Gebruiksaanwijzing /service van het product Backup Advanced for Windows Server van de fabrikant Acronis
Ga naar pagina of 444
A c r o n i s B a c k u p A d v a n c e d Version 11.5 Update 6 USER GUIDE APPLIES TO TH E FOLLOW ING PRODUCTS Advanced for Windows Server Advanced for Linux Server Advanced for PC Advanced for VMware.
2 Copyright © Acronis International GmbH, 2002- 2015 Copyright Statemen t Copyright © Acr onis Intern ational GmbH, 2002-2015. All rights reser ved. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis International G mbH.
3 Copyright © Acronis International GmbH, 2002- 2015 Table of contents 1 Introducing Acroni s Backu p ............................................................................................ 11 1.1 What's new in Update 6 ....................
4 Copyright © Acronis International GmbH, 2002- 2015 4 Backup .......................................................................................................................... 55 4.1 Back up now ..............................................
5 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 21 S ect or- by -se cto r bac kup ............................................................................................................................. 12 5 4. 7. 22 T ape ma nag eme nt .
6 Copyright © Acronis International GmbH, 2002- 2015 7.3 Removable device s ................................................................................................................ 194 7.4 Tape devices ........................................
7 Copyright © Acronis International GmbH, 2002- 2015 9.5 Acronis Startup Rec overy Manager ....................................................................................... 264 9.6 Acronis PXE Server ............................................
8 Copyright © Acronis International GmbH, 2002- 2015 11 .5 .3 R ecov er ing i ndiv id ual i tems ........................................................................................................................ 305 12 Protecting Micro s oft SQL S erv er with sin gle-pass backup .
9 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .8 C lou d b ack up pr oxy ..................................................................................................................................... 342 15 Centralized mana gement .
10 Copyright © Acronis International GmbH, 2002- 2015 17 Glossary ....................................................................................
11 Copyright © Acronis International GmbH, 2002- 2015 1 I nt rod uc i ng Ac ro ni s B ac ku p 1. 1 W hat 's ne w i n U pda te 6 Improvements added in buil d 43798 Support for Wind ows 10 – Home, Pro, Education, and Enterprise editions. Note At the tim e of this hotfix release, Windows 10 i s not yet gen erally available.
12 Copyright © Acronis International GmbH, 2002- 2015 Support for Citrix XenServe r 6 .5, Red Ha t Enterprise Vi rtualization 3.4, 3.5, and Or acle VM Server 3.3 (by installing an ag ent into a guest system). Linux Support for Linux k ernel version 3 .
13 Copyright © Acronis International GmbH, 2002- 2015 Cloud backup is no w availa ble for machines running Li nux. Cloud backup subs criptions for Servers and for Virtual Machines are deprecated. Users can renew these subscrip tions to volume subscripti o ns (p.
14 Copyright © Acronis International GmbH, 2002- 2015 Use any backup de stination including Acronis Onlin e Backup Storage. Microsoft SQL Ser v er 2012 is supported, as well as the previ ous Microsoft SQL Server v ersions. Basic support for Windows 8 and Windows Server 2012 (p.
15 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup supp orts Micros o ft Exchange S erver 2010 as well as Micros o ft Exchan ge Server 2003/2007. Express full ba c kup method This method is bas ed o n monitoring changes of the Exchange databa se files.
16 Copyright © Acronis International GmbH, 2002- 2015 Back up and recover v irtual machine s running in a RHEV envir onment. Migrate ph ysical machines to the RHEV en v ironment ( P 2V); and mig rate a virtual m achine fro m a different v irtualization platform to the RHEV platform (V2V).
17 Copyright © Acronis International GmbH, 2002- 2015 Components for centr alized management These components, in cluded in Acronis Backup Advanced, provide centrali zed management capability. Usage of t hese comp o nents is n o t licensed. Console The console pr o vides Grap hical User Interface to other Acronis B ackup componen ts.
18 Copyright © Acronis International GmbH, 2002- 2015 Disk backup Disk-level data pr ote ction is based on backing up either a disk o r a volu m e file syste m as a whole, along with all infor m ation n ece ssary for the o perating system to boot; or all the disk se ctors usin g the se ctor- by -sector appro ach (raw m o de.
19 Copyright © Acronis International GmbH, 2002- 2015 The agent uses Micr osoft VSS to ensure the consist ency of the backed-up data. The agent is included in t he se tup program o f Acronis Backup Advanced. The agent is installed with Agent for Windows (p.
20 Copyright © Acronis International GmbH, 2002- 2015 Components f or Remote In stallatio n need to be install ed o n the machin e with the console or with the management s erver (p. 19 ). D uring installa tion, the setup progra m saves the components in the default location and saves this location path in the r egistry.
21 Copyright © Acronis International GmbH, 2002- 2015 1. 9 Ab o ut u sin g t he pr od uct i n t he tr ia l m od e Before buying an Acr onis Backup license, you may w ant to try the software.
22 Copyright © Acronis International GmbH, 2002- 2015 1. 11 Tec hn ica l Sup po rt Maintenance and Suppor t Program If you need assistanc e with your Acronis produc t, please go t o http://www.
23 Copyright © Acronis International GmbH, 2002- 2015 2 G ett in g st art ed Step 1. Installation These brief installa tio n instructions enable you to start using the product quickly. For the complete descripti o n of installa tio n methods and procedures, please ref er to the Installation documentation.
24 Copyright © Acronis International GmbH, 2002- 2015 c. Follow the on-screen ins tructions. Step 2. Running Run Acronis Backup Management Console. In Windows Start the consol e by selecti ng Acronis Backup fr o m the Start menu . In Linux Log in as root o r log in as an ordin ary user and th en switch user as required.
25 Copyright © Acronis International GmbH, 2002- 2015 Tip. Using the bo o table me dia, yo u can d o off -line ("cold") bac kups in the same way as in the operating system.
26 Copyright © Acronis International GmbH, 2002- 2015 If you opt for st o ring all ba ckup archives in a single or a few network ed locations, create centralized vaults in th ese locations.
27 Copyright © Acronis International GmbH, 2002- 2015 Menu b ar Appears across the top o f the program window. L ets you perform most of operations available in Acro nis Backup. The m enu items change dy namically depending on th e item selected in the Navigation tree and the main area.
28 Copyright © Acronis International GmbH, 2002- 2015 Dashboard . Use this v iew to esti mate at a glance whether th e data is successfully protected on th e machines registered on the m anagement se rver. Machines with a gents . Use this view to manage machines register ed on the management ser v er.
29 Copyright © Acronis International GmbH, 2002- 2015 2 . 1 . 2 M ai n a r ea , v i e w s an d a c t i o n pa g e s The main area is a basi c place where you w o rk with the c o nsole. Here you create, edit and manage backup plans, reco v ery tasks and perf orm other operations.
30 Copyright © Acronis International GmbH, 2002- 2015 To D o t he fol lo wing Sort items by any column Click a column's header to sor t items in ascending ord er.
31 Copyright © Acronis International GmbH, 2002- 2015 Using controls and specifyi ng settings Use active controls to specify a backup plan o r recover y t ask setting s and parameters. By default, such fields as credential s, options, comments, and some others are hidden.
32 Copyright © Acronis International GmbH, 2002- 2015 If the option is enabled, the credentials for v arious locations that you enter during a console session are saved for use du ring later sessions. In Windo ws, the creden tials are stored in the Windo ws Credential Manager.
33 Copyright © Acronis International GmbH, 2002- 2015 Notify when the mana gement console is con nected to a componen t of a different version This option defin es whether to display a pop-up window when a c onsole is connected to an agent/management server and their versions differ.
34 Copyright © Acronis International GmbH, 2002- 2015 3 Un de rs ta ndi ng A cr oni s Ba cku p This section attempts to give its readers a clear understanding of the pr o duct so that the y c an use the product in v arious circu mstances without step- by -step instructions.
35 Copyright © Acronis International GmbH, 2002- 2015 enter the credentials ne xt time. The credentials ar e cached independently for each user wh o uses the console on the m achine. Backup plan's creden tials Any backup plan runn ing on a machi ne runs on behalf of a user.
36 Copyright © Acronis International GmbH, 2002- 2015 In Linux You do not need t o specify task cr edentials. In Linux, tasks always run un der the root user acc ount.
37 Copyright © Acronis International GmbH, 2002- 2015 of user rights, me m bership in securi ty groups, and the Full Control per m issions o n respective registry keys in the foll owing key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nis. There are no permissions granted on other regi stry keys.
38 Copyright © Acronis International GmbH, 2002- 2015 S ervi ce na me P urp ose A cco unt us ed by t he ser vi ce P riv il eg es add ed to th e a cc ount U ser ri ght s Gr ou p me mb er shi p P ermi .
39 Copyright © Acronis International GmbH, 2002- 2015 Acronis Scheduler2 Service Providing scheduling for ta sks performed b y Acronis components Local System Dependencies on othe r services The main.
40 Copyright © Acronis International GmbH, 2002- 2015 Incremental backu p An incremental backup stores changes to the data against the latest backup . You need access to other backups fro m the same ar chive to recover data from an incremental backup.
41 Copyright © Acronis International GmbH, 2002- 2015 A volume backup s to res all fil es and folders o f the sele cted volume independent of their attributes (includ ing hidden and sy stem files), the b oot record, the file all o cation table (FAT ) if it exists, the root and the zero track of the hard disk with the master boot rec ord (MBR).
42 Copyright © Acronis International GmbH, 2002- 2015 acrocmd backup disk -- volume=DYN --loc= srv1 backups -- c re dentials=netuser1 ,pass1 -- arc=alldyn_arc This will back up all dyna mic volumes of the l o cal mach ine to a network shar ed folder.
43 Copyright © Acronis International GmbH, 2002- 2015 Ba ck up (so urc e): Re cov er ed to: Dy na mic v olu me Ba si c v ol ume Dy na mic v olu me Dynamic volume Type as of the target Dynamic volume .
44 Copyright © Acronis International GmbH, 2002- 2015 Basic volumes included in logical volumes are shown in the list with N one in the File s y stem colu m n. If you select such volumes, the program will back them up sector- by -sector. Normally this is n ot required.
45 Copyright © Acronis International GmbH, 2002- 2015 3. 7. 2.3 Ba ck ing u p h ar dw are RA ID a rr ay s (Li nux ) Hardware RAID arra ys under Linux combine sev eral physical drives to creat e a single partitionab le disk. The special file related to a hardware RAID array is usually located in /dev/a taraid.
46 Copyright © Acronis International GmbH, 2002- 2015 The machine has fewer physical disks than the original v olume structure used. Th e software will fail to recreate the volume structure even if th e capacity of the physical disks is en o ugh to fit all the data being rec o vered.
47 Copyright © Acronis International GmbH, 2002- 2015 6. If you previously m o unted the backup by using the acrocm d utility, use this u tility again to unmount the bac kup (see "Mounting bac kup volumes" later in t his topic). 7. Return to the m anagement c onsole by pres sing ALT+F1.
48 Copyright © Acronis International GmbH, 2002- 2015 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgr oup /dev/md0 /dev/md1 lvm vgdisplay The output of th e l vm vgdisplay command will contain lines similar to the f o llowing: --- Volume group --- VG Name my_volgroup .
49 Copyright © Acronis International GmbH, 2002- 2015 type: disk Num Partition Flags Size Type GUID ---------- -------------------- -------- -- ---------- ------------- ------ -- Dyn1 my _volgroup-my_lo. .. 4 GB Ext 3 Dyn2 md0 2.007 GB Ext 2 Disk 1 sda 16 GB DT_FIXED 1-1 sda1 Act,Pri 203.
50 Copyright © Acronis International GmbH, 2002- 2015 4K native (4Kn ) disks have a 4 -KB logical sect o r size. M odern operating systems can store dat a on these disks, but they generally cannot boot fr om these disks. These disks are commonly external drives with USB conne ction.
51 Copyright © Acronis International GmbH, 2002- 2015 Th e informa tio n in this sect ion also applies to Window s 8 .1 and Wind ows Server 2012 R2. Limitations Acronis Disk Direc tor Lite (p. 267) is not av ailable un der Windows 8 and Windows Serv er 2012.
52 Copyright © Acronis International GmbH, 2002- 2015 Data Deduplication In Windows Ser ver 2012, you can enable the Data Dedupli catio n feature f or an NTFS volume. D ata Deduplication reduce s t he used space on the vo lume by storing duplicate fragmen ts of the volum e's files only once.
53 Copyright © Acronis International GmbH, 2002- 2015 2. Recover the sys tem. The recovered data will b e unencrypted. 3. Re boot the recover ed system. 4. Turn on BitLocker. If you only need to re cover one parti tion of a multi-partitioned disk, d o so under t he operating system.
54 Copyright © Acronis International GmbH, 2002- 2015 About the test message When configurin g SNMP notifications, you can send a test message to check if your settings are correct. The parameters o f the test m essage are as f ollows: Type of event OID: 1.
55 Copyright © Acronis International GmbH, 2002- 2015 4 B ack up 4. 1 B ac k up now Use the Back up no w feature t o configure and run a one-time backup in a few si mple steps. The backup process will star t immediately after yo u perf o rm the required steps and click OK .
56 Copyright © Acronis International GmbH, 2002- 2015 Select the mod e the removable device w i ll be used i n (p. 194) If the specified l o cation is an RDX dri v e or USB flash drive, select the device mode: Removable med ia or Fixed drive .
57 Copyright © Acronis International GmbH, 2002- 2015 Set up a regular c onv ersion o f a disk or volu me backup to a virtual machine. Plan parameters Plan name [Optional] Enter a uniq ue name for the backup plan . A conscious name lets you identify the plan among others.
58 Copyright © Acronis International GmbH, 2002- 2015 Microsoft SQL databas es by means of sing le -pass disk an d application backup, if Acronis Backup Agent for S QL is ins talled. Agent for SQL enables you to create applicati o n-aware disk backup s and to recover Microsoft SQL databas es from such backups.
59 Copyright © Acronis International GmbH, 2002- 2015 For more inf o rmation abou t backing up Microsoft Exc hange data see "Backing u p Microsoft Exchange Server data" . 2. In the tree below Data to ba c k up section, selec t the items to back up.
60 Copyright © Acronis International GmbH, 2002- 2015 4 . 2 . 3 S o u r c e fil e s e x c l u s i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for disk-level backup of NTFS, FAT, Ext3, and Ext4 file sys tems only.
61 Copyright © Acronis International GmbH, 2002- 2015 Wildcard characters You can use one or more wildcard characters * and ? in the criterion. These chara cters can be used both within the full pa th and in the file or folder name. The asterisk (*) sub stitutes for zero or more chara cters in a file name.
62 Copyright © Acronis International GmbH, 2002- 2015 added, deleted or m o dified by an other user or by the program itself acc ording to scheduled operations.
63 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls Cloud storage To back up dat a to Acronis Cloud Storage, click Log in and specify the cr edentials to log in to the cloud storage. Then, ex pand th e Cloud storage group an d select the account.
64 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls FTP, SFTP To back up dat a to FTP or SFTP, type the server nam e or address in th e Path field as follows: ftp://ftp_ser.
65 Copyright © Acronis International GmbH, 2002- 2015 Warning: According to the original FTP specifica tion, credentials required for acc ess to FTP servers are transferred through a n etwork as plaintext. This means that th e u ser name and password c an be intercepte d by an eavesdropper using a packet sniffer.
66 Copyright © Acronis International GmbH, 2002- 2015 Full - selected by default for all backup locations ( ex cep t for Acronis Cloud Storage). Incremental . At the firs t time a full backup will be created. The next backups will be incremental.
67 Copyright © Acronis International GmbH, 2002- 2015 Keep backups Specifies how long you want the b ackups to be stored in th e archive. A term can b e set in hours, days, weeks, mo nths, or years. For month ly backups, y ou can also select Keep indefinitely if yo u want them to be sa ved forever.
68 Copyright © Acronis International GmbH, 2002- 2015 available through nex t Sunday, January 8; the firs t weekly backup, the on e of Saturday, January 7, will be stored on the syste m until February 7 .
69 Copyright © Acronis International GmbH, 2002- 2015 Monthly: 5 years Here, daily incre m ental bac kups will be created on Tuesdays and Thursdays, with weekly and monthly backups perf ormed on Fridays. Note tha t, in order to choose Friday in the We ekly/monthly field, you need to first select it in the Back up on field.
70 Copyright © Acronis International GmbH, 2002- 2015 P ara met er Me ani ng Clean up arch ive Specifies how to get rid o f old b ackups: either to app ly reten tion rules (p. 100 ) regularly or clean up t he archive during a backu p when the destination lo cation runs out of space.
71 Copyright © Acronis International GmbH, 2002- 2015 Here, all parame ters excep t Schedule in Full ba ckup are left empty. All backup s in the archive are kept indefinitely (n o archiv e cleanup is perfor med).
72 Copyright © Acronis International GmbH, 2002- 2015 By default, a bac kup is not deleted a s long as it has depend ent backups that must be kept. For example, if a full ba ckup has become subject t.
73 Copyright © Acronis International GmbH, 2002- 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different le vels have different types: Last-level (in this case, level 4) bac kups are full; Backups of intermediat e levels (2, 3) are differential ; First-level (1) backups are incremental.
74 Copyright © Acronis International GmbH, 2002- 2015 On day 14, the int erv al is fi v e days. It incr eases on subsequent days bef ore decreasing again, and so on. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back peri o d shows how many days we are guaran te ed to have e ven in the w o rst case.
75 Copyright © Acronis International GmbH, 2002- 2015 protection strategy and you prefer to be imm ediately informed whether the backed-up data is not corrupted and c an be s uccessfully recovered, think of starting the validation rig ht after backup creation.
76 Copyright © Acronis International GmbH, 2002- 2015 To a dd a te xt la bel to a ba ck up: 1. On the Create backup plan (p. 55 ) page, click Sh ow plan's credentials, c omments, l abel . 2. In Label , enter the text label or select it fro m the drop-down m enu.
77 Copyright © Acronis International GmbH, 2002- 2015 acronisTag.hostna m e = “su perserver.corp.local” acronisTag.os.type = “windows7Server64Gue st” acronisTag.os.servicepa ck = “1” acronisTag.os.sid = “ S -1-5- 21 - 874133492-782267321- 39289498 34” 4 .
78 Copyright © Acronis International GmbH, 2002- 2015 When you back up t o a locally atta ched RDX drive or US B flash drive, the Name backup files using the archive na me... check box does not appear. Instead, the removable device m ode (p. 194) determines whet her th e standard or si mplified naming scheme will be used.
79 Copyright © Acronis International GmbH, 2002- 2015 4 . 3 . 1 T h e [ D A T E ] v ar i a b l e If you specify the [DATE] variable in the ar chive name, the file nam e of each backup will include tha t backup’s creation da te. When using this variable, th e first backup of a new da y will be a full bac kup.
80 Copyright © Acronis International GmbH, 2002- 2015 You want to perfor m a dail y full backup of your machine. You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine . tib . You want each ne w backup to replace the old one.
81 Copyright © Acronis International GmbH, 2002- 2015 4. 3. 3.4 Ex am pl e 4. Da il y f ul l b ac ku ps w ith d ai ly dr iv e s wa ps Consider the follo wing scenario: You want to perfor m a dail y full backup of your machine. You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine .
82 Copyright © Acronis International GmbH, 2002- 2015 Result: Before creating a Mo nday backup (by the first backup pla n), all backups will be d eleted from the currently attached drive. While one drive is a ttached to the machine, you can keep the other drive off-site for ex tra data protection.
83 Copyright © Acronis International GmbH, 2002- 2015 The scheduler uses lo cal time o f the machine the backup plan exist s o n. Bef ore creating a sch edule, be sure the machin e’s date and time settings ar e correct. Schedule To define when a t ask has t o be executed, you need to specify an event or multiple events.
84 Copyright © Acronis International GmbH, 2002- 2015 What if an event oc c urs w hile the scheduler is waitin g for the condition require d by the previous event? The event will be ignored.
85 Copyright © Acronis International GmbH, 2002- 2015 "Three-hour time i nterval l asting for three months" s chedule Run the task ever y three hours. The task starts on a c ertain date (say, Sept ember 15, 2009), and end s after three months.
86 Copyright © Acronis International GmbH, 2002- 2015 3. Effective: From: 09/20/20 09 . To: not set . 4 . 4 . 2 W ee k l y s c h e d u l e Weekly schedule is effective in Windows and Linux operating systems. To s pec if y a w eek ly s che dul e In the Schedule are a, se lect the app ropriate paramete r as follows: Every: <.
87 Copyright © Acronis International GmbH, 2002- 2015 on workdays. F o r more det ails, see the Full and incre mental backups plus clean up example in the Custom backup sche me (p. 69 ) section. "Workdays" s chedule Run the task ever y week on wo rkdays : from Monday through Friday.
88 Copyright © Acronis International GmbH, 2002- 2015 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM . 3. Effective: From: not set . To: not set . Third schedule 1. Every: 1 wee k(s ) on: Sat, S un . 2. Once at: 09:00:0 0 PM . 3. Effective: From: not set .
89 Copyright © Acronis International GmbH, 2002- 2015 1. Months: <All mo nths> . 2. Days: Last . The task w ill run on the last day of every month despite its actual da te. 3. Once at: 10:00:0 0 PM . 4. Effective: From: empty . To: empty . This schedule is widel y used when creating a custom backup scheme.
90 Copyright © Acronis International GmbH, 2002- 2015 Second schedu le 1. Months: March , April , May , September , Octo ber , November . 2. On: <All> <All wo r kdays> . 3. Every: 12 ho urs From: 12:00:00 AM Until: 12:00:0 0 PM . 4. Effective: From: 11/01/20 09 .
91 Copyright © Acronis International GmbH, 2002- 2015 One or more bad blo cks that have suddenly appeared on a hard disk usually indic ate that the hard disk drive will so o n fail. Su ppose that you want to create a ba ckup plan that will back up hard disk data as soon as such a situation o ccurs.
92 Copyright © Acronis International GmbH, 2002- 2015 3. In the Event Pro perties dialog box, view the event's pr operties such as the event source, shown in the Source field ; and the ev ent number, shown in the Event ID field. When you are finish ed, click OK to close the Event Pro perties dialog b o x.
93 Copyright © Acronis International GmbH, 2002- 2015 Second machine : Every day at 09: 00:00 AM Third machine: Ever y day at 09:59:59 AM Example 2 Suppose that you ar e deploying a centraliz ed back.
94 Copyright © Acronis International GmbH, 2002- 2015 task anyway. With t his settin g, the program will auto m atically handle the situa tion when the conditions are not met for too long and further d elay ing the backup is undesirab le.
95 Copyright © Acronis International GmbH, 2002- 2015 (2) If 9:00 PM co mes but the hos t is unavailable at the moment, the backup task will start on the next workday if the l o cation's h o st is available. (3) If the location's h ost will never be available on workdays at 9:00 PM, the task never starts.
96 Copyright © Acronis International GmbH, 2002- 2015 Enables to put a backup task run on hold until all us ers log off from Wind o ws on t he m anaged machine. Example Run the backup task at 8 PM on the first and thi rd Friday of every month, prefer ably when all users are logged off.
97 Copyright © Acronis International GmbH, 2002- 2015 Similarly, you can c opy or move backups fr om a second location to a third location and so on. Up to five consecutive l ocations are supported (including t he primary one).
98 Copyright © Acronis International GmbH, 2002- 2015 Notes: Setting up both c o pying an d mov ing backup s from the same location is n ot possi ble. With simplified naming of backup files (p. 77 ), nei ther replication nor use of rete ntion rules is available.
99 Copyright © Acronis International GmbH, 2002- 2015 As follows from the above d escription, the opera tion will be performed only if the machine with the agent is powered on. If the operation is scheduled, the schedule will use that m achine's da te and time.
100 Copyright © Acronis International GmbH, 2002- 2015 Grandfather-Fath er-Son (GFS) scheme Backups of each t y pe (daily , weekly, and monthly) are retained for the periods you specify in Keep backups , and then del eted. The retention rules ar e applied after creating a backup.
101 Copyright © Acronis International GmbH, 2002- 2015 With these settings, a backup will be stored until it is older than five days and the size o f the archive containin g it exceeds 1 00 GB.
102 Copyright © Acronis International GmbH, 2002- 2015 This mode is not a vailable if you selected the Archi v e size grea ter than rule for a ny archive location except for Acronis Cloud Storage. What you nee d to know about consolidation Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion.
103 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.3 Ex am pl e 3. Re pl ica tin g ba cku ps t o t h e c lou d st or ag e This example assu mes that you have activated (p. 427) a cloud backup sub scr iption (p. 412) for the machine that you a re backing up.
104 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.4 Ex am pl e 4. Mo vi ng ol der b ac ku ps t o tap es Consider the follo wing scenario: You want to perfor m a dail y backup of your machine. You want to st o re the backups locally fo r one w ee k.
105 Copyright © Acronis International GmbH, 2002- 2015 The storage node copies the backups to the tape de vice. No CPU resource fro m the machin es is taken. The lifetime of backup s on the hard disk does no t exceed one mo nth. On the tape library, the monthly backups are kept indefinitely.
106 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Additional settings (p.
107 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p File -level backup snapshot (p.
108 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When the option is enabled, backing up to rem o vable media ma y be not possible if the us er is away, because the pr o gram will wait f or someone to press OK in the prompt box.
109 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 2 A r c h i v e p r o t e c t i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for both disk-level and file-le vel backup.
110 Copyright © Acronis International GmbH, 2002- 2015 For a disk-level backup - disks, volumes, files, and f olders. For a file-level backup - files and folders.
111 Copyright © Acronis International GmbH, 2002- 2015 High – to maximiz e the backup process speed by taking resources from other processes. 4. 7. 4.2 HD D w ri ti ng sp ee d This option is effe ctive for Windows and Linux o perati ng systems and bo o table media.
112 Copyright © Acronis International GmbH, 2002- 2015 The following set tings are available. Automatic With this setting, A cro nis B ackup will act as follows. When backing up to a hard disk or a network s hare: A single backup file w ill be create d if the d estination disk's file system allows the estimated file size.
113 Copyright © Acronis International GmbH, 2002- 2015 compressed files, such as .jpg , .pdf or .mp3. However, formats su ch as .doc or .xls will be compress ed well. To s pec if y the c omp res si on le ve l Select one of the f o llowing: None – the data will b e copied as is, without any compression.
114 Copyright © Acronis International GmbH, 2002- 2015 3. [Optional] Change the default value of the Subje c t field, if necessary. If you back up multip le machines with one centrali zed ba ckup plan and wan t each machine user to receive a separa te DRP e-mail about his/her machin e only: a.
115 Copyright © Acronis International GmbH, 2002- 2015 6. In the SMTP server field , enter the name of the outgo ing mail server (SMTP). 7. In the Port field, set the port of the outgoing m ail serv er.
116 Copyright © Acronis International GmbH, 2002- 2015 If Acronis Cloud Storage is selected a s the primary, the second, or a fu rther backup location, the option value is automatica lly set to Enabled. Number of at tempts: 300 , regardless of th e default va lue.
117 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 10. 2 W in dow s ev en t l og This option is effe ctive only in Windows operating s ystems.
118 Copyright © Acronis International GmbH, 2002- 2015 The snapshot enabl es backing up of all files includin g files o pened f o r exclusive ac cess. The files will be backed up at t he sa m e point in time. Choose t his sett ing only if these factors are critic al, that is, backing up files without a snapshot does n ot make sense.
119 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 1 4 L V M s n a p s h o t t i n g This option is effe ctive only for Linux operating s ystems. This option is effecti v e for both dis k -level and file-level backup of volumes managed by Linu x Logical Volu me Manager (LVM).
120 Copyright © Acronis International GmbH, 2002- 2015 To c ha ng e the d efa ul t s ize o f a s na psh ot lo gic al vo lum e: 1. Decide how much un allo ca te d space you want to use. If you are backin g up two or more logical volumes, base y o ur choice on the size of the biggest of the m .
121 Copyright © Acronis International GmbH, 2002- 2015 If such folder (a par ent folder) is selected f o r backup, and the Mount points option is enabled, all files located on the mo unted v o lume will be in cluded in the backup. If the Mount points o ption is disabled, the m o unt point i n the backup will be empty.
122 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to define the commands t o be aut o matically ex ecute d before and after the backup procedure.
123 Copyright © Acronis International GmbH, 2002- 2015 Perform the backup only after the command is successfully executed. Fail the task if the command execution fails. command is executed despite execution failure or success. the command ex ecution and irrespective of the command execution result.
124 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y pre /p ost da ta ca pt ure c omm an ds 1. Enable pre/post data capture commands exe cutio n by c hecking th e following opt ions: Execute before the da ta capture Execute after the data capture 2.
125 Copyright © Acronis International GmbH, 2002- 2015 4. Depending on the r esult you want to obtain, select the appropriate options as described in the table below.
126 Copyright © Acronis International GmbH, 2002- 2015 level (p. 112) option is set to None ). Use the sector- by -sect o r backup for ba cking up drives with unrecognized or unsup ported file systems and other p roprietary data formats.
127 Copyright © Acronis International GmbH, 2002- 2015 Move a tape back to t he slot after using The preset is: Enabled . If you disable this o ption, a tape will remain in the drive after an operation wi th the tape is completed. If both this option and the Eject tapes after succe s sful backup s option are enabled , t he tape will b e ejected.
128 Copyright © Acronis International GmbH, 2002- 2015 The program will tr y to execute the failed task again if you select the Restart a failed t ask check box and specify the nu mber of attempts and the tim e interval betwe en the attempts.
129 Copyright © Acronis International GmbH, 2002- 2015 Time diagram: Wa i t until c onditions are met Skip the task executio n Delaying a backup m ight be un acceptable, for example, when you need to back up data stric tly at the specified time.
130 Copyright © Acronis International GmbH, 2002- 2015 VSS will use any a v ailable software-based pr ovider. If one is not found, VSS will try to use the Microsoft Softwar e Shadow C o py provider, and Acronis VSS Provider in turn. Software - Acroni s VSS Provider VSS will use Acronis VSS Provider.
131 Copyright © Acronis International GmbH, 2002- 2015 If you use Acronis Ba ckup Agent for Exchange or third -party soft ware for backing up the Exchange Server data. This is because the l o g truncati on will interfere with the c onsecutive transaction log ba ckups.
132 Copyright © Acronis International GmbH, 2002- 2015 5 Re co ve ry When it comes t o data recovery, fir st consider the most func tio nal method : connect the console t o the managed ma c hine runn i ng the operating system and create the recovery task.
133 Copyright © Acronis International GmbH, 2002- 2015 Where to recover This section appears af ter the required backup is selec ted and the type of data t o recover is defined. The para m eters y o u specify here depend on the type of data being recovered.
134 Copyright © Acronis International GmbH, 2002- 2015 5 . 1 . 1 W h a t t o r e c o v e r 1. Specifying the archive loc ation In the Data path field, sp ecify the archive locati on path or click Browse and select the r equired location as described in "Selecting archive locati o n" (p.
135 Copyright © Acronis International GmbH, 2002- 2015 There are probab ly other times when you m ay need to re cover the MBR, but the above ar e the most common. When recovering the MBR of one disk to an o ther Acronis Backup recovers Track 0, which do es not affect the target disk ’s partition table and partiti o n layout.
136 Copyright © Acronis International GmbH, 2002- 2015 Lo ca tio n D etai ls FTP, SFTP If the archive is stored on an FTP or SFT P server, type th e server name or address in t he Path field as follo.
137 Copyright © Acronis International GmbH, 2002- 2015 Select Microsoft Ex change Information Store to brow se and search f o r informa tio n stores, individual storage group s or databases in the databas e-lev el backups.
138 Copyright © Acronis International GmbH, 2002- 2015 On a managed m achine: En able cataloging in the Backup catalogin g option ( Optio ns > Machine option s ). On the managemen t server: Enable cataloging by modifying the Wind o ws regist ry (p.
139 Copyright © Acronis International GmbH, 2002- 2015 Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext.
140 Copyright © Acronis International GmbH, 2002- 2015 virtualization product brand and settings. VMware ES X(i) may have multiple stor ages. A Microsoft Hyper-V ser ver enables creating a new v irtual machine in any local folder.
141 Copyright © Acronis International GmbH, 2002- 2015 The software will ke ep the NT signature of th e target disk if it is the same as the N T signature stored in the backup . (In other w o rds, if you rec o ver the disk t o the same disk that was backed up.
.
143 Copyright © Acronis International GmbH, 2002- 2015 3. Examine the first value in the Sector size (logical/phy sical) line. For example, the output may be the following: Sector size (logical/ physical): 512B/4096B 5. 1. 4.2 S ele ct in g t ar ge t v ol um es Available volume d estinations depend on the agen ts operating on the machin e.
144 Copyright © Acronis International GmbH, 2002- 2015 Recover [Disk #] MBR to: [If the Master Boot Rec ord is selected for recovery] Disk # (p. 144) Choose the disk to re cover the M aste r Boot Record to. NT signature: (p. 140 ) Select the way the disk' s sig nature co ntained in t he MBR will be han dled.
145 Copyright © Acronis International GmbH, 2002- 2015 T yp e A basic MBR disk can contain up to four primary vo lumes o r up to thre e primary volumes and multiple logical driv es. By default, the progra m selects the original volume's type. You can change this setting, if required .
146 Copyright © Acronis International GmbH, 2002- 2015 When recovering basi c MBR and GPT vo lumes, y o u can select the alignment method manuall y if the automatic alignment does not satisfy you for s o me reason. Th e following opti o ns are availab le: Select automati c ally - (Defau lt) recommended.
147 Copyright © Acronis International GmbH, 2002- 2015 If you allow files to be overwritten, you still have an option to pre v ent overwriting o f specific files by excluding them from the recovery operation. Recovery exclu si ons (p. 147 ) Specify files and f o lders you do n o t wish to be re cover ed.
148 Copyright © Acronis International GmbH, 2002- 2015 Use current use r credentia ls The task will run under the credentials with which the user who starts the ta sks is logged on. If the task has t o run on sch edule, you will be asked for the cu rrent user's pas sword on completing the tas k creation.
149 Copyright © Acronis International GmbH, 2002- 2015 Limitations Transferring a Linu x system between UEFI and BIOS is n o t supported. Transferring a Win do ws sys te m between UEFI and BIOS is no.
150 Copyright © Acronis International GmbH, 2002- 2015 Or ig i nal s yst em Ta rg et ha rdwa re BI OS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: convertible Solution Recover the operating system to an MBR disk or to an un initialized disk.
151 Copyright © Acronis International GmbH, 2002- 2015 The following table su mmarizes all cases of re covering disks of a BIOS-based syst em to UEFI-based and vice versa. Green background means that the system will b e bootable. No user action is required.
152 Copyright © Acronis International GmbH, 2002- 2015 5. 3 Ac ro ni s A cti ve Re sto re Active Restore is the Acronis proprietary techn ology that brings a system o r a da tabase online immediately after its recovery is started. This section describes the use of Active Restore during an operating system re covery .
153 Copyright © Acronis International GmbH, 2002- 2015 If you opt for Acr o nis Activ e Restore, th e system will be operational in a short ti me. Users will be able to open the nece ssary files from the storag e and use them while th e rest of the files, which are not immediatel y necessary, are being re covered in the backgroun d.
154 Copyright © Acronis International GmbH, 2002- 2015 Why a recovered operating system may be unboo table The machine B IOS is config ured to boot from another HDD. Solution : Configure the BIOS to boot from the H D D where the op erating system resides.
155 Copyright © Acronis International GmbH, 2002- 2015 Such system canno t boot b ecause its kernel tries to m o unt the root file system at the LVM volume. Solution : Change the loader configuration and /etc / fstab so that the LVM is not used and reactivate the b oot loader.
156 Copyright © Acronis International GmbH, 2002- 2015 or chroot /mnt/system/ / usr/sbin/grub 9. Specify the disk on which GRUB is l ocated — typically, the boot or ro o t partition: root (hd0,0) 10. Install GRUB. For example, to inst all GRUB in the master bo o t record ( MBR) of th e first disk, run the following com m and: setup (hd0) 11.
157 Copyright © Acronis International GmbH, 2002- 2015 Once you confir m the operation, Acr onis Backup will r e -deploy the factory imag e located in Acronis Secure Zone. This will r ecover the original v o lume layout, the pre -installed Wind ows operating system, and any original third-p arty applications.
158 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk re co ver y Fi le re cov ery (a ls o f ro m.
159 Copyright © Acronis International GmbH, 2002- 2015 The preset is Enab led . This option defin es whether to re cover th e files’ date an d tim e from the ar chive or assign the files the current date and time. Validate backups before recov ery The preset is Disa bled .
160 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to receive e-mail notifications about the recovery task's s uccessful completion, failure o r when user interaction is required. The preset is: Disab l ed . To c onf ig ur e e -ma il no ti fic at io n 1.
161 Copyright © Acronis International GmbH, 2002- 2015 9. Click Send test e-ma il message to check whether e -mail no tifications w o rk correct ly with the specified settings. 5 . 6 . 3 E r r o r h a n d l i n g These options ar e effective fo r Windows and Linux operating systems and b ootable media.
162 Copyright © Acronis International GmbH, 2002- 2015 Send SNMP no tifi cations in div idually for r ecovery op eration events – to send th e events of t he recovery operati o ns to the specifi ed SNMP managers. Types of events to s end – ch o ose the types o f events to be sent: All events , Errors and warnings , or Errors o nly .
163 Copyright © Acronis International GmbH, 2002- 2015 5 . 6 . 6 M o u nt p o i n t s This option is effe ctive only in Windows for reco v ering data fr om a file -level back up. Enable the Mount po i nts option to r ecover files and folders that were stored on the mounted volumes and w ere backed up w ith the enabled Moun t points option.
164 Copyright © Acronis International GmbH, 2002- 2015 5. Click Test command t o check if th e command is correct. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails* Selected Cl.
165 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y the r eco ver y pro ces s p ri ori ty Select one of the f o llowing: Low – to minimize r esources taken by the r ecovery pro.
166 Copyright © Acronis International GmbH, 2002- 2015 6 C onv er si on to a vir tu al ma ch in e Acronis Backup o ffers a nu m ber of ways o f convertin g a disk backup into a virtual m achine. This section helps you c hoose t he method that best fits you r needs and provides step- by -step instructions for conversion.
167 Copyright © Acronis International GmbH, 2002- 2015 During conversion which is part of a backup plan (p. 168 ), the s o ftware creat es the virtual machine in addition to creating the backup. The virtual machine has the sa m e configu ratio n as the original machine.
168 Copyright © Acronis International GmbH, 2002- 2015 Conversion of logical volumes to basic ones may als o prevent the system fro m booting up. For these reason s, if t he m achine uses a custom boot lo ader, you might need to configure the loader to point to the ne w devices and reactivate it.
169 Copyright © Acronis International GmbH, 2002- 2015 Storage Choose the storage o n the virtuali zation server or the folder to pla ce the virtual machine files in. Resultant VMs Specify the na m e of the vir tual machine. The default n am e is Backup_of_[Machin e Name] .
170 Copyright © Acronis International GmbH, 2002- 2015 You can choose the v irtual machine type: VMware W orkstation, Micro so ft Virtual PC, Red Hat Kernel-based Virtual Machine (KVM) or Red Hat Enterprise Virtualization (RHEV). In the Storage step, yo u ca n select the virtual machine path.
171 Copyright © Acronis International GmbH, 2002- 2015 If you choose to creat e the virtual machine on a virtu alization server The first conversi o n creates a new v irtual mach ine.
172 Copyright © Acronis International GmbH, 2002- 2015 6. 2. 3.1 S tep s to pe rf or m To p er for m a r eco ve ry to a ne w v ir tu al mac hi ne 1. Connect the cons o le to the manage ment server, to a machine where an agent is installed, or to a machine booted fr om a bootable media.
173 Copyright © Acronis International GmbH, 2002- 2015 deployed immedia te ly after you cli ck OK . Recovery wil l be performed by that age nt. It will take a license. 3. Click OK to return t o the Recover da ta page. To s el ect t he vir tu al ma chi ne ty pe 1.
174 Copyright © Acronis International GmbH, 2002- 2015 Enter the name f o r the new vir tual machine. If the backup w as created by Agent for VMware or Agent for Hyper-V, the software takes t he name from the virtual machine c o nfigu ratio n contained in the backup.
175 Copyright © Acronis International GmbH, 2002- 2015 6 . 3 . 2 S t ep s t o pe r f o r m To p er for m a r eco ve ry to a ma nu all y c re at ed vir tu al ma ch ine 1. [Optional] When rec overing Windows, prepare Wind ows drivers that correspond to the target virtualization platfor m .
176 Copyright © Acronis International GmbH, 2002- 2015 7 St or in g the b ac ke d u p da ta 7. 1 Va ul ts A vault is a locati o n for stor ing backup archives. For ease of use an d administration, a vault is associated with the archives' metadata.
177 Copyright © Acronis International GmbH, 2002- 2015 'Vaults' view Vaults (on the naviga tion pane) - top item of the vaul ts tree. Click this ite m to display cen tralized and personal vaults. To perform actions on any vau lt, use the toolbar that is loca ted at the top of the Vaults view.
178 Copyright © Acronis International GmbH, 2002- 2015 What doe s the icon mean? When browsing archi ves on the Archive view tab, y ou may encounter a backup with the icon.
179 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Ma nag ed v aul ts U nman ag ed vau lt s SAN, NAS Yes Yes FTP/SFTP server No Yes 7. 1. 2.1 A ct io ns o n cen tra liz ed va ul ts To a cc ess ac ti ons 1. Connect the cons o le to the manage ment server.
180 Copyright © Acronis International GmbH, 2002- 2015 To Do in the Attachin g a managed vault (p. 185 ) section. Note . Tape-based vaults cannot be attached. Validate a vault 1. Select the vault. 2. Click Validate . You will be taken to the Validat ion (p.
181 Copyright © Acronis International GmbH, 2002- 2015 [Optional] Select whether to pr o tect the vaul t with encryption. Anything w ritten to the vault will be encrypted and anything read from it will be decrypted transparently by t he storage node, using a vault-sp ecific encryption key stored o n the storage n ode.
182 Copyright © Acronis International GmbH, 2002- 2015 Compression [Optional] Select whether to co m press the dedupli cation data stores. This setting is available only if the backward compatibility is turned o n and dedu plication is enabled. User accounts Vault administra tors (p.
183 Copyright © Acronis International GmbH, 2002- 2015 stored on the node. If the storage medium is stolen o r accessed by an unauthorized person, the malefactor will n o t be able to de cry pt the vault contents without acces s to the storage node.
184 Copyright © Acronis International GmbH, 2002- 2015 You will be pro m pted to specify the domain account credentials, when you enter a user or group name that cannot b e checked using your domain a ccount; for example, if you ar e logged on using a domain account o ther than the domain name you have entere d t o check.
185 Copyright © Acronis International GmbH, 2002- 2015 Va ul t p at h To s pec if y the pa th wh er e t he u nma na ged v aul t will b e c re at ed 1. Enter the full path to the folder in the Path field or sel ect t he desir ed fo lder in th e folders tree.
186 Copyright © Acronis International GmbH, 2002- 2015 If the vault is dedu plicating, we recommend that you move the deduplication da tabase from the old storage node t o the new one. Otherwise, the software will automaticall y re -create the deduplication database, which m ay take a lo ng time to perform.
187 Copyright © Acronis International GmbH, 2002- 2015 7 . 1 . 3 P e r s o n a l v a ul t s A vault is called per so nal if it w as created usi ng direct co nnection of the console to a managed machine. Personal vaults are specific for each manage d machine.
188 Copyright © Acronis International GmbH, 2002- 2015 To Do for accessing a vault In the appearing d ialog box, provide the credentia ls required for accessing t he vault.
189 Copyright © Acronis International GmbH, 2002- 2015 3. Create a new vaul t. 4. Edit the backup plan s and t asks: redirect their d estination to the new vaul t. 5. Delete the old vault. How can I merge two vaults? Suppose you have two vaults A and B in use.
190 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y a n ew ca che f old er in L inu x: Add the following element inside the Confi g uratio n tag in /etc/Acronis / MMS.
191 Copyright © Acronis International GmbH, 2002- 2015 Offers a cost-effecti ve and han dy method for protecting data fro m software malf unction, virus attack, operat or error. Since it is internal archi ve storage, it eliminates th e need for a separate media o r n et work connection to back up or recover the data.
192 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 1.2 A cr on is S ecu re Z on e S iz e Enter the Acronis Secur e Zone size or drag the slider to select any size between the mini mum and the maximum ones. Th e minimum size is approxima tely 50MB, depending on the g eometry of the hard disk.
193 Copyright © Acronis International GmbH, 2002- 2015 As is apparent fro m the abov e, setting the maximum possible zone size is n ot advisable. You will end up with no free space o n an y volume which m ight cau se the o perating sy stem or applications to w o rk unstably and even fail to start.
194 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 2.3 D ele ti ng A cro ni s Sec ur e Z one To d ele te Ac ro nis S ecu re Zo ne : 1. On the Manage Acronis Secure Zon e page, click Delete . 2. In the Delete Acroni s Secure Zon e window, select volumes to which you want to add the spac e freed from the z o ne and th en click OK .
195 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Fi xe d d riv e Re mov abl e m edi a You can set the option t o clean up the arch ive " When there is insufficient space w hile backing up " within th e Custom (p. 69 ) backup scheme.
196 Copyright © Acronis International GmbH, 2002- 2015 device with several dr ives is attach ed to a storage node, multiple machines can simultaneously back up to tapes.
197 Copyright © Acronis International GmbH, 2002- 2015 3. Add the registry k ey descri bed below. Specify the new location path in th e registry value ArsmDmlDbProto c ol . Registry key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nisARSM Settings Registry value: ArsmD mlDbProtocol Possible data values: Any strin g 0 to 32765 characters long.
198 Copyright © Acronis International GmbH, 2002- 2015 Custom scheme Set up the custo m scheme so that it creat es full backu ps with a reasonable frequ ency. Otherwise, if you specify retention rules, the software will no t be able to overwrite tapes as ap propriate.
199 Copyright © Acronis International GmbH, 2002- 2015 12. Barcode printers are not sup po rted. 7. 4. 2.7 Re ad ab il it y o f ta pes wr it te n by th e old er A cro ni s pro du ct s The following table su mmarizes the readability o f tapes writt en by Acronis True Image Echo, Acronis True Image 9.
200 Copyright © Acronis International GmbH, 2002- 2015 4. Click Detect tape de vic es . 5. If your tape devic e is a stan d -alone drive, skip this step. Otherwi se, do the followi ng: a. Click Inventory to det ect the load ed tapes. Select the Full invent orying method.
201 Copyright © Acronis International GmbH, 2002- 2015 Tapes sent to the Imported t apes pool contain backups written by Acronis software. Be fore moving such tapes to the Free tapes pool, make sure yo u do not need these bac kups. c. Decide whether y ou want t o back up to th e default Acronis pool (p.
202 Copyright © Acronis International GmbH, 2002- 2015 8. If any of the required tapes are not loaded for s ome reason, the software will show you a message with the identifier of the needed tape. L o ad th e tape, and click Retry to co ntinue the recovery.
203 Copyright © Acronis International GmbH, 2002- 2015 9. Select the Unrecogn ized tapes pool. 10. Select the tapes to be resc anned. To select all the tapes of the pool, select the check box next to the Tape name colu mn header.
204 Copyright © Acronis International GmbH, 2002- 2015 7 . 4 . 4 T a p e m an a ge m e n t 7. 4. 4.1 D ete ct in g tap e dev ic es When detecting tap e devices, Acronis Backup fin ds tape devices attached t o the machin e and places information about them in the tape management dat abase.
205 Copyright © Acronis International GmbH, 2002- 2015 backups from diff erent dep artments of your company backups from diff erent machines backups of syste m volumes and users' data filled tapes from tap es being written to (p.
206 Copyright © Acronis International GmbH, 2002- 2015 To e dit a po ol : 1. In the Navigation tr ee , clic k Tape managemen t . If con nected to the manag ement ser v er, select the storage node to which your tape device is a tt ached. 2. Select the required pool, and then click Settings .
207 Copyright © Acronis International GmbH, 2002- 2015 You cannot mo ve write-protected and o nce-recorded WORM (Write-Once-Read- Many) tapes to the Free tapes po o l. Cleaning tapes are alw ays displayed in the Unrecogni z ed tapes pool; y o u cannot mo ve them to any other pool.
208 Copyright © Acronis International GmbH, 2002- 2015 After a tape is eje cte d eith er manually o r automatically (p. 126 ), it is recom mended to write its name on the tape. Er as ing Erasing a tape physicall y deletes all backups stor ed on the tape and rem o ves the in fo rmation about these backups fr o m the dat abase.
209 Copyright © Acronis International GmbH, 2002- 2015 Note During the in ventorying, do not select th e Move newly detected tapes from the 'Unrecognized tapes' or 'Imported tapes ' pools to the 'Free tapes ' pool check box.
210 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup reads tags written by Acronis softwar e and analyzes other infor mation about the contents of the lo aded tapes. Select this method to recognize empty tapes and t apes written by Acronis software on an y tape device and any m achine.
211 Copyright © Acronis International GmbH, 2002- 2015 4. [Optional] Select the Move newly de tected tape s from the 'Un r ecogni z ed tapes' o r 'Imported tapes' poo ls to the 'Free tap es' pool check box.
212 Copyright © Acronis International GmbH, 2002- 2015 Personal tape-based vaults Before backing up a m achine to a dire ctly attached tape device, yo u can cr eate a personal vault. If you do not want to , the software will automatically create a personal vault associated with the Acronis pool.
213 Copyright © Acronis International GmbH, 2002- 2015 2. Perform the fast in v entorying (p. 20 9 ) with the Move newly detected tapes fro m the 'Unrecognized ta pes' or 'Imported tapes' po ols to the 'Free tapes' pool check box selected.
214 Copyright © Acronis International GmbH, 2002- 2015 In Tape poo l , select the pool wh ere yo u will back up to (the Acronis pool or the n ew ly created one). 7. When creating a c entralized backup plan (p. 354): In Items to back up , s elect the machines you want to back up.
215 Copyright © Acronis International GmbH, 2002- 2015 7. After each backup is created and the tapes with it are ejected, send them t o a secure off-site storage. If you d o not have enoug h free tapes to continu e backups, load ne w tapes and perform steps 2 and 4.
216 Copyright © Acronis International GmbH, 2002- 2015 Result The machine will b e backed up t o tapes acc o rding to the s pecified backup scheme. Tapes with full backups will be sent to a secure off-site storage. 7. 5 St or ag e no des The following secti o ns desc ribe how to use Acronis Backup Sto rage Nod e.
217 Copyright © Acronis International GmbH, 2002- 2015 Deduplication A managed vault can be configured as a deduplicating vault. This means that ide ntical data will be backed up to this vaul t only once to minimize net work usage during backup and to minimize storage space taken by the archives.
218 Copyright © Acronis International GmbH, 2002- 2015 b. Select the storag e node, then click Create vault . The Create centralized vault page will be opened with the pr e-selected storage node. P erform th e remaining steps to create the vault as described in "Creatin g a managed centralized vault" (p.
219 Copyright © Acronis International GmbH, 2002- 2015 Additional right of machine administrators A vault user who is a member of the Administrat ors group on a machine can v iew and man age any archives created f rom that machine in a managed vault — regardless of the type of that user's account on the storage n o de.
220 Copyright © Acronis International GmbH, 2002- 2015 To Do storage node. Perform the r emaining steps to create th e vault. View details of the storage node 1.
221 Copyright © Acronis International GmbH, 2002- 2015 7. 5. 6.3 S tor ag e no de pr ope rt ie s The Storage node properties window accumulates in fo ur tabs all infor mation on the select ed Acronis Backup St o rage No de. This information is also duplicated on the Information panel.
222 Copyright © Acronis International GmbH, 2002- 2015 Vaults This tab displays a lis t of vaults managed by the select ed storage node. To update the list of vaults with the most rec ent information from the manag ement server, click Refresh .
223 Copyright © Acronis International GmbH, 2002- 2015 The size of the del et ed dat a is 20 GB, and the size of the re m aining data is 80 GB. The ratio of the deleted to remain ing data is thus 2 0 GB / 80 GB = 0.25, or 25 percen t. The storage node calculat es the relative size of the remaining data as 1 0 0 percent – 25 percent = 75 percent.
224 Copyright © Acronis International GmbH, 2002- 2015 See also the Fast Ope ration Connection Limi t parameter. Backup Queue Li mi t Description: Specifi es the maxi mum number of agents in the s to rage n o de's backup qu eue.
225 Copyright © Acronis International GmbH, 2002- 2015 A vault database contain s in fo rmation about archives and backups stored in the vault. When you create or attach a vault, the storage node places the database for that vault t o the folder determined by this pa rameter.
226 Copyright © Acronis International GmbH, 2002- 2015 When the amount o f free s pace in a vault is equal to t he value in Vault Free Space Wa r ning Lim it or less, a warning is recorded in the storage node's log, indicating the vau lt in question.
227 Copyright © Acronis International GmbH, 2002- 2015 The database is s tored on th e storage node in a local f older whose name is specif ied by the by the Vault Metad ata Data base Path parameter.
228 Copyright © Acronis International GmbH, 2002- 2015 of RAM, but leav e at least 2 GB of RAM for the operating system and o ther appli cations. You can change this beha v ior by usin g the DatastoreInd exCacheM emoryPercent and Da tastoreIndexRese rvedMemory parameters.
229 Copyright © Acronis International GmbH, 2002- 2015 The deduplication is per formed on data blocks. Th e block size is 4 KB for disk-lev el backups an d 1 B to 256 KB for file-le vel backups . Each file that is less than 256 KB is consider ed a data block.
230 Copyright © Acronis International GmbH, 2002- 2015 Deduplication at targe t After a backup t o a deduplicating v ault is c ompleted, the storage node run s the indexing activi ty. This activity deduplicat es the data in the vault as f o llows: 1.
231 Copyright © Acronis International GmbH, 2002- 2015 Compacting After one or m o re backups o r archives ha v e been d eleted from the vault — either manually or durin g cleanup — the data store may contain blocks which ar e no longer referred to fr om any archive.
232 Copyright © Acronis International GmbH, 2002- 2015 Place the deduplicatio n database and dedup licating vault on separat e physical devices To increase the speed of access to a deduplicati on database, the database and t he vault m ust be located on separat e physic al devices.
233 Copyright © Acronis International GmbH, 2002- 2015 64 -bit operating system The storage node must be in stalled in a 64 -bit oper ating system. The machine w ith the s to rage node should not run.
234 Copyright © Acronis International GmbH, 2002- 2015 Disk-level backup Deduplication of disk bl ocks is not performed if the volume's allocation unit size — also known as cluster size or bloc k size — is not divisib le by 4 KB. Tip: The allocation unit size on most NTFS a nd ext3 volum es is 4 KB.
235 Copyright © Acronis International GmbH, 2002- 2015 This method requires stopping the Acronis St orage Node Service. Both methods use th e same principle: if the s to rage n o de does not find the database, it creates th e database from scra tch. This process length depends on the datastore size and dis k I/O speed.
236 Copyright © Acronis International GmbH, 2002- 2015 Deduplication database and datastore are in the same folder 1. Detach the managed v ault. 2. Move the old dedup lication datab ase files to an other folder. 3. Attach the manag ed vault. When att aching, specify the same pa ths, including the same de duplication database pat h.
237 Copyright © Acronis International GmbH, 2002- 2015 8 O pe rat io ns wi th a rch iv es an d bac ku ps 8. 1 Va li da tin g a rc hiv es a nd ba cku ps Validation is an oper ation that checks the pos sibility of data recovery fr om a backu p. Validation of a fil e backup imitat es recovery o f all files from the backup to a dummy destination.
238 Copyright © Acronis International GmbH, 2002- 2015 Credentials (p. 23 9 ) [Optional] Provide cr edentials for accessing the so urce if the task acc o unt does no t have enough privileges t o access it. When to validate Start validation (p. 2 4 0) Specify when and h ow often to perform validati on.
239 Copyright © Acronis International GmbH, 2002- 2015 To select a centraliz ed vault (either managed or unmanaged), expand the Centralized group and click the vault.
240 Copyright © Acronis International GmbH, 2002- 2015 According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that the user name and p assword can be intercepte d by an eavesdropper using a p acket sniffer.
241 Copyright © Acronis International GmbH, 2002- 2015 8. 2 E x por tin g arc hiv es a nd ba cku ps The export operati on creates a copy of an archi v e or a self-sufficient part copy of an archive in the location you specify. The original archive remains untouched.
242 Copyright © Acronis International GmbH, 2002- 2015 The exported archi ve inherits the o ptions of the original arch ive, including e ncryption and th e password. When exporting a password-protected arch ive, you are prompted for t he password. If the original archive is encrypted, the password is used to encrypt the resulting archive.
243 Copyright © Acronis International GmbH, 2002- 2015 Select the type of objects t o export: Archive - in this case, you need to specify the archi ve only. Backups - you need to specify the archive first, and t hen selec t the desir ed backup(s) in this archive.
244 Copyright © Acronis International GmbH, 2002- 2015 8 . 2 . 3 A c c e s s c r e d e n t i a l s f o r s o u r c e Specify credentials r equired for access to the location where the source archive, or t he backup is stored. To s pec if y cre de nti als 1.
245 Copyright © Acronis International GmbH, 2002- 2015 After entering acc ess crede ntials, the folders on the se rv er become availab le. Click the appropriate folder o n the server. You can access th e server a s an anonymous user if the server enables such access.
246 Copyright © Acronis International GmbH, 2002- 2015 The software will acc ess the destination using th e cred entials you specify. Use this option if the task account d o es not have access per missions to the destinati on. Specify: User name .
247 Copyright © Acronis International GmbH, 2002- 2015 Select volumes t o mount an d configure the m ount setting s fo r every v olume: assig n a letter or enter the mount po int, choos e the read/writ e or read only access mode. When you complet e all the required steps, clic k OK to mount the vo lumes.
248 Copyright © Acronis International GmbH, 2002- 2015 Specify: User name . When en tering the name of an Active D irectory user account, be sure to also specify the domain name (DOMAINUsername or Usern am e@domain ). Password . The passw ord for the account.
249 Copyright © Acronis International GmbH, 2002- 2015 8. 4 O per ati on s ava ila bl e i n va ult s By using vaults, y ou can easil y access archi ves and backup s and perform archive manage ment operations. To p er for m ope ra tio ns wit h ar ch ives a nd ba ck ups 1.
250 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 2 O p e r a t i o n s wi t h b a c k u p s To p er for m any op er at ion wi th a bac ku p 1. In the Navigation pane, select the vault that c o ntains archives. 2. On the Archive v iew tab of the v ault, select the archive.
251 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 3 C o n v e r t i n g a b a c k u p t o f u l l When the chain o f incremen tal backups in an archive becomes lo ng, con v ersion of an incr emental backup to a full one increases the reliability of your archive.
25 2 Copyright © Acronis International GmbH, 2002- 2015 Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion. The resulting backup w ill not contain da ta that was present in the deleted backup and was absent from the retained incremental or differential ba ckup.
253 Copyright © Acronis International GmbH, 2002- 2015 9 B oot ab le me dia Bootable media Bootable media is physical media (CD, DVD, USB flash drive or other re m ovable media supp orted by a machin.
254 Copyright © Acronis International GmbH, 2002- 2015 Bootable media based on WinPE versi o ns earlier than 4.0 cannot boot on machi nes that use Unified Extensible Fir mware Interface (UEFI).
255 Copyright © Acronis International GmbH, 2002- 2015 If you set, say, 10 s ec. for the bo o table agent, the age nt will launch 10 seconds after the menu is displayed. This enables unattended onsi te operation when booting from a PXE server or WDS/RIS.
256 Copyright © Acronis International GmbH, 2002- 2015 Prompts for the video mode t o be used by the b ootable media's graphical user interface. Without the vga param eter, the video mode is de te cted auto matically. vga= mode_number Specifies the vid eo mode t o be used by t he bootable m edia's graphical us er interface.
257 Copyright © Acronis International GmbH, 2002- 2015 Uses PCI BIOS calls t o get the interru pt routing table. You m ay want t o use this p arameter if the kernel is unable t o allocate interrupt requests (IRQs) or di scover secondary PCI buses o n the motherboard.
258 Copyright © Acronis International GmbH, 2002- 2015 9. 1. 1.3 Ne tw or k por t While creating bo o table media, y o u have an option to pre-configure the network port that the bootable agent listens for incoming connecti on.
259 Copyright © Acronis International GmbH, 2002- 2015 http://www.micr o soft.co m/downloads/details.aspx?f am ilyid=696D D665 -9F76-4177-A811-39C 26 D3B3B34&displa y lang=en Automated Installa tion Kit (AIK) Supplement for Windows 7 S P 1 (PE 3.
260 Copyright © Acronis International GmbH, 2002- 2015 [Optional] To creat e a 64 -bit bootable media, select the Create x6 4 media check box, if available. A 64-bit m edia is required to boot a machin e that uses Unified Extensible Firmware Interface (UEFI).
261 Copyright © Acronis International GmbH, 2002- 2015 Configuring network settings To change the net wo rk sett ings for a current session, click Configure ne twork in the startup window. The Network Se tti ngs window that appe ars will allow you to configu re network settings for ea ch network interface card (NIC) of the machine.
262 Copyright © Acronis International GmbH, 2002- 2015 3. Backups created using bootable media ha v e simplified file names (p. 77 ). Standard names are assigned to the backup s only if these are added to an existing archive with stan dard file naming, or if the destination does not support simplified fil e names.
263 Copyright © Acronis International GmbH, 2002- 2015 2. Click Configure i SCSI/NDAS d ev ices (in a Linux-based media) or Run the iSCSI Setu p (in a PE -based m edia). 3. Specify the IP add ress and port of the iSCSI de vice's host, and the name of the iSCSI in itiato r.
264 Copyright © Acronis International GmbH, 2002- 2015 e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udev.
265 Copyright © Acronis International GmbH, 2002- 2015 Unless you use the GRUB boot loader and it is install ed in the Master Boot Re co rd (MBR), Acr onis Startup Recover y Manager activ ation overwri tes the MBR with its own boot c o de. Thus, yo u may need to reactivate third-party boot loaders if they are installed.
266 Copyright © Acronis International GmbH, 2002- 2015 Acronis PXE Server run s as a service immediat ely after installation. Later on it will automatically launch at each sys tem restart. You can stop and start Acronis PXE Server in th e same way as other Windows services.
267 Copyright © Acronis International GmbH, 2002- 2015 10 D isk m an ag eme nt Acronis Disk Direc tor Lite is a t o ol for preparin g a machine disk/volume configuration f o r recovering the volume images saved by the Acronis Backup software.
268 Copyright © Acronis International GmbH, 2002- 2015 1. Back up the disk o n which v olumes will be created or managed. Ha v ing your m ost important data backed up to another hard disk, network share o r rem o vable media will allow you to work on disk volumes being r eassured that your data is safe.
269 Copyright © Acronis International GmbH, 2002- 2015 10 .5 "D is k m an age men t" vi ew Acronis Disk Direc tor Lite is contr o lled through th e Disk mana g ement view of t he console. The top part of the v iew co ntains a disks and volumes table enabli ng data sorting and colu mns customization and t oolbar.
270 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 6 . 1 D i s k i ni t i a l i z at i o n If you add any n ew disk to your m achine, Acr onis Disk Director Lite will n otice the configuration change and scan the added disk to include it t o the dis k and volume list.
271 Copyright © Acronis International GmbH, 2002- 2015 10 .6 .2 .1 Se lec ti ng s ou rc e a nd ta rg et di sk s The program displa ys a list of partitioned disks and asks the user to select t he source disk, from which data will be transferred to another disk.
272 Copyright © Acronis International GmbH, 2002- 2015 You have the follo wing two alternatives to retain sy stem b o otability on th e targe t disk volu m e: 1. Copy NT signature – to provide the t arget disk with the source disk NT signatur e matched with the Registry keys als o copied on the target disk.
273 Copyright © Acronis International GmbH, 2002- 2015 Dynamic disk conversi on: MBR to GPT Acronis Disk Direc tor Lite does n o t support direct MBR to GPT conversi on for dynamic disk s. Howev er you can perfor m the followin g conversions to reach the g oal using the pr o gram: 1.
274 Copyright © Acronis International GmbH, 2002- 2015 System disk conversio n Acronis Disk Direc tor Lite does n o t require an o peratin g system reboot after basic to dynamic conversion of the dis k, if: 1. There is a single Windows 2008 / Vista operatin g system installed on the dis k.
275 Copyright © Acronis International GmbH, 2002- 2015 safe conversion of a dynamic disk to basic when it contains volumes with data for simple and mirrored volu mes in multiboot syste ms, bootability of a system that was offline during the operation 1 0 .
276 Copyright © Acronis International GmbH, 2002- 2015 Store backups (image s) of other volumes/disks o n a special volum e; Install a new operating system (or swap file) o n a new volu m e; Add new hardwar e to a machine. In Acronis Disk Dire cto r Lite the to o l for creating vo lumes is the Create volume Wiz ard .
277 Copyright © Acronis International GmbH, 2002- 2015 and is able to o v ercome the physical dis k size limitations wi th a higher than mirrored disk- to -volume size ratio.
278 Copyright © Acronis International GmbH, 2002- 2015 To create a RAID- 5 volume : Select three destinati on disks to create the v o lume o n. After you choose the disks, the wizard will calcula.
279 Copyright © Acronis International GmbH, 2002- 2015 If you are creating a ba sic volume, which can be made into a system volu me, this page will be different, giving you the opportunity to select the volume Type — Primary ( Active Primar y ) or Logical .
280 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 7 . 3 S e t a c t i v e v ol u m e If you have several pri mary volumes, you m ust specif y one to be the b oot volume.
281 Copyright © Acronis International GmbH, 2002- 2015 an application v o lume, DAT A — a data volum e, etc., b ut it does not imply that only the type of data stated with the label could be stored on such a v o lume. In Windows, volu me labels are shown in the Explorer disk and folder tree: LABEL 1 (C:), LABEL2( D: ), LABEL3(E:), etc.
282 Copyright © Acronis International GmbH, 2002- 2015 10 .8 Pe ndi ng op er ati ons All operations, which were prepared by the user in manual mode or with the aid of a wizard , are considered pendin g until the user issues the specifi c command for the change s to be made permanent.
283 Copyright © Acronis International GmbH, 2002- 2015 11 Pr ot ec ti ng ap pli ca ti on s wit h dis k- le vel b ack up This section describes how to use a disk-level backup to protect applications runn ing on Windows servers.
284 Copyright © Acronis International GmbH, 2002- 2015 If the application databa ses are located on a nu mber of machines, back up all o f the machines on the same schedule. F o r exampl e, include all of the SQL ser vers belonging to a Shar ePo int farm in a centralized backup plan running on a fixed schedule.
285 Copyright © Acronis International GmbH, 2002- 2015 option is effecti v e on a phy sical m achine and on a virtual machine wher e Agent for Windows is installed. Other available s olutions inclu de: 1. Truncating the logs manually or by using a scrip t.
286 Copyright © Acronis International GmbH, 2002- 2015 Create Table ##temp ( Da tabaseName sysname, Na me sysname, ph ysical_name nvarchar(500), si ze decimal (18,2), Fr eeSpace decimal (18,2) ) Exec.
287 Copyright © Acronis International GmbH, 2002- 2015 Tracks how far Exchan ge has progressed in writing log ged information to the dat abase file. To find out the dat abase file and log fil e paths, proceed as foll o ws.
288 Copyright © Acronis International GmbH, 2002- 2015 11 .1 .1 .4 Sh ar eP oin t da tab as e f il es SharePoint store s content, auxiliary SharePoint se rvices' data and farm configuration in Mi crosoft SQL Server databases. To f ind d ata ba se fi les i n S ha reP oi nt 20 10 or l ate r 1.
289 Copyright © Acronis International GmbH, 2002- 2015 Log file shrinking . L o g file s hrinking reduces the physical size of a l og file by removing the inac tive virtual log files. Shrin king is most effec tive after log truncation. For more inf o rmation abou t shrinking refer to the foll o wing article: http://technet.
290 Copyright © Acronis International GmbH, 2002- 2015 Where: myServer - name o f the server instanceN a me - name of the instan ce C: mySc r ipt.
291 Copyright © Acronis International GmbH, 2002- 2015 1. Dismount the da tabase (in Exchan ge 2010) or all databases of t he storage gr oup (in Exchange 2003/2007). F o r more inf o rmation, se e: Exchange 2010 : http://tech net.m icrosoft.c om/en-us/library/bb123903 Exchange 2007 : http://tech net.
292 Copyright © Acronis International GmbH, 2002- 2015 2. In the mounted v olumes, deter m ine which logs have been committed to the database by using the Eseutil tool. The procedure is described in step 1 of "Log truncation of online databases " above.
293 Copyright © Acronis International GmbH, 2002- 2015 The volumes where t he Active D irectory databas e and the transaction logs (p. 287) are l ocated The volume with the SYSVOL folder. The default location of this folder is %Syste mR oot%SYSVOL .
294 Copyright © Acronis International GmbH, 2002- 2015 To bring a backed-up datab ase back to production, rec over the database files from a dis k backup.
295 Copyright © Acronis International GmbH, 2002- 2015 b. Select the volume( s) contain ing the SQL Server database files. F o r the instruc tio ns on h ow to find out the databas e paths, refer to "SQL Server data base files" (p. 285). c. Choose the Read/ write access mod e.
296 Copyright © Acronis International GmbH, 2002- 2015 By using Acronis Bac kup, you can recover Exchan ge database files from a disk backup. To bring a database online, mount it. For details, see "Mounting Exchange Server databases " (p. 296).
297 Copyright © Acronis International GmbH, 2002- 2015 1 1 . 3 . 3 G r a n u l a r r e c o v er y o f m ai l bo x e s RDB (RSG) is a spe cial administrative database (s to rage group) in Exchange Server. It lets y o u extract data from the m o unted ma ilbox database.
298 Copyright © Acronis International GmbH, 2002- 2015 Steps to perform If the domain has other domain controllers, y o u can perfor m nonauthori tative restore of a lost domain controller in either of these ways: Recover a domain controller from a backup by using a bootable media.
299 Copyright © Acronis International GmbH, 2002- 2015 Changes to Active D irectory that o ccurred af te r the b ackup had been made will be los t. Re -creation of the d omain controller is not an option. Even a backup with an expired tombstone lifeti me can be used.
300 Copyright © Acronis International GmbH, 2002- 2015 d. On the General tab, clic k Start . After the service s tarts, click OK . Details. This change is needed because the Acronis agent ser vice on a domain controller run s under a domain user account, but domain us er accoun ts are unavailable in Directory Services Restore Mode.
301 Copyright © Acronis International GmbH, 2002- 2015 A USN rollback is unli ke ly to o ccur when you r ecover an entire domain c ontroller from a VSS-base d disk-level backup.
302 Copyright © Acronis International GmbH, 2002- 2015 Value name: Data base restored from backup Value data: 1 6. Restart the do main controller in normal mode. 7. [Optional] After the domain controller restarts, open Event Viewer, expand Application an d Services Logs , and then select the Directory Serv ices log.
303 Copyright © Acronis International GmbH, 2002- 2015 3. If you have reco v ered the databa se to a non-original SQL serv er of the original Sh arePoint farm, attach the reco vered database t o the far m .
304 Copyright © Acronis International GmbH, 2002- 2015 stsadm.exe -o a ddcontentdb - url <site url> -databas ename <database> -data baseserver <database server> 1 1 .
305 Copyright © Acronis International GmbH, 2002- 2015 c. To change the ser ver on which you want to st o p the s erv ice, in the Server list, cli ck Change Server , and then clic k the r equired server name. d. By default, only c o nfigurable ser v ices are displa ye d.
306 Copyright © Acronis International GmbH, 2002- 2015 5. Detach the database and unmount the previ o usly mo unted volume as described in steps 7-8 of "Accessing SQL Ser ver databases fr om a disk backup" (p. 294). To r ec ove r S ha reP oi nt it em s from a n una tt ach ed da tab as e 1.
307 Copyright © Acronis International GmbH, 2002- 2015 12 Pr ot ec ti ng Mi cr oso ft S QL Ser ve r wit h si ngl e-p as s b ack up This section describes how to use single-pass disk and application bac kups to protect Microsof t SQL Server data.
308 Copyright © Acronis International GmbH, 2002- 2015 Mounting databases By using the agent, you can temporarily attach a ba cked-up database to a running SQL Server instance and use third- party tools t o get various o bjec ts from this database. 1 2 .
3 09 Copyright © Acronis International GmbH, 2002- 2015 Granting the permissions to the agent During installati o n, the setup pro gram includ es the agent ser vice account in the Backup Operators group. If you ch o ose to create a n ew account for the a gent, this account is also inclu ded in the Administrators gr o up.
310 Copyright © Acronis International GmbH, 2002- 2015 12 .2 In sta ll ati on of Ag en t for S QL Agent for SQL can o nly be i nstalled o n a m achine runn ing Microsoft SQL Server. Rem o te installation of the agent is no t possible. The agent is included in t he se tup program o f Acronis Backup Advanced.
311 Copyright © Acronis International GmbH, 2002- 2015 Follow these recom mendations to ensure that a single- pass backup is successful. Back up entire ma chines. This will allow y ou to re cover both the operating sy stem and an y SQL database present on a machine.
312 Copyright © Acronis International GmbH, 2002- 2015 Leave the setting disabled if you use a third-party appli catio n, such as the SQL Server backup and restore compon ent, for backin g up the SQL Server data. Log truncation and ignoring application errors are mutually exclusive.
313 Copyright © Acronis International GmbH, 2002- 2015 Rename the re c overed dat abase This setting lets y o u retain the e xisting datab ase. A recovered database will h ave the following name: < o riginal d a tabase name> -Recovere d .
314 Copyright © Acronis International GmbH, 2002- 2015 Active Restore supp o rts the foll o wing backup locations: A local folder on the machine where the rec o very is p erfo rmed (exc ept optical disks). Acronis Secure Z o ne. A network share.
315 Copyright © Acronis International GmbH, 2002- 2015 12 .5 Mo unt in g S QL Se rve r da tab ase s fro m a sin gle -p ass ba ck up When you mount a bac ked-up SQL database, it is t emporarily attached to your SQL Server in the read-only mode. You can access the database lik e any other databas e of the instance.
316 Copyright © Acronis International GmbH, 2002- 2015 If the selected databas e is in use, Acronis Backup for cibly disconnects all users from the database and then unmounts i t.
318 Copyright © Acronis International GmbH, 2002- 2015 13 Pr ot ec ti ng Mi cr oso ft A cti ve D ir ec tor y wi th si ng le -p ass b ac ku p This section describes how to use single-pass disk and application bac kups to protect the Acti ve Directory Domain Ser vices role of Micros o ft Active Direct o ry.
319 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup f o r Windows Ser ver Essentials Acronis Backup Advanc ed for VMware / Hyper-V / RH EV / Citrix XenServer / Orac le VM Acronis Backup Advanc ed Universal License Each of these licens es enables you to install Agent f o r Windows on the same machine.
320 Copyright © Acronis International GmbH, 2002- 2015 1 3 . 5 . 1 Re - pr o m o t i n g t h e d o m ai n c o n t r ol l e r This method of rec overing the data is availab le only if the domain has other domain contr o llers. It does not require ha ving a backup.
321 Copyright © Acronis International GmbH, 2002- 2015 b. Copy all of the con tents from each of these f o lders to the roo t of the co rresp o nding disk drive. For example , copy the contents from the Drive(C) folder to C:/ and from the Drive ( E) folder to E:/ .
322 Copyright © Acronis International GmbH, 2002- 2015 14 A dmi ni st er in g a ma nag ed ma ch in e This section describes the views that are availabl e through the navigati o n tree of t he console connected to a man aged machine and explains h ow to work with each vie w.
323 Copyright © Acronis International GmbH, 2002- 2015 To Do Validation task (p. 237 ) View details of a plan /task Click Details . In the respective Plan Det ails (p. 331 ) or Task Deta ils (p. 332) wind ow, review the plan or task details. View plan's/task's log Click Log .
324 Copyright © Acronis International GmbH, 2002- 2015 To Do Edit a plan /task Click Edit . Backup plan ed iting is performed in the sa me way as creation (p. 55 ), except for the following limitation s : It is not always possible to u se all scheme op tions, when editing a backup plan if the created archive is n ot empty (i.
325 Copyright © Acronis International GmbH, 2002- 2015 S tat e H ow i t is de ter min ed H ow to han dl e 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition .
326 Copyright © Acronis International GmbH, 2002- 2015 Once the task is s tarted manuall y or the event spe cified by the schedule oc curs, the task enters either the Running state or t he Waiting state.
327 Copyright © Acronis International GmbH, 2002- 2015 You can edit plans in the Acronis Backup graphical us er interface when importing them or afte r. Backup plans are exp o rted to .xml files, s o you can edit the exp ort files o f backup plan s (p.
328 Copyright © Acronis International GmbH, 2002- 2015 To modify credentials, change the <login> and <pa ssword> tags in the correspondin g sections: plan's credentials – the &.
329 Copyright © Acronis International GmbH, 2002- 2015 1. Delete the <ID> tag. 2. Edit the value of th e <Path> tag , which c ontains inf ormation about data to back up; f o r example, replace " C: " wi th " D: ".
330 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 1 . 4 D e p l o y i n g b a c k u p p l a n s a s fi l e s Assume that for so m e reason y o u cannot run Acronis Backup Managem ent Server in your environment, but yo u need t o apply one and the sa me backup plan to m ultiple mach ines.
331 Copyright © Acronis International GmbH, 2002- 2015 <key name="Import"> <value name="Folde rPath" type="TString"> "/us r/lib/Acronis/Bac kupAndRecovery/import" </value> </key> The change will be app lied after a restart of t he agent.
332 Copyright © Acronis International GmbH, 2002- 2015 History The History tab lets you examine the history o f all the backup plan's accomplished activiti es. What to back up The Source tab pro v ides the foll o wing inf o rmation on the data selected for backup : Source type - the type o f data selected for backing up.
333 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 2 . 1 A c t i o ns o n l o g e n t r i e s All the operations des cribed below are perform ed by clicking the corresponding i tems on the log toolbar . These opera tio ns can also be performed with t he context m enu (by right-clicking the l og entry or the activit y).
334 Copyright © Acronis International GmbH, 2002- 2015 To view details of t he next or t he pre v ious log entry, click the down arrow but to n or corresp o ndingly the up arrow button.
335 Copyright © Acronis International GmbH, 2002- 2015 To export entire t able contents to a *.txt or *.c sv file, click Save all to file . Configuring alerts Use the following o ptions at the to p of the Ale r ts view to configu re alerts: Show/hide alert s (p.
336 Copyright © Acronis International GmbH, 2002- 2015 To change a license f or a virtualization host (exc ept for a clustered host), conn ect the console to the management s erver, navigate to Virtual ma c hines > Ho s ts and clus ters , right-click the ho st, and then click Chan g e license .
337 Copyright © Acronis International GmbH, 2002- 2015 It determines Acr onis Backup behavior when the syst em is shutting down. The s ystem shutdown occurs when the m achine is turned o ff or restart ed. The preset is: Stop r unning ta s ks and shut do w n.
338 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .3 .2 Ti me -ba se d al ert s Last backup This option is effe ctive when the console is co nnected to a managed m achine (p. 443) or to the management ser v er (p. 444 ). The option defines whether to alert if no backup was performed on a given mac hine for a period of time.
339 Copyright © Acronis International GmbH, 2002- 2015 5. If the outgoing mail s erver requires authenticati on, enter User name and Passwo rd o f the sender's e-mail ac co unt. If the SMTP server do es not require auth entication, leave the User name and Password fields blank.
340 Copyright © Acronis International GmbH, 2002- 2015 You can override the settings set here, exclusively fo r the e v ents that oc cur during backup or during recovery, in the D efault backup and recovery options.
341 Copyright © Acronis International GmbH, 2002- 2015 1. Start > Control Pane l > Add or R emove Pro gr ams > A dd/Remove Windows Com ponents. 2. Select Management an d Monitoring Tools . 3. Click Details. 4. Select the Simple Netw ork Management Protocol check box.
342 Copyright © Acronis International GmbH, 2002- 2015 In Windows XP and Ser ver 2003: %ALLUSERSP ROFILE%Application DataAcronisBa c kupAndRecove ry MMS events.db3 . In Windows Vista an d later versions of Windows: %PRO G RAMDATA%A c ronisBackupAnd Recovery MMS events.
343 Copyright © Acronis International GmbH, 2002- 2015 To s et up pr ox y s er ver s ett in gs 1. Select the Use a pro xy server check box. 2. In Address , specif y the network name or IP address of the proxy server — for example: proxy.example.com or 192.
344 Copyright © Acronis International GmbH, 2002- 2015 15 C en tra li zed m ana ge me nt This section covers o perati o ns that can b e performed centrall y by using the components for centralized manage ment. The content of this se ction is only applicable to Acr onis Backup Advanced.
345 Copyright © Acronis International GmbH, 2002- 2015 Storage Node (p. 4 4 5) and configu re it to m anage a ce ntralized vault or multiple centralized vault s. Such vaults are call ed managed vaults (p. 443). The storage node helps the agent deduplicate (p.
346 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .2 .2 Pr iv ile ge s fo r loc a l c onn ect io n Windows Local connection on a machine running Wind o ws can be established by any user who has the "L og on locally" user right on the machin e.
347 Copyright © Acronis International GmbH, 2002- 2015 To d is abl e U AC Do one of the foll o wing depend ing on the operating system: In a Windows op erating system prior to Windo w s 8: Go to .
348 Copyright © Acronis International GmbH, 2002- 2015 2. Add the names of the non-root users, whom you wan t to allow to connect to the machine remotely, to the Acro nis_Trusted group. For exa m ple, to add the existing user user_a to the group, run the foll owing command: usermod -G Acronis_Trusted user_a 3.
349 Copyright © Acronis International GmbH, 2002- 2015 Acronis Centralized Admins A user who is a m ember of thi s group is a management ser ver administra tor.
350 Copyright © Acronis International GmbH, 2002- 2015 This section also pro vides information on configurin g communication settings, se lect ing a netw o rk port for com munication, an d m anaging securit y certificates.
351 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .3 .3 Co nf ig uri ng c om mu ni ca tio n se tt ing s You can configu re communication s ettings, such as whether t o encrypt transferred data, f or Acronis Backup component s installed on one or more ma chines, by using Acronis Admini strative Template.
352 Copyright © Acronis International GmbH, 2002- 2015 Linux Specify the port in the /etc/Acronis /Policies/Agent.config file. Restar t the acronis_agent dae mon.
353 Copyright © Acronis International GmbH, 2002- 2015 "%CommonProgramFiles% Acronis Utils acroniscert" -- reinst all When using a 64-bit ver sion of Windows: "%CommonProgramFiles( x86)% Acronis Utilsacroniscer t" -- reinstall 4.
354 Copyright © Acronis International GmbH, 2002- 2015 15 .3 Cr eat in g a c ent ra liz ed ba ck up pl an A centralized backup plan can be applied to both Windows and Linux machines. The steps required fo r the creating centralized backup plan are si milar to creating a backup plan (p.
355 Copyright © Acronis International GmbH, 2002- 2015 Backing up an entir e virtual machine, its disks, o r volumes y ields a standard disk backup (p. 439). In addition, this backup stores the virtual machine configuration. This configuration will be suggested by default when re covering the backup con te nt to a n ew virtual machine.
356 Copyright © Acronis International GmbH, 2002- 2015 Notes for Linux us ers: Logical volumes and MD devices are shown under Dynamic volumes . For more information ab out backing up such volu m es and devices, see "Backup and recovery of l o gical volu m es and MD de v ices (Linu x)" (p.
357 Copyright © Acronis International GmbH, 2002- 2015 Some environmen t v ariables point to Windows folder s. Using such variables instead of full fo lder and file paths ensures tha t proper Windows folders are backed up regardless o f where Wind ows is located on a particular machine.
358 Copyright © Acronis International GmbH, 2002- 2015 1 5 . 3 . 3 S e l ec t i o n r u l e s f o r v o l u m e s Define volume sel ect ion rul es, according to which the vo lumes o n the machines included in the centralized backup plan will be backed up.
359 Copyright © Acronis International GmbH, 2002- 2015 To i ncl ude I n t he sel ec tio n rul es box : Co mm ent s First disk Type or select: [Disk 1] Refers to the first disk of the r egistered machine, including all volu mes on that d isk.
360 Copyright © Acronis International GmbH, 2002- 2015 case, you can type either /dev/hda3 or /ho m e/usr/do cs in the Volu me field t o perform a disk backup of the third parti tio n.
361 Copyright © Acronis International GmbH, 2002- 2015 1. Selecting the archiv es destination Choose where to st o re mac hines' archives: Store all machines' archives in a single lo cation To back up data t o Acronis Clou d Storage, click Lo g in and specify the cr edentials to log in to the cloud storage.
362 Copyright © Acronis International GmbH, 2002- 2015 FINDEPT3_SYSTE M BACKUP_Arch ive (1) 1 5 . 3 . 5 C e n t r a l i z e d b a c k u p p l a n ' s c r e de n t i a l s Provide the credentials un der which the centraliz ed tasks will run on the machin es.
363 Copyright © Acronis International GmbH, 2002- 2015 /dev/sda1 volu m e. This is b ecause the [SYSTEM] volu m e is not f o und. The plan will get the Error status on Linux mach ines that do not have a SCSI de vice.
364 Copyright © Acronis International GmbH, 2002- 2015 Applications The Application s section di splays the number of protected and unprotected applications running on the registered machin es. An application on a m achine is c o nsidered prot ected if the respective ag ent is installed on that machine in the trial mode or wi th a license key.
365 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .1 Ma ch in e g ro up s Machine groups are designed for convenien t protection o f a large number o f ma chines registered on the management s erver. While creating a centralized backup plan, select a group and the plan will be deployed to all machin es of this group.
366 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .2 Ac ti on s o n ma chi ne s Registering machines on the management server Once the machine is added or imported to the All machines with agen ts group, it bec omes registered on the m anagement se rver.
367 Copyright © Acronis International GmbH, 2002- 2015 To Do Add a machine to a nother static group Click Add to another group . In the Add to group (p. 370 ) wind ow, specify the group t o copy the selected machine to. The centralized b ackup p lans of the groups the machin e is a member of will be deployed t o the machine.
368 Copyright © Acronis International GmbH, 2002- 2015 To Do Upgrading from Acron is Backup to Acron is Backup Advanced Update all information related to the machine Click Synchronize . The management serv er will query the machine an d update the datab ase with the most recent information .
369 Copyright © Acronis International GmbH, 2002- 2015 2. Select from the menu Options > Ma c hine options > Machine management . 3. Select Centralized management and specify the mana gement server where t o register the machine. Refer to "Machine manag ement (p.
370 Copyright © Acronis International GmbH, 2002- 2015 To s yn chr on ize m ach in es w it h a t ex t f il e u si ng com ma nd li ne 1. Log on as a me m ber of the Acron i s Centralized Admi ns security gr oup.
371 Copyright © Acronis International GmbH, 2002- 2015 Machine The tab displays th e followi ng information on the regis te red machine : Name - name of t he select ed machine (taken from th e Computer name in Wind o ws). Registration ad dress - compu ter name or IP address of the selected machine.
372 Copyright © Acronis International GmbH, 2002- 2015 For the list of the o peration s av ailable with m achine's backup plans and tasks, see "Actions on backup plans and tas ks" (p.
373 Copyright © Acronis International GmbH, 2002- 2015 To Do Click Add machine to AMS . In the Add m achine (p. 368 ) window, select the machin e that needs to b e added to the man agement server.
374 Copyright © Acronis International GmbH, 2002- 2015 To Do The management con sole will updat e the list of groups from the manage ment server with the most rec ent information. Though t he list of groups is refreshed automatically b ased on events, the dat a may not be retrieved immediately from the manag ement server due to some lat ency.
375 Copyright © Acronis International GmbH, 2002- 2015 These criteria will add to the same group all of th e machines whose operating system is Windows 2003 o r Windows 200 8 and belong to the S ERVERS organizational unit and whose IP addresses are within the range 192.
376 Copyright © Acronis International GmbH, 2002- 2015 The root folder o f the mac hines tree contains groups of the first le vel . Groups that include other groups are called par ent groups . Groups that are in pa rent groups are called child groups .
377 Copyright © Acronis International GmbH, 2002- 2015 To Do The centralized backu p plan cannot be ru n manually, if at least one of the machines included in the plan runs Acron is Backup & Recov ery 10 agent. Stop a backu p plan Click Stop . Stopping the run ning backup plan stops all its task s on all the machine s the plan is deployed to.
378 Copyright © Acronis International GmbH, 2002- 2015 Install and configure Agent for V M ware (Virtual App liance) or Agent for VM ware (Windows).
379 Copyright © Acronis International GmbH, 2002- 2015 To Do Create a new backup plan , or a task on a registered machine Click New , and select one of the following: Backup plan (centra lized) (p. 354 ) Recovery task (p. 13 2) Validation task (p.
380 Copyright © Acronis International GmbH, 2002- 2015 To Do Clone a backup plan Click Clone . The clone of the original b ackup plan will b e created with default name " Clone of <original_plan_name > ". The c loned plan will be disabled i mmediately a fter cloning, so that it does not run con currently with the original p lan.
381 Copyright © Acronis International GmbH, 2002- 2015 Accessing the Licenses view To access the License s v iew when conn ected to the manage m ent server, click Licenses in the Navigation pane. To connect to the lic ense server directly: 1. In the Tools menu of t he consol e, select Manage licenses .
382 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .6 .3 Ex por ti ng l ice ns es Before changing the license ser ver, export the licenses fro m the licens e server th at you plan to change (p. 381). All licen ses are saved into .xml file. Later on, you can import (p.
383 Copyright © Acronis International GmbH, 2002- 2015 Adds a new license key to the specified license ser ver. You can specify multiple lic ense keys (space separated). --import - file <IP-address or hostname> <fi lename> Imports license k ey s from a .
384 Copyright © Acronis International GmbH, 2002- 2015 moved to a new o r to the existing inactive group. The number of ass o ciated mac hines ( X ) is reduced for the active group alert and increased for the in active group alert respecti v ely. To obtain infor m ation about ma chines associated with the group alert, click Vie w details .
385 Copyright © Acronis International GmbH, 2002- 2015 The report will c o ntain the information selected, grouped and so rted according to t he templat e settings. Select wheth er to preview the rep o rt in the d efault browser or to save it to the .
386 Copyright © Acronis International GmbH, 2002- 2015 Deployment state : The deployment states of the backup plans — for exa mple, Revoking . Execution state : Th e execution states of the ba ckup plans — for example, Running . Stat us : The statuses of th e backup plans — OK , Warning , and/ o r Error .
387 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .8 .4 Rep or t ab ou t t h e ar ch iv es an d ba cku ps In this view, you c an generate a r eport about the archives that are stored in managed centraliz ed vaults. This rep o rt consists o f one or m o re tables.
388 Copyright © Acronis International GmbH, 2002- 2015 Specify which table co lumn s to show, and in which ord er. Select which diagra ms to include in the repor t.
389 Copyright © Acronis International GmbH, 2002- 2015 To a llo w a ct iv e con te nt per ma ne ntl y in Internet Explor er 1. On the Tools menu, click In ternet Options , and then click the Advanced tab. 2. Select the Allow active c ontent to run files on My Computer check box under S ecurity .
390 Copyright © Acronis International GmbH, 2002- 2015 To Do The log entry's details wil l be displayed. See Log entry details (p. 390 ) for details of the log entry's operation s. Save the selected log entries to a file 1. Display Activities an d select activities or di splay Events an d select log entries.
391 Copyright © Acronis International GmbH, 2002- 2015 Machine - The nam e of the machine where the e v ent has occurred (if an y). Code - It can be blan k or t he progra m error code if the ev ent type is error. Error code is an integer number that may be used by Acronis supp o rt service to solve the problem.
392 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When enabled, y o u can specify the keeping period for the ac cepted alerts.
393 Copyright © Acronis International GmbH, 2002- 2015 credentials are giv en by this option, the progra m will ask you for credentials and save them in this optio n. It is sufficient t o specify the creden tials of a user who is a member of the Domain Users group on the domain.
394 Copyright © Acronis International GmbH, 2002- 2015 A ler t no ti fic at ion s This option enables yo u to specify when to send e-mail notifica tio ns about alerts which o ccurred on the management s erver and to select the t y pes of aler ts to send.
395 Copyright © Acronis International GmbH, 2002- 2015 Wi nd ow s e ve nt l og This option defin es whether the management server has t o record its o wn log even ts in the Application Event L o g of Win do ws (to see this l o g, run eventv wr.exe or select Control Panel > Administrative tools > Eve nt Viewer ).
396 Copyright © Acronis International GmbH, 2002- 2015 This parameter can als o be set by using Acronis Admin istrative Template (p. 405). 15 .4 .1 0. 7 Clo ud b ac ku p p ro xy This option is effe ctive only for connection to Acr o nis Cloud St o rage over th e Internet.
397 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .1 Ho w t o loa d Ac ro ni s A dm in ist ra ti ve T emp la te The Administrativ e Template, pr o vided by Acr o nis, enables the f ine-tuning of some secu rity related features, includin g encrypted communication setting s.
398 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .2 Ac ro ni s B ac ku p This section of the ad ministrative template spe cifies the connection para meters and event tracing parameters.
399 Copyright © Acronis International GmbH, 2002- 2015 Do not use The use of SSL c ertificates is disab led. Any connection to a server appli cation which requires the use of SS L c ertifi cate s will not be established. Use if possible The use of SSL c ertificates is enabled .
400 Copyright © Acronis International GmbH, 2002- 2015 Event tracing paramet ers In Windows, the ev ents occurring in Acronis Bac kup can be recorded into the event log, a file, or both.
401 Copyright © Acronis International GmbH, 2002- 2015 Enable Information about the hardware configuration, the most and least used feature s and about any problems will be automatically collected fr om the machine and s ent to Acronis on a regular basis.
402 Copyright © Acronis International GmbH, 2002- 2015 If, during a check for the license k ey (see License Check Inter val earlier in this topic), Acronis Backup Agent could n ot connect to the license s erv er, it will try to rec o nnect onc e in the number of hours gi ven by License Se rver Connect i on Retry Interval .
403 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled Trace Level Description: Specifi es the minimu m level of severity of event s for sending SNMP notificati o ns about them. Only n otifications about events of levels g reater than or equal t o Trace Level will be sent.
404 Copyright © Acronis International GmbH, 2002- 2015 The initial size will n ot exceed the available space m inus 50 MB. Pre-allocated storage s ize ( in percent) This setting is effecti ve only when the Pre-allocated s torage size (in Megabytes ) setting is 0 .
405 Copyright © Acronis International GmbH, 2002- 2015 Description: Specifi es whether Acronis Backup Agen t will catalog backups in unmanag ed vaults.
406 Copyright © Acronis International GmbH, 2002- 2015 Windows Event Lo g Specifies when t o record Acronis Ba ckup Management Server's e vents into the App licatio n Event Log in Windows. This parameter has t wo settings: Trace State Description: Specifi es whether to record Acronis Ba ckup Management Server's events into the event log.
407 Copyright © Acronis International GmbH, 2002- 2015 This parameter has th e following settings: Maximum Connect i ons Description: Specifi es the maxi mum number of simultaneous sy nchronization connections to keep.
408 Copyright © Acronis International GmbH, 2002- 2015 Real-Time Monitor ing Description: Specifi es whether to perform real-time m o nitoring of regi ste red m achines instead of using a p olling mechanism.
409 Copyright © Acronis International GmbH, 2002- 2015 Snapsho t Storage Specifies the locati on and initial size of the snapsho t storage — a temporary file th at is used when backing up data by taking a snapshot. This file is deleted as so o n as the backup is complete.
410 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled If the value of this parameter is Disabled , all of the f o llowing para meters are ignored.
411 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enab l ed Smart Error Repo r ting Description: Specifi es whether an error message disp layed by the managem ent console will include a link to a re levant Acr o nis Knowledg e Base ar ticle.
412 Copyright © Acronis International GmbH, 2002- 2015 16 C lou d ba ck up This section provid es detail s about using the Acronis Cloud Backup service. This service enables you to back up your da ta to Acronis Cloud Storage. Acronis Cloud Backup might be unavailab le in your region.
413 Copyright © Acronis International GmbH, 2002- 2015 For effective us e of t he sto rage spa ce, you have th e option to set up the " Delete backups older than " retention rule. Example You might want to us e the following backup s trate gy for a fil e server.
414 Copyright © Acronis International GmbH, 2002- 2015 you want to use pre / post backup o r pre/post data capture commands on the virtual machine you want to back up ind ividual files and folders of th e virtual machine you want to rec over files directly t o the virtual m achine’s file system.
415 Copyright © Acronis International GmbH, 2002- 2015 Windows 8/8.1 – all editi ons except for the Wind ows RT editions (x86, x64) Virtualization produc ts (host-b ased backup of virtual ma chines) VMware ESX(i) 5 .0, 5.1, 5.5 , and 6.0 (H ost-based backup is available only for paid licens es of VMware ESXi.
416 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .7 .4 Wh at i f a n et wor k con n ect io n is lo st du ri ng c lo ud ba cku p or r ec ov er y? The software will try to reach the cloud storage e very 30 seconds.
417 Copyright © Acronis International GmbH, 2002- 2015 Acronis uploads the backup to the cloud storage. After that, you can add increm ental backups to this full backup, either manually or on a schedule. The hard disk drive i s sent back to you but it is not possible to recover from it.
418 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .8 .8 Ho w d o I per fo rm i nit ia l see di ng? Preparing 1. Ensure that you hav e activated an Acr onis Cloud Backup subscription on the machin e where you will do initial seeding ( skip this step if you have a volume subscription).
419 Copyright © Acronis International GmbH, 2002- 2015 Hard drive types Acronis accepts hard disk drives of the following interf ace types: IDE, ATA, SATA, USB connected drives. SCSI drives are not ac cepted. Packaging If possible, use th e original packagin g.
420 Copyright © Acronis International GmbH, 2002- 2015 St ep 4 Using the website o f the ship ping company that you chose, pr epare and print two prepaid shippin g labels: 1. Shipping label for sending your hard drive. This label i s placed on the top of the box.
421 Copyright © Acronis International GmbH, 2002- 2015 St ep 5 Securely seal the b ox with a sturdy tape. Then, sti ck the shipping labe l for sendin g your hard drive t o the top of the bo x, so the l abel does not wrap around the edge of the package.
422 Copyright © Acronis International GmbH, 2002- 2015 specified). If a prepaid shipping label was not pr o vide d with the media, th e media will be discarded. [Occasional] The orde r is on hold – Your order was pl aced on hold due to technical dif ficulties processing the order.
423 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .9 .7 Ho w t o bu y a L arg e Sc al e R ec ove ry l ice ns e? You can buy a Large Scale Recovery license fr om an Acronis partner or from the Acronis online store. Having purchased a lic ense from an Acronis partner, you receive a confirmation e-mail wi th a registration code.
424 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 1 How d o I a cc es s m y ac cou nt m an ag em en t web pa ge ? Go to http://ww w.acronis.com/en-us/ m y/cloud-back up/co rporat e and log in to y our account (cr eate one if you are not re gistere d).
425 Copyright © Acronis International GmbH, 2002- 2015 A subscription for v irtual mach ines (now deprecated) can be ren ewed to a server sub scription or to a volume subscription.
426 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 8 Ca n I c an ce l m y su bsc ri pt ion ? Just wait until the subs cription expires. Refu nds are not available for the clo ud backup subscriptions. 16 .2 Wh er e do I s tar t? Go to http://ww w.
427 Copyright © Acronis International GmbH, 2002- 2015 On the account management webpage, click the c loud backup trial link, and then select t he necessary subscripti o n typ e.
428 Copyright © Acronis International GmbH, 2002- 2015 1 6 . 4 . 2 R e a s s i g n i n g a n a c t i v at e d s u b s c ri pt i on Sometimes you may want to use an already ac tiv ated subscription instead of an available subscription.
429 Copyright © Acronis International GmbH, 2002- 2015 All earlier created ba ckups remain intact. You can delete them manually if necess ary. Keep in mind though, backups can be del eted from a subscription o nly by the machine to which the subscription is assigned.
430 Copyright © Acronis International GmbH, 2002- 2015 To r et rie ve fi les fr om th e c lou d st ora ge: 1. Go to the account m anagement webpage (p. 424 ) and click Recove r files from Acronis Cloud . You will see the list of t he machin es backed up by using t he specified acc o unt.
431 Copyright © Acronis International GmbH, 2002- 2015 Setting up regular c o nversi o n of backups to a virtual machin e Operations with ba c kups : Validating a backup* Exporting a back.
432 Copyright © Acronis International GmbH, 2002- 2015 Increase storage quot a Replace a subscripti on with another one that has a greater storage quota.
433 Copyright © Acronis International GmbH, 2002- 2015 Subscription period The period during w hich the subscrip tion remains activated. Yo u can back up and recover the machine during this period. Recovery is possible f or extra 30 days after this peri od ends.
434 Copyright © Acronis International GmbH, 2002- 2015 17 G los sa ry A A cr on is A ct ive R est or e The Acronis propri et ary tec hnology that brings a syste m online i m mediately aft er the system recovery is started. The system boots from the backup (p.
435 Copyright © Acronis International GmbH, 2002- 2015 A ct iv it y An action perform ed by Acronis Backup for achie v ement of s o me user goal. Examples: backing up, recovery, expor ting a backup, catalogin g a vault. An activit y may be initiat ed by a user or by the software itself.
436 Copyright © Acronis International GmbH, 2002- 2015 the backup archive (p. 435) name and location the backup sche m e (p. 436). This inclu des the backup schedule and [optionally] t he retention rules (p. 445) [optionally] additional o perations to perform with the backups (replica tio n (p.
437 Copyright © Acronis International GmbH, 2002- 2015 access and back up the data that has survived in a c orrupted system deploy an operating system on bare metal create basic or dyna m ic vol umes (p.
438 Copyright © Acronis International GmbH, 2002- 2015 C ent ra li ze d v au lt A networked location allotted by the management ser ver (p. 444) administrat o r to serve as s to rage for the backup archi v es (p. 435). A c entralized vault can be m anaged by a storage node (p.
439 Copyright © Acronis International GmbH, 2002- 2015 The centralized cat alo g ava ilable on the management server (p. 444) contains all data st o red on its storage nodes (p. 4 45). Physically, data catal og is stored in catalog files. Every vault uses its own s et of catalog files w hich normally are located dir ectly in the vault.
440 Copyright © Acronis International GmbH, 2002- 2015 D is k ba cku p ( Im ag e) A backup (p. 435) that c ontains a sector-based copy of a disk or a v olume in a pac kaged form.
441 Copyright © Acronis International GmbH, 2002- 2015 Di sk 1 MBR LDM database 1 MB Di sk 2 Protec-t ive MBR GPT Microsoft Reserved Partition (MSR) LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks.
442 Copyright © Acronis International GmbH, 2002- 2015 E En cr yp te d arc hi ve A backup archive (p. 43 5 ) encrypted a cco rding to the Advanced Encryption Stand ard (AES). When the encryption option and a password for the archive are set in the backup options (p.
443 Copyright © Acronis International GmbH, 2002- 2015 In de xi ng An activity (p. 435) perfor m ed by a storage n ode (p . 445) after a backup (p. 435 ) has been sav ed to a deduplicating vault (p.
444 Copyright © Acronis International GmbH, 2002- 2015 M ana ged v au lt A centralized vault (p. 4 37 ) managed by a storage node (p. 445 ) . Archives (p.
445 Copyright © Acronis International GmbH, 2002- 2015 Re gi st ere d ma ch in e A machine (p. 443) m anaged by a manag ement server (p. 444). A machi ne can be registered on only one management se rver at a time. A machine become s registered as a result of t he registration (p.
Een belangrijk punt na aankoop van elk apparaat Acronis Backup Advanced for Windows Server (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Acronis Backup Advanced for Windows Server heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Acronis Backup Advanced for Windows Server vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Acronis Backup Advanced for Windows Server leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Acronis Backup Advanced for Windows Server krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Acronis Backup Advanced for Windows Server bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Acronis Backup Advanced for Windows Server kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Acronis Backup Advanced for Windows Server . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.