Acronis True Image for MS SBS Server  - User Guide Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel Acronis True Image for MS SBS Server  - User Guide. Acronis True Image for MS SBS Server  - User Guide User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 157
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Business Server

User's GuideAcronis®True Imagefor Microsoft Small Business ServerCompute with confidencewww.acronis.com

Page 2

Chapter 1. Introduction 1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users Acronis True Image fo

Page 3 - ACRONIS, INC

Chapter 8. Scheduling tasks Acronis True Image for Microsoft Small Business Server allows you to schedule periodic backup and archive validation tas

Page 4

Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tasks

Page 5

In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to

Page 6 - Table of Contents

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st

Page 7

8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: Day – on the specified

Page 8

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta

Page 9

Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is

Page 10 - Chapter 1. Introduction

3. Select the partitions from which space will be used to create the zone. 4. In the next window, enter the Acronis Secure Zone size or drag the sli

Page 11

5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup

Page 12

9.3 Changing the password for Acronis Secure Zone 1. When prompted by the wizard, select Manage Acronis Secure Zone. 2. Select Change password. 3.

Page 13

you to limit the amount of CPU usage for the application to maximize the CPU’s availability for mission critical applications. Additionally, users ca

Page 14

Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image for Microsoft Small Business Server on a bare

Page 15 - 1.6 Technical support

Acronis Bootable Agent full version The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from

Page 16 - 2.2 Security parameters

4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to

Page 17 - 4.4.1 Group status

2. Insert your Win PE distribution CD into the media drive of the computer. If you have a distribution copy on the hard disk, copy the path to it. Th

Page 18

Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is no

Page 19

Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives

Page 20

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Page 21 - 3.5 Acronis Backup

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Page 22

5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected

Page 23 - User or administrator?

security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consoli

Page 24

1.2 Acronis True Image for Microsoft Small Business Server components Acronis True Image for Microsoft Small Business Server includes the following

Page 25 - Server components

The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full

Page 26

6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window

Page 27

Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image for Microsof

Page 28 - 6.3.12 Dual

12.2 WinPopup notification To set up WinPopup notification: 1. Enable the Messenger service on both the computer executing the task and the computer

Page 29 - Acronis Secure Zone

The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.

Page 30 - 4.5 Managing backup server

An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image for Micr

Page 31

If you run Acronis True Image for Microsoft Small Business Server regularly, this feature in your operating system is redundant. You can turn it off,

Page 32 - 3.6 Acronis Active restore

Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, dep

Page 33 - 3.6.3 How to use

If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable m

Page 34

4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: the fa

Page 35

Backup server Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library f

Page 36

Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and click Convert to Virtual disk.

Page 37 - 6.3.14 Additional settings

Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too sma

Page 38

14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete

Page 39

You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system

Page 40 - Management Console

14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No

Page 41 - Business

Keep data – leave the old disk partitions and data intact Destroy data – destroy all data on the old disk. If you are going to sell or give away you

Page 42

The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,

Page 43

If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system an

Page 44 - Restoring the backup data

Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including

Page 45

Along with the hard disk number, you will see disk capacity, label, partition and file system information. Different partition types, including prima

Page 46

Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create

Page 47

Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacit

Page 48 - Secure Zone

If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce

Page 49 - Chapter 6. Creating

Chapter 16. Command-line mode and scripting Acronis True Image for Microsoft Small Business Server (local version) supports the command-line mode an

Page 50 - 8.2 Managing scheduled tasks

partitions, except for the MBR, from an image /net_user:[username] /net_password:[password] /ftp_user /ftp_password /oss_numbers /reboot /log:[file

Page 51

virtual machine /log:[file name] /log_net_user:[remote user] /log_net_password:[password] list Lists available drives and partitions. With the filena

Page 52 - 4.5.1 Default settings

asz_delete Deletes the Acronis Secure Zone /password:[password] /oss_numbers /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[

Page 53

specified or there is no basic full backup, a full backup will be created /compression:[0…9] Specify the data compression level. It ranges from 0 to

Page 54

/partition:DYN1,DYN2 /file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This opt

Page 55

/target_harddisk:DYN you will select unallocated space on all dynamic disks that present in the system. /target_partition:[partition number] Specif

Page 56

driver to be installed. filerestore /target_folder:[target folder] Specifies a folder where folders/files will be restored (a target folder). If not

Page 57

* - an FTP-server must allow passive mode for file transfers. Data recovery directly from FTP-server requires the archive to consist of files no more

Page 58 - 4.5.6 Managing Archives

/harddisk:[disk number] Specifies the hard disks to convert by numbers. For each disk, a separate virtual disk will be created. By specifying /hardd

Page 59

/harddisk:X Specifies the hard disk number where the Acronis Secure Zone will be created. /partition:[partition number] Specifies partitions from whi

Page 60

trueimagecmd /create /filename:"C:\Test\1.tib" /password:qwerty /harddisk:2 /reboot /raw /incremental /compression:5 /split:640 /progress:o

Page 61 - Chapter 16. Command-line

trueimagecmd /deploy_mbr /harddisk:1 /target_harddisk:2 /filename:ftp://server/folder/arc.tib /ftp_user:fuser /ftp_password:fpswd This will restore M

Page 62

7. List trueimagecmd /list This will list available partitions. trueimagecmd /list /asz This will list contents of the latest image located in Acroni

Page 63

Copyright © Acronis, Inc., 2000-2008 155 - full (base) image backup c

Page 64

16.2 Scripting 16.2.1 Script execution parameters Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True Image for M

Page 65 - 12.5 Managing System Restore

Copyright © Acronis, Inc., 2000-2008 157 Options. This tag can be use

Page 66

Chapter 2. Acronis True Image for Microsoft Small Business Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirem

Page 67 - 3.2 Full, incremental and

The Acronis Group Server uses administrator’s credentials to perform data backup tasks on the computers. You will be asked for the credentials during

Page 68 - 1.4.2 Supported storage

18 Copyright © Acronis, Inc., 2000-2008 The earlier versions of Acro

Page 69 - 6.3 Setting backup options

Encryption Options Server Requires Encryption This option defines the server behavior in case the client does not support encryption. When enabled,

Page 70 - 6.3.6 Backup performance

Copyright © Acronis, Inc., 2000-2008. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron

Page 71

Acronis True Image for Microsoft Small Business Server Install Window It is recommended that you install Acronis True Image Management Console first

Page 72

connecting image backups as virtual disks (see 11.2.2 Mounting an image). 2.3.2 Installation of Acronis Group Server The Acronis Group Server only

Page 73 - 6.3.1 Archive protection

4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can creat

Page 74 - 6.3.4 Database support

Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator

Page 75 - 6.3.5 Compression level

10. Define the computers which administrators will back up using Acronis True Image Agents. Add the computers as follows. Click Set up Administrato

Page 76

2.3.4 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image for Microsoft Small Business Server. It i

Page 77 - 6.3.8 Archive splitting

If your operating system fails to load, you can run Acronis Startup Recovery Manager. However, this must be activated prior to use; see 3.4 Acronis

Page 78 - 7.4.5 File-level security

Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc

Page 79 - 6.3.11 Error handling

incremental backup, as it does not have to process through a long chain of previous backups. A standalone, full backup could be an optimal solution i

Page 80 - 6.3.13 Wake On LAN

In that case, you will have to either re-create the full backup or increase the size of the Acronis Secure Zone. You can back up data automatically o

Page 81 - Archives cataloguing

ACRONIS, INC. End User License Agreement (EULA) BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE DOWNLOADED OR IS CONTAINED O

Page 82 - 6.3.10 Media components

Recovery Manager. Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you s

Page 83

of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup lo

Page 84

The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Gen

Page 85 - 7.4 Setting

Copyright © Acronis, Inc., 2000-2008 33 2. Next, the application writ

Page 86

will usually produce the same unbootable result because the new hardware is incompatible with the most critical drivers included in the image. Using

Page 87 - 7.3.2 Archive selection

recovered system, you can prepare the system with Sysprep, image it and restore, if need be, using Acronis Universal Restore. 3.7.4 Limitations in u

Page 88 - Active restore

following diagram illustrates ways of access to tape devices for networks with (I) and without (II) backup server. The devices must be locally attac

Page 89 - Universal Restore

metadata saved on the tape and the database will be recreated on the new host using the new host RSM. This operation is performed at first access to

Page 90

3.8.2 Backing up to a tape device through Acronis Backup Server To enable backup to a tape device in the local network: 1. Install Acronis Backup Se

Page 91

4. If the tape contains data, its contents will be overwritten on prompt. You have an option to disable prompts, see 6.3.14 Additional settings. 5.

Page 92

• One (1) instance of the Hardware installed Software in one physical operating system environment; and • Up to four (4) instances of the Hardware

Page 93 - 7.4 Setting restore options

Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managi

Page 94 - 7.4.3 Pre/post commands

To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main w

Page 95 - 6.3.9 File-level security

5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account cr

Page 96 - 7.4.8 Error handling

7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed.

Page 97

The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery

Page 98

Copyright © Acronis, Inc., 2000-2008 45 Browse logs of Acronis True I

Page 99

46 Copyright © Acronis, Inc., 2000-2008 Other Tools Create bootable

Page 100 - Creating backup archives

Cancelled – the task has been cancelled on the remote computer Offline - the remote computer is not connected to the network or is switched off Inacc

Page 101

6. Hide computers that you do not wish to browse or make a hidden computer visible. To hide a computer, select it, then select on the sidebar Compute

Page 102

backing up to a backup server, choose Personal Backup Location or tape drive and enter backup server administrator’s credentials. For more informatio

Page 103

BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY. Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY

Page 104

When distribution is complete, the group task appears in Group Tasks Management window. If you connect to any computer included into the group, you w

Page 105

When managing a group task, enter the same username and password you entered when created the task. 4.4.4 Acronis Group Server options Acronis Group

Page 106 - 3.3 Acronis Secure Zone

When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entere

Page 107

The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (th

Page 108

Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas

Page 109

To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy

Page 110

If you opted for picking the user name out of the domain user list, you will skip the above window and proceed to the other windows where you will s

Page 111

backup location, quotas and time limits like common users are and uses the administrator profile for both remotely and locally controlled backups. 4.

Page 112 - Small Business Server

To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window

Page 113

You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the li

Page 114

Table of Contents Chapter 1. Introduction ...10 1.1 Acronis® T

Page 115 - 11.2.1 Exploring an archive

If maximum number of connections is set, then some agents or local Acronis True Image for Microsoft Small Business Server versions may be unable to a

Page 116 - 11.2.2 Mounting an image

Chapter 5. Using Acronis True Image for Microsoft Small Business Server (local version) Acronis True Image for Microsoft Small Business Server (loca

Page 117

Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity checking

Page 118 - 11.3 Consolidating backups

Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.

Page 119

64 Copyright © Acronis, Inc., 2000-2008 Run, stop, edit, clone, renam

Page 120

Other Tools Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Turn on/off Windows System Restore to

Page 121

Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a

Page 122 - 12.1 Email notification

You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex

Page 123 - 12.3 Viewing logs

The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot

Page 124 - 12.4 Event tracing

7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may select

Page 125 - 12.4.2 SNMP notifications

3.7.5 Getting Acronis Universal Restore...35 3.8 Backing up to tape lib

Page 126

You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from th

Page 127

4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file

Page 128 - Chapter 7. Restoring

See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select wh

Page 129 - Chapter

6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being a

Page 130

You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex

Page 131 - 14.1 General information

net start “Microsoft Exchange Event” net start “Microsoft Exchange IMAP4” net start “Microsoft Exchange MTA Stacks” net start “Microsoft Exchange POP

Page 132 - 14.3 Executing transfers

6.3.6 Backup performance The three options below might have a more or less noticeable effect on the backup process speed. This depends on overall sy

Page 133

6.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup. Incremental/differential backup captures only cha

Page 134 - 14.3.6 Old disk data

You can disable preserving the files’ security settings in archives to completely eliminate this kind of problem. Then the restored files/folders wil

Page 135

6.3.11 Error handling 1. Ignore bad sectors The preset is disabled. With the default setting, the program will display a pop-up window each time i

Page 136

7.3 Restoring disks/partitions or files from images ...86 7.3.1 Starting the Restor

Page 137

Even if a password is set for the Acronis Secure Zone, the copy archive will not be protected with the password. 6.3.13 Wake On LAN This option is

Page 138 - 14.3.11 Cloning summary

To check archive data integrity, you must have all incremental and differential backups belonging to the archive and the initial full backup. If any

Page 139

Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1

Page 140 - 15.1 Selecting a hard disk

7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). Fo

Page 141 - 15.3 Disk add summary

7.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the des

Page 142 - 16.1.1 Supported commands

4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locat

Page 143

7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as

Page 144

start over. If you can not determine which applications use the partition (disk), close them all. 7.3.1 Starting the Restore Data Wizard Start the R

Page 145 - Backup options

7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offer

Page 146 - General options

Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecti

Page 147 - /partition:DYN1

12.4.1 Windows event log...124 12.4.2 SNMP notificatio

Page 148

If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination dis

Page 149

Selecting Active for a partition without an installed operating system could prevent your server from booting. 7.3.7 Changing the restored partitio

Page 150

7.3.9 Assigning a letter to the restored partition Acronis True Image for Microsoft Small Business Server will assign an unused letter to a restored

Page 151

Acronis Universal Restore uses three sources for drivers: - the driver repository - a folder or folders on a network drive or CD specified in restor

Page 152

You can edit the default (or set the temporary) restore options while creating a restore task as well. 7.4.1 Files to exclude from restoration The

Page 153

The program does not support interactive commands, i.e. commands that require user input (for example, “pause”.) The backup process will run concurre

Page 154

96 Copyright © Acronis, Inc., 2000-2008 Here you can specify a path t

Page 155

Copyright © Acronis, Inc., 2000-2008 97 cannot continue without user

Page 156 - 16.2 Scripting

4. Select the type of dynamic volume that will be created: simple/spanned, striped, mirrored or RAID 5. 5. Specify amount of space that the dynamic

Page 157

On completion of operations, the dynamic volumes are unformatted and have no letters assigned. You will be able to assign the letters using Windows D

Commentaires sur ces manuels

Pas de commentaire