a

Page 60 - 1. Selecting the destination

152 Copyright © Acronis International GmbH, 2002-2014 If you opt for Acronis Active Restore, the system will be operational in a short time. Users w

Page 61

153 Copyright © Acronis International GmbH, 2002-2014 Why a recovered operating system may be unbootable  The machine BIOS is configured to boot f

Page 62

154 Copyright © Acronis International GmbH, 2002-2014 Such system cannot boot because its kernel tries to mount the root file system at the LVM volu

Page 63

155 Copyright © Acronis International GmbH, 2002-2014 or chroot /mnt/system/ /usr/sbin/grub 9. Specify the disk on which GRUB is located—typically,

Page 64 - 4.2.6 Backup schemes

156 Copyright © Acronis International GmbH, 2002-2014 Once you confirm the operation, Acronis Backup will re-deploy the factory image located in Acr

Page 65 - Parameters

157 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery Fil

Page 66

158 Copyright © Acronis International GmbH, 2002-2014 The preset is Enabled. This option defines whether to recover the files’ date and time from th

Page 67

159 Copyright © Acronis International GmbH, 2002-2014 The option enables you to receive e-mail notifications about the recovery task's successf

Page 68

16 Copyright © Acronis International GmbH, 2002-2014 Components for centralized management These components, included in Acronis Backup Advanced, pr

Page 69

160 Copyright © Acronis International GmbH, 2002-2014 9. Click Send test e-mail message to check whether e-mail notifications work correctly with t

Page 70

161 Copyright © Acronis International GmbH, 2002-2014  Send SNMP notifications individually for recovery operation events – to send the events of

Page 71

162 Copyright © Acronis International GmbH, 2002-2014 5.6.6 Mount points This option is effective only in Windows for recovering data from a file-l

Page 72 - Roll-back period

163 Copyright © Acronis International GmbH, 2002-2014 5. Click Test command to check if the command is correct. Check box Selection Fail the task i

Page 73 - 4.2.7 Archive validation

164 Copyright © Acronis International GmbH, 2002-2014 To specify the recovery process priority Select one of the following:  Low – to minimize res

Page 74

165 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk

Page 75 - Parameters specification

166 Copyright © Acronis International GmbH, 2002-2014  During conversion which is part of a backup plan (p. 167), the software creates the virtual

Page 76

167 Copyright © Acronis International GmbH, 2002-2014  Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo

Page 77 - 4.3.1 The [DATE] variable

168 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac

Page 78 - 4.3.3 Usage examples

169 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker

Page 79

17 Copyright © Acronis International GmbH, 2002-2014 Disk backup Disk-level data protection is based on backing up either a disk or a volume file sy

Page 80

170 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr

Page 81 - 4.4 Scheduling

171 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso

Page 82 - What-ifs

172 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak

Page 83 - 4.4.1 Daily schedule

173 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A

Page 84 - 4.4.2 Weekly schedule

174 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio

Page 85

175 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F

Page 86

176 Copyright © Acronis International GmbH, 2002-2014 'Vaults' view Vaults (on the navigation pane) - top item of the vaults tree. Click

Page 87 - 4.4.3 Monthly schedule

177 Copyright © Acronis International GmbH, 2002-2014 What does the icon mean? When browsing archives on the Archive view tab, you may encounter

Page 88

178 Copyright © Acronis International GmbH, 2002-2014 FTP/SFTP server No Yes 7.1.2.1 Actions on centralized vaults To access actions 1. Connect

Page 89

179 Copyright © Acronis International GmbH, 2002-2014 To Do Validate a vault 1. Select the vault. 2. Click Validate. You will be taken to the V

Page 90

18 Copyright © Acronis International GmbH, 2002-2014 The agent uses Microsoft VSS to ensure the consistency of the backed-up databases. After a succ

Page 91 - Use Wake-on-LAN

180 Copyright © Acronis International GmbH, 2002-2014 [Optional] Select whether to protect the vault with encryption. Anything written to the vault

Page 92 - 4.4.6 Conditions

181 Copyright © Acronis International GmbH, 2002-2014 catalog, click the update the catalog now link on the Data view tab of the vault. Please be aw

Page 93 - 4.4.6.1 User is idle

182 Copyright © Acronis International GmbH, 2002-2014 Vault encryption If you protect a vault with encryption, anything written to the vault will be

Page 94 - 4.4.6.4 Users logged off

183 Copyright © Acronis International GmbH, 2002-2014 At first, the software tries to find the entered names in the list of local users and groups o

Page 95 - Example:

184 Copyright © Acronis International GmbH, 2002-2014 After you have performed all the required steps, click OK to commit creating the unmanaged cen

Page 96 - Usage scenarios

185 Copyright © Acronis International GmbH, 2002-2014 If the vault is deduplicating, we recommend that you move the deduplication database from the

Page 97 - 4.5.1 Supported locations

186 Copyright © Acronis International GmbH, 2002-2014 7.1.3 Personal vaults A vault is called personal if it was created using direct connection of

Page 98 - Simple scheme

187 Copyright © Acronis International GmbH, 2002-2014 for accessing a vault In the appearing dialog box, provide the credentials required for access

Page 99 - Custom scheme

188 Copyright © Acronis International GmbH, 2002-2014 4. Edit the backup plans and tasks: redirect their destination to the new vault. 5. Delete t

Page 100 -  Consolidate these backups

189 Copyright © Acronis International GmbH, 2002-2014 To specify a new cache folder in Linux: Add the following element inside the Configuration tag

Page 101 - 4.5.5 Usage examples

19 Copyright © Acronis International GmbH, 2002-2014 The most important function of a storage node is deduplication (p. 226) of backups stored in it

Page 102

190 Copyright © Acronis International GmbH, 2002-2014  Offers a cost-effective and handy method for protecting data from software malfunction, vir

Page 103

191 Copyright © Acronis International GmbH, 2002-2014 7.2.1.2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to sel

Page 104 - 4.7 Default backup options

192 Copyright © Acronis International GmbH, 2002-2014 As is apparent from the above, setting the maximum possible zone size is not advisable. You wi

Page 105

193 Copyright © Acronis International GmbH, 2002-2014 7.2.2.3 Deleting Acronis Secure Zone To delete Acronis Secure Zone: 1. On the Manage Acronis

Page 106 - 4.7.1 Additional settings

194 Copyright © Acronis International GmbH, 2002-2014 You can set the option to clean up the archive "When there is insufficient space while ba

Page 107 - 4.7.2 Archive protection

195 Copyright © Acronis International GmbH, 2002-2014 7.4.2.1 Compatibility with RSM and third-party software Coexistence with third-party software

Page 108 - 4.7.3 Backup cataloging

196 Copyright © Acronis International GmbH, 2002-2014 Registry value: ArsmDmlDbProtocol Possible data values: Any string 0 to 32765 characters long.

Page 109 - 4.7.4 Backup performance

197 Copyright © Acronis International GmbH, 2002-2014 Set up the custom scheme so that it creates full backups with a reasonable frequency. Otherwis

Page 110 - 4.7.5 Backup splitting

198 Copyright © Acronis International GmbH, 2002-2014 7.4.2.7 Readability of tapes written by the older Acronis products The following table summar

Page 111 - 4.7.6 Compression level

199 Copyright © Acronis International GmbH, 2002-2014 a. Click Inventory to detect the loaded tapes. Select the Full inventorying method. Do not se

Page 112

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Page 113 - 4.7.8 E-mail notifications

20 Copyright © Acronis International GmbH, 2002-2014 1.7.9 Bootable Media Builder Acronis Bootable Media Builder is a dedicated tool for creating b

Page 114 - 4.7.9 Error handling

200 Copyright © Acronis International GmbH, 2002-2014 c. Decide whether you want to back up to the default Acronis pool (p. 203) or to create a new

Page 115 - 4.7.10 Event tracing

201 Copyright © Acronis International GmbH, 2002-2014 What if I do not see backups stored on tapes? It may mean that the database with the contents

Page 116

202 Copyright © Acronis International GmbH, 2002-2014 11. If the tapes contain a password-protected archive, select the corresponding check box, and

Page 117 - 4.7.14 LVM snapshotting

203 Copyright © Acronis International GmbH, 2002-2014  After you have attached or re-attached a tape device.  After you have installed or reinst

Page 118 -  Logical volume manager

204 Copyright © Acronis International GmbH, 2002-2014 Separating filled tapes You may want to separate filled tapes from incomplete ones. Let's

Page 119 - 4.7.16 Mount points

205 Copyright © Acronis International GmbH, 2002-2014 3. You can change the pool name (except the name of the Acronis pool) or settings. For more i

Page 120 - 4.7.18 Pre/Post commands

206 Copyright © Acronis International GmbH, 2002-2014 To move tapes to another pool: 1. In the Navigation tree, click Tape management. If connected

Page 121 - 4.7.18.1 Pre-backup command

207 Copyright © Acronis International GmbH, 2002-2014 Erasing Erasing a tape physically deletes all backups stored on the tape and removes the infor

Page 122

208 Copyright © Acronis International GmbH, 2002-2014 4. Click Rescan. 5. Select the vault where the newly detected archives will be placed. 6.

Page 123

209 Copyright © Acronis International GmbH, 2002-2014 Tape was used by... Tape is read by... Tape is sent to pool... Agent the same Agent where the

Page 124 - 4.7.22 Tape management

21 Copyright © Acronis International GmbH, 2002-2014  ReiserFS3 - particular files cannot be recovered from disk backups located on Acronis Backup

Page 125

210 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select tape libraries and stand-alone drives to be inventoried. By default, all

Page 126 - Always use a free tape

211 Copyright © Acronis International GmbH, 2002-2014 To create a personal vault: 1. In the Navigation tree, click Vaults. 2. Click Create. 3.

Page 127

212 Copyright © Acronis International GmbH, 2002-2014 5. Create a personal vault (p. 210) and associate your pool with it. 6. When creating a back

Page 128 - Skip the task execution

213 Copyright © Acronis International GmbH, 2002-2014  In Clean up archive, select Using retention rules, and then click Retention rules. Specify

Page 129 - Enabling VSS Full backup

214 Copyright © Acronis International GmbH, 2002-2014  You want to back up a machine to a tape device attached to a storage node.  You want to u

Page 130

215 Copyright © Acronis International GmbH, 2002-2014 are required to protect enterprise data. This goal is achieved by organizing and managing the

Page 131 - 5 Recovery

216 Copyright © Acronis International GmbH, 2002-2014 7.5.4 Getting started with a storage node Prerequisites Make sure that:  The management ser

Page 132 - Task parameters

217 Copyright © Acronis International GmbH, 2002-2014 3. Select the storage node; then, perform the required operations as described in "Actio

Page 133 - 5.1.1 What to recover

218 Copyright © Acronis International GmbH, 2002-2014 7.5.6 Operations with storage nodes 7.5.6.1 Actions on storage nodes To access actions 1. C

Page 134

219 Copyright © Acronis International GmbH, 2002-2014 Refresh the list of storage nodes Click Refresh. The management console will update the lis

Page 135 - 5.1.1.2 Data catalog

22 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to

Page 136

220 Copyright © Acronis International GmbH, 2002-2014  Archives - the total number of archives stored in all the vaults managed by the storage nod

Page 137

221 Copyright © Acronis International GmbH, 2002-2014 Every time the compacting task starts, the storage node determines whether to perform compacti

Page 138 - 5.1.4 Where to recover

222 Copyright © Acronis International GmbH, 2002-2014 Other parameters Log Cleanup Rules Specifies how to clean up the storage node log. This parame

Page 139 - NT signature

223 Copyright © Acronis International GmbH, 2002-2014 Components of Acronis Backup may connect to the storage node for viewing the contents of a vau

Page 140

224 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to check the hash values of data blocks that are sent to a dedu

Page 141 - By disk specification

225 Copyright © Acronis International GmbH, 2002-2014 node's log, indicating the vault in question. You can view storage node warnings in the D

Page 142 - Disks/volumes

226 Copyright © Acronis International GmbH, 2002-2014 Enabled Possible values: 0 (disables cataloging) or 1 (enables cataloging) Registry key: HKEY_

Page 143 - Size and location

227 Copyright © Acronis International GmbH, 2002-2014 If the database is corrupted or the storage node is lost, while the vault retains its contents

Page 144 - Volume (partition) alignment

228 Copyright © Acronis International GmbH, 2002-2014 The following diagram illustrates the result of deduplication at target. The indexing activit

Page 145

229 Copyright © Acronis International GmbH, 2002-2014  When performing incremental backups of similar data from different sources, provided that t

Page 146 - 5.1.6 Task credentials

23 Copyright © Acronis International GmbH, 2002-2014 c. Follow the on-screen instructions. Step 2. Running Run Acronis Backup Management Console.

Page 147 - Recommendations

230 Copyright © Acronis International GmbH, 2002-2014  The disk space required for a deduplication database can be estimated by using the followin

Page 148 - 5.2.1 Recovering volumes

231 Copyright © Acronis International GmbH, 2002-2014 Back up a typical machine before backing up several machines with similar contents When backin

Page 149 - 5.2.2 Recovering disks

232 Copyright © Acronis International GmbH, 2002-2014

Page 150

233 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Page 151 - 5.3 Acronis Active Restore

234 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 235) [Optional] Provide credentials for accessing the source if the task accou

Page 152 - How to use

235 Copyright © Acronis International GmbH, 2002-2014  To select a centralized vault (either managed or unmanaged), expand the Centralized group a

Page 153

236 Copyright © Acronis International GmbH, 2002-2014 According to the original FTP specification, credentials required for access to FTP servers ar

Page 154

237 Copyright © Acronis International GmbH, 2002-2014 8.2 Exporting archives and backups The export operation creates a copy of an archive or a sel

Page 155 - 5.4.2 About Windows loaders

238 Copyright © Acronis International GmbH, 2002-2014 The exported archive inherits the options of the original archive, including encryption and th

Page 156

239 Copyright © Acronis International GmbH, 2002-2014 Select the type of objects to export: Archive - in this case, you need to specify the archive

Page 157 - 5.6.1 Additional settings

24 Copyright © Acronis International GmbH, 2002-2014 Tip. Using the bootable media, you can do off-line ("cold") backups in the same way a

Page 158 - 5.6.2 E-mail notifications

240 Copyright © Acronis International GmbH, 2002-2014 8.2.3 Access credentials for source Specify credentials required for access to the location w

Page 159

241 Copyright © Acronis International GmbH, 2002-2014 After entering access credentials, the folders on the server become available. Click the appro

Page 160 - 5.6.4 Event tracing

242 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if

Page 161 - 5.6.5 File-level security

243 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or

Page 162 - 5.6.7 Pre/Post commands

244 Copyright © Acronis International GmbH, 2002-2014 Specify:  User name. When entering the name of an Active Directory user account, be sure to

Page 163 - 5.6.8 Recovery priority

245 Copyright © Acronis International GmbH, 2002-2014 8.4 Operations available in vaults By using vaults, you can easily access archives and backup

Page 164 - 5.6.9 Tape management

246 Copyright © Acronis International GmbH, 2002-2014 8.4.2 Operations with backups To perform any operation with a backup 1. In the Navigation pa

Page 165 - 6.1 Conversion methods

247 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes

Page 166 - Custom loader reactivation

248 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele

Page 167 - 6.2.2.1 Conversion settings

249 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or

Page 168

25 Copyright © Acronis International GmbH, 2002-2014  If you opt for storing all backup archives in a single or a few networked locations, create

Page 169 - Storage space

250 Copyright © Acronis International GmbH, 2002-2014  When a machine is booted with a PE-based bootable media, you cannot select optical media su

Page 170

251 Copyright © Acronis International GmbH, 2002-2014  User name and password to be entered on the console side at the connection to the agent. If

Page 171 - 6.2.3.1 Steps to perform

252 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The

Page 172

253 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con

Page 173 - Choosing the disk interface

254 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p

Page 174 - 6.3.2 Steps to perform

255 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI

Page 175 - 7.1 Vaults

256 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from

Page 176 - 7.1.1 Working with vaults

257 Copyright © Acronis International GmbH, 2002-2014 VLANs are mainly used to divide a local area network into segments. A NIC that is connected to

Page 177 - 7.1.2 Centralized vaults

258 Copyright © Acronis International GmbH, 2002-2014 8. The log lifetime is limited to the current session. You can save the entire log or the fil

Page 178

259 Copyright © Acronis International GmbH, 2002-2014 4. Specify the 20-character device ID. 5. If you want to allow writing data onto the device,

Page 179

26 Copyright © Acronis International GmbH, 2002-2014 Menu bar Appears across the top of the program window. Lets you perform most of operations ava

Page 180

260 Copyright © Acronis International GmbH, 2002-2014 gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunz

Page 181 - Deduplication database path

261 Copyright © Acronis International GmbH, 2002-2014 9.6 Acronis PXE Server Acronis PXE Server allows for booting machines to Acronis bootable com

Page 182 - Vault administrators

262 Copyright © Acronis International GmbH, 2002-2014 On a machine that has an operating system on the hard disk, the BIOS must be configured so tha

Page 183 - Vault users

263 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co

Page 184 - Attaching a managed vault

264 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d

Page 185

265 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di

Page 186 - 7.1.3 Personal vaults

266 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit

Page 187 - Creating a personal vault

267 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a

Page 188 - How can I merge two vaults?

268 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume

Page 189 - 7.2 Acronis Secure Zone

269 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t

Page 190 - Limitations

27 Copyright © Acronis International GmbH, 2002-2014  Dashboard. Use this view to estimate at a glance whether the data is successfully protecte

Page 191 - 7.2.1.4 Result confirmation

270 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot

Page 192

271 Copyright © Acronis International GmbH, 2002-2014  safe conversion of a dynamic disk to basic when it contains volumes with data for simple an

Page 193 - 7.3 Removable devices

272 Copyright © Acronis International GmbH, 2002-2014  Store backups (images) of other volumes/disks on a special volume;  Install a new operati

Page 194 - 7.4 Tape devices

273 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to

Page 195 - 7.4.2.2 Supported hardware

274 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume:  Select three destination disks to create the volume on. After yo

Page 196 - Backup schemes

275 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be

Page 197 - 7.4.2.6 Limitations

276 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the

Page 198 - Before backing up

277 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of

Page 199 - Results

278 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit

Page 200

279 Copyright © Acronis International GmbH, 2002-2014 11 Protecting applications with disk-level backup This section describes how to use a disk-lev

Page 201

28 Copyright © Acronis International GmbH, 2002-2014 2.1.2 Main area, views and action pages The main area is a basic place where you work with the

Page 202 - 7.4.4 Tape management

280 Copyright © Acronis International GmbH, 2002-2014 If the application databases are located on a number of machines, back up all of the machines

Page 203 - 7.4.4.2 Tape pools

281 Copyright © Acronis International GmbH, 2002-2014 option is effective on a physical machine and on a virtual machine where Agent for Windows is

Page 204 - Editing a pool

282 Copyright © Acronis International GmbH, 2002-2014 Create Table ##temp ( DatabaseName sysname, Name sysname, physical_name nvarchar(5

Page 205 - Changing pool

283 Copyright © Acronis International GmbH, 2002-2014 Tracks how far Exchange has progressed in writing logged information to the database file. To

Page 206 - Ejecting

284 Copyright © Acronis International GmbH, 2002-2014 11.1.1.4 SharePoint database files SharePoint stores content, auxiliary SharePoint services&a

Page 207 - Rescanning

285 Copyright © Acronis International GmbH, 2002-2014  Log file shrinking. Log file shrinking reduces the physical size of a log file by removing

Page 208 - Inventorying

286 Copyright © Acronis International GmbH, 2002-2014 Where:  myServer - name of the server  instanceName - name of the instance  C:\myScrip

Page 209 - Sequence of actions

287 Copyright © Acronis International GmbH, 2002-2014 1. Dismount the database (in Exchange 2010) or all databases of the storage group (in Exchang

Page 210 - 7.4.5 Vaults on tapes

288 Copyright © Acronis International GmbH, 2002-2014 2. In the mounted volumes, determine which logs have been committed to the database by using

Page 211 - 7.4.6 Usage examples

289 Copyright © Acronis International GmbH, 2002-2014  The volumes where the Active Directory database and the transaction logs (p. 283) are locat

Page 212 - Result

29 Copyright © Acronis International GmbH, 2002-2014 To Do the following Sort items by any column Click a column's header to sort items in asce

Page 213

290 Copyright © Acronis International GmbH, 2002-2014 To bring a backed-up database back to production, recover the database files from a disk backu

Page 214 - 7.5 Storage nodes

291 Copyright © Acronis International GmbH, 2002-2014 b. Select the volume(s) containing the SQL Server database files. For the instructions on how

Page 215 - Encryption

292 Copyright © Acronis International GmbH, 2002-2014 By using Acronis Backup, you can recover Exchange database files from a disk backup. To bring

Page 216 - Managing storage nodes

293 Copyright © Acronis International GmbH, 2002-2014 11.3.3 Granular recovery of mailboxes RDB (RSG) is a special administrative database (storage

Page 217

294 Copyright © Acronis International GmbH, 2002-2014 Steps to perform If the domain has other domain controllers, you can perform nonauthoritative

Page 218 - To access actions

295 Copyright © Acronis International GmbH, 2002-2014  Changes to Active Directory that occurred after the backup had been made will be lost. 

Page 219 - Storage node properties

296 Copyright © Acronis International GmbH, 2002-2014 d. On the General tab, click Start. After the service starts, click OK. Details. This change

Page 220 - Template

297 Copyright © Acronis International GmbH, 2002-2014 A USN rollback is unlikely to occur when you recover an entire domain controller from a VSS-ba

Page 221

298 Copyright © Acronis International GmbH, 2002-2014  Value name: Database restored from backup  Value data: 1 6. Restart the domain controlle

Page 222 - Other parameters

299 Copyright © Acronis International GmbH, 2002-2014 3. If you have recovered the database to a non-original SQL server of the original SharePoint

Page 223

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...

Page 224

30 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery

Page 225

300 Copyright © Acronis International GmbH, 2002-2014 stsadm.exe -o addcontentdb -url <site url> -databasename <database> -databaseserve

Page 226 - 7.5.7 Deduplication

301 Copyright © Acronis International GmbH, 2002-2014 c. To change the server on which you want to stop the service, in the Server list, click Chan

Page 227 - Deduplication at target

302 Copyright © Acronis International GmbH, 2002-2014 5. Detach the database and unmount the previously mounted volume as described in steps 7-8 of

Page 228 - Compacting

303 Copyright © Acronis International GmbH, 2002-2014 12 Protecting Microsoft SQL Server with single-pass backup This section describes how to use s

Page 229

304 Copyright © Acronis International GmbH, 2002-2014 Mounting databases By using the agent, you can temporarily attach a backed-up database to a ru

Page 230

305 Copyright © Acronis International GmbH, 2002-2014 Granting the permissions to the agent During installation, the setup program includes the agen

Page 231

306 Copyright © Acronis International GmbH, 2002-2014 12.2 Installation of Agent for SQL Agent for SQL can only be installed on a machine running M

Page 232

307 Copyright © Acronis International GmbH, 2002-2014 Follow these recommendations to ensure that a single-pass backup is successful.  Back up ent

Page 233 - What to validate

308 Copyright © Acronis International GmbH, 2002-2014 Leave the setting disabled if you use a third-party application, such as the SQL Server backup

Page 234 - 8.1.3 Vault selection

309 Copyright © Acronis International GmbH, 2002-2014  Rename the recovered database This setting lets you retain the existing database. A recover

Page 235

31 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console

Page 236 - 8.1.6 Task credentials

310 Copyright © Acronis International GmbH, 2002-2014 Active Restore supports the following backup locations:  A local folder on the machine where

Page 237

311 Copyright © Acronis International GmbH, 2002-2014 12.5 Mounting SQL Server databases from a single-pass backup When you mount a backed-up SQL d

Page 238 - What to export

312 Copyright © Acronis International GmbH, 2002-2014 If the selected database is in use, Acronis Backup forcibly disconnects all users from the dat

Page 239 - 8.2.2 Backup selection

313 Copyright © Acronis International GmbH, 2002-2014

Page 240 - 8.2.4 Destination selection

314 Copyright © Acronis International GmbH, 2002-2014 13 Protecting Microsoft Active Directory with single-pass backup This section describes how to

Page 241 - 3. Naming the new archive

315 Copyright © Acronis International GmbH, 2002-2014  Acronis Backup for Windows Server Essentials  Acronis Backup Advanced for VMware / Hyper-

Page 242 - 8.3 Mounting an image

316 Copyright © Acronis International GmbH, 2002-2014 13.5.1 Re-promoting the domain controller This method of recovering the data is available onl

Page 243 - 8.3.3 Access credentials

317 Copyright © Acronis International GmbH, 2002-2014 b. Copy all of the contents from each of these folders to the root of the corresponding disk

Page 244 - 8.3.4 Volume selection

318 Copyright © Acronis International GmbH, 2002-2014 14 Administering a managed machine This section describes the views that are available through

Page 245

319 Copyright © Acronis International GmbH, 2002-2014 To Do  Validation task (p. 233) View details of a plan/task Click Details. In the respect

Page 246

32 Copyright © Acronis International GmbH, 2002-2014 Notify when the management console is connected to a component of a different version This opti

Page 247 - Tips on usage

320 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea

Page 248

321 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At

Page 249 - 9 Bootable media

322 Copyright © Acronis International GmbH, 2002-2014 Running A task changes to the Running state when the event specified by the schedule occurs AN

Page 250

323 Copyright © Acronis International GmbH, 2002-2014 Usage examples  Agent reinstallation Export the backup plans before reinstalling the agent a

Page 251 - 9.1.1.1 Kernel parameters

324 Copyright © Acronis International GmbH, 2002-2014  access credentials for the backed-up data – the <plan><targets><inclusions&g

Page 252

325 Copyright © Acronis International GmbH, 2002-2014 2. Edit the value of the <Path> tag , which contains information about data to back up;

Page 253 - 9.1.1.3 Network port

326 Copyright © Acronis International GmbH, 2002-2014 14.1.4 Deploying backup plans as files Assume that for some reason you cannot run Acronis Bac

Page 254

327 Copyright © Acronis International GmbH, 2002-2014 <key name="Import"> <value name="FolderPath" type="T

Page 255

328 Copyright © Acronis International GmbH, 2002-2014 History The History tab lets you examine the history of all the backup plan's accomplishe

Page 256 - Configuring network settings

329 Copyright © Acronis International GmbH, 2002-2014 14.2.1 Actions on log entries All the operations described below are performed by clicking th

Page 257 - Remote connection

33 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding

Page 258 - To add an NDAS device

330 Copyright © Acronis International GmbH, 2002-2014 To view details of the next or the previous log entry, click the down arrow button or correspo

Page 259 - Linux-based bootable media

331 Copyright © Acronis International GmbH, 2002-2014 To export entire table contents to a *.txt or *.csv file, click Save all to file. Configuring

Page 260 - Do not activate

332 Copyright © Acronis International GmbH, 2002-2014  To change a license for a virtualization host (except for a clustered host), connect the co

Page 261 - 9.6 Acronis PXE Server

333 Copyright © Acronis International GmbH, 2002-2014 It determines Acronis Backup behavior when the system is shutting down. The system shutdown oc

Page 262 - 9.6.3 Work across subnets

334 Copyright © Acronis International GmbH, 2002-2014 14.6.3.2 Time-based alerts Last backup This option is effective when the console is connected

Page 263 - 10 Disk management

335 Copyright © Acronis International GmbH, 2002-2014 5. If the outgoing mail server requires authentication, enter User name and Password of the s

Page 264

336 Copyright © Acronis International GmbH, 2002-2014 You can override the settings set here, exclusively for the events that occur during backup or

Page 265 - 10.6 Disk operations

337 Copyright © Acronis International GmbH, 2002-2014 1. Start > Control Panel > Add or Remove Programs > Add/Remove Windows Components.

Page 266 - 10.6.2 Basic disk cloning

338 Copyright © Acronis International GmbH, 2002-2014  In Windows XP and Server 2003: %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery

Page 267 - Using advanced options

339 Copyright © Acronis International GmbH, 2002-2014 To set up proxy server settings 1. Select the Use a proxy server check box. 2. In Address, s

Page 268

34 Copyright © Acronis International GmbH, 2002-2014 enter the credentials next time. The credentials are cached independently for each user who use

Page 269

340 Copyright © Acronis International GmbH, 2002-2014 15 Centralized management This section covers operations that can be performed centrally by us

Page 270 - System disk conversion

341 Copyright © Acronis International GmbH, 2002-2014 Storage Node (p. 441) and configure it to manage a centralized vault or multiple centralized v

Page 271 - 10.7 Volume operations

342 Copyright © Acronis International GmbH, 2002-2014 15.1.2.2 Privileges for local connection Windows Local connection on a machine running Window

Page 272

343 Copyright © Acronis International GmbH, 2002-2014 To disable UAC Do one of the following depending on the operating system:  In a Windows oper

Page 273 - Select destination disks

344 Copyright © Acronis International GmbH, 2002-2014 2. Add the names of the non-root users, whom you want to allow to connect to the machine remo

Page 274 - Set the volume options

345 Copyright © Acronis International GmbH, 2002-2014 Acronis Centralized Admins A user who is a member of this group is a management server adminis

Page 275 - 10.7.2 Delete volume

346 Copyright © Acronis International GmbH, 2002-2014 This section also provides information on configuring communication settings, selecting a netw

Page 276 - 10.7.5 Change volume label

347 Copyright © Acronis International GmbH, 2002-2014 15.1.3.3 Configuring communication settings You can configure communication settings, such as

Page 277 - 10.7.6 Format volume

348 Copyright © Acronis International GmbH, 2002-2014 Linux Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the acronis_age

Page 278 - 10.8 Pending operations

349 Copyright © Acronis International GmbH, 2002-2014 "%CommonProgramFiles%\Acronis\Utils\acroniscert" --reinstall  When using a 64-bit

Page 279 - Back up entire machines

35 Copyright © Acronis International GmbH, 2002-2014 In Linux You do not need to specify task credentials. In Linux, tasks always run under the root

Page 280 - Truncating transaction logs

350 Copyright © Acronis International GmbH, 2002-2014 15.3 Creating a centralized backup plan A centralized backup plan can be applied to both Wind

Page 281

351 Copyright © Acronis International GmbH, 2002-2014 Backing up an entire virtual machine, its disks, or volumes yields a standard disk backup (p.

Page 282 -  Checkpoint file (.chk)

352 Copyright © Acronis International GmbH, 2002-2014  Notes for Linux users: Logical volumes and MD devices are shown under Dynamic volumes. For

Page 283 - Exchange 2003

353 Copyright © Acronis International GmbH, 2002-2014 Some environment variables point to Windows folders. Using such variables instead of full fold

Page 284

354 Copyright © Acronis International GmbH, 2002-2014 To define volume selection rules 1. Select the rule from the drop-down list (or type it manua

Page 285

355 Copyright © Acronis International GmbH, 2002-2014 first IDE hard disk of a Linux machine first partition of the first IDE hard disk drive. For m

Page 286

356 Copyright © Acronis International GmbH, 2002-2014 Standard names for Linux partitions Names such as /dev/hda1 reflect the standard way of naming

Page 287

357 Copyright © Acronis International GmbH, 2002-2014 Prior to backing up to the cloud storage, you need to buy a subscription (p. 422) to the cloud

Page 288 - Volumes to back up

358 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following:  Use Acronis service credentials The

Page 289 - Considerations for backup

359 Copyright © Acronis International GmbH, 2002-2014 15.4 Administering Acronis Backup Management Server This section describes the views that are

Page 290

36 Copyright © Acronis International GmbH, 2002-2014 of user rights, membership in security groups, and the Full Control permissions on respective r

Page 291 - To attach a database

360 Copyright © Acronis International GmbH, 2002-2014 An application on a machine is considered protected if the respective agent is installed on th

Page 292

361 Copyright © Acronis International GmbH, 2002-2014 Built-in group As soon as a machine is registered on the management server, the machine appear

Page 293

362 Copyright © Acronis International GmbH, 2002-2014 Adding and importing actions are available when you select the Machines with agents view or

Page 294 - Recovery vs. re-creation

363 Copyright © Acronis International GmbH, 2002-2014 To Do Add machines to a static group Click Add machines to group. In the Add machines to gr

Page 295

364 Copyright © Acronis International GmbH, 2002-2014 To Do Refresh a list of machines Click Refresh. The management console will update the list

Page 296 - Ntdsutil

365 Copyright © Acronis International GmbH, 2002-2014  Adds machines that are present in the list but are not registered  Deletes registered mac

Page 297 - USN rollback

366 Copyright © Acronis International GmbH, 2002-2014  [path_to_the_file] is the path to a .txt or .csv file containing the list of machines. The

Page 298

367 Copyright © Acronis International GmbH, 2002-2014  Drive health status - the state of the machine's drives health. This field is set to N

Page 299

368 Copyright © Acronis International GmbH, 2002-2014 Member of This tab appears only if the selected machine is added to one or more custom groups

Page 300

369 Copyright © Acronis International GmbH, 2002-2014 To Do Click Synchronize with file. Specify a text file with the list of machines. After syn

Page 301

37 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr

Page 302

370 Copyright © Acronis International GmbH, 2002-2014 Creating a custom static or dynamic group To create a group 1. In the Name field, enter a nam

Page 303 - 12.1 General information

371 Copyright © Acronis International GmbH, 2002-2014 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it

Page 304 - Mounting databases

372 Copyright © Acronis International GmbH, 2002-2014 Changing the type of group will result in its conversion. Any custom group can be converted to

Page 305

373 Copyright © Acronis International GmbH, 2002-2014 To Do Refresh table Click Refresh. The management console will update the list of backup pl

Page 306 - Installation

374 Copyright © Acronis International GmbH, 2002-2014 Virtual machines added to the management server as virtual machines are present under the Virt

Page 307

375 Copyright © Acronis International GmbH, 2002-2014 To Do log The Log (p. 385) view will display a list of the log entries related to the select

Page 308

376 Copyright © Acronis International GmbH, 2002-2014 To Do Export a plan Click Export. Specify the path and name of the resulting file. See Expo

Page 309

377 Copyright © Acronis International GmbH, 2002-2014 Right-click on the column headings bar to choose the details to display: License key, Expirati

Page 310 - The recovery process

378 Copyright © Acronis International GmbH, 2002-2014 15.4.6.4 Removing licenses To completely remove a license from the Acronis License Server, se

Page 311 - To unmount a SQL database

379 Copyright © Acronis International GmbH, 2002-2014 Active and inactive alerts An alert can be either in an active, or inactive state. The active

Page 312

38 Copyright © Acronis International GmbH, 2002-2014 Acronis Scheduler2 Service Providing scheduling for tasks performed by Acronis components Local

Page 313

380 Copyright © Acronis International GmbH, 2002-2014 15.4.8 Reporting Reporting provides the management server administrator with detailed and wel

Page 314

381 Copyright © Acronis International GmbH, 2002-2014 Filters Under Filters, choose which machines to include in the report. Only the machines that

Page 315

382 Copyright © Acronis International GmbH, 2002-2014 Report view Under Report view, choose how the report will look:  Select whether to show all

Page 316

383 Copyright © Acronis International GmbH, 2002-2014  Type: The archive types—disk-level archives and/or file-level archives.  Owner: The list

Page 317 - Completing the recovery

384 Copyright © Acronis International GmbH, 2002-2014 Report coverage Under Report coverage, choose the time interval for which you want to generate

Page 318 - 14.1 Backup plans and tasks

385 Copyright © Acronis International GmbH, 2002-2014 15.4.9 Log The centralized event log stores the history of operations performed by the manage

Page 319 -  Validation task (p. 233)

386 Copyright © Acronis International GmbH, 2002-2014 be saved to the specified file. Save all the filtered log entries to a file 1. Set filters to

Page 320

387 Copyright © Acronis International GmbH, 2002-2014 To access the management server options, connect the console to the management server and then

Page 321 - 14.1.2.3 Task states

388 Copyright © Acronis International GmbH, 2002-2014 Time-based alerts Last backup This option is effective when the console is connected to a mana

Page 322 - 14.1.2.4 Task statuses

389 Copyright © Acronis International GmbH, 2002-2014 Note: Alerts warn only about problems. Therefore, e-mail notifications about successful backup

Page 323 - How to modify credentials

39 Copyright © Acronis International GmbH, 2002-2014 Incremental backup An incremental backup stores changes to the data against the latest backup.

Page 324

390 Copyright © Acronis International GmbH, 2002-2014 Set up the notification Frequency and Time. 2. Click OK. 15.4.10.5 Event tracing You can co

Page 325 - Example

391 Copyright © Acronis International GmbH, 2002-2014 15.4.10.6 Logging level This option defines whether the management server has to collect log

Page 326 - Editing the export file

392 Copyright © Acronis International GmbH, 2002-2014 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy serv

Page 327 - 14.1.5 Backup plan details

393 Copyright © Acronis International GmbH, 2002-2014  In a 32-bit version of Windows: %CommonProgramFiles%\Acronis\Agent\Acronis_agent.adm or %Pr

Page 328 - 14.2 Log

394 Copyright © Acronis International GmbH, 2002-2014 Enabled The component will use the specified port; type the port number in the Server TCP Port

Page 329 - 14.2.2 Log entry details

395 Copyright © Acronis International GmbH, 2002-2014 Not Configured The component will use the default setting, which is to use encryption if possi

Page 330 - 14.3 Alerts

396 Copyright © Acronis International GmbH, 2002-2014 5 Critical Event that resulted in the termination of a process such as the agent's proces

Page 331 - 14.4 Changing a license

397 Copyright © Acronis International GmbH, 2002-2014 Specifies how often the agent checks its license on the license server, and how long it can wo

Page 332 - 14.6.1 Additional settings

398 Copyright © Acronis International GmbH, 2002-2014 Default value: 1048576 (that is, 1 GB) Percentage To Keep Description: Specifies the percentag

Page 333 - 14.6.3 Alerts

399 Copyright © Acronis International GmbH, 2002-2014 Default value: public Snapshot Storage Specifies the location and initial size of the snapshot

Page 334 - 14.6.4 E-mail settings

4 Copyright © Acronis International GmbH, 2002-2014 4 Backup ...

Page 335 - 14.6.5 Event tracing

40 Copyright © Acronis International GmbH, 2002-2014 A volume backup stores all files and folders of the selected volume independent of their attrib

Page 336 - 14.6.5.1 SNMP notifications

400 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to use a proxy server Possible values: Enabled or Disabled Defa

Page 337 - 14.6.6 Log cleanup rules

401 Copyright © Acronis International GmbH, 2002-2014 Specifies when to collect log entries from machines managed by Acronis Backup Management Serve

Page 338 - 14.6.8 Cloud backup proxy

402 Copyright © Acronis International GmbH, 2002-2014 Specifies the types of the management server's events to send notifications about by mean

Page 339

403 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies the maximum number of threads to use for synchronization. Possible valu

Page 340 - 15 Centralized management

404 Copyright © Acronis International GmbH, 2002-2014 Description: Specifies whether to try to connect to a registered machine by using its last-kno

Page 341

405 Copyright © Acronis International GmbH, 2002-2014 or %PROGRAMDATA%\Acronis\BackupAndRecovery\MMS\Temp (in Windows Vista and later versions of Wi

Page 342 - Windows

406 Copyright © Acronis International GmbH, 2002-2014 Default value: Empty string Password Description: Specifies the password for authentication wi

Page 343 - Example 1

407 Copyright © Acronis International GmbH, 2002-2014 Possible values: 0 (disables cataloging) or 1 (enables cataloging) Registry key: HKEY_LOCAL_MA

Page 344 - Acronis Backup Agents

408 Copyright © Acronis International GmbH, 2002-2014 16 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th

Page 345 - On a domain controller

409 Copyright © Acronis International GmbH, 2002-2014 For effective use of the storage space, you have the option to set up the "Delete backups

Page 346

41 Copyright © Acronis International GmbH, 2002-2014 acrocmd backup disk --volume=DYN --loc=\\srv1\backups --credentials=netuser1,pass1 --arc=alldyn

Page 347

410 Copyright © Acronis International GmbH, 2002-2014  you want to back up a pass-through disk of a Hyper-V virtual machine  you want to use pre

Page 348 - 15.1.3.5 SSL certificates

411 Copyright © Acronis International GmbH, 2002-2014 Virtualization products (host-based backup of virtual machines) VMware ESX(i) 5.0, 5.1, and 5.

Page 349 - 15.2 Back up now

412 Copyright © Acronis International GmbH, 2002-2014 16.1.7.4 What if a network connection is lost during cloud backup or recovery? The software w

Page 350

413 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t

Page 351

414 Copyright © Acronis International GmbH, 2002-2014 16.1.8.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac

Page 352

415 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Page 353

416 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa

Page 354

417 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo

Page 355 - Note on Linux machines

418 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis

Page 356

419 Copyright © Acronis International GmbH, 2002-2014 16.1.9.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens

Page 357 - 2. Naming the archives

42 Copyright © Acronis International GmbH, 2002-2014 Basic volume or unallocated space on a basic disk Basic volume Basic volume Moving and resizing

Page 358 - Examples

420 Copyright © Acronis International GmbH, 2002-2014 16.1.10.1 How do I access my account management webpage? Go to http://www.acronis.com/my/clou

Page 359 - 15.4.1 Dashboard

421 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli

Page 360 - 15.4.2 Machines with agents

422 Copyright © Acronis International GmbH, 2002-2014 16.1.10.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are

Page 361 - Custom groups

423 Copyright © Acronis International GmbH, 2002-2014 To get a trial subscription, do either of the following:  On the account management webpage,

Page 362 - Grouping actions

424 Copyright © Acronis International GmbH, 2002-2014  You no longer need to back up one of your machines and you want to reuse that machine’s sub

Page 363 - Other actions

425 Copyright © Acronis International GmbH, 2002-2014 Before reassigning Delete backups from Subscription 1 using Machine 1 (if it is available and

Page 364 - To add a machine

426 Copyright © Acronis International GmbH, 2002-2014 To retrieve files from the cloud storage: 1. Go to the account management webpage (p. 420) an

Page 365 - Text file requirements

427 Copyright © Acronis International GmbH, 2002-2014  Setting up regular conversion of backups to a virtual machine Operations with backups:  V

Page 366 - Machine details

428 Copyright © Acronis International GmbH, 2002-2014 Increase storage quota Replace a subscription with another one that has a greater storage quot

Page 367

429 Copyright © Acronis International GmbH, 2002-2014 Subscription period The period during which the subscription remains activated. You can back u

Page 368 - 15.4.2.3 Actions on groups

43 Copyright © Acronis International GmbH, 2002-2014  Recovering volume contents only. The type or other properties of the target volume will not

Page 369

430 Copyright © Acronis International GmbH, 2002-2014 17 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o

Page 370 - Adding multiple criteria

431 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b

Page 371 - Editing custom groups

432 Copyright © Acronis International GmbH, 2002-2014  the backup archive (p. 431) name and location  the backup scheme (p. 432). This includes

Page 372 - Group details

433 Copyright © Acronis International GmbH, 2002-2014  access and back up the data that has survived in a corrupted system  deploy an operating

Page 373 - 15.4.3 Virtual machines

434 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 439) administrato

Page 374 - Typical workflow

435 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 439) contains all data stored o

Page 375

436 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 431) that contains a sector-based copy of a disk or a volume

Page 376 - 15.4.6 Licenses

437 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di

Page 377 - 15.4.6.3 Exporting licenses

438 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil

Page 378 - 15.4.7 Alerts

439 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli

Page 379 - Configuring alerts

44 Copyright © Acronis International GmbH, 2002-2014 3.7.2.4 Assembling MD devices for recovery (Linux) In Linux, when performing recovery from a d

Page 380 - 15.4.8 Reporting

440 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect

Page 381 - Report view

441 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req

Page 382

442 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 432) aimed to maintain the optimal balance between

Page 383 - Report coverage

45 Copyright © Acronis International GmbH, 2002-2014 Creating the volume structure automatically Use the following procedure to automatically recrea

Page 384 - 15.4.8.8 Report view

46 Copyright © Acronis International GmbH, 2002-2014 Note: This procedure will not work if you connect to Acronis Backup Bootable Agent remotely, be

Page 385 - 15.4.9 Log

47 Copyright © Acronis International GmbH, 2002-2014 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable .

Page 386

48 Copyright © Acronis International GmbH, 2002-2014 type: disk Num Partition Flags Size Type GUID ------

Page 387 - Alert management

49 Copyright © Acronis International GmbH, 2002-2014  4K native (4Kn) disks have a 4-KB logical sector size. Modern operating systems can store da

Page 388 - 15.4.10.4 E-mail settings

5 Copyright © Acronis International GmbH, 2002-2014 4.7.21 Sector-by-sector backup ...

Page 389 - Alert notifications

50 Copyright © Acronis International GmbH, 2002-2014 The information in this section also applies to Windows 8.1 and Windows Server 2012 R2. Limitat

Page 390 - Windows event log

51 Copyright © Acronis International GmbH, 2002-2014 Data Deduplication In Windows Server 2012, you can enable the Data Deduplication feature for an

Page 391 - Log cleanup rules

52 Copyright © Acronis International GmbH, 2002-2014 2. Recover the system. The recovered data will be unencrypted. 3. Reboot the recovered system

Page 392

53 Copyright © Acronis International GmbH, 2002-2014 About the test message When configuring SNMP notifications, you can send a test message to chec

Page 393 - 15.5.1.2 Acronis Backup

54 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i

Page 394

55 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 193) If the specified location is an R

Page 395 - Event tracing parameters

56 Copyright © Acronis International GmbH, 2002-2014 Set up a regular conversion of a disk or volume backup to a virtual machine. Plan parameters Pl

Page 396 - Critical

57 Copyright © Acronis International GmbH, 2002-2014  Microsoft SQL databases by means of single-pass disk and application backup, if Acronis Back

Page 397

58 Copyright © Acronis International GmbH, 2002-2014 For more information about backing up Microsoft Exchange data see "Backing up Microsoft Ex

Page 398

59 Copyright © Acronis International GmbH, 2002-2014 4.2.3 Source files exclusion This option is effective for Windows and Linux operating systems

Page 399

6 Copyright © Acronis International GmbH, 2002-2014 7.3 Removable devices ...

Page 400

60 Copyright © Acronis International GmbH, 2002-2014 Wildcard characters You can use one or more wildcard characters * and ? in the criterion. These

Page 401

61 Copyright © Acronis International GmbH, 2002-2014 added, deleted or modified by another user or by the program itself according to scheduled oper

Page 402

62 Copyright © Acronis International GmbH, 2002-2014 Destination Details Cloud storage To back up data to Acronis Cloud Storage, click Log in and

Page 403

63 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address

Page 404

64 Copyright © Acronis International GmbH, 2002-2014 Warning: According to the original FTP specification, credentials required for access to FTP se

Page 405

65 Copyright © Acronis International GmbH, 2002-2014  Full - selected by default for all backup locations (except for Acronis Cloud Storage).  I

Page 406

66 Copyright © Acronis International GmbH, 2002-2014 Keep backups Specifies how long you want the backups to be stored in the archive. A term can be

Page 407

67 Copyright © Acronis International GmbH, 2002-2014 available through next Sunday, January 8; the first weekly backup, the one of Saturday, January

Page 408 - 16 Cloud backup

68 Copyright © Acronis International GmbH, 2002-2014  Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays,

Page 409

69 Copyright © Acronis International GmbH, 2002-2014 Clean up archive Specifies how to get rid of old backups: either to apply retention rules (p. 9

Page 410 - Server operating systems

7 Copyright © Acronis International GmbH, 2002-2014 9.5 Acronis Startup Recovery Manager ...

Page 411

70 Copyright © Acronis International GmbH, 2002-2014 Here, all parameters except Schedule in Full backup are left empty. All backups in the archive

Page 412 - 16.1.8 Initial Seeding FAQ

71 Copyright © Acronis International GmbH, 2002-2014 By default, a backup is not deleted as long as it has dependent backups that must be kept. For

Page 413

72 Copyright © Acronis International GmbH, 2002-2014 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have d

Page 414 - Creating subsequent backups

73 Copyright © Acronis International GmbH, 2002-2014 On day 14, the interval is five days. It increases on subsequent days before decreasing again,

Page 415 - Packaging

74 Copyright © Acronis International GmbH, 2002-2014 protection strategy and you prefer to be immediately informed whether the backed-up data is not

Page 416

75 Copyright © Acronis International GmbH, 2002-2014 To add a text label to a backup: 1. On the Create backup plan (p. 54) page, click Show plan&ap

Page 417

76 Copyright © Acronis International GmbH, 2002-2014 acronisTag.hostname = “superserver.corp.local” acronisTag.os.type = “windows7Server64Guest” acr

Page 418

77 Copyright © Acronis International GmbH, 2002-2014 When you back up to a locally attached RDX drive or USB flash drive, the Name backup files usin

Page 419

78 Copyright © Acronis International GmbH, 2002-2014 are kept. This means you can store multiple full backups with or without incremental ones, but

Page 420

79 Copyright © Acronis International GmbH, 2002-2014 Result. The archive consists of a single file: MyMachine.tib. This file is deleted before creat

Page 421 - Machine subscriptions

8 Copyright © Acronis International GmbH, 2002-2014 11.5.3 Recovering individual items...

Page 422 - 16.2 Where do I start?

80 Copyright © Acronis International GmbH, 2002-2014  You want each new backup to replace the backup on the currently attached drive. In this scen

Page 423 - To activate subscriptions

81 Copyright © Acronis International GmbH, 2002-2014 In Windows, if you choose to back up to locally attached RDX drives or USB flash drives, the Na

Page 424

82 Copyright © Acronis International GmbH, 2002-2014 Event Windows Linux Time: Daily, Weekly, Monthly + + Time since completion of the last successf

Page 425

83 Copyright © Acronis International GmbH, 2002-2014 4.4.1 Daily schedule Daily schedule is effective in Windows and Linux operating systems. To sp

Page 426 - Operations

84 Copyright © Acronis International GmbH, 2002-2014 From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 times a da

Page 427 - 16.8 Terminology reference

85 Copyright © Acronis International GmbH, 2002-2014 To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows:

Page 428

86 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: <Workdays> - selecting the <Workdays> check box automatica

Page 429 - Unassign a subscription

87 Copyright © Acronis International GmbH, 2002-2014 2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. 4.4.3 Monthly schedule M

Page 430 - 17 Glossary

88 Copyright © Acronis International GmbH, 2002-2014 once a week and incremental on workdays. For more details, see the Monthly full, weekly differe

Page 431 -  what data to back up

89 Copyright © Acronis International GmbH, 2002-2014 Third schedule 1. Months: June, July, August. 2. Days: 1, 15. 3. Once at: 10:00:00 PM. 4. E

Page 432 - Bootable media

9 Copyright © Acronis International GmbH, 2002-2014 14.6.8 Cloud backup proxy ...

Page 433 - Centralized task

90 Copyright © Acronis International GmbH, 2002-2014  Event type: Error  Event ID: 7 Important: To ensure that such a task will complete despite

Page 434 - Data catalog

91 Copyright © Acronis International GmbH, 2002-2014 Use Wake-on-LAN When this setting is enabled, Acronis Backup Management Server will use the Wak

Page 435 - Disaster recovery plan (DRP)

92 Copyright © Acronis International GmbH, 2002-2014 Distribute start time within the time window Maximum delay: 1 Hour(s) Distribution method: Rand

Page 436 - Dynamic disk

93 Copyright © Acronis International GmbH, 2002-2014 4.4.6.1 User is idle Applies to: Windows "User is idle" means that a screen saver is

Page 437 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2014 Example A company uses different locations on the same network-attached storage for backing up

Page 438

95 Copyright © Acronis International GmbH, 2002-2014  Task start conditions: Wait until the conditions are met, Run the task anyway after 3 hour(s

Page 439

96 Copyright © Acronis International GmbH, 2002-2014 The following picture illustrates this example. Usage scenarios  Reliable disaster recovery

Page 440

97 Copyright © Acronis International GmbH, 2002-2014 4.5.1 Supported locations You can copy or move a backup from any of these locations:  A loca

Page 441

98 Copyright © Acronis International GmbH, 2002-2014 Copying and moving backups between managed vaults Copying or moving a backup from one managed v

Page 442

99 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi scheme Each backup is retained based on its level (p. 71), and then deleted. You

Commentaires sur ces manuels

Pas de commentaire