User guide

3 Copyright © Acronis International GmbH, 2002-2013
Table of contents
1 Command-line utility overview ..............................................................................................7
1.1 Installation ................................................................................................................................. 7
1.2 Backward compatibility and upgrade ........................................................................................ 8
1.3 Syntax......................................................................................................................................... 8
1.4 Local, remote and centralized management ...........................................................................10
1.5 Uninstallation ...........................................................................................................................12
1.6 List of abbreviated names .......................................................................................................12
2 Commands .......................................................................................................................... 13
2.1 Commands by services ............................................................................................................13
2.1.1 Disk, file, virtual machine backup................................................................................................................. 13
2.1.2 Application backup ........................................................................................................................................ 15
2.2 help ..........................................................................................................................................17
2.3 Backup and recovery ...............................................................................................................18
2.3.1 Disks and volumes ......................................................................................................................................... 18
2.3.2 Files ................................................................................................................................................................. 24
2.3.3 Virtual machines ............................................................................................................................................ 27
2.3.4 Microsoft Exchange ....................................................................................................................................... 31
2.3.5 Microsoft SQL ................................................................................................................................................ 37
2.3.6 Microsoft Active Directory............................................................................................................................ 39
2.4 Operations with archives and backups ....................................................................................40
2.4.1 Archives .......................................................................................................................................................... 40
2.4.2 Backups .......................................................................................................................................................... 44
2.4.3 Mounting volumes ........................................................................................................................................ 51
2.4.4 Mounting SQL databases .............................................................................................................................. 53
2.5 Operations with Acronis Secure Zone .....................................................................................55
2.5.1 create asz ....................................................................................................................................................... 55
2.5.2 resize asz ........................................................................................................................................................ 55
2.5.3 cleanup asz..................................................................................................................................................... 56
2.5.4 delete asz_files .............................................................................................................................................. 57
2.5.5 delete asz ....................................................................................................................................................... 57
2.6 Operations with Acronis Startup Recovery Manager ..............................................................58
2.6.1 activate asrm ................................................................................................................................................. 58
2.6.2 deactivate asrm ............................................................................................................................................. 58
2.7 Operations with tapes .............................................................................................................59
2.7.1 list tape_libraries ........................................................................................................................................... 59
2.7.2 list tape_slots ................................................................................................................................................. 59
2.7.3 inventory tape ............................................................................................................................................... 60
2.8 Operations with vaults .............................................................................................................60
2.8.1 validate vault ................................................................................................................................................. 60
2.8.2 catalog vault................................................................................................................................................... 61
2.9 Operations with disks ..............................................................................................................62
2.9.1 clone disk ....................................................................................................................................................... 62
2.10 Administration operations .......................................................................................................63
2.10.1 Collecting information .................................................................................................................................. 63
2.10.2 Plans ............................................................................................................................................................... 65