User Guide Manual

7 Copyright © Acronis International GmbH, 2002-2014
9.5 Acronis Startup Recovery Manager .......................................................................................260
9.6 Acronis PXE Server .................................................................................................................261
9.6.1 Acronis PXE Server Installation ................................................................................................................... 261
9.6.2 Setting up a machine to boot from PXE .................................................................................................... 261
9.6.3 Work across subnets ................................................................................................................................... 262
10 Disk management .................................................................................................. 263
10.1 Supported file systems ..........................................................................................................263
10.2 Basic precautions ...................................................................................................................263
10.3 Running Acronis Disk Director Lite ........................................................................................264
10.4 Choosing the operating system for disk management ..........................................................264
10.5 "Disk management" view ......................................................................................................265
10.6 Disk operations ......................................................................................................................265
10.6.1 Disk initialization .......................................................................................................................................... 266
10.6.2 Basic disk cloning ......................................................................................................................................... 266
10.6.3 Disk conversion: MBR to GPT ..................................................................................................................... 268
10.6.4 Disk conversion: GPT to MBR ..................................................................................................................... 269
10.6.5 Disk conversion: basic to dynamic ............................................................................................................. 269
10.6.6 Disk conversion: dynamic to basic ............................................................................................................. 270
10.6.7 Changing disk status .................................................................................................................................... 271
10.7 Volume operations ................................................................................................................271
10.7.1 Creating a volume ....................................................................................................................................... 271
10.7.2 Delete volume ............................................................................................................................................. 275
10.7.3 Set active volume ........................................................................................................................................ 276
10.7.4 Change volume letter ................................................................................................................................. 276
10.7.5 Change volume label ................................................................................................................................... 276
10.7.6 Format volume ............................................................................................................................................ 277
10.8 Pending operations ................................................................................................................278
11 Protecting applications with disk-level backup ........................................................ 279
11.1 Backing up an application server ...........................................................................................279
11.1.1 Locating database files ................................................................................................................................ 281
11.1.2 Truncating transaction logs ........................................................................................................................ 284
11.1.3 Best practices when backing up application servers ................................................................................ 288
11.2 Recovering SQL Server data ...................................................................................................289
11.2.1 Recovering SQL Server databases from a disk backup ............................................................................. 290
11.2.2 Accessing SQL Server databases from a disk backup ............................................................................... 290
11.2.3 Attaching SQL Server databases ................................................................................................................ 291
11.3 Recovering Exchange Server data ..........................................................................................291
11.3.1 Recovering Exchange Server database files from a disk backup ............................................................. 292
11.3.2 Mounting Exchange Server databases ...................................................................................................... 292
11.3.3 Granular recovery of mailboxes ................................................................................................................. 293
11.4 Recovering Active Directory data ..........................................................................................293
11.4.1 Recovering a domain controller (other DCs are available) ...................................................................... 293
11.4.2 Recovering a domain controller (no other DCs are available) ................................................................. 294
11.4.3 Restoring the Active Directory database ................................................................................................... 295
11.4.4 Restoring accidentally deleted information .............................................................................................. 296
11.4.5 Avoiding a USN rollback .............................................................................................................................. 296
11.5 Recovering SharePoint data ..................................................................................................298
11.5.1 Recovering a content database .................................................................................................................. 298
11.5.2 Recovering configuration and service databases ..................................................................................... 300