User guide
6 Copyright © Acronis International GmbH, 2002-2013
3.12.7 log_format ................................................................................................................................................... 117
3.12.8 network_speed ........................................................................................................................................... 117
3.12.9 oss_numbers ............................................................................................................................................... 118
3.12.10 output........................................................................................................................................................... 118
3.12.11 password ...................................................................................................................................................... 119
3.12.12 process_priority ........................................................................................................................................... 119
3.12.13 progress........................................................................................................................................................ 119
3.12.14 reboot ........................................................................................................................................................... 120
3.12.15 silent_mode ................................................................................................................................................. 120
3.12.16 use_registry_defaults.................................................................................................................................. 120
4 Usage examples ................................................................................................................. 121
4.1 Backup and recovery .............................................................................................................121
4.1.1 Disks and volumes ....................................................................................................................................... 121
4.1.2 Files ............................................................................................................................................................... 124
4.1.3 Virtual machines .......................................................................................................................................... 125
4.1.4 Microsoft Exchange ..................................................................................................................................... 126
4.1.5 Microsoft SQL .............................................................................................................................................. 128
4.1.6 Microsoft Active Directory.......................................................................................................................... 130
4.2 Operations with archives and backups ..................................................................................130
4.2.1 Archives ........................................................................................................................................................ 130
4.2.2 Backups ........................................................................................................................................................ 131
4.2.3 Mounting volumes ...................................................................................................................................... 133
4.2.4 Mounting SQL databases ............................................................................................................................ 133
4.3 Operations with Acronis Secure Zone ...................................................................................134
4.4 Operations with Acronis Startup Recovery Manager ............................................................135
4.5 Operations with tapes ...........................................................................................................135
4.6 Operations with vaults ...........................................................................................................136
4.7 Operations with disks ............................................................................................................137
4.8 Administration operations .....................................................................................................137
4.8.1 Collecting information ................................................................................................................................ 137
4.8.2 Plans ............................................................................................................................................................. 138
4.8.3 Tasks ............................................................................................................................................................. 138
4.8.4 Licenses ........................................................................................................................................................ 139
4.9 Selecting logical volumes and MD devices for backup ..........................................................139
4.10 Scheduling backups under Linux using the cron service .......................................................140
5 Comparison of the old and new command-line syntax ........................................................ 140
6 acronis_encrypt utility ....................................................................................................... 141