Gebruiksaanwijzing /service van het product Backup & Recovery 10 Workstation van de fabrikant Acronis
Ga naar pagina of 241
Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 W o r k s t a t i o n User's Guide.
Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc.
Table of contents 1 Introducing Acro nis® Backu p & Recovery™ 10 ........................................................................ 7 1.1 Acronis Backup & Rec overy 10 overview .........................................................
3. 3. 1 De fa ul t b ac ku p opt ion s ................................................................................................................................ . 50 3. 3. 2 De fa ul t r ec ove ry opt io ns .....................................
6. 3. 8 Wh en t o r ec ove r ................................................................................................................................ ......... 153 6. 3. 9 U niv er sa l Re st ore ...............................................
7. 1. 7 La rg e S cal e R eco ve ry F AQ .......................................................................................................................... 21 7 7. 1. 8 Su bs cri pti on li fe cy cl e FA Q ......................................
7 Copyright © Acronis, Inc., 2000 - 2010 1 I ntr od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba cku p & R eco ve ry 10 o ver vie w Based on Acronis’ paten ted disk im.
8 Copyright © Acronis, Inc., 2000 - 2010 3. Connect the cons ole to the machine w here th e agent is installed. Where to go from here For what to d o next see "Basic c o ncepts (p. 18 )". For understanding of t he G UI elements see the next s ect ion.
9 Copyright © Acronis, Inc., 2000 - 2010 tree, or on the Action s and Tools pan e. Menu b ar Appears across the top o f the program window and lets you perform all the operations, available on bo th panes. Menu items change dy namically. 1024x768 or high er display resolution is required for c o mfortab le work with the management console.
10 Copyright © Acronis, Inc., 2000 - 2010 1. 2. 1.2 "A ct io ns an d to ols " p an e The Actions and t ools pan e enables y o u to easil y and efficientl y work wi th Acronis Backup & Recovery 10. The pan e's bars provide quick acc ess to p rogram's operations and t ools.
11 Copyright © Acronis, Inc., 2000 - 2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of th e Acroni s tools. Always the same ac ro ss all the pr ogram views. All the tools can al so be ac cessed in the Tools menu.
12 Copyright © Acronis, Inc., 2000 - 2010 and action pages ac co rding the items you select in the m enu, Navigation tre e, or on the Actions and Tools pane. Vi ew s A view appears on the main area when clickin g any item in the Navigat ion tree in the Navigation pane (p.
13 Copyright © Acronis, Inc., 2000 - 2010 A cti on p ag es An action page app ears in the main area when clicking any action i tem in the Actions menu, or in the Actions bar on th e Action s and to ols pa ne. It contains steps yo u need t o perfor m in order to create and launch any task, or a backup plan, or backup p olicy.
14 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 remembers the changes y ou made on the acti on pages. For example, if you started to cr eate a backup plan, and then f o r any reas o n switch ed to another view with o ut accomplishing the plan creation, you can click the Back navigati on button on the menu.
15 Copyright © Acronis, Inc., 2000 - 2010 File backup File -level data protecti o n is based on backing up files and folders r esiding on the machine wher e the agent is installed or o n a ne tw ork shar e. Files can be recovered to t heir orig inal lo cation or to anoth er place.
16 Copyright © Acronis, Inc., 2000 - 2010 NTFS Ext2/Ext3/Ext4 ReiserFS3 - particular files cannot be recovered fr om disk backups located o n Acr onis Backup & Recovery 10 Storag e No.
17 Copyright © Acronis, Inc., 2000 - 2010 Workstation 80 MB 1 GB 500 MB 1024*768 pixels or higher Bootable Media Builder (Windows) 80 MB 700 MB 300 MB Bootable media Me dia t ype Me mo ry I SO i mage si ze A ddi tio nal Based on Windows PE 512 MB 300 MB Linux-based 256 MB 130 MB 1.
18 Copyright © Acronis, Inc., 2000 - 2010 2 Un de rs ta n din g Acr on is B ack up & Re co ver y 10 This section attempts to give its readers a clear un derstanding of the produc t so that the y can use the product in vari ous circumstanc es without step- by -step instructions.
19 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates the notions discusse d above. For more definiti ons please refer to the Glossary.
20 Copyright © Acronis, Inc., 2000 - 2010 Backup using bootable media You can boot the m achine u sing the bootable media, configure th e backup operation in the sa m e way as a simple backup plan and execute the o peratio n.
21 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates data recovery und er the operating system (onli ne). No backup can proceed on the machin e while the recovery opera tion is taking place. If requ ired, you can connect the console to an o ther ma chine and configure a recover y o perati o n on that m achin e.
22 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to rec ov er dat a to bare metal, you boot th e machine using the bootable media and config ure the recovery operation in th e same wa y as the recovery task. The following diagram illustrates the recovery using the bootable media.
23 Copyright © Acronis, Inc., 2000 - 2010 It is widely accept ed that a full backup is the slowes t to do but the fastest to restore. With Acr onis technologies, rec overy from an incremental bac kup may be n ot slower than recovery from a full on e.
24 Copyright © Acronis, Inc., 2000 - 2010 P ar ame ter Fu ll ba cku p Di ff ere nti al ba cku p I nc re ment al ba cku p Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.
25 Copyright © Acronis, Inc., 2000 - 2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are clear ed. This prevents the "modif y settings, lea ve passw o rds" trick. T he program displays a warning each ti me you are trying to edit a plan (task) last modified by another user.
26 Copyright © Acronis, Inc., 2000 - 2010 “sons”; weekly bac kups are referred to as “fath ers”; t he longest li ved monthly backups are called “grandfathers”. GFS as a tape rotation schem e GFS was initially cr eated and is often referred to as a tape rotati on scheme.
27 Copyright © Acronis, Inc., 2000 - 2010 The schedule m arked out according to th e GFS scheme. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Acronis uses incre mental and differential backups tha t help save storage space a nd optimize the cleanup so that cons o lidati on is not needed.
28 Copyright © Acronis, Inc., 2000 - 2010 “D” stands for the backup that is c onsidered Dail y. “W” stands for the backup tha t is considered Weekly. “M” stand s for the backup that is considered Mo nthl y. An ideal archive created according to the GFS schem e.
29 Copyright © Acronis, Inc., 2000 - 2010 The backups that outlive their nomin al lifetime be cause of dependencies are marked pink. The initial full backup will be deleted as soon as all differential and incremental backups ba sed on this backup are deleted.
30 Copyright © Acronis, Inc., 2000 - 2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gi ves the following order o f moves: The Tower of Hanoi backup scheme is based on th e same patterns. I t operates with Sessions instead of Moves and with Backup levels instead of Rings .
31 Copyright © Acronis, Inc., 2000 - 2010 the pattern starts with a ful l backup since the very first backup cannot be incremental the scheme f o rces every backup level t o keep o nly the mo.
32 Copyright © Acronis, Inc., 2000 - 2010 1. Delete backups older tha n This is a time inter v al count ed back from the moment when the retention rules are app lied.
33 Copyright © Acronis, Inc., 2000 - 2010 Combination of rules 1 and 2 You can limit bo th the backu ps’ lifetime and the archi ve size. The diagra m below i llustrates the resulting rule.
34 Copyright © Acronis, Inc., 2000 - 2010 Please be aware t hat cons olidation is just a method of deletio n bu t not an alt ernative to deletion. The resulting backup w ill n o t contain da ta that was present in the deleted backup and was absent from the r et ained incremental or differential backup .
35 Copyright © Acronis, Inc., 2000 - 2010 Recovering dynamic v olumes A dynamic volu m e can be r ecovered over any type o f existing v olume to unallocated space o f a di sk group to unallocated space o f a b asic disk.
36 Copyright © Acronis, Inc., 2000 - 2010 U na ll oc ate d s pa ce (b as ic GPT di sk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and re sizing volum es during recovery You can resize the r esulting basic volume, both M BR a nd GPT, during recovery, or change the volume's location o n the di sk.
37 Copyright © Acronis, Inc., 2000 - 2010 de vi ce (ta pe dr iv e o r t ap e li br ary ) by. .. Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 + + + + ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Ta pe w ri tt en on a ta pe dev ic e th ro ugh .
38 Copyright © Acronis, Inc., 2000 - 2010 6. Acronis Active Re store (p. 227) is n o t available when recovering fro m a tape. Recovery from a loc ally attached tape devi ce Before creating a r ecovery task, insert or m o unt the ta pe co ntain ing the backup you need to rec over.
39 Copyright © Acronis, Inc., 2000 - 2010 Type of event OID: 1.3.6.1.4.1.24 769.100.200.1.0 Value: "Unknown" Text description o f the e vent OID: 1.
40 Copyright © Acronis, Inc., 2000 - 2010 With the new Acronis Secure Zone behavior, y ou obtain the abil ity to: list archives locat ed in the z o ne and backups co ntain ed in each archive .
41 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 1 . 3 U n i v e r s a l R e s t o r e ( A c r o n i s B a c k u p & R ec o v e r y 10 U n i v e rs a l R e s t o r e ) Acronis Backup & Rec ove.
42 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore and Micro soft Sysprep Universal Restor e is not a system preparation tool. Yo u can apply it t o any Windows image cr eated by Acronis product s, includin g images of systems prepared with Microsoft System Preparati on Tool (Sysprep).
43 Copyright © Acronis, Inc., 2000 - 2010 How it works When configurin g a recovery operation, you selec t disks or volumes to rec o ver fr o m a backup . Acronis Backup & Rec overy 10 scans the selec ted disks or volumes in the backup . If this scan finds a supported operating system, the Acronis Ac tive Restore option be comes available.
44 Copyright © Acronis, Inc., 2000 - 2010 5. Once the system r ecovery is started, the operating system boots from the bac kup. The Acronis Active Restore ic o n appear s in the system tray. The machin e beco m es operation al and ready to provide necessary se rvice s.
45 Copyright © Acronis, Inc., 2000 - 2010 3 O p ti on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is applicab le to both stand-alone and a dv anced edi tio ns of Acronis Backup & Rec overy 10.
46 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for all results. To make a settin g fo r each result (successful completion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box.
47 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backup & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents.
48 Copyright © Acronis, Inc., 2000 - 2010 Use the Types of e v ents to log check b ox to filter the events to be l ogged in the Appli catio n Event Log of Wind ows: All events - all ev ents (inf ormation, warni ngs and errors) Errors and warn i ngs Errors only .
49 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 1.3 S ett in g up SN MP s erv ic es on t he re ce iv ing m ac hi ne Windows To install the SNM P se rvic e on a machine running Win do ws: 1. Start > Control Pane l > Add or Remove Prog rams > Add/Remove W indows Com ponents.
50 Copyright © Acronis, Inc., 2000 - 2010 3. In Port , specify the p ort number of the proxy ser v er — for exa m ple: 80 4. If the proxy server requires authentication, specify the credentials in User name and Password . 5. To test the prox y server se ttings, click Test connection .
51 Copyright © Acronis, Inc., 2000 - 2010 Availability of the backup options The set of availab le backup opti ons depends on: The environment the agent opera tes in (Windows, bootable m edia) .
52 Copyright © Acronis, Inc., 2000 - 2010 Media components (p. 66 ) Dest: removable media Dest: removable media - - Error handling (p. 66 ): Do not show message s and dialogs while processing (silent mode) + + + + Re -attempt if an error occur s + + + + Ignore bad sectors + + + + Dual destination (p.
53 Copyright © Acronis, Inc., 2000 - 2010 To p rot ec t t he ar ch ive f r om u na ut hor ize d acc es s 1. Select the Set pas sw ord for the archive check bo x. 2. In the Enter the pa s sword field , t ype a pass word. 3. In the Confirm the password field, re-type the passw ord.
54 Copyright © Acronis, Inc., 2000 - 2010 Exclude files mat ching the following cr i teria Select this check b ox to skip files and folders whos e names match any of the c riteria — called file masks — in the list ; use the Add , Edit , Remove and Re mov e All buttons to create the list of fil e masks.
55 Copyright © Acronis, Inc., 2000 - 2010 The following sche me illustrates when pre/po st com mands are executed. Pre -backup command Backup Post-backup command Examples of how you can use the pre/ .
56 Copyright © Acronis, Inc., 2000 - 2010 execution fails. P ost -b ack u p c om man d To s pec if y a c omm an d/e xec ut ab le fi le to b e e xec ut ed a fte r the b ack up is c omp le ted 1. In the Command field , type a command or br owse to a batch file.
57 Copyright © Acronis, Inc., 2000 - 2010 3. Click OK . P re- da ta ca pt ur e c om man d To s pec if y a c omm an d/b atc h fil e to be ex ec ute d b ef or e dat a cap tu re 1. In the Command field , type a command or br owse to a batch file. The program does not support interactive com m ands, i.
58 Copyright © Acronis, Inc., 2000 - 2010 Re sul t Preset Continue the backu p only after the command is successfully executed. Delete the TIB file and temporary files and fail the task if the command execution fails. Continue the backup after the command is executed despite command execution failure or success.
59 Copyright © Acronis, Inc., 2000 - 2010 When this option is s et to Enable , snapshots of all v o lumes being backed up will be crea te d simultaneously. Use this option to create a time -consis te nt backup o f data span ned across mul tiple volumes, for instanc e for an Oracle database.
60 Copyright © Acronis, Inc., 2000 - 2010 The optimal data c ompression level d epends on the type of data being backed up . For example, even maximum compr ession will not significantly r e duce the archive size if the archive contains essentially compressed files, such as .
61 Copyright © Acronis, Inc., 2000 - 2010 Backing up to a fi xe d hard disk (for example , to Acronis Secure Zone ) may slow p erfo rmance o f the operating system and applications b ecause of the la rge amounts of data that need s t o be written to the disk.
62 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure e -ma il n ot ifi ca tio n 1. Select the Send e- mail notificat ions check b o x to acti vate notifications. 2. In the E-mail addres ses fiel d, ty pe the e -mail add ress to which notifications will b e sent.
63 Copyright © Acronis, Inc., 2000 - 2010 The Messenger ser v ice is n ot started by default in the Micr osoft Windows Serv er 2003 family. Change the servi ce Startup mode to Automatic and sta rt the service. To c onf ig ure W inP op up not if ica ti ons : 1.
64 Copyright © Acronis, Inc., 2000 - 2010 The option defines whether the agent(s) operating o n the managed machine ha ve to send the log events of the backup operations to the specified Si mple Network Manage ment Protocol (SNMP) managers. You can ch oo se the types of events to be sent.
65 Copyright © Acronis, Inc., 2000 - 2010 Automatic With this setting, A cro nis Backup & Rec o very 1 0 will a ct as foll o ws. When backing up to a hard disk: A single backup file w ill b e created if the destination d isk's file system allows the est imated fil e size.
66 Copyright © Acronis, Inc., 2000 - 2010 To completely eli minate this kind of proble m, disable preserving fil e security se tt ings in archives. The recovered files and fo lders will always inherit the per m issions fr om the folder to which they are recovered or fr o m the dis k, if recovered to the root.
67 Copyright © Acronis, Inc., 2000 - 2010 When a recoverab le e rror o ccurs, the pr ogram re-attempts to perfor m the unsuccessful operation. You can set the tim e interv al and the number of attempts.
68 Copyright © Acronis, Inc., 2000 - 2010 You might have to provide the access credentials for the sec ondary destinati o n. Enter th e credentials on prompt. 3. 3. 1.1 8 T ask s ta rt co nd iti on s This option is effec tive in Wind o ws and Linux o perati ng systems.
69 Copyright © Acronis, Inc., 2000 - 2010 Skip the task executio n Delaying a backup m ight b e unacceptable, for example, when you need to back u p data strictly at the specified time. Then i t makes sense to skip the backup rather than wait for t he con ditions, especially if the events occur r elatively often.
70 Copyright © Acronis, Inc., 2000 - 2010 This option is effec tive whe n backing up to a removable media (C D , DVD, tape o r f loppy disk.) The preset is: Disab l ed. The destination CD /D VD ca n be ejected or the tape can be dism o unted after the backup is completed.
71 Copyright © Acronis, Inc., 2000 - 2010 This option is effec tive for Win do ws and Linu x operati ng systems and bootable media, when the backup destination is a deduplicating vault.
72 Copyright © Acronis, Inc., 2000 - 2010 The environment the agent opera tes in (Windows, bootable m edia) The type of data bein g recovered (disk, file) The operating syst em being recovered fr o m the disk backup The following table su mmarizes the availability o f the recovery options.
73 Copyright © Acronis, Inc., 2000 - 2010 SNMP (p. 77 ) + + - - 3. 3. 2.1 P re/ Po st c om ma nd s This option is effec tive for Win do ws and Linu x operati ng systems and PE-based bootable media. The option enables y ou to define the commands to be aut o matically e xecuted befo re and after the data recovery.
74 Copyright © Acronis, Inc., 2000 - 2010 command is successfully executed. Fail the task if the command execution failed. executed despite execution failure or success.
75 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Recove r files with their securi ty setting s . If the file NTFS per m issions were preserved during bac kup (p. 65 ), you can ch oo se w hether t o recover the permi ssions or let the files inhe rit the NTFS permissions fr om the folder to which the y are recovered.
76 Copyright © Acronis, Inc., 2000 - 2010 Port – set the port o f the S M TP server. By default, the port is set t o 25. User name – enter th e user name. Password – enter the password. Click Send test e-ma il mes sage to check if the settings are correct.
77 Copyright © Acronis, Inc., 2000 - 2010 To s el ect wh et her t o l og th e r ec ove ry op er ati ons ev en ts in th e Ap pl ic at io n E ve nt L og of Wi nd ows : Select one of the f o llowing: Use the setting set in the Machine options – to use the setting specified for the machine.
78 Copyright © Acronis, Inc., 2000 - 2010 Do not show message s and dialogs while processing (silen t mode) The preset is: Disab l ed . With the silent m o de enabled , the progra m will autom atically handle situations re quiring user interaction where p ossible.
79 Copyright © Acronis, Inc., 2000 - 2010 The option defines whether to reboot the machin e auto m atically if i t is required for recover y. Such might be the case when a volume locked by th e operating system has to b e recovered. Reboot machine after recovery This option is effec tive whe n o perating under bootable media.
80 Copyright © Acronis, Inc., 2000 - 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata ma kes for fas t and convenient operations with archi ves and backups stored in the vault.
81 Copyright © Acronis, Inc., 2000 - 2010 4. 1 Per so nal v aul ts A vault is called p erso nal if it was created using direct co nnection of t he c o nsole t o a managed machine. Personal vaults are specific for each m anag ed machine. Personal vaults are visible to any user that can l og on to the system.
82 Copyright © Acronis, In c., 2000- 2010 Vault content The Vault conten t section contain s the archives t able and toolbar. The archives t able displays archives and backups tha t are stored in the vault. U se the archives toolbar to perform actions on the selected archi ves and backup s.
83 Copyright © Acronis, Inc., 2000 - 2010 Explore a vault's content Click Explore . In the ap pearing Explorer window, examine the selected vault's content. Validate a vault Click Validate . You will be taken to the Validation (p. 159 ) page, where th is vault is already pre - selected as a source.
84 Copyright © Acronis, In c., 2000- 2010 2. Move the archive s to vault B manually by means of a t hird-party file manager. 3. Edit the backup plan s that use vault A : redirec t their destination to vault B . 4. In the vaults tree, select vault B to check whethe r the arch ives are displa y ed.
85 Copyright © Acronis, Inc., 2000 - 2010 All the operations des cribed below are perform ed by clicking the corresponding butto ns on the toolbar. These operations can be als o accessed from the '[Backup name]' action s bar (on the A ctions and tools pane) and fr om the '[Backup name]' a ctions item of the m ain menu.
86 Copyright © Acronis, In c., 2000- 2010 The filters in this wind ow are from the archives list of the vault view. Thus, if some filters hav e been applied to the archi v es list, only the archives and back ups corresponding to these filters are display ed here.
87 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aunched systema tically keeping t he critical data safely protected.
88 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last successful backup completed The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multiple conditions) is not met is defin ed by the Task start conditions (p.
89 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily s chedule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 day(s). 2. Once at: 06:00:0 0 PM . 3. Effective: From: not set .
90 Copyright © Acronis, Inc., 2000 - 2010 task's recurrences is 4 hours, and between the third , fourth and fifth is 2 hours. In t his case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 day(s). 2. Every: 4 hours.
91 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Frida y at 10PM, s tarting from a certain date (say 05/14/2009) and ending after si x months. The schedule's param eters are thus set up as foll o ws.
92 Copyright © Acronis, Inc., 2000 - 2010 Thursday: every 3 h ours from 9 AM till 9 PM Friday: twice at 1 2 PM and 9 PM (i.e. sa me as on Mon day) Saturday: once at 9 PM Sunday: once at 9 PM Combining the identical times, the following three schedules can be added t o the task: First schedule 1.
93 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run during the spec ified time interval. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be run 12 times from 10 AM to 10 PM during one day .
94 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of November. By setting up this date we just define that the task must be discon tinued in 20 10, after autu m n end s in the northern hemispher e.
95 Copyright © Acronis, Inc., 2000 - 2010 For example, you may want to set up a backup plan that will aut omatically perform an emergency full backup of your data a s soon as Windows disc o vers that yo ur hard dis k drive is about to fail. Parameters Log name Specifies the na me of t he l og.
96 Copyright © Acronis, Inc., 2000 - 2010 WindowsUpdateCl ient and event number 18 in to the System log; the type o f this event is Information . When creating the plan, type or select the follo wing.
97 Copyright © Acronis, Inc., 2000 - 2010 5. 6 Co ndi tio ns Conditions add more flex ib ility to t he sch eduler, enabling to execu te backup t ask s w ith respec t to certain conditi o ns. Once a specified event occurs (see the " Scheduling (p.
98 Copyright © Acronis, Inc., 2000 - 2010 Task start conditi o ns: Wait until the conditions are me t , Run the task anyway af ter 2 hour(s). As a result, (1) If the user bec omes idle before 9PM, th e backup task will start at 9PM.
99 Copyright © Acronis, Inc., 2000 - 2010 Condition: Fits the time interval , from 04:30:00 PM un til 1 0:00:0 0 PM . Task start conditi o ns: Skip the task execution . As a result, (1) if the user l o gs off betw een 04:30:00 PM and 10:00: 00 PM, the backup task will start immediately following the logg ing off.
100 Copyright © Acronis, Inc., 2000 - 2010 5 . 6 . 5 T i m e s i n c e l a s t b ac k u p Applies to: Windows, Linu x Enables to put a backup t as k run on hold until the specifi ed time interval since the last successful backup completion pas ses.
101 Copyright © Acronis, Inc., 2000 - 2010 6 D i rec t ma nag em en t This section covers o perati ons t hat can be perform ed directly on a managed m achin e by using the direct console-agent co nne ction. The content of this s ection is applicable to both stand-alo ne and advanced editions o f Acron is Backup & Recovery 10.
102 Copyright © Acronis, Inc., 2000 - 2010 Create now will launch the Boota ble Media Builder (p. 237 ). No backups h ave been created for X days Back up now The Dashboard warn s you that no data was backed up on the machine for a relativ ely long period of time.
103 Copyright © Acronis, Inc., 2000 - 2010 Alternatively, y o u can revi ew the task execution sta te s in the Backup pla ns and tasks (p. 103) view and specify your decisi on on each task in the Informat ion panel (or in the Task de tail s (p. 111 ) window).
104 Copyright © Acronis, Inc., 2000 - 2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition . This situation is qu ite normal, b ut delaying a backu p for too long is risky.
105 Copyright © Acronis, Inc., 2000 - 2010 3 OK All the tasks are completed successfully. No action is required. No te that a backup plan can be OK in case none of the tasks has b een started yet or some of the tasks are stopped or b eing stopped. These situation s are considered as normal.
106 Copyright © Acronis, Inc., 2000 - 2010 Task state diagram T ask s ta tus es A task can have o ne of the fo llowing status es: Error ; Warning ; OK .
107 Copyright © Acronis, Inc., 2000 - 2010 6. 1. 2.2 Wo rk in g w it h ba cku p pla n s an d tas ks A cti on s on ba ck up pl an s a n d ta sks The following is a guid eline for you to perfor m operations with ba ckup plans and task s. To Do Create a new backup plan, or a task Click New , then select one of the following: Backup plan (p.
108 Copyright © Acronis, Inc., 2000 - 2010 Stop a plan/ta sk Backup plan Click Stop . Stopping the run ning backup plan stops all its tasks. Thu s, all the task operations will be aborted.
109 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 116 ), except for the following limitat ions : It is not always possible to u se all scheme option s, when e diting a backup p lan if the created archive is not e mpty (i.
110 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks.
111 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If required , you can hide the displayed c o lumns and show hid den ones. To s how o r hi de co lum ns 1.
112 Copyright © Acronis, Inc., 2000 - 2010 Recovery (disk) Disk backup recove ry Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Mast.
113 Copyright © Acronis, Inc., 2000 - 2010 Progress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progr ess, elapsed time and other para meters.
114 Copyright © Acronis, Inc., 2000 - 2010 Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule.
115 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry . 2. Do one of the follow ing Click View Details . Th e log entry's details will be d isplayed in a separate window. Expand t he Information panel, by clicking th e chevron.
116 Copyright © Acronis, Inc., 2000 - 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r hi de co lum ns 1.
117 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g ste ps . General Plan name [Optional] Enter a uniq ue name for the backup pla n. A consci o us name let s you id entify the plan among others. Plan's credentials (p.
118 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 128) [Optional] Provide credentials for the location if the pl an account does not have a ccess permissions to the l ocation. To access this opti o n, sele ct the Advanced v iew check box.
119 Copyright © Acronis, Inc., 2000 - 2010 Virtualization server (p. 139) Here you select the resulting virtual machine type and location. Available o ptions depend o n the host you selec te d in the pre v ious step. Storage (p. 139) Choose the storage o n the virtualization server or the folder to place th e virtual machine files in.
120 Copyright © Acronis, Inc., 2000 - 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed.
121 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the machi ne goes into hibernation (hiberfil.s ys) are not backed up. After rec overy, the files will be re-cre ate d in the appropriate place with the zero size.
122 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 6 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, yo u may n o t want database, hidden and system files and folder s, as well as files with specific extensions, to be stored in the archiv e.
123 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F.
124 Copyright © Acronis, Inc., 2000 - 2010 To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you select.
125 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 128) to the arc hive name. If you do not select the Name ba c kup files us i ng the archive name.
126 Copyright © Acronis, Inc., 2000 - 2010 Your script can m o ve older backups based on the date stamp. See also “The *Date+ variable” (p. 128 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hi n a da y Consider the follo wing scenario: You want to perfor m hourl y backups of your server's c ritical files every day.
127 Copyright © Acronis, Inc., 2000 - 2010 You want to swap th e drive s each Monday, so that on e drive contains backups of the curr ent week (Monda y through Sund ay), and the other dri ve those of the previous wee k.
128 Copyright © Acronis, Inc., 2000 - 2010 6. 2. 8.2 T he [D AT E] va ri ab le If you specify the [DATE] variable in the arch ive name, the file name of each backup will include that backup’s creation da te. When using this variable, th e first backup o f a ne w day will b e a full backup.
129 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the source data usi ng the cre dentials of the backup plan account specified in the Gen eral section. Use the followin g creden tials The program will ac cess the source data usi ng the cre dentials you specify.
130 Copyright © Acronis, Inc., 2000 - 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 22 ). 6. 2. 10. 2 Ba ck u p la t er s ch eme With the Back up later scheme, the backup will be perf ormed only once, at the da te and ti me you specify.
131 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups.
132 Copyright © Acronis, Inc., 2000 - 2010 Keep monthly ba ckups indefinitely. Backup scheme para meters can then be s et up as foll o ws. Start backup at: 11: 00 PM Back up on: All days .
133 Copyright © Acronis, Inc., 2000 - 2010 Have a weekl y summary o f file chan ges since las t mo nth (Fri day weekly differential backup ). Have a monthly ful l backup of your files. Moreover, assu m e that yo u w ant to r etain access t o all backup s, including the daily ones, f or at least six months.
134 Copyright © Acronis, Inc., 2000 - 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p.
135 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an go ba ck Ro ll- bac k pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days.
136 Copyright © Acronis, Inc., 2000 - 2010 Incremen tal Specifies on what schedule an d under which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full b ackup is created instead of the in cremental backup .
137 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche m e yield s a full backup pe rformed every Friday nigh t. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param et ers excep t Schedu l e in Full ba c kup a re left e mpty.
138 Copyright © Acronis, Inc., 2000 - 2010 Finally, we create r etention rules for the archiv e: let us retain only backups that are no older than six months, and let the cleanup be performed after each backup task and also on th e last day of every month.
139 Copyright © Acronis, Inc., 2000 - 2010 Validation of the archi ve will validate all the archive’s backup s and m ay take a long time and a l o t of system res ources. 3. Validation sche dule (appears only if you have selected the on schedule in step 1) - set the schedule of validation.
140 Copyright © Acronis, Inc., 2000 - 2010 Agent for Hyper-V is installed on the host You can choose bet ween creating a virtual m achine on the Hyper -V serve r and creating a VMware Workstati on, Microsoft Virtual PC o r Parall els Workstation machine in the folder you select.
141 Copyright © Acronis, Inc., 2000 - 2010 A dynamic volume can be recover ed over an existing volum e, to unallocated space of a disk grou p, or to unallocated space o f a b asic disk. To learn more ab o ut recovering d ynamic volumes, please turn to the Microsoft L D M (Dyna mic volumes) (p.
142 Copyright © Acronis, Inc., 2000 - 2010 after the recover y is start ed. The operating system bo o ts from th e backup image and the machine bec omes operation al and ready to pro v ide n ece ssary servi ces. The data required to serve incoming r equests is recovered with the hig hest priority; everything e lse is recovered in the background.
143 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the f o llowing: Run under the current user The task will run under the credentials with which the u ser who star ts the ta sks is logged on.
144 Copyright © Acronis, Inc., 2000 - 2010 After entering acc ess credentials, the folders on the server become available. Clic k the appropriate folder o n the s erv er. You can access th e server as an anonymous user if the server enables such access.
145 Copyright © Acronis, Inc., 2000 - 2010 The disk geometry is different to that stored in t he ba ckup. There are probab ly other times when you may n eed to recover the MBR, bu t the above are the mos t common.
146 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 6.1 D isk s Available disk destinati ons depend on the agents op erating on the machine. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows or Agent fo r L inux is installed.
147 Copyright © Acronis, Inc., 2000 - 2010 NT si gn at ure When the MBR is s elected along with the disk backup , you need to retain opera ting system bootability on th e target di sk volume. The operating s y stem must have the system volume information (e.
148 Copyright © Acronis, Inc., 2000 - 2010 If Acronis Backup & Recovery 10 Agen t for Hyper-V or Agent for ESX/ESXi is instal led. These agents enab le creatin g a new virtual machine on the vir tualization server you specif y .
149 Copyright © Acronis, Inc., 2000 - 2010 Be careful! To be o n the safe side, it is ad visable to assign unique nam es to the volumes. The Linux-style bo o table medi a shows local disks and volu m es as un mo unted (sd a1, sda2.
150 Copyright © Acronis, Inc., 2000 - 2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter fro m a drop-down list. With the default AU TO selection, the first unused le tt er will be assigned to the volume.
151 Copyright © Acronis, Inc., 2000 - 2010 set by the virtualizati on product. You can add virtual disks to the machine c o nfig uration or, in some ca ses, delete the pro p osed disks. Implementatio n of Xen machines is based on Mic rosoft Virtual PC and inhe rits its limitations: up to 3 IDE d isks and 1 processor.
152 Copyright © Acronis, Inc., 2000 - 2010 By mask (*) *.log F* Excludes all files with th e .log extension Excludes all files and folder s with names starting w ith "F" (such as folders F, F1 a nd files F.log, F1.log) By mask (?) F???.log Excludes all .
153 Copyright © Acronis, Inc., 2000 - 2010 Password . The passw ord for the account. 2. Click OK . 6 . 3 . 8 W h e n t o r e c o v e r Select when to start the recovery task: Recover now - the r ecovery task will be started i mmediately after you click the final OK .
154 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore settings Automatic driver search Specify where the pr ogram will search for the Hardware Abstraction Layer (HA L), HDD controller driver and netw ork adapter driver( s): - If the drivers are o n a ven dor's disc or other removable media, turn on the Sea r ch removab le media .
155 Copyright © Acronis, Inc., 2000 - 2010 With Acronis Backu p & Recover y 10 Agent for Windo w s , you can recov er a disk (volu m e) backup to a new virtual machine o f a ny o f the f o llowing types: V Mware Workstati on, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Vir tual Appliance (OVA).
156 Copyright © Acronis, Inc., 2000 - 2010 You will be taken to the Backup plans and task s view where you can examine the state and pr ogress of the recover y task. Post-conversion oper ations The resulting machin e always has SCSI disk interfa ce and basic MBR volu m es.
157 Copyright © Acronis, Inc., 2000 - 2010 One part of the GRUB l oader resides either in th e first several sectors of the disk or in the first several sec to rs of the volume.
158 Copyright © Acronis, Inc., 2000 - 2010 cp /mnt/system/boot /grub/grub.conf /mnt/s ystem/boot/grub/grub.c onf.backup 5. Edit the /mnt/sys tem/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Li nux distributions) or the /mnt/system/boot/gru b/grub.
159 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 11. 2 A bou t Win dow s loa de rs Windows NT/2000/XP /2003 A part of the loader resides in the partition bo ot sector, the r est is in the files ntldr, boot.ini, ntdetect.com, ntbo o tdd.sys. boot.i ni is a text file that contains the l oader configuration.
160 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a v al ida ti on tas k, pe rf orm t he fo llo win g s te ps . General Task name [Optional] Enter a uniq ue name for the validati o n task. A co nscious na me lets you quickly identify the task a mong the others.
161 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out operations available depend ing on the user privileges, s ee the User privileges o n a managed machi ne (p. 24 ) se ction. 6 . 4 . 2 A r c h i v e s e l ec t i o n Selecting the archive 1.
162 Copyright © Acronis, Inc., 2000 - 2010 While you are re v iewing the locati o n content, archives can be ad ded, dele te d or m odified by another user or by t he pro gram itself according to sch eduled operations. Use the Refresh button to refresh the lis t of archives.
163 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the location using t he credentials y o u specify. U se this option if the task account does no t have access permissions to the l o cation. Y o u might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault.
164 Copyright © Acronis, Inc., 2000 - 2010 Offline virus c lean : if a mac hine is attacked, the administrato r shuts it down, boots with b ootable media and creates an i mage. Then, the administrat or mounts this image in read /write mode, scans and cleans it with an antivirus program, and fina lly recovers the machine.
165 Copyright © Acronis, Inc., 2000 - 2010 ftp://ftp_server:p ort _number or sftp://sftp_ server:port number If the port number is n ot specified, port 21 is used for FTP and port 22 is used for SF TP. After entering acc ess credentials, the folders on t he se rver becom e available.
166 Copyright © Acronis, Inc., 2000 - 2010 2. Click OK . According to t he original FTP specification, crede ntials required for access to FTP servers are transfer red through a ne twork as plaintext. This means that th e user name and password can b e intercepted by an eavesdropper using a p acket sniffer.
167 Copyright © Acronis, Inc., 2000 - 2010 6. 7 Ex por tin g arc hiv es a nd b ack ups The export operati on creates a copy of an archi ve or a self-sufficient part copy of an archive in the location you specify. The original archive re m ains untouched .
168 Copyright © Acronis, Inc., 2000 - 2010 The resulting ar chive's options The exported archi ve inher its t he opti o ns of th e original archive , including encryption and th e password. When exporting a password-protected arch ive, you are prompted for t he password.
169 Copyright © Acronis, Inc., 2000 - 2010 Task credential s (p. 169) [Optional] The exp o rt task will run on behalf of the us er who is creating the task. You can change the task credentia ls if necessary. To acc ess this option, select the Advanced v iew check box.
170 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out operations available dependin g on the user pri v ileges, s ee the User privileg es on a managed machi ne (p. 24 ) se ction. 6 . 7 . 2 A r c h i v e s e l ec t i o n Selecting the archive 1.
171 Copyright © Acronis, Inc., 2000 - 2010 While you are re v iewing the location c o ntent, archiv es can be added, deleted o r modifi ed by another user or by t he pro gram itself according to sch eduled operations. Use the Refresh button to refresh the lis t of archives.
172 Copyright © Acronis, Inc., 2000 - 2010 To export data t o a person al v ault, expand th e Person al v aults gr o up and click the vault. To export data t o a local fol der on the machine, expan d the Local folders gr oup and click the required folder.
173 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the f o llowing: Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section.
174 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.1 A cro ni s Se cur e Zo n e D is k The Acronis Secur e Zone ca n be located on any fixed hard drive. Acronis Secure Zone is always created at the end of the hard disk. A machine can ha ve only one Acronis Secur e Zone.
175 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.4 Re su lt c onf ir ma t io n The Result confir mation window displays the expecte d partition layout accordin g to the settings y ou have chosen. Click OK , if you are satisfied with the lay o ut and the Acr onis Secure Zone creation will start.
176 Copyright © Acronis, Inc., 2000 - 2010 3. Specify the ne w size of the z o ne by: dragging the slid er and s electing any size between the current and maxi mum values.
177 Copyright © Acronis, Inc., 2000 - 2010 (if you have GRUB). If th e system fails to boot, y ou will be abl e to start the b ootable rescue utility, by pressing F11 or by s electing it from the menu, respec tively.
178 Copyright © Acronis, Inc., 2000 - 2010 PE -based bootabl e media PE -based bo o table m edia contains a minimal Win dows system call ed Windows Preinstallation Environment (Win PE) and Acronis Plug-in for WinP E, that is, a modification o f Acronis Bac kup & Recovery 10 Agent that can run in the preinstallation environment.
179 Copyright © Acronis, Inc., 2000 - 2010 Bootable Med ia or, as a sep arate componen t. The wizard will guide yo u through the necessary operations. Pleas e refer t o Adding the Acronis Plug-in to WinPE 1.x (p. 183) for d et ails. To be able to crea te or m odify PE 2.
180 Copyright © Acronis, Inc., 2000 - 2010 If not configured, the Acronis loader waits for som eone to select whether to b oot the operating system (if present) or t he Acronis component. If you set, say, 10 sec. for th e bootable agent, the age nt will launch 10 seconds after th e menu is displayed.
181 Copyright © Acronis, Inc., 2000 - 2010 vga= mode_number Specifies the vid eo mode to be used by the bootable media's graphical user inte rface.
182 Copyright © Acronis, Inc., 2000 - 2010 These calls might no t work properly on some m achine s. But this may be the only way to get the interrupt routing t able. Ne tw or k s ett in gs While creating Acr onis bootable media, you have an option to pre-configure net wo rk c onnections that will be used b y the bo otable agent.
183 Copyright © Acronis, Inc., 2000 - 2010 the default port the currently us ed po rt the new port (en te r the p ort number). If the port has not b ee n pr e-configured, the agen t uses the default port number (987 6.) This port is also used as defaul t by the Acro nis Backup & Recovery 10 Manage ment Console.
184 Copyright © Acronis, Inc., 2000 - 2010 To a dd Ac ro nis P lug -i n to Win PE 1 .x: 1. Unpack all files of your WinPE 1.x ISO to a separate fo lder on the hard disk. 2. Start the Bootabl e Media Buil der either from the management console, b y se lect ing Tools > Create Bootable Med i a or, as a separate c o mponent.
185 Copyright © Acronis, Inc., 2000 - 2010 4. Specify network setting s (p. 182) for the machine n etwork adapters or choos e DHCP auto configuration. 5. [optional] Specify Win dows drivers to be added t o Win do ws PE. Once you boot a machine into Windows PE, the drivers can help you access the device wher e the backup ar chive is located.
186 Copyright © Acronis, Inc., 2000 - 2010 11. Specify the output f o lder a nd the full path to the resul ting ISO file including the fil e name or the media to create. 12. Build the Bart PE. 13. Burn the ISO to CD or D VD (if t his has n o t been d one yet) or copy to a flash drive.
187 Copyright © Acronis, Inc., 2000 - 2010 After entering acc ess credentials, you will see a lis t of archives located in the vault. 6. 10. 3. 1 S ett in g up a di sp lay m ode For a machine bo o ted from m edia, a display v ideo mode is detected automaticall y based on the hardware configuration (monitor and graphics card specifications).
188 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 0 . 4 L i s t o f c o m ma n d s an d u t i l i t i e s a v ai l a bl e i n L i n u x - ba s e d b o o t a b l e m e d i a Linux-based bootabl e media contains the foll owing command s and command line utilities , which you can use when runnin g a command shell.
189 Copyright © Acronis, Inc., 2000 - 2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 .
190 Copyright © Acronis, Inc., 2000 - 2010 To c re ate t he vo lu me st ruc tu re by us ing a sc ri pt 1. Boot the machine fr om a Linux-based bootable medi a. 2. Click Acronis Bo otable Agent . Then, click Run man agement console . 3. On the toolbar, cli ck Ac tion s , and then click Sta r t shell .
191 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that you pre vio usly perf ormed a disk backup of a machine with the following disk configuration: The machine has two 1-gigabyte and tw o 2-gigab y te SCSI hard disks, mounted on /dev/sda , /dev/sdb , /dev/ sdc , and /dev/sdd , r espectively.
192 Copyright © Acronis, Inc., 2000 - 2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk7W- yDG3 -uF1l-Q2AL-C0z0- vMeACu 5. Run the following c omman d to create the logical volu me; in the -L para meter, sp ecify the size given by VG Size : lvm lvcreate -L1.
193 Copyright © Acronis, Inc., 2000 - 2010 2. Use the -- mount c ommand, specifying the volume's index in the -i param et er. For e xample: trueimagemnt -- mount / mnt -- filename smb://server/backups/linu x_machine.tib - i 4 This command mounts the logical volume DYN 1, whose index in the backup is 4, on the mount point /mnt.
194 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 2 R u n n i n g A c r o n i s Di s k D i r ec t o r L i t e You can run Acronis D isk Director Lite under Windows or start it from a bootable media.
195 Copyright © Acronis, Inc., 2000 - 2010 Starting the operations Any operation can be launched: From the volum e or disk context menu (both in the table and the graphic pan el) From the Dis.
196 Copyright © Acronis, Inc., 2000 - 2010 3. In the window, y o u will b e able to set the disk partitioning scheme ( MBR or GPT) and the disk type (basic or dyna mic). The new disk state will be graphically represented in the Disk Managemen t view of the c onsole immediatel y.
197 Copyright © Acronis, Inc., 2000 - 2010 But with the wide rang e of available hard ware it is n o rmal tha t the target disk would differ in size from the source.
198 Copyright © Acronis, Inc., 2000 - 2010 5. Wait until the machin e is t urned off. 6. Disconnect either t he sour ce or the target hard disk drive fr om the machine. 7. Start up the machin e. If y ou ne ed to le ave a n N T s ig nat ur e: 1. Click to clear th e Copy NT signature check box, if nece ssary.
199 Copyright © Acronis, Inc., 2000 - 2010 If you need to conver t a GPT disk to MBR: 1. Select a GPT disk to conver t to MBR. 2. Right-click on the se lected volume, and then click Convert to MBR in the context menu. You will receive a warning window, stating that you ar e about to convert G PT into MBR.
200 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 5. 6 D isk c on ve rs io n: dy na mi c t o b as ic You would want to co nvert dynami c disks back to basic ones, e.g. if you want to start using an OS o n your machine that does not support dyna m ic disks.
201 Copyright © Acronis, Inc., 2000 - 2010 Online The online status means that a disk is accessible in the read -write m ode. This is t he nor mal disk status.
202 Copyright © Acronis, Inc., 2000 - 2010 T ype s of dy na mi c v olu me s Simple Volume A volume created fr om free space on a single physi cal disk. It can consist of one region on the disk or several regi o ns, vir tually united by the Logical Disk Manager (LDM).
203 Copyright © Acronis, Inc., 2000 - 2010 Its pages will enable you to enter operation para meters, proceeding step- by -step further on and return to any previ o us step if necessary to change any previo usly s elected options. To help you wi th your choices, each par ameter is supplemented with detailed instructions.
204 Copyright © Acronis, Inc., 2000 - 2010 If you are creating a dynamic volume and select one or several basic disks, as its destinati on, you will receive a warning t hat the selected disk will be con verted to dynamic automa tically.
205 Copyright © Acronis, Inc., 2000 - 2010 A Basic disk can c ontain up to four primary vo lumes. If they already exist, t he disk will have to be converted into dynamic, oth erwise or Active and Primary options will be disabled and you will only be able to se lect the Logical volume type.
206 Copyright © Acronis, Inc., 2000 - 2010 Please note, t hat due to setting the new active volume, the former active volume le tter mig ht be cha nged and some o f the installed programs might stop run ning.
207 Copyright © Acronis, Inc., 2000 - 2010 3. By clicking OK in the C hang e label window, you'll add the pendin g o perati on of changing the volume label .
208 Copyright © Acronis, Inc., 2000 - 2010 The Disk mana g ement vie w contains th e toolbar with icons to launch t he Undo , Redo and Com mit actions intended f o r pendi ng op erations. Th ese actions might also b e launched from the Disk management menu o f the console.
209 Copyright © Acronis, Inc., 2000 - 2010 7 O n lin e bac ku p This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Onli ne Backup Storage. Acronis Backup & Re covery 10 Online m ight be unava ilable in your region.
210 Copyright © Acronis, Inc., 2000 - 2010 7 . 1 . 3 H o w l o n g w i l l m y b a c k u ps b e k e p t i n t h e o n l i n e s t o r a g e ? Your backups remain in the onlin e storag e until y ou de lete the m or until th e subscription expires.
211 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 5.3 C an I us e A cr on is Un iv er sal R est or e whe n rec ov er in g a s ys tem f rom t he on li ne st ora ge? Yes. Acronis Uni v ersal Res tore is alwa ys available whe n recovering a system fro m the online st orage.
212 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 6.1 Wh at i s In it ia l See din g? Initial Seeding is an extra service that lets y o u save an initial full backup locally an d then send it to Acronis on a hard dis k drive. Acronis uploads the backup to the online storage.
213 Copyright © Acronis, Inc., 2000 - 2010 Having purchased a li cense from an Acronis partner, you receive a confirmation e-mail wi th a registration code. Clic k Enter new registration cod e on the same w eb page an d register the license. The license beco m es availa ble o n the Init i al Seed ing / Recovery tab.
214 Copyright © Acronis, Inc., 2000 - 2010 Packaging If possible, use the original packaging. Other wise, pack aging materials can be ob tained at any shipping outlet or s tationary store. The following are inst ructions about how to packag e your hard disk drive.
215 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this compan y's web site, prepare and print two prepaid ship ping labels: 1. Shipping label for sending your hard drive. This lab el is placed on the top of the bo x.
216 Copyright © Acronis, Inc., 2000 - 2010 St ep 5 Securely seal the b ox with a sturdy tape. Then, stick t he shippin g label fo r sendin g your hard drive t o the top of the box, s o t he l abel does not wrap around the edge of the package. 7. 1. 6.
217 Copyright © Acronis, Inc., 2000 - 2010 The order has been c ompl eted. The media has been retu rned (or: Returning th e media was not requested ) – Your m edia has been shipped bac k (the carrier and the tracking number are specified). If a prepaid shipping label was not pr o vide d with the media, the media will be discarded.
218 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 7.6 C an I ob ta in ba ck ups t ake n fr om a nu mbe r of ma ch in es on a s ing le h ard d ri v e? No.
219 Copyright © Acronis, Inc., 2000 - 2010 7 . 1 . 8 S u b s c r i p t i o n l i f e cy c l e F A Q This section explains a subscription lifecycle and subsc ription operations that you can perf orm on your account management Web pag e.
220 Copyright © Acronis, Inc., 2000 - 2010 An expired subscripti o n can be renewed within five days after expirati on. In such cases, the new subscription will be a ctivated immediately. Re ne wi n g a s in gl e s ub s cri pt io n To r en ew a s ubs cr ip tio n 1.
22 1 Copyright © Acronis, Inc., 2000 - 2010 7. 2 Wh er e do I st art ? On the Acronis Web si te, log in to your account ( create one if you are not regi stered yet) and navigate to Online ba c kup > Fo r Business . This is your acc ount management Web page .
222 Copyright © Acronis, Inc., 2000 - 2010 the backup will fail. Wi th a server subscription, y ou ca n o nly back up the Wind o ws host. With a subscription for virtual machin es, you can bac k up bot h the Windows host and its virtual machines.
223 Copyright © Acronis, Inc., 2000 - 2010 Reassigning a subscripti on does not restart its subscription peri od. To a ss ign an a ct iva ted s ubs cri pt ion t o a m ac hi ne 1. On the machine t o which y o u want t o assign an acti vated subscription, go t o the subscription activation windo w.
224 Copyright © Acronis, Inc., 2000 - 2010 After reassignin g Delete backups fr om Subscription 1 using Ma chine 2. You cannot d elete backups from Subscripti o n 2, unless you assign this subscription to any machin e.
225 Copyright © Acronis, Inc., 2000 - 2010 Dual destinat i on (p. 67 ) By using the Ba c kup perfo rmance > Network c onnecti on speed option, y o u can v ary the transferring speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up.
226 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration co de A character string f o r regist ering a subscription or lice nse that was bough t from an Acronis partner.
227 Copyright © Acronis, Inc., 2000 - 2010 8 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af te r the s y stem recovery is started. T he sys te m boots from the backup (p. 233) and the machine becomes operational and r eady to provide necessary servic es.
228 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation of loaders other tha n Windows loaders and GR UB. A gen t (A cr on is B ack up & Re cov er y 10 A ge nt ) An application tha t perfor m s data backup and recovery and enables other management operati ons on the machine (p.
229 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati on (p. 228), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup strea m or data compression level. Back up options are a part o f a backu p plan (p.
230 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 228 ) installed o n the m achine finds da ta items using the sel ect ion rules. For example, if the selection rule is [A ll volumes], the entire machin e will be back ed up.
231 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manuall y modified. Custom groups cannot be created within built-in groups. There is n o way to remove a physical machine from the built-in group exc ept for re m oving the machine from the managem ent server.
232 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 2 28) from a backup archive (p. 228) in order to get rid o f outdated backups o r prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p.
233 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma nag em en t Any management o peratio n that is performed on a managed machine (p. 236 ) using the direc t console (p. 232)-agen t (p. 228) connection (as oppo sed to centralized manageme nt (p. 231) when the operations are c o nfigured o n the manag ement server (p.
234 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Management http://support.micr o soft.c o m/kb/222 1 89/EN-US/ D yna mi c di sk A hard disk manag ed by Log ical D isk Manag er (LDM) that is available in Window s starting with Windows 2000.
235 Copyright © Acronis, Inc., 2000 - 2010 the administrat or changes the crit eria so that the mach ine does not meet them anymore. There is no way t o remove a m achine from a dynamic group manually except for deleting the machine from th e management server.
236 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 228) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecove r th e data from a full backup. G GF S ( Gr and fa th er -Fa t h er-S on ) A popular backup sche me (p.
237 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d va ult A centralized vault (p. 231) managed by a storag e no de (p. 238 ). Archiv es (p. 228) in a man aged vault can be accessed as f o llows : .
238 Copyright © Acronis, Inc., 2000 - 2010 P lan See Backup plan (p. 2 2 9 ). P oli cy See Backup policy (p. 229 ). R Re co ver y po in t Date and time to w hich th e backed up dat a can be reverted to. Re gi st ere d ma ch in e A machine (p. 236) managed by a manage ment server (p.
239 Copyright © Acronis, Inc., 2000 - 2010 prevent access to the backup archives, even in c ase the storage medium is stolen or access ed by a malefactor, by usin g encrypted vaults (p. 235 ). S tor ag e nod e- sid e cl ea nu p Cleanup (p. 23 1) performe d by a storag e node (p.
240 Copyright © Acronis, Inc., 2000 - 2010 U Un iv er sa l R es tor e (Ac ro ni s Bac ku p & R eco ve ry 1 0 U ni ve rsa l R es to r e) The Acronis propri et ary t echnology that helps boot up W indows o n dissimila r hardware o r a virtual machine.
241 Copyright © Acronis, Inc., 2000 - 2010 Vi rt ua l m ach in e On Acronis Backup & Recover y 10 Manag ement Server, a machine (p. 236) i s considered virtual if it can be backed up fr om the virtualization host without in stalling an agent (p. 228) on the machin e.
Een belangrijk punt na aankoop van elk apparaat Acronis Backup & Recovery 10 Workstation (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Acronis Backup & Recovery 10 Workstation heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Acronis Backup & Recovery 10 Workstation vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Acronis Backup & Recovery 10 Workstation leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Acronis Backup & Recovery 10 Workstation krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Acronis Backup & Recovery 10 Workstation bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Acronis Backup & Recovery 10 Workstation kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Acronis Backup & Recovery 10 Workstation . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.