User Guide Manual
8 Copyright © Acronis International GmbH, 2002-2014
11.5.3 Recovering individual items........................................................................................................................ 301
12 Protecting Microsoft SQL Server with single-pass backup ........................................ 303
12.1 General information ..............................................................................................................303
12.1.1 Agent for SQL ............................................................................................................................................... 303
12.1.2 Supported operating systems .................................................................................................................... 304
12.1.3 Supported Microsoft SQL Server versions ................................................................................................. 304
12.1.4 Permissions for SQL Server backup and recovery .................................................................................... 304
12.1.5 What else you need to know about single-pass backup .......................................................................... 305
12.2 Installation of Agent for SQL ..................................................................................................306
12.3 Backing up Microsoft SQL server ...........................................................................................306
12.3.1 Single-pass backup settings ........................................................................................................................ 307
12.4 Recovering Microsoft SQL Server data ..................................................................................308
12.4.1 Recovering SQL databases to instances .................................................................................................... 308
12.4.2 Extracting the database files to folders ..................................................................................................... 310
12.5 Mounting SQL Server databases from a single-pass backup .................................................311
12.5.1 Unmounting mounted SQL Server databases ........................................................................................... 311
12.6 Protecting clustered SQL Server instances and AAG .............................................................312
13 Protecting Microsoft Active Directory with single-pass backup ................................ 314
13.1 Agent for Active Directory .....................................................................................................314
13.2 Supported operating systems ................................................................................................314
13.3 Installation of Agent for Active Directory ..............................................................................314
13.4 Backing up Microsoft Active Directory ..................................................................................315
13.5 Recovering Microsoft Active Directory ..................................................................................315
13.5.1 Re-promoting the domain controller ........................................................................................................ 316
13.5.2 Recovering the Active Directory data from a single-pass backup ........................................................... 316
14 Administering a managed machine ......................................................................... 318
14.1 Backup plans and tasks ..........................................................................................................318
14.1.1 Actions on backup plans and tasks ............................................................................................................ 318
14.1.2 States and statuses of backup plans and tasks ......................................................................................... 320
14.1.3 Export and import of backup plans ............................................................................................................ 322
14.1.4 Deploying backup plans as files .................................................................................................................. 326
14.1.5 Backup plan details ..................................................................................................................................... 327
14.1.6 Task/activity details ..................................................................................................................................... 328
14.2 Log ..........................................................................................................................................328
14.2.1 Actions on log entries.................................................................................................................................. 329
14.2.2 Log entry details .......................................................................................................................................... 329
14.3 Alerts ......................................................................................................................................330
14.4 Changing a license .................................................................................................................331
14.5 Collecting system information ...............................................................................................332
14.6 Adjusting machine options ....................................................................................................332
14.6.1 Additional settings....................................................................................................................................... 332
14.6.2 Acronis Customer Experience Program ..................................................................................................... 333
14.6.3 Alerts ............................................................................................................................................................ 333
14.6.4 E-mail settings ............................................................................................................................................. 334
14.6.5 Event tracing ................................................................................................................................................ 335
14.6.6 Log cleanup rules ......................................................................................................................................... 337
14.6.7 Machine management................................................................................................................................ 338