Acronis® Backup & Recovery ™ 10 Advanced Workstation User's Guide
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware is a registered trademark of VMware, Inc. Windows and MS-DOS are registered trademarks of Microsoft Corporation.
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ......................................................... 7 1.1. Acronis Backup & Recovery 10 overview ............................................................................ 7 1.2. Getting started .................................................................................................................... 8 1.2.1. 1.3. 1.3.1. 1.3.2. 1.3.3. 1.3.4. 1.3.5. Using the management console ...........................................
3.1.3. 3.1.4. 3.1.5. 3.2. 3.2.1. 3.2.2. 3.2.3. 3.2.4. 3.2.5. 3.2.6. 3.3. 3.3.1. 3.3.2. 3.3.3. 3.4. 3.4.1. 3.4.2. 4. Time-based alerts ...................................................................................................................................... 82 Number of tasks ......................................................................................................................................... 82 Fonts ........................................................................
6.2.1. 6.2.2. 6.2.3. 6.2.4. 6.2.5. 6.2.6. 6.2.7. 6.2.8. 6.2.9. 6.2.10. 6.2.11. 6.3. 6.3.1. 6.3.2. 6.3.3. 6.3.4. 6.3.5. 6.3.6. 6.3.7. 6.3.8. 6.3.9. 6.3.10. 6.3.11. 6.3.12. 6.4. 6.4.1. 6.4.2. 6.4.3. 6.4.4. 6.4.5. 6.4.6. 6.5. 6.5.1. 6.5.2. 6.5.3. 6.5.4. Why is the program asking for the password? ......................................................................................196 Backup plan's credentials .................................................................................................
.10.6. 6.11. 6.11.1. 6.11.2. 6.11.3. 6.11.4. 6.11.5. 6.11.6. 6.11.7. 6.12. 7. Acronis PXE Server ...................................................................................................................................268 Disk management ........................................................................................................... 270 Basic precautions .................................................................................................................................
1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
• Enterprise level of security Controlling user rights to perform operations and access backups Running services with minimal user rights Restricted remote access to a backup agent Secure communication between the product components Using third-party certificates for authentication of the components Data encryption options for both data transmission and storage Backup of remote machines to a centralized storage node behind firewalls. 1.2. Getting started Direct management 1.
The simplified way of centralized management • Backup Using the Back up control, select the machine which you want to back up and then create a backup plan (p. 370) on the machine. You can create backup plans on multiple machines in turn. • Recovery Using the Recover control, select the machine where the data recovery is required and create a recovery task on the machine. You can create recovery tasks on multiple machines in turn.
• Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the All machines group. This way you will deploy backup plans on each machine with a single action. Select Actions > Create backup policy from the top menu and then refer to the context help. • Grouping the machines registered on the management server Group the registered machines by appropriate parameters, create several policies and apply each policy to the appropriate group of machines.
Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate to the different views (see the Navigation pane (p. 11) section.) Actions and tools pane Contains bars with a set of actions that can be performed and tools (see the Actions and Tools pane (p. 12) section). Main area The main place of working, where you create, edit and manage backup plans, policies, tasks and perform other operations. Displays the different views and action pages (p.
• [Management server name]. Root of the tree also called a Welcome view. Displays the name of the management server the console is currently connected to. Use this view for quick access to the main operations, available on the management server. o o o o o o o Dashboard. Use this view to estimate at a glance whether the data is successfully protected on the machines registered on the management server. Backup policies. Use this view to manage backup policies existing on the management server.
actions bar will be named as 'System backup' actions and will have the set of actions typical to backup plans. All actions can also be accessed in the respective menu items. A menu item appears on the menu bar when you select an item in any of the navigation views. Examples of "'Item name' actions" bars Actions Contains a list of common operations that can be performed on a managed machine or on a management server. Always the same for all views.
Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3. Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( - for the Navigation pane; - for the Actions and tools pane).
"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Information panel. • • • Use filtering and sorting capabilities to search the table for the item in question • Perform actions on the selected item.
Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc. When the advanced representation is enabled, all the available fields are displayed. You can switch between the views by selecting the Advanced view check box at the top of the action page. Most settings are configured by clicking the respective Change… links to the right.
Navigation buttons 1.3. Acronis Backup & Recovery 10 components This section contains a list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes three main types of components. Components for a managed machine (agents) These are applications that perform data backup, recovery and other operations on the machines managed with Acronis Backup & Recovery 10. Agents require a license to perform operations on each managed machine.
File backup File-level data protection is based on backing up files and folders residing on the machine where the agent is installed or on a network share. Files can be recovered to their original location or to another place. It is possible to recover all files and folders that were backed up or select which of them to recover.
Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.3.3. Components for centralized management This section lists the components included in the Acronis Backup & Recovery 10 editions that provide the centralized management capability. Besides these components, Acronis Backup & Recovery 10 Agents have to be installed on all machines that need data protection. 1.3.3.1.
VMware vCenter integration This add-on provides the capability to view virtual machines managed by a VMware vCenter Server in the management server GUI, view the backup status of these machines in the vCenter, and automatically register virtual machines created by Acronis Backup & Recovery 10 in the vCenter. Integration is available in all Acronis Backup & Recovery 10 advanced editions; a license for Virtual Edition is not required. No software installation is required on the vCenter Server.
This functionality cannot be disabled in a managed vault. The next two operations are optional. Deduplication A managed vault can be configured as a deduplicating vault. This means that identical data will be backed up to this vault only once to minimize the network usage during backup and storage space taken by the archives. For more information, please see the "Deduplication (p. 64)" section in the User Guide.
1.3.5. Acronis Wake-On-LAN Proxy Acronis Wake-On-LAN Proxy enables Acronis Backup & Recovery 10 Management Server to wake up for backup machines located in another subnet. Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4.
1.5.
Acronis Backup & Recovery 10 Management Server Item Minimum requirements Recommended System memory 512 MB 1 GB or more Installation disk space 25 MB Space required for Operational SQL Server and Reporting SQL Server 200 MB Acronis Backup & Recovery 10 Storage Node Item Minimum requirements Recommended System memory 1 GB 4 GB Installation disk space 40 MB Space required for tapes database About 1 MB per 10 archives Acronis License Server Item Minimum requirements Recommended System mem
2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1. Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. 26 Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-by-sector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2. Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: • • you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.
specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3. User privileges on a managed machine When managing a machine running Windows, the scope of a user's management rights depends on the user's privileges on the machine.
Managing a plan (task) owned by another user Having Administrator privileges on the machine, a user can modify tasks and local backup plans owned by any user registered in the operating system. When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are cleared. This prevents the "modify settings, leave passwords" trick. The program displays a warning each time you are trying to edit a plan (task) last modified by another user.
2.5. GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme in Acronis Backup & Recovery 10. With this backup scheme you are not allowed to back up more often than once a day. The scheme enables you to mark out the daily, weekly and monthly cycles in your daily backup schedule and set the retention periods for the daily, monthly and weekly backups.
Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day of the week from the days selected in the previous step. Each 1st, 2nd and 3rd backup created on this day of the week will be considered as a weekly backup. Each 4th backup created on this day of the week will be considered as a monthly backup. Backups created on the other days will be considered as daily backups. Assume you select Friday for Weekly/Monthly backup.
Keep backups: Monthly This step defines the retention rule for monthly backups. The cleanup task will run after each monthly backup and delete all monthly backups that are older than you specify. The monthly backups’ retention period cannot be less than the weekly backups’ retention period. It is usually set several times longer. You have the option to keep the monthly backups infinitely.
Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups will start to be deleted. The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. When using the incremental and differential backup methods, you cannot delete a backup as soon as the scheme requires if later backups are based on this backup.
2.6. Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keeping such backups for a long time. The Tower of Hanoi (ToH) backup scheme is a useful compromise. Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In the puzzle a series of rings are stacked in size order, the largest on the bottom, on one of three pegs. The goal is to move the ring series to the third peg.
Tower of Hanoi by Acronis The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
For information about using Tower of Hanoi for tape libraries, see Using the Tower of Hanoi tape rotation scheme (p. 148). 2.7. Retention rules The backups produced by a backup plan make an archive. The two retention rules described in this section enable you to limit the archive size and set the lifetime (retention period) of the backups. 1. Delete backups older than This is a time interval counted back from the moment when the retention rules are applied.
There is a certain risk that all but one backup will be deleted if the maximum archive size is set improperly (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size.
• Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also become outdated. Then all the chain will be deleted at once during the regular cleanup. This mode helps to avoid the potentially time-consuming consolidation but requires extra space for storing backups whose deletion is postponed. The archive size and/or the backup age can exceed the values you specify.
Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic GPT volumes. Backing up dynamic volumes Dynamic and basic GPT volumes are backed up in the same way as basic MBR volumes. When creating a backup plan through the GUI, all types of volumes are available for selection as Items to back up. When using the command line, specify the dynamic and GPT volumes with the DYN prefix.
o o If the data size is less than 20GB, then one disk can hold, say, 10GB; the other will hold the remaining 10GB. This way, a striped volume will be created on both disks and 20GB on the second disk will remain unallocated. If the data size is more than 20GB, the data cannot be distributed evenly between the two disks, but can fit into a single simple volume. A simple volume accommodating all the data will be created on the second disk. The first disk will remain untouched.
2.9. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape drives as storage devices. A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 20). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p. 131).
Tape written on a tape device through... Backup Server Storage Node 2.9.2. ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 - - - + Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device. The functionality of a locally attached autoloader or tape library is limited to the ordinary tape drive.
Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape containing the backup you need to recover. When creating a recovery task, select the tape device from the list of available locations and then select the backup. After recovery is started, you will be prompted for other tapes if the tapes are needed for recovery. 2.10.
With the new Acronis Secure Zone behavior, you obtain the ability to: • • list archives located in the zone and backups contained in each archive • • mount a disk backup to copy files from the backup to a physical disk examine a backup's content safely delete archives and backups from the archives. For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 155) section.
2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system start, such as video, audio and USB. Windows takes control over this process during the logon phase, and if some of the new hardware is not detected, you will have a chance to install drivers for it later manually. Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool.
Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the selected disks or volumes in the backup.
4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Restore check box. Acronis Active Restore will choose for the boot-up and subsequent recovery the first operating system found during the backup scan. Do not try to recover more than one operating system using Active Restore if you want the result to be predictable. When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5.
Since you connect the console to the management server rather than to each machine and perform all management operations through the central management unit, this way of management is called centralized management (p. 372). Centralized management does not rule out the direct management (p. 374) of each machine. You can connect the console to each machine and perform any direct management operation.
You have to protect each server as a whole, the users' data on the workstations, and the virtual machines. You want to be able to track the health of the data protection, be sure that the backup archives do not store duplicated information and that the obsolete backups are deleted from the storage in a timely manner. These goals can be achieved by regular backup of the desired data items to a centralized vault with deduplication. Setting up the Acronis infrastructure 1.
5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The storage node enables you to organize the infrastructure for storing backup archives and to use the deduplication functionality. The node can be installed together with the management server if the host is capable enough. When installing the storage node, register it on the management server in the same way as you register the agents.
3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of the servers. The policy deployment state has to change from Deploying to Deployed and its status has to be OK. To see the resulting backup plans on each of the servers: a. navigate to the All machines group or the S_1 group b. select the server c. select the Backup plans and tasks tab on the Information pane.
2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in multiple ways: • Connect the console to the virtual appliance (Agent for ESX) and create a backup plan that will back up all or some of the virtual machines. • Connect the console to the virtual appliance (Agent for ESX) and create an individual backup plan for each machine. The plan will back up the volumes you specify.
Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks is created on each machine according to the configuration provided by the policy. Revoking a policy is the reverse action to the aggregate of applying and deploying. Revoking removes the correspondence between the policy and one or more machines and then removes the tasks from the machines.
The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the second application of the same policy, but the server remembers that the policy has been applied twice. 2. A policy, revoked from the group, remains on the machine. 3. A policy, revoked from the machine, remains on the group and therefore on the machine. 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.11.4.2.
2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group besides the All machines group. Let's start from this simplified approach. In the diagram below, the container stands for a group; the two-color circle stands for a machine with two applied policies; the three-color circle stands for a machine with three applied policies and so on. Copyright © Acronis, Inc.
Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is G1's child. The "green" policy, applied to the All machines group, is inherited by all machines. The "orange" policy, applied to G1, is inherited by the G1 members and all its child groups, both immediate and indirect. The "blue" policy, applied to G2, is inherited only by the G2 members since G2 does not have child groups. The "violet" policy is applied straight to machine #4.
#4 #5 or #6 "green" Inherited All machines -> #4 "orange" Inherited G1 -> G2 -> #4 "blue" Inherited G2 -> #4 "violet" Applied directly "green" Inherited All machines -> #5 or #6 "orange" Inherited G1 -> G2 -> #5 or #6 "blue" Inherited G2 -> #5 or #6 2.11.5. Backup policy's state and statuses Centralized management presumes that the administrator can monitor the health of the entire product infrastructure using a few easily understandable parameters.
You may change grouping conditions or the machine may change its properties so that the machine leaves one group and is included into another. This may result in revoking one policy and deploying another policy. In this case, the first policy's state on the machine will be Revoking and the second policy's state will be Deploying. The policies can appear in the GUI simultaneously or one after another. Backup policy state diagram 2.11.5.2.
Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is applied to both Linux and Windows machines. Once the first backup is started, the policy gets the Error status on the Linux machines and on the Windows machines that do not have such volumes. The policy gets the Warning status on Windows machines that have either a D: or F: volume, unless an event that will result in an error occurs.
2.11.5.4. Policy status on a group To see this parameter, select Machines in the tree, then select the group, and then select the Backup policies tab on the Information pane. This status is defined as the most severe status of the policy on the machines included in the group and its child groups. If the policy is currently not applied to any machine, its status is "OK". 2.11.5.5.
Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a duplicate of an already stored one, its content is not transferred over the network. Deduplication is performed on disk blocks (block-level deduplication) and on files (file-level deduplication), for disk-level and file-level backups respectively. In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Performed on a managed machine during backup.
Before sending the item to the vault, the agent queries the deduplication database to determine whether the item's hash value is the same as that of an already stored item. If so, the agent sends only the item's hash value; otherwise, it sends the item itself. Some items, such as encrypted files or disk blocks of a non-standard size, cannot be deduplicated, and the agent always transfers such items to the vault without calculating their hash values.
• When performing incremental backups of data that does not change itself, but changes its location. Such is the case when multiple pieces of data circulate over the network or within one system. Each time a piece of data moves, it is included in the incremental backup which becomes sizeable while it does not contain new data. Deduplication helps to solve the problem: each time an item appears in a new place, a reference to the item is saved instead of the item itself.
What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previous example, increasing the number of machines would lead to ratios of 3:1, 4:1, etc.), a reasonable expectation for a typical environment is a ratio between 1.2:1 and 1.6:1. As a more realistic example, suppose that you are performing a file-level or disk-level backup of two machines with similar disks.
File-level deduplication restrictions During a file backup to an archive in a deduplicating vault, deduplication of a file is not performed in the following cases: • If the file is encrypted and the In archives, store encrypted files in decrypted state check box in the backup options is cleared (it is cleared by default) • If the file is less than 4 KB in size • If you protected the archive with a password Files that were not deduplicated are stored in the archive as they would be in a non-deduplicat
3. To specify credentials for connection, click Options and then type the user name and password in the User name and Password boxes respectively. In Windows, if you leave the User name box empty, the credentials under which the console is running will be used. 4. To save the password for the specified user name, select the Save password check box; the password will be saved in a secure storage on the machine where the console is running. 2.11.7.2.
A user who is a member of this group is a management server administrator. Management server administrators can connect to the management server by using Acronis Backup & Recovery 10 Management Console; they have the same management rights on the registered machines as users with administrative privileges on those machines—regardless of the contents of Acronis security groups there.
Users with these additional privileges are also called storage node administrators. Recommendations on user accounts To allow users to access the centralized vaults managed by a storage node, you must ensure that those users have a right to access the storage node from the network.
2.11.7.7. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Backup & Recovery 10 Management Server, and Acronis Backup & Recovery 10 Storage Node components run as services. When installing any of these components, you need to specify the account under which the component's service will run. For each service, you can either create a dedicated user account (recommended in most cases) or specify an existing account of a local or domain user—for example: .
2.11.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acronis Backup & Recovery 10 components communicate with each other using secure authentication and encryption. This section also provides information on configuring communication settings, selecting a network port for communication, and managing security certificates. 2.11.8.1.
Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node Yes Yes Acronis PXE Server No Yes Acronis Backup & Recovery 10 Bootable Agent Yes Yes 2.11.8.3. Configuring communication settings You can configure communication settings, such as whether to encrypt transferred data, for Acronis Backup & Recovery 10 components installed on one or more machines, by using Acronis Administrative Template.
Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disabled The same as Not configured. For details about the network port and instructions on how to specify it in Linux and a bootable environment, see Network port configuration (p. 78). Client Encryption options Specifies whether to encrypt the transferred data when the component acts as a client application, and whether to trust self-signed SSL certificates.
Always use The use of SSL certificates is enabled. The connection will be established only if the use of SSL certificates is enabled on the server application. Disabled The same as Not configured. Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application. Select one of the following: Not configured The component will use the default setting, which is to use encryption if possible (see the following option). Enabled Encryption is enabled.
2.11.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network communication port by default. The server listens to this port for incoming connection. This port is also used as default by the Acronis client. During component installation you might be asked to confirm the port opening or to open the port manually, in case you are using a firewall other than Windows Firewall.
In Windows, the certificate path and the server certificate's file name are specified in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Encryption\Server. The default path is %SystemDrive%\Program Files\Common Files\Acronis\Agent. To ensure reliability, the certificate is stored in Windows Certificate Store at the following location: Certificates (Local Computer)\Acronis Trusted Certificates Cache.
Non-self-signed certificates You have the option to use trusted third-party certificates or certificates created by your organization's CA as an alternative to self-signed certificates, by using Acronis Certificate Commandline Utility. To install a third-party certificate 1. Click Start, then click Run, and then type: certmgr.msc 2. In the Certificates console, double-click the name of the certificate that you want to install. 3. In the Details tab, in the list of fields, click Thumbprint. 4.
3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1. Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.1.
The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displaying of pop-up messages is disabled, you can review the task execution states and results in the Tasks view. The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3.
3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the log. With the minimum 1% setting, the log will be nearly cleared. Even if you remove the log size limit, logging events to an SQL Server Express database will stop after the log size reaches 4 GB, because SQL Express Edition has the 4 GB per database limit. Set the maximum log size to approximately 3.8 GB if you want to use the maximum capacity of the SQL Express database.
To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appropriate options as follows: o Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. o Server name/IP – type the name or IP address of the host running the SNMP management application, the messages will be sent to. o Community – type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong.
b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is installed. Provide access credentials for the machine. c. Repeat this step if there are several Acronis WOL Proxies. 3. When scheduling a backup policy, enable the Use Wake-On-LAN setting. You also have the ability to delete proxies from the list. Please keep in mind that any change to this option affects the entire management server.
On the vCenter Server side When integration is enabled, the vCenter Server will store and show information about when and how successful each virtual machine was backed up. The same information is displayed in the Status and the Last backup columns on the management server. Backup status - the most severe status of all backup plans and backup policies on the machine. For more information, see "Backup plan statuses (p. 182)" and "Policy status on a machine (p. 62)".
3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers. If you do not modify the event tracing options anywhere except for here, your settings will be effective for each local backup plan and each task created on the machine.
The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. You can override the settings set here, exclusively for the events that occur during backup or during recovery, in the Default backup and recovery options (p. 90).
5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operating system. Linux To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or the snmpd (for Debian) package has to be installed. SNMP can be configured using the snmpconf command. The default configuration files are located in the /etc/snmp directory: • • /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd.
• • The type of the data being backed up (disk, file) • The backup scheme (Back up now or using the scheduler) The backup destination (networked location or local disk) The following table summarizes the availability of the backup options. Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backup File backup + + + + Source files exclusion (p. 93) + + + + Pre/Post backup commands (p. 94) + + PE only PE only Pre/Post data capture commands (p.
media media Do not show messages and dialogs while processing (silent mode) + + + + Re-attempt if an error occurs + + + + Ignore bad sectors + + + + Dest: local Dest: local - - Task start conditions (p. 108) + + - - Task failure handling (p.
3.4.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable media. This option is effective for both disk-level and file-level backup. The preset is: Disabled. To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2. In the Enter the password field, type a password. 3. In the Confirm the password field, re-type the password. 4.
• Exclude all system files and folders Select this check box to skip files and folders with the System attribute. If a folder is System, all of its contents — including files that are not System — will be excluded. You can view file or folder attributes in the file/folder properties or by using the attrib command. For more information, refer to the Help and Support Center in Windows.
The program does not support interactive commands, i.e. commands that require user input (for example, "pause"). To specify pre/post commands 1. Enable pre/post commands execution by checking the following options: o Execute before the backup o Execute after the backup 2. Do any of the following: o Click Edit to specify a new command or a batch file o Select the existing command or the batch file from the drop-down list 3. Click OK.
Post-backup command To specify a command/executable file to be executed after the backup is completed 1. In the Command field, type a command or browse to a batch file. 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field, specify the command execution arguments, if required. 4. If successful execution of the command is critical for your backup strategy, select the Fail the task if the command execution fails check box.
o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture command To specify a command/batch file to be executed before data capture 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3.
Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not back up until the command execution is complete Selected Selected Cleared Cleared Result Preset Continue the backup only after the command is successfully executed. Delete the TIB file and temporary files and fail the task if the command execution fails. 3.4.1.5. Continue the backup after the command is executed despite command execution failure or success.
The option determines whether to take snapshots of multiple volumes at the same time or one by one. The preset is: Enable. When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously. Use this option to create a time-consistent backup of data spanned across multiple volumes, for instance for an Oracle database. When this option is set to Disable, the volumes' snapshots will be taken one after the other.
3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable media. The option defines the level of compression applied to the data being backed up. The preset is: Normal. The optimal data compression level depends on the type of data being backed up. For example, even maximum compression will not significantly reduce the archive size if the archive contains essentially compressed files, such as .jpg, .pdf or .mp3. However, formats such as .doc or .
• Normal – to run the backup process with normal speed, allocating resources on a par with other processes • High – to maximize the backup process speed by taking resources from other processes. HDD writing speed This option is effective for Windows and Linux operating systems and bootable media.
3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media. The option enables you to receive e-mail notifications about the backup task's successful completion, failure or need for interaction along with the full log of the task. The preset is: Disabled.
• Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct. Messenger service (WinPopup) This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine. This option is not available when operating under bootable media. The option enables you to receive WinPopup notifications about the backup task's successful completion, failure or need for interaction. The preset is: Disabled.
To select whether to log the backup operations events in the Application Event Log of Windows: Choose one of the following: • Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 87). • Log the following event types – to log events of the backup operations in the Application Event Log.
• Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP managers. 3.4.1.12. Fast incremental/differential backup The option is effective in Windows and Linux operating systems and bootable media. This option is effective for incremental and differential disk-level backup. This option defines whether a file change is detected using the file size and time stamp or by comparing the file contents to those stored in the archive. The preset is: Enabled.
to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size. 3.4.1.14. File-level security These options are effective only for file-level backup in Windows operating systems. In archives, store encrypted files in a decrypted state This option defines whether to decrypt files before saving them to a backup archive. The preset is: Disabled.
Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
the data will be backed up and you will be able to mount the resulting disk backup and extract valid files to another disk. 3.4.1.17. Dual destination This option is effective for both Windows and Linux operating systems, when the primary backup destination is a local folder or Acronis Secure Zone and the secondary destination is another local folder or network share. Managed vaults and FTP servers are not supported as secondary destinations. The preset is: Disabled.
The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the scheduler starts monitoring the conditions and launches the task as soon as the conditions are met. If the conditions are never met, the task will never start. To handle the situation when the conditions are not met for too long and further delaying the backup is becoming risky, you can set the time interval after which the task will run irrespective of the condition.
The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts. The program stops trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depending on which comes first. If the task fails because of a mistake in the backup plan, you can edit the plan while the task is in the Idle state.
If the console is connected to the management server The Use a separate tape set option has more precise definitions. So for the backup policy to be created you can use a separate tape set for all machines or for each single machine. The A single tape set for all machines option is selected by default. Generally this option ensures more efficient usage of tapes, than the A separate tape set for each single machine option.
When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To disable this warning, select this check box. Dismount media after backup has finished This option is effective in Windows and Linux operating systems. This option is effective when backing up to a removable media (CD, DVD, tape or floppy disk.) The preset is: Disabled.
When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the machine boots from a hard disk drive by default and you select this check box, the machine will be restarted and the operating system will start as soon as the bootable agent has finished creating the backup.
3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a recovery task, you can either use a default option, or override the default option with the custom value that will be specific for this task only. You can also customize a default option itself by changing its value against the pre-defined one.
Validate backup archive before recovery + + + + Check file system after recovery + - + - Reboot machine automatically if it is required for recovery + + - - Windows recovery - Windows recovery - E-mail (p. 117) + + - - Win Pop-up (p. 118) + + - - Windows events log (p. 119) + + - - SNMP (p. 119) + + - - Change SID after recovery Notifications: Event tracing: 3.4.2.1.
Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. 4.
3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This option is not available when operating under the bootable media. The priority of a process running in a system determines the amount of CPU and system resources allocated to that process. Decreasing the recovery priority will free more resources for other applications.
To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notifications. 2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can enter several addresses separated by semicolons. 3.
The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported. 3.
This option is not available when operating under the bootable media. The option defines whether the agent(s) operating on the managed machine have to send the log events of the recovery operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.
When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can set the time interval and the number of attempts. The attempts will be stopped as soon as the operation succeeds OR the specified number of attempts is performed, depending on which comes first. For example, if the network location becomes unavailable or not reachable, the program will attempt to reach the location every 30 seconds, but no more than 5 times.
The preset is Disabled. This option enables booting the machine into the recovered operating system without user interaction. Change SID after the recovery is finished The preset is Disabled. Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system. You do not need a new SID when recovering a system over itself or when creating a system replica that will replace the original system.
4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each managed machine. Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vaults tree. Click this item to display groups of centralized and personal vaults. Centralized. This group is available when the console is connected to a managed machine or to a management server.
Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the machine where the storage node is installed. The scope of a user's privileges in a vault depends on the user's rights on the storage node. A user who is a member of the Users group can view and manage his/her own archives. Members of the Administrators group can view and manage any archive stored on the storage node.
• [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Use the archives toolbar to perform actions on the selected archives and backups. The list of backups is expanded by clicking the "plus" sign to the left of the archive's name.
password (if the vault is encrypted) and information in the Comments field. Validate a vault • The Edit unmanaged vault page lets you edit the vault's name and information in the Comments field. 1 Select the vault. 2 Click Validate. You will be taken to the Validation (p. 233) page with an already pre-selected vault as a source. The vault validation checks all the archives in this vault. Delete a vault 1 Select the vault. 2 Click Delete.
4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the following steps Vault Name Specify a unique name for the vault. Creation of two centralized vaults with the same name is prohibited. Comments [Optional] Enter the distinctive description of the vault being created. Type Select the Managed type. Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p.
o o o o o on the hard drives local to the storage node on a network share on a Storage Area Network (SAN) on a Network Attached Storage (NAS) on a tape library locally attached to the storage node. To create a new folder for the vault in the selected location, click Create folder. 2. Click OK. A vault can be created in an empty folder only. We do not recommend creating a deduplicating managed vault on a FAT32 volume.
o o o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm with a 128-bit key AES 192 – the vault contents will be encrypted using the AES algorithm with a 192-bit key AES 256 – the vault contents will be encrypted using the AES algorithm with a 256-bit key. 5. Click OK. The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly generated key with a user-defined size of 128, 192 or 256 bits.
To create a new folder for the vault, click Create folder. A vault can be created in an empty folder only. 2. Click OK. 4.1.2.3. Attaching a managed vault A vault managed by a storage node can be attached to another storage node. You might need to do so when retiring storage node hardware, when the storage node is lost or when balancing loads between storage nodes. As a result, the first node stops managing the vault.
4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acronis Backup & Recovery 10 Storage Node. The storage node should be installed on the machine a tape library is attached to. Storage node can simultaneously use more than one tape library for keeping archives. To manage a tape library media, the storage node uses the Windows Removable Storage Manager (RSM). See the RSM Media Pools (p. 133) section for more information.
If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by software. Tape libraries are a cost-effective solution for data storages with huge capacity. Moreover, tape is perfect for archiving because cartridges can be stored off-site for enhanced data security. However reading even a small amount of data from a tape library takes much more time (from several seconds to several minutes) than from other types of data storages.
If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to. If the application is not found, the RSM will move the tape into the Unrecognized pool. If the application is not found, but the RSM database has no information about the tape, it will be moved into the Import pool. If the RSM database has the information, the tape moves into its own pool of the application.
Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted, you can define the tape label for identification purposes later. You should have Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console installed on local or remote machines, as well as Acronis Backup & Recovery 10 Storage Node, installed on the machine with the tape library device, and registered in the management server.
At the Delete operation, the vault content will be deleted from the storage node database without accessing the tapes. The plans and tasks that use this vault will fail. The backup archives, belonging to a deleting centralized vault on a tape library, will be deleted as well, but these archives might be recovered by any storage node through the Rescan operation.
The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction window comes up if a required tape is not found. Keep in mind that a data recovery operation may require access to a number of tapes.
To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage tapes and then click Start inventory on the Tape Management window. When inventorying is completed a user has the list of tapes currently loaded into the library. Perform the procedure every time you load new tapes into tape library slots. Rescan As stated above the storage node keeps information about tapes and their contents in a dedicated database.
Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the storage node service (ASN User) has write permissions for these pools. These permissions are not assigned to ASN User during installation, so you might need to add them manually. To define your own label for a tape, select a related data field, type in a new label, click Eject tape, write the same label on the tape cartridge (to make association with the label) and insert it back into the same slot.
• Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape, with the required label, to be loaded into the tape library device. • Use a free tape - the backup will be written onto a free tape, so the operation will be paused only if there is no free tape in the library. Always use a free tape If you leave the options below unchanged, then each backup will be written onto the tape specified by the Use a separate tape set option.
Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes. Acronis Backup & Recovery 10 provides automation of tape rotation for Grandfather-Father-Son, Tower of Hanoi, and Custom backup schemes. Grandfather-Father-Son (p. 33) (GFS) and Tower of Hanoi (p. 37) (ToH) are the most popular backup schemes to use on tape library devices.
• • the full size of the data to protect is approximately 320 GB • • the approximate size of weekly changes of data is no more than 40 GB the approximate size of daily changes of data is about 16 GB tape capacity is 400 GB. Let’s analyze the results of a combination of GFS and ToH schemes with different tape options for the case. All the below analyzed examples are a simplistic approach to a real case, but provide you with a general conception of backup distribution onto tapes.
• GFS Example 3 (p. 147). The Use a separate tape set option is selected. All the Always use a free tape options are selected. It requires 28 tapes in rotation. These examples demonstrate how the number of tapes required for automated rotation depends on the tape options. If a tape library does not have enough tapes for automated rotation, the Tasks Need Interaction window will sometimes ask you to load a free tape into the library.
• four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of the 4th week. However tape 02 has only 104 Gb of free space at the moment. So after the tape reaches the end, the recording continues from the beginning of free tape 03. Keep in mind, that the Cleanup task is launched after each backup operation for the GFS scheme. This task deletes all the outdated backups.
The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and 24 on Friday of the 52nd week. As all backups of tape 01 have been deleted, the tape is considered as free and can be reused.
GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set option is selected • the Always use a free tape: For each full backup option is selected • the Always use a free tape: For each incremental backup option is cleared • the Always use a free tape: For each differential backup option is cleared. The example has only one difference from the previous one. That is selection of the Always use a free tape: For each full backup option.
As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GFS Example 1.
These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of the rotation scheme that uses 8 tapes for daily backups, 6 tapes for weekly backups and 13 tapes for monthly backups (since there are 13 four-week cycles in a year) for the analyzed case. And one tape is required for the next backup. In total this rotation scheme, combined with the options requires 28 tapes.
go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it allows the roll-back period equal 64 days. The roll-back period is always half the number of sessions. Each additional level doubles not only the number of sessions but also the oldest backup age. Let’s return to the analyzed case described in the Case to analyze (p. 141) section, and suppose the ToH settings are the following: • • Schedule: Start the task every 1 day at 11:00 PM. Repeat once.
As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated backups are deleted automatically. In the next figure the deleted backups are drawn as dark-gray rectangles. Actually the deleted backup is still stored on the tapes, but the information about it is deleted from the storage node database.
The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options. The recurring part of the scheme contains sixteen backup sessions. The figure displays the backup archive state at the moment when the 17th session is finished. In the figure below the backups deleted at the moment are drawn as dark-gray rectangles.
The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the rotation is seven that is more than in classical five-level ToH scheme. Two additional tapes used for: 1. keeping an old full backup (postponed deletion) as it is a base for other level backups 2. keeping an old backup on a level until a new backup has been successfully created on the level. The example demonstrates that the tapes’ usage efficiency is reduced.
• • tape rotation scheme ( frequency of backups, retention rules) • requirements to support off-site tape cartridge archives. tape-append options There is no common formula to calculate a number of tapes required in all possible combinations of above listed considerations. But the general way to get a number of tapes for a case includes the following steps: 1. Draw (or write) a chain of backups until the first backup can be deleted 2.
• • average size of incremental backups is I_GB • • compression level provides CL average reduction coefficient average size of differential backups is D_GB selected tape rotation scheme is Custom with the following settings: o full backup - every 10 days o differential backup - every 2 days o incremental backup - every 1 day, every 6 hours o retention rules: delete backups older than 5 days • tape options are the following: o the Use a separate tape set option is selected o the Always use a free tape
• What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis agents create backups on tapes in a format that differs from the format used by the storage node. It is the reason why it is impossible to interchange tapes between tape devices attached to a storage node and attached to a managed machine: a tape written by a storage node cannot be read by an agent in a locally attached tape device. However the storage node can read tapes written by an agent.
name. If you accidentally delete the .meta folder, it will be automatically recreated next time you access the vault. But some information like owner names and machine names may be lost. 4.2.1. Working with the "Personal vault" view This section briefly describes the main elements of the Personal vault view, and suggests the ways to work with them. Vault toolbar The toolbar contains operational buttons that let you perform operations with the selected personal vault.
• [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicates actions of the archives toolbar. • [Backup Name] The Actions bar is available when you expand the archive and click on any of its backups. Duplicates actions of the archives toolbar. 4.2.2. Actions on personal vaults To perform any operation (except for creation) with a vault, you must select it first.
4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the vault being created. 2. [Optional] In the Comments field, add a description of the vault. 3. In the Path field, click Change... In the opened Personal Vault Path window, specify a path to the folder that will be used as the vault. A personal vault can be organized on detachable or removable media, on a network share, or on FTP. 4. Click OK.
All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the [Archive name] actions bar (on the Actions and tools pane) and from the [Archive name] actions item of the main menu respectively. The following is a guideline for you to perform operations with archives stored in a vault. To Do Validate an archive Click Validate. The Validation (p. 233) page will be opened with the pre-selected archive as a source.
Recover a disk/volume as a virtual machine Validate a backup Right-click the disk backup, then select Recover as virtual machine. The Recover data (p. 214) page will be opened with the pre-selected backup as a source. Select the location and the type of new virtual machine and then proceed as with regular disk or volume recovery. Click Validate. The Validation (p. 233) page will be opened with the pre-selected backup as a source.
There should be enough space in the vault for temporary files created during consolidation. Backups resulting from consolidation always have maximum compression. 4.3.4. Filtering and sorting archives The following is a guideline for you to filter and sort archives in the archives table. To Do Sort backup archives by any column Click the column's header to sort the archives in ascending order. Filter archives by name, owner, or machine.
5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not met is defined by the Task start conditions (p. 108) backup option. What-ifs • What if an event occurs (and a condition, if any, is met) while the previous task run has not completed? The event will be ignored. • What if an event occurs while the scheduler is waiting for the condition required by the previous event? The event will be ignored.
Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6PM. If you have created the task after 6 PM, the task will be started for the first time on the next day at 6 PM. To: not set. The task will be performed for an indefinite number of days.
First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. 5.2. Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...
Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six months. The schedule's parameters are thus set up as follows. 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still be available in the Tasks view after this date.
• • Tuesday: every 3 hours from 9 AM till 9 PM • • • • Thursday: every 3 hours from 9 AM till 9 PM Wednesday: every 3 hours from 9 AM till 9 PM Friday: twice at 12 PM and 9 PM (i.e. same as on Monday) Saturday: once at 9 PM Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the task: First schedule 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1.
In the During the day execute the task... area, select one of the following: Once at: <...> Set up the time at which the task will be run once. Every: <...> Set up how many times the task will be run during the specified time interval. For example, setting the task frequency to Every 1 hour From 10:00:00 AM until 10:00:00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day. From: <...> Until: <...> In the Effective... area, set the following settings: From: <...
3. Every: 6 hours. From: 12:00:00 AM Until: 06:00:00 PM. 4. Effective: From: 08/30/2009. Actually the task will be started on the first workday of September. By setting up this date we just define that the task must be started in 2009. To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we just define that the task must be discontinued in 2010, after autumn ends in the northern hemisphere.
From: 11/01/2009. To: not set. 5.4. Advanced scheduling settings The following advanced settings are available when setting up a daily, weekly, or monthly schedule in a backup policy. Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the WakeOn-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start.
Second machine: Every day at 09:00:00 AM Third machine: Every day at 09:59:59 AM Example 2 Suppose that you are deploying a backup policy with the following schedule to three machines: Run the task: Daily Every: 2 Hour(s) From: 09:00:00 AM Until: 11:00:00 AM Distribute start time within the time window Maximum delay: 1 Hour(s) Distribution method: Random Then the time of the task's first run on each machine may be any time between 09:00:00 AM and 09:59:59 AM; the interval between the first and the second ru
Event source Specifies the event source, which typically indicates the program or the system component that caused the event—for example: disk Event type Specifies the event type: Error, Warning, Information, Audit success, or Audit failure. Event ID Specifies the event number, which typically identifies the particular kind of events among events from the same source.
• • Event type: Information Event ID: 18 Tip: To set up a similar backup plan for machines running Microsoft Windows XP, replace the text in Event source with Windows Update Agent and leave the remaining fields the same. How to view events in Event viewer To open a log in Event Viewer 1. On the Desktop or in the Start menu, right-click My Computer, and then click Manage. 2. In the Computer Management console, expand System Tools, and then expand Event Viewer. 3.
Example: It is required to run the backup task after free space on the managed machine is changed by at least 1 GB, but only if all users are logged off and more than 12 hours have passed since the last backup. Set the schedule, conditions and the Task start conditions backup option as follows: • • • • Schedule: When free space changed; Value: Run task if free space has changed by at least: 1 GB. Condition: User logged off; Value: Run the task on schedule only if all users are logged off.
• • Event: Weekly, Every 1 week(s) on ; Once at 09:00:00 PM. • Task start conditions: Skip the task execution. Condition: Location's host is available As a result, (1) If 9:00 PM comes and the location's host is available, the backup task starts right on time. (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available.
• • • If the task start conditions are Skip the task execution, the task will never run. If the task start conditions are Wait until the conditions are met and the Run the task anyway after check box is cleared, the task (scheduled to run at 3:00 PM) will start at 6:00 PM—the time when the condition is met.
(2) if the free space changes by more than 1GB after 12 hours pass since the last backup successful completion, the backup task will start immediately. (3) if the free space never changes by more than 1GB, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc.
6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1. Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.1.
server and run Acronis License Server to manage licenses. license key data was not corrupted. After a successful license check the agent will start working. Please make sure you have a valid license on Acronis License Server. Trial version of product expires in X day(s) Connect Once the trial version of the product is installed, the program starts the countdown of days remaining until the trial period expires. Connect 15 day trial period has expired. Enter a full license key.
How it is determined Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date. Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on this date. Information Highlight the date in green if only "Information" log entries appeared on this date (normal activity.) The Select current date link focuses selection to the current date.
unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 187) section for details. • • • In the backup table, select the backup plan (task). Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 184) section for details. You can run, edit, stop and delete the created plans and tasks. Use the Information panel to review detailed information on the selected plan (task). The panel is chevron.
Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup plan status is derived from the results of the last run of the plans' tasks. 1 State How it is determined How to handle Error At least one task has failed.
Need interaction Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The next state may be Stopping (if the user chooses to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that can put the task to the Running state.) Stopping The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state.
• Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to read the warnings -> [optionally] Perform actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" No action is required. 6.1.2.2. The "-" state means that the task has never been started or has been started, but has not finished yet and so its result is not available.
Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 188) window, select the task you need to be run. Running the backup plan starts the selected task of that plan immediately in spite of its schedule and conditions. Why can't I run the backup plan? • Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot run plans owned by other users. Task Click Run. The task will be executed immediately in spite of its schedule and conditions.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 194), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1 It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2 If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? • The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. • Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. • The backup plan has a centralized origin.
Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to column headers presented in the table. 2. Click the items you want to be displayed/hidden.
Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing VM) Recovery of a virtual machine backup to an existing virtual machine Recovery (new VM) Recovery of a virtual machine b
Settings The Settings tab displays information on scheduling and the options changed against the default values. Progress The Progress tab is available while the task is running. It is common for all types of tasks. The tab provides information about task progress, elapsed time and other parameters. Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates in four tabs all the information on the selected backup plan.
• • Archive name - name of the archive. Archive comments - comments on the archive (if provided). Settings The Settings tab displays the following information: • • • Backup scheme - the selected backup scheme and all its settings with schedules. Validation (if selected) - events before or after which the validation is performed, and validation schedule. Backup options - backup options changed against the default values. 6.1.3.
To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CTRL and click the log entries one by one • contiguous: select a single log entry, then hold down SHIFT and click another entry. All the entries between the first and last selections will be selected too. View a log entry’s details 1 Select a log entry. 2 Do one of the following • Click View Details. The log entry's details will be displayed in a separate window.
Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machine name, owner name, etc.) in the field below the respective column header. Sort log entries by date and time Click the column's header to sort the log entries in ascending order. Click it once again to sort the log entries in descending order. As a result you will see that the list of log entries fully or just partly coincide with the entered value.
6.2. Creating a backup plan Before creating your first backup plan (p. 370), please familiarize yourself with the basic concepts (p. 25) used in Acronis Backup & Recovery 10. To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan among others. Plan's credentials (p. 196) [Optional] The backup plan will run on behalf of the user who is creating the plan.
Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view check box. How to back up Backup scheme (p. 202) Specify when and how often to back up your data; define for how long to keep the created backup archives in the selected location; set up schedule for the archive cleanup procedure. Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi; create a custom backup scheme, or back up data once.
Host (p. 213) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 213) Here you select the resulting virtual machine type and location. Available options depend on the host you selected in the previous step. Storage (p. 213) Choose the storage on the virtualization server or the folder to place the virtual machine files in.
6.2.3. Source type Select the type of data you want to be backed up on the managed machine. The list of available data types depends on the agents running on the machine: Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders.
What does a disk or volume backup store? For supported file systems, with the sector-by-sector option turned off, a disk or volume backup stores only those sectors that contain data. This reduces the resulting backup size and speeds up the backup and recovery operations. Windows The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernation (hiberfil.sys) are not backed up. After recovery, the files will be re-created in the appropriate place with the zero size.
The program will access the source data using the credentials you specify. Use this option if the plan's account does not have access permissions to the data. Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK. 6.2.6. Exclusions Set up exclusions for the specific types of files you do not wish to back up.
6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the destination Enter the full path to the destination in the Path field, or select the desired destination in the folders tree. • • • • To back up data to a centralized vault, expand the Centralized group and click the vault. To back up data to a personal vault, expand the Personal group and click the vault.
Backing up to an existing archive You can configure the backup plan to back up to an existing archive. To do so, select the archive in the archives table or type the archive name in the Name field. If the archive is protected with a password, the program will ask for it in the pop-up window. By selecting the existing archive, you are meddling in the area of another backup plan that uses the archive.
6.2.9. Backup schemes Choose one of the available backup schemes: • Back up now – to create a backup task for manual start and run the task immediately after its creation. • Back up later – to create a backup task for manual start OR schedule one-time task execution in the future. • • Simple – to schedule when and how often to backup data and specify retention rules. Grandfather-Father-Son – to use the Grandfather-Father-Son backup scheme.
6.2.9.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data and set the retention rule. At the first time a full backup will be created. The next backups will be incremental. To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 162) section. Retention rule 6.2.9.4.
Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The default value is Workdays. Weekly/Monthly: Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day. The default value is Friday.
• • Weekly/monthly: Saturday (for example) Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be available for seven days since creation. For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted.
Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months. The following GFS scheme suits such purposes: • • • • Start backup at: 11:30 PM Back up on: Tuesday, Thursday, Friday Weekly/monthly: Friday Keep backups: o Daily: 6 months o Weekly: 6 months o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups performed on Fridays.
Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 163), weekly (p. 165), or monthly (p. 167) schedule. Setting up schedule parameters allows creating simple schedules (example of a simple daily schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (example of a complex daily schedule: a task will be run every 3 days, starting from January 15.
Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to have is called the roll-back period. The following table shows full backup and roll-back periods for schemes of various levels.
6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Incremental Specifies on what schedule and under which conditions to perform an incremental backup.
might end up with no backups if the program is not able to create the new backup for some reason. Apply the rules Specifies when to apply the retention rules (p. 39). (only if the retention rules are set) For example, the cleanup procedure can be set up to run after each backup, and also on schedule. This option is available only if you have set at least one retention rule in Retention rules. Cleanup schedule Specifies a schedule for archive cleanup.
Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates the use of all options available in the Custom scheme. Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and daily incremental backups. Then the backup schedule can look as follows.
• • Full backup, runs every Friday at 10:00 PM • Differential backup, runs manually Incremental backup, runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans and tasks section in the left pane. If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks: three backup tasks and one cleanup task. 6.2.10. Archive validation Set up the validation task to check if the backed up data is recoverable.
task manually after powering off the machine. Any changes made to the machine while it was powered on, will be overwritten. 6.2.11.2. Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
Virtual machines created on a Hyper-V server or workstation type machines (VMware Workstation, Microsoft Virtual PC or Parallels Workstation) use as much disk space as the original data occupies. Since the space is not pre-allocated, the physical disk on which the virtual machine will run is expected to have sufficient free space for the virtual disks to increase in size. 6.3.
Task credentials (p. 217) [Optional] The task will run on behalf of the user who is creating the task. You can change the task account credentials if necessary. To access this option, select the Advanced view check box . What to recover Archive (p. 217) Select the archive to recover data from. Data type (p. 217) Applies to: disk recovery Choose the type of data you need to recover from the selected disk backup. Content (p. 218) Select the backup and content to be recovered. Access credentials (p.
[Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 227) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers. Acronis Universal Restore will install drivers that better fit the target hardware.
2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 31) section. 6.3.2. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
• • Disks - to recover disks • Files - to recover specific files and folders Volumes - to recover volumes 6.3.4. Content selection The representation of this window depends on the type of data stored in the archive. 6.3.4.1. Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive backups by its creation date and time. Thus, you can revert the disk data to a certain moment in time. Specify the items to recover.
6.3.5. Access credentials for location Specify the credentials required for access to the location where the backup archive is stored. To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the task account specified in the General section. o Use the following credentials The program will access the location using the credentials you specify.
The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displayed in the Virtual Machine Settings (p. 224) section. Check the settings and make changes if necessary. Then you proceed to the regular disk mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed.
• Create new The program will generate a new NT signature for the target hard disk drive. • Recover from backup The program will replace the NT signature of the target hard disk with one from the disk backup. Recovering the disk signature may be desirable due to the following reasons: o Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk.
Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 222) Choose the disk to recover the Master Boot Record to. NT signature: (p. 220) Select the way the disk's signature contained in the MBR will be handled. The disk signature is used by Windows and the Linux kernel version 2.6 and later. Recover [Volume] [Letter] to: Disk # /Volume (p. 222) Sequentially map each of the source volumes to a volume or an unallocated space on the destination disk. Size (p.
Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and multiple logical drives. By default, the program selects the original volume's type. You can change this setting, if required. • Primary. Information about primary volumes is contained in the MBR partition table. Most operating systems can boot only from the primary volume of the first hard disk, but the number of primary volumes is limited.
To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the virtualization server that I select option. 2. In the left part of the window, select the virtualization server. Use the right part of the window to review details on the selected server. 3. Click OK to return to the Data recovery page. To select the type of virtual machine 1. Choose the Save as files of the VM type that I select to the folder that I specify option. 2.
This is the number of processors of the new virtual machine. In most cases it is set to one. The result of assignment of more than one processor to the machine is not guaranteed. The number of virtual processors may be limited by the host CPU configuration, the virtualization product and the guest operating system. Multiple virtual processors are generally available on multi-processor hosts. A multicore host CPU or hyperthreading may enable multiple virtual processors on a single-processor host. 6.3.6.5.
Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file named test.log located in the folder C:\Finance Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. The above settings are not effective for the files or folders that were explicitly selected for recovery.
• Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the recovery task: • • Recover now - the recovery task will be started immediately after you click the final OK. Recover later - the recovery task will be started at the date and time you specify. If you do not need to schedule the task and wish to start it manually afterwards, select the Task will be started manually (do no schedule the task) check box. 6.3.9.
- If the drivers are on a vendor's disc or other removable media, turn on the Search removable media. - If the drivers are located in a networked folder or on the bootable media, specify the path to the folder in the Search folder field. During recovery, Universal Restore will perform the recursive search in all the sub-folders of the specified folder, find the most suitable HAL and HDD controller drivers of all those available, and install them into the recovered system.
XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation machine can be converted to the open virtualization format (OVF) using the VMware OVF tool. With Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi, you can recover a disk (volume) backup to a new virtual machine on the respective virtualization server. To convert a disk backup to a virtual machine: 1.
6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it will boot after recovery. However, the information the operating system stores and uses for booting up may become outdated during recovery, especially if you change volume sizes, locations or destination drives. Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
• The system loader points to the wrong volume This may happen when system or boot volumes are not recovered to their original location. Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this automatically and so you are not likely to experience the problem. For the GRUB and LILO loaders, you will need to correct the GRUB configuration files.
The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu item. o The device on which the Linux kernel is located—typically, this is the boot partition or the root partition, such as root (hd0,0) in this example. o The path to the kernel on that device and the root partition—in this example, the path is /vmlinuz-2.6.24.4 and the root partition is /dev/sda2.
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect Windows Vista/2008 A part of the loader resides in the partition boot sector, the rest is in the files bootmgr, boot\bcd. At starting Windows, boot\bcd is mounted to the registry key HKLM \BCD00000000. 6.3.12.
bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the backup can be successfully validated using the bootable media. Different ways to create a validation task Using the Validation page is the most general way to create a validation task. Here you can validate immediately or set up a validation schedule for any backup, archive or location you have permission to access.
To specify credentials 1. Select one of the following: o Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. o Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name.
According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. o If the archive is stored on a locally attached tape device, expand the Tape drives group, then click the required device. 2. In the table to the right of the tree, select the archive.
6.4.5. Access credentials for source Specify the credentials required for access to the location where the backup archive is stored. To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the task account specified in the General section. o Use the following credentials The program will access the location using the credentials you specify.
Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: • • Sharing: mounted images can be easily shared to networked users. "Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine.
o If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself.
Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.5.4.
To unmount an image, select it in the table and click To unmount all the mounted volumes, click Unmount. Unmount all. 6.7. Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient part copy of an archive in the location you specify. The original archive remains untouched. The export operation can be applied to: • • a single archive - an exact archive copy will be created a single backup - an archive consisting of a single full backup will be created.
The resulting archive's options The exported archive inherits the options of the original archive, including encryption and the password. When exporting a password-protected archive, you are prompted for the password. If the original archive is encrypted, the password is used to encrypt the resulting archive.
Task credentials (p. 243) [Optional] The export task will run on behalf of the user who is creating the task. You can change the task credentials if necessary. To access this option, select the Advanced view check box. What to export Export Select an object to export: Archive (p. 217) - in that case, you need to specify the archive only. Backups (p. 245) - specify the archive first, and then select the desired backup(s) in this archive Access credentials (p.
To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 31) section. 6.7.2. Archive selection To select an archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
6.7.3. Backup selection To specify a backup(s) to export 1. At the top of the window, select the respective check box(es). To ensure that you choose the right backup, click on the backup and look at the bottom table that displays the volumes contained in the selected backup. To obtain information on a volume, right-click it and then select Information. 2. Click OK. 6.7.4.
• To export data to a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself.
In any of the above cases, provide an archive name that is unique to the destination folder or vault. If you need to redo the export using the same archive name, first delete the archive that resulted from the previous export operation. 6.7.6. Access credentials for destination Specify credentials required for access to the location where the resulting archive will be stored. The user whose name is specified will be considered as the archive owner. To specify credentials 1.
Size (p. 248) Specify the exact size of the zone. Moving or resizing of locked volumes, such as the volume containing the currently active operating system, requires a reboot. Settings Password (p. 248) [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the password appear at any operation relating to the zone. After you configure the required settings, click OK. In the Result confirmation (p.
2. In the Enter the password field, type a new password. 3. In the Confirm the password field, re-type the password. 4. Click OK. To disable password 1. Choose Do not use. 2. Click OK. 6.8.1.4. Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start.
• • examine backup content • safely delete archives and backups from the archives. mount a volume backup to copy files from the backup to a physical disk To learn more about operations with vaults, see the Vaults (p. 123) section. 6.8.2.1. Increasing Acronis Secure Zone To increase Acronis Secure Zone 1. On the Manage Acronis Secure Zone page, click Increase. 2. Select volumes from which free space will be used to increase the Acronis Secure Zone. 3.
If you select several volumes, the space will be distributed proportionally to each partition. If you do not select any volume, the freed space becomes unallocated. After you click OK, Acronis Backup & Recovery 10 will start deleting the zone. When removing Acronis Backup & Recovery 10 agent from the system, you have two options: to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone. 6.9.
• • recover an operating system that cannot start • • • • deploy an operating system on bare metal access and back up the data that has survived in a corrupted system create basic or dynamic volumes on bare metal back up sector-by-sector a disk with an unsupported file system back up offline any data that cannot be backed up online because of restricted access, being permanently locked by the running applications or for any other reason.
Linux-based bootable media Start the Bootable Media Builder either from the management console, by selecting Tools > Create Bootable Media or, as a separate component. Select the way volumes and network resources will be handled—called the media style: • A media with Linux-style volume handling displays the volumes as, for example, hda1 and sdb2. It tries to reconstruct MD devices and logical (LVM) volumes before starting a recovery.
It is recommended that you familiarize yourself with the help documentation supplied with Windows AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 260) for details. 6.10.1.1. Linux-based bootable media When using the media builder, you have to specify: 1.
Kernel parameters This window lets you specify one or more parameters of the Linux kernel. They will be automatically applied when the bootable media starts. These parameters are typically used when experiencing problems while working with the bootable media. Normally, you can leave this field empty. You also can specify any of these parameters by pressing F11 while in the boot menu. Parameters When specifying multiple parameters, separate them with spaces.
nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing on some hardware. nofw Disables the FireWire (IEEE1394) interface support. nopcmcia Disables detection of PCMCIA hardware. nomouse Disables mouse support. module_name=off Disables the module whose name is given by module_name. For example, to disable the use of the SATA module, specify: sata_sis=off pci=bios Forces the use of PCI BIOS instead of accessing the hardware device directly.
Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network interface cards. To ensure that each NIC will be assigned the appropriate settings, create the media on the server for which the media is customized. When you select an existing NIC in the wizard window, its settings are selected for saving on the media. The MAC address of each existing NIC is also saved on the media.
• to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the target hardware has a specific mass storage controller (such as a SCSI, RAID, or Fiber Channel adapter) for the hard disk. For more information please refer to Universal Restore (p. 227). The drivers will be placed in the visible Drivers folder on the bootable media.
7. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots into the WinPE, Acronis Backup & Recovery 10 starts automatically. 6.10.1.3. Adding the Acronis Plug-in to WinPE 2.x Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x: • Adding the Acronis Plug-in to the existing PE 2 ISO. This comes in handy when you have to add the plug-in to the previously configured PE 2 ISO that is already in use.
8. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots into WinPE, Acronis Backup & Recovery 10 starts automatically. To create a PE image (ISO file) from the resulting WIM file: • replace the default boot.wim file in your Windows PE folder with the newly created WIM file. For the above example, type: copy c:\AcronisMedia.wim c:\winpe_x86\ISO\sources\boot.wim • use the Oscdimg tool. For the above example, type: oscdimg -n –bc:\winpe_x86\etfsboot.
6.10.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the IP address(es) obtained from DHCP or set according to the pre-configured values. Remote connection To connect to the machine remotely, select Connect -> Manage a remote machine in the console menu and specify one of the machine's IP addresses. Provide the user name and password if these have been configured when creating the bootable media.
1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then proceed with booting. 3. From the list of supported video modes, choose the appropriate one by typing its number (for example, 318), and then press ENTER.
6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based bootable media contains the following commands and command line utilities, which you can use when running a command shell. To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console.
gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.10.5. Recovering MD devices and logical volumes To recover Linux Software RAID devices, known as MD devices, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery.
Under the archive contents, Acronis Backup & Recovery 10 will display a message saying that it detected information about the volume structure. 4. Click Details in the area with that message. 5. Review the volume structure, and then click Apply RAID/LVM to create it. To create the volume structure by using a script 1. Boot the machine from a Linux-based bootable media. 2. Click Acronis Bootable Agent. Then, click Run management console. 3. On the toolbar, click Actions, and then click Start shell.
8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
--- Volume group --VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk7W-yDG3-uF1l-Q2AL-C0z0-vMeACu 5. Run the following command to create the logical volume; in the -L parameter, specify the size given by VG Size: lvm lvcreate -L1.99G --name my_logvol my_volgroup 6. Activate the volume group by running the following command: lvm vgchange -a y my_volgroup 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1.
... Dynamic & GPT Volumes: DYN1 4 my_volgroup-my_logvol 12533760 Ext2 You will need the volume's index, given in the Idx column, in the next step. 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimagemnt --mount /mnt --filename smb://server/backups/linux_machine.tib -i 4 This command mounts the logical volume DYN1, whose index in the backup is 4, on the mount point /mnt.
6.10.6.2. Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supports network booting. On a machine that has an operating system on the hard disk, the BIOS must be configured so that the network interface card is either the first boot device, or at least prior to the Hard Drive device. The example below shows one of reasonable BIOS configurations. If you don’t insert bootable media, the machine will boot from the network.
6.11. Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configuration for recovering the volume images saved by the Acronis Backup & Recovery 10 software. Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk configuration might change due to a HDD replacement or hardware loss.
Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a nonWindows machine. To do so, boot the machine from a bootable media (p. 371) created with the Acronis Bootable Media Builder; run the management console and then click Disk Management. 6.11.3.
Displaying operation results The results of any disk or volume operation, you have just planned, are immediately displayed in the Disk management view of the console. For example, if you create a volume, it will be immediately shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including changing the volume letter or label, are also immediately displayed in the view. 6.11.5.
After the initialization, all the disk space remains unallocated and so still impossible to be used for program installation or file storage. To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools. 6.11.5.2. Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk.
If the destination is smaller, then the As is option of cloning will be unavailable and proportional resizing of the source disk volumes will be mandatory. The program analyzes the target disk to establish whether its size will be sufficient to hold all the data from the source disk without any loss. If such transfer with proportional resizing of the source disk volumes is possible, but without any data loss , then the user will be allowed to proceed.
If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2. Click to clear the Turn off the machine after the cloning operation check box, if necessary. 3. Click Finish to add the pending operation. 4. Click Commit on the toolbar and then click Proceed in the Pending Operations window. 5. Wait until the task is finished. 6.11.5.3.
If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the selected volume, and then click Convert to MBR in the context menu. You will receive a warning window, stating that you are about to convert GPT into MBR. You will be explained the changes that will happen to the system after the chosen disk is converted from GPT to MBR. E.g.
In contrast to Windows Disk Manager the program ensures bootability of an offline operating system on the disk after the operation. 6.11.5.6. Disk conversion: dynamic to basic You would want to convert dynamic disks back to basic ones, e.g. if you want to start using an OS on your machine that does not support dynamic disks. If you need to convert a dynamic disk to basic: 1. Select the dynamic disk to convert to basic. 2.
One of the following disk statuses always appears in the graphical view of the disk next to the disk's name: • Online The online status means that a disk is accessible in the read-write mode. This is the normal disk status. If you need a disk to be accessible in the read-only mode, select the disk and then change its status to offline by selecting Change disk status to offline from the Operations menu. • Offline The offline status means that a disk is accessible in the read-only mode.
Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can consist of one region on the disk or several regions, virtually united by the Logical Disk Manager (LDM). It provides no additional reliability, no speed improvement, nor extra size. Spanned Volume A volume created from free disk space virtually linked together by the LDM from several physical disks.
Create volume wizard The Create volume wizard lets you create any type of volume (including system and active), select a file system, label, assign a letter, and also provides other disk management functions. Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to any previous step if necessary to change any previously selected options. To help you with your choices, each parameter is supplemented with detailed instructions.
o Select three destination disks to create the volume on. After you choose the disks, the wizard will calculate the maximum size of the resulting volume, depending on the size of the unallocated space on the disks you chose and the requirements of the volume type you have previously decided upon. If you are creating a dynamic volume and select one or several basic disks, as its destination, you will receive a warning that the selected disk will be converted to dynamic automatically.
If you are creating a basic volume, which can be made into a system volume, this page will be different, giving you the opportunity to select the volume Type — Primary (Active Primary) or Logical. Typically Primary is selected to install an operating system to a volume. Select the Active (default) value if you want to install an operating system on this volume to boot at machine startup. If the Primary button is not selected, the Active option will be inactive.
6.11.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volume. For this, you can set a volume to become active. A disk can have only one active volume, so if you set a volume as active, the volume, which was active before, will be automatically unset. If you need to set a volume active: 1. Select a primary volume on a basic MBR disk to set as active. 2. Right-click on the selected volume, and then click Mark as active in the context menu.
6.11.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volume for easier recognition. For example, one volume could be called SYSTEM — a volume with an operating system, or PROGRAM — an application volume, DATA — a data volume, etc., but it does not imply that only the type of data stated with the label could be stored on such a volume. In Windows, volume labels are shown in the Explorer disk and folder tree: LABEL1(C:), LABEL2(D:), LABEL3(E:), etc.
The new volume structure will be graphically represented in the Disk management view. If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the volume, but some programs (e.g. Setup programs) might calculate its disk space incorrectly. 6.11.7. Pending operations All operations, which were prepared by the user in manual mode or with the aid of a wizard, are considered pending until the user issues the specific command for the changes to be made permanent.
7. Centralized management This section covers operations that can be performed centrally by using the components for centralized management. The content of this section is only applicable to advanced editions of Acronis Backup & Recovery 10. 7.1. Administering Acronis Backup & Recovery 10 Management Server This section describes the views that are available through the navigation tree of the console connected to the management server, and explains how to work with each view. 7.1.1.
Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has less than 10% free space. View vaults will take you to the Centralized vaults (p. 125) view where you can examine the vault size, free space, content and take the necessary steps to increase the free space.
Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server. The chart shows the number of log entries of each type (error, warning, information) for a particular day. Statistics for the selected date are displayed to the right of the chart. All the statistics fields are interactive, i.e.
• Use the Information pane's tabs to view detailed information about the selected policy and perform additional operations, such as revoke the policy, view details of the machine (group) the policy is applied to, etc. The panel is collapsed by default. To expand the panel, click the chevron. The content of the pane is also duplicated in the Policy details (p. 292) window. • Use the filtering and sorting (p. 292) capabilities of the policy table for easy browsing and examination. 7.1.2.1.
o o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select a task and then click View log. Select a log entry and then click View details. This approach comes in handy if the policy state is Deployed, that is, the policies' tasks already exist on the managed machines. Select the policy and click View log. Check the "error" log entries to find out the reason of the failure: select a log entry and then click View details.
To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is described in-depth in the Creating a backup policy (p. 346) section. Apply policy to machines or groups Click Edit a policy Click Apply to. In the Machines selection (p. 291) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Edit.
The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies. To Do Sort backup policies by any column Click the column's header to sort the backup policies in ascending order. Filter backup policies by name/owner Type a policy's name / owner's name in the fields below the corresponding column's header.
Settings The tab displays information about the backup scheme used by the policy and backup options that were modified against the default settings. Applied to The tab displays a list of machines and groups the selected policy is applied to. Actions To Do View details of the machine (group). Click In the Machine details (p. 300)/Group details (p. 309) window, examine all information on the selected machine (or the selected group). View tasks of the machine (group).
The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a group, the policy applied to the group is applied to the machine and the new tasks are created by the policy on the machine. Once a machine is removed from a group, the policy applied to the group will be revoked from the machine and the tasks created by the policy will be removed. Built-in group - a group that always exists on a management server. The group cannot be deleted or renamed.
7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or imported to the All physical machines group, it becomes registered on the management server. Registered machines are available for deploying backup policies and for performing other centralized management operations. Registration provides a trusted relationship between the agent, residing on the machine, and the management server.
Add a machine to another static group Click Add to another group. In the Add to group (p. 299) window, specify the group to copy the selected machine to. The backup policies applied to the groups the machine is a member of will be applied to the machine. For machines in custom groups Add machines to a static group Click Move a machine to another static group Click Add machines to group. In the Add machines to group (p. 300) window, select the machines that you need to add. Move to another group.
View tasks existing on a machine Click View tasks. The Tasks (p. 318) view will display a list of the tasks, existing on the machine. View log entries of a machine Click Update all information related to the machine Click Refresh a list of machines Click View log. The Log (p. 320) view will display a list of the machine's log entries. Synchronize. The management server will query the machine and update the database with the most recent information.
To perform registration through a local or remote console-agent connection, you have to be connected with the management server administrator's credentials or provide the management server administrator's credentials. On connecting, select from the menu Options - Machine options Machine management, then opt for Centralized management and then enter the management server's name or IP address and the management server administrator's credentials.
A registered machine has to be specified by its registration address, that is, you need to provide exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified when the machine was initially added to the management server. Otherwise, the machine will be deleted and added again as if it were another machine. This means all policies, both inherited and directly applied, will be revoked from the machine and its static group membership will be lost.
The machine being added becomes a member of more than one group. As a result, the backup policies applied to the first group will remain on the machine, and the backup policies applied to the second, third, etc. group will be deployed to the machine. Moving a machine to another group To move the selected machine to another group 1. In the group tree, select the group the machine will be moved to. 2. Click OK. The machine being moved leaves one group and becomes a member of another group.
o o o o o • • • • • • Online - the machine is available for the management server. This means that the management server's last connection to the machine was successful. Connection is established every 2 minutes. Offline - the machine is unavailable for the management server: it is turned off, or its network cable is unplugged.
Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the Backup policies view. See the Filtering and sorting backup policies (p. 292) section for details. Plans and tasks Displays a list of the plans (both local and centralized) and tasks existing on the selected machine. Operations The following is a guideline for you to perform operations with backup plans and tasks. To Do View details of a plan/task Backup plan Click View details.
Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task again.
Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing. When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks.
View tasks related to a group View log related to a group Remove machine from a group. Click View tasks. You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. Click View log. This opens Log view with pre-filtered log entries of the selected group. Click Remove. The centralized plans, which were deployed to the parent group, will no longer affect this machine.
Configuring the machines table By default, the table has five columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to column headers presented in the table. 2. Click the items you want to be displayed/hidden. 7.1.3.2. Actions on groups Actions are available when you select the click on a group.
Refresh a list of groups Click Refresh. The management console will update the list of groups from the management server with the most recent information. Though the list of groups is refreshed automatically based on events, the data may not be retrieved immediately from the management server due to some latency. Manual Refresh guarantees that the most recent data is displayed. Creating a custom static or dynamic group To create a group 1.
For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windows Server 2003 Organizational unit: SERVERS IP range: 192.168.17.0 - 192.168.17.55 will add to the same group all the machines whose operating system is Windows 2000 or Windows 2003 and belong to the SERVERS organizational unit and whose IP addresses are within the range 192.168.17.0 - 192.168.17.55.
Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machine has to be specified by its registration address, that is, you need to provide exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified when the machine was initially added to the management server. Otherwise, the machine will not be added to the group.
• • Type - type of the group (static, or dynamic) • Comments - the group description (if specified) Criteria (for dynamic groups only) - grouping criteria Backup policies Displays a list of backup policies related to the group and allows performing the following operations: To Do View details of a policy Click View details. In the Policy details (p. 292) window, examine all information related to the selected backup policy. View tasks of a policy Click View tasks. The Tasks (p.
7.1.4. Virtual machines You can centrally manage virtual machines using either of the following methods or both: Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 297) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
7.1.4.1. Virtual machines on a management server Availability of virtual machines Virtual machines are displayed as available when both the agent is available for the management server and the machines are available for the agent. The list of virtual machines is refreshed dynamically every time the management server synchronizes with the agents. When the virtualization server or the virtual appliance becomes unavailable or is withdrawn, the virtual machines are grayed out.
• Host/VA Using this criterion, you can create a dynamic group of virtual machines hosted on a specified virtualization server or managed by the specified virtual appliance. 7.1.4.2. Deploying Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up.
5. Licenses Click Provide license. When installing the trial product version, select Use the following trial license key and enter the trial license key. Deduplication is always enabled in the trial version. When installing the purchased product, select Use a license from the following Acronis License Server and specify the license server that has the appropriate number of licenses for Acronis Backup & Recovery 10 Advanced Server Virtual Edition. You need one license for every host you selected.
The group that has the same name as the vCenter Server will be removed and the policies applied to this group or its child groups will be revoked. Virtual machines remain in the All virtual machines group and in other groups if their host is managed by Agent for ESX/ESXi. Policies applied to these groups or directly to the machines continue functioning on the machines. This way, by removing the integration you remove only the machines that are not manageable. 7.1.5.
7.1.5.1. Actions on storage nodes All the operations described here, are performed by clicking the corresponding buttons on the toolbar. The operations can be also accessed from the Storage nodes bar (on the Actions and tools pane) and from the Storage nodes item of the main menu. To perform an operation with a storage node added to the management server, first select the storage node. The following is a guideline for you to perform operations with storage nodes.
Refresh the list of storage nodes Click Refresh. The management console will update the list of storage nodes from the management server with the most recent information. Though the list of storage nodes is refreshed automatically based on events , the data may not be retrieved immediately from the management server due to some latency. Manual refresh guarantees that the most recent data is displayed. Adding a storage node To add a storage node 1.
o • • Withdrawn - the storage node was registered on another management server. As a result, it is not possible to control the node from the current management server. Archives - the total number of archives stored in all the vaults managed by the storage node Backups - the total number of backups stored within the archives in all the vaults managed by the storage node. Vaults This tab displays a list of the vaults, managed by the storage node.
or the backup plan will run. View details of a task Click View details. In the Tasks details (p. 188) window, examine all information related to the selected task. View a task's log Click View log. The Log (p. 320) view will display a list of the log entries related to the selected task. Run a task Click Run. The task will be executed immediately in spite of its schedule. Stop a task Click Stop.
tasks owned by other users. • This is a built-in compacting task Each storage node has a built-in service task called a compacting task. This task cannot be deleted. Refresh tasks table Click Refresh. The management console will update the list of tasks existing on the machines with the most recent information. Though the list of tasks is refreshed automatically based on events, the data may not be retrieved immediately from the managed machine due to some latency.
Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has local and centralized logs of events. Local event log A local event log holds information about Acronis Backup & Recovery 10 operations on a managed machine. For example, creating a backup plan, executing a backup plan, managing archives in personal vaults, executing a recovery task, will generate events logged in the local event log.
7.1.7.1. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these operations can also be performed with the context menu (by right-clicking the log entry), or with the Log actions bar (on the Actions and tools pane). The following is a guideline for you to perform actions on log entries. To Do Select a single log entry Click on it.
To Do Display log entries for a given time period 1 In the From field, select the date starting from which to display the log entries. 2 In the To field, select the date up to which to display the log entries.
• • Machine - The name of the machine where the event has occurred (if any) Code - Blank or the program error code if the event type is error. Error code is an integer number that may be used by Acronis support service to solve the problem. • Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem. • • Owner - User name of the policy/backup plan owner (p.
Reports about vaults' statistics and task activities are interval-based and provide historical information for the specified time interval that can last from days to years, depending on the amount of data kept in the databases. Generating reports To start generating a report, select a report template in the Reports view, and then click Generate on the toolbar. There are two types of report templates: customizable and predefined.
7.1.8.2. Report about the backup policies In this view, you can generate a report about the backup policies existing on the management server. This report consists of one or more tables. Filters Under Filters, choose which backup policies to include in the report. Only the backup policies that meet all filter criteria are included. • • • • Backup policies: The list of backup policies. • Schedule: The types of the backup policies' schedules—Manual and/or Scheduled.
With the default filter settings, the report includes all backup plans from all machines. Report view Under Report view, choose how the report will look: • Select whether to show all items in a single table or to group them by a particular column. • • Specify which table columns to show, and in which order. Specify how to sort the table. 7.1.8.4. Report about the tasks In this view, you can generate a report about the tasks that run on registered machines. This report consists of one or more tables.
Filters Under Filters, choose which archives to include in the report. Only the archives that meet all filter criteria are included. • Vaults: The list of centralized managed vaults that store the archives. • • • • • • Machines: The list of registered machines from which the archives were created. • Type: The archive types—disk-level archives and/or file-level archives. Owner: The list of users who created the archives.
• • Specify which table columns to show, and in which order. Select which diagrams to include in the report. The diagrams show space usage in the vaults. 7.1.8.7. Report about the task activities In this view, you can generate a report about the tasks that existed on registered machines within a chosen period. This report consists of one or more diagrams, one diagram per machine.
Explorer, click the Information bar that appears at the top of the webpage by default, and then click Allow blocked content. To allow active content permanently in Internet Explorer 1. On the Tools menu, click Internet Options, and then click the Advanced tab. 2. Select the Allow active content to run files on My Computer check box under Security. 3. Click OK. in Mozilla Firefox 1. On the Options menu, click Content. 2. Make sure, that the Enable JavaScript check box is selected. 3. Click OK. 7.2.
7.2.1.1. How to load Acronis Administrative Template The Administrative Template, provided by Acronis, enables the fine-tuning of some security related features, including encrypted communication settings. Through the Microsoft Group Policy mechanism, the template policy settings can be applied to a single computer as well as to a domain. To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32\gpedit.msc.) 2.
7.2.1.2. Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
Vault Free Space Warning Percentage Description: Specifies the amount of free space in a managed vault, as a percentage of its total size, below which a warning is recorded in the storage node's log. Possible values: Any integer number between 0 and 100 Default value: 10 The total size of a vault is the vault's free space plus the size of all archives that are contained in the vault. For example, suppose that two vaults, Vault A and Vault B, are both stored on a disk volume.
Default value: 10 If the amount of free space on the disk containing a managed vault's database is less than the value of Vault Database Free Space Error Limit, an error is recorded in the storage node's log. Backups performed to the vault will keep failing until the amount of free space is above the limit. You can view storage node errors in the Dashboard. The database is stored on the storage node in a local folder whose name is specified in Database path when creating the vault. 7.2.1.3.
For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 83). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Management Server's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record Acronis Backup & Recovery 10 Management Server's events into the event log.
Possible values: Any string 0 to 32765 characters long Default value: public Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered machines for deployment of centralized policies, retrieval of logs and backup plan states, and similar actions—collectively called synchronization. This parameter has the following settings: Maximum Connections Description: Specifies the maximum number of simultaneous synchronization connections to keep.
Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously). If there are fewer worker threads than normal-priority machines, the actual interval between synchronizations may be longer than the value of this parameter.
We recommend setting Second Connection Atempt to True only in networks which often experience problems with their DNS servers, and provided that the machines' IP addresses change infrequently—as in cases of fixed IP addresses or long DHCP lease times. This setting has no effect on machines that were added to the management server by IP address.
Default value: 0 If this setting is 0, the management server uses the Snapshot Storage Relative Size setting. The initial size will not exceed the available space minus 50 MB. Snapshot Storage Relative Size This setting is effective only when the Snapshot Storage Absolute Size setting is 0. Description: Specifies the initial size of the snapshot storage as a percentage of the disk space that is available at the time of starting the backup.
Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue working with full functionality for the number of days specified in Maximum Time Without License Server, as counted from the moment of installation or from the last successful check. License Server Connection Retry Interval (in hours) Description: Specifies the interval, in hours, between connection attempts when Acronis License Server is unavailable.
Default value: False Trace Level Description: Specifies the minimum level of severity of events to be recorded into the event log. Only events of levels greater than or equal to the value in Trace Level will be recorded.
You may want to increase the initial size of the snapshot storage—or to place it on a different volume—when experiencing problems with backing up data that changes extensively during backup. This parameter is used when creating a backup plan. Changes to this parameter do not affect already existing backup plans. This parameter has the following settings: Snapshot Storage Path Description: Specifies the folder in which to create the snapshot storage.
Specifies the port that the component will use for incoming and outgoing communication with other Acronis components. Select one of the following: Not Configured The component will use the default TCP port number 9876. Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disabled The same as Not configured.
Always use The use of SSL certificates is enabled. The connection will be established only if the use of SSL certificates is enabled on the server application. Disabled The same as Not configured. Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a server application. Select one of the following: Not Configured The component will use the default setting, which is to use encryption if possible (see the following option). Enabled Encryption is enabled.
Each event has a level from zero to five based on the event's severity, as shown in the following table: Level Name Description 0 Unknown Event whose level of severity is unknown or not applicable 1 Debug Event used for debug purposes 2 Information Informational event, such as one about the successful completion of an operation or startup of a service 3 Warning Event which is a possible impending problem, such as low free space in a vault 4 Error Event that resulted in a loss of data or fun
You will find the description of these parameters in the correspondent topic about configuration through the administrative template. 7.2.3. Parameters set through Windows registry The following two parameters determine paths to Acronis Backup & Recovery 10 Storage Node's internal databases, which contain information about managed vaults. They can be modified only by editing the registry.
General Policy name [Optional] Enter a unique name for the backup policy. A conscious name lets you identify the policy among the others. Source type Select the type of items to back up: Disk/volumes or Files. Policy credentials (p. 349) [Optional] You can change the policy account credentials if necessary. To access this option, select the Advanced view check box. Policy comments [Optional] Type a description of the backup policy. To access this option, select the Advanced view check box.
Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, create a custom backup scheme or back up data once. Archive validation When to validate [Optional] Define when and how often to perform validation and whether to validate the entire archive or the latest backup in the archive.
Storage (p. 213) Choose the storage on the virtualization server or the folder to place the virtual machine files in. Resultant VMs Specify a name for the virtual machines to be created. The default name consists of variables that reflect the policy name and the name of the machine that will be backed up. You can add suffixes to the name but never delete variables, since each virtual machine has to have a distinct and unique name.
7.3.2.1. Volumes to back up selection rules Define volume selection rules, according to which the volumes will be backed up on the machines the policy will be applied to. To define volume selection rules In the first line, select the rule from the list, or type it manually. To add another rule, click the next empty line, and select the rule from the list, or type it manually.
First partition on the first SCSI hard disk of a Linux machine Type or select: /dev/sda1 sda1 is the standard device name for the first partition of the first SCSI hard disk drive. For more details, see Note on Linux machines. First partition on the first software RAID hard disk of a Linux machine Type or select: /dev/md1 md1 is the standard device name for the first partition of the first software RAID drive. For more details, see Note on Linux machines.
/dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, one can type /dev/hda3 in the row of the Volumes to back up selection rules dialog box. Furthermore, a Linux partition can be mounted anywhere inside the tree. Say, /dev/hda3, can be mounted as a “subdirectory” inside the tree, such as /home/usr/docs. In this case, one can type either /dev/hda3 or /home/usr/docs in the Volume field to perform a disk backup of the third partition.
Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, the policy will back up this item on each machine where this exact path will be found. To include In the Files and folders column, type or select: File Text.doc in folder D:\Work D:\Work\Text.doc Folder C:\Windows C:\Windows Environment variables Some environment variables point to Windows folders.
The root user's home directory /root Directory for all userrelated programs /usr Directory for system configuration files /etc 7.3.3. Access credentials for source Specify credentials required for access to the data you are going to back up. To specify credentials 1. Select one of the following: o Use the policy credentials The program will access the source data using the credentials of the backup policy account specified in the General section.
You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Exclusion examples Criterion Example Description By name File1.
The program generates a common name for the new archives and displays it in the Name field. The name looks like [PolicyName]_[MachineName]_Archive1. If you are not satisfied with the automatically generated name, construct another name. If you selected Store all machines' archives in a single location, you have to use variables in order to provide the unique archive names within the location. 1.
7.3.7. Backup scheme selection Choose one of the available backup schemes: • Back up now – to create a backup task for manual start and run the task immediately after its creation. • Back up later – to create a backup task for manual start OR schedule one-time task execution in the future. • • Simple – to schedule when and how often to backup data and specify retention rules. Grandfather-Father-Son – to use the Grandfather-Father-Son backup scheme.
7.3.7.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data and set the retention rule. At the first time a full backup will be created. The next backups will be incremental. To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 162) section. Retention rule 7.3.7.4.
• Daily ("Son") backups are incremental. Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The default value is Workdays. Weekly/Monthly: Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day.
Backup scheme parameters can then be set up as follows. • • Start backup at: 11:00 PM • • Weekly/monthly: Saturday (for example) Back up on: All days Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be available for seven days since creation.
• Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). • Have a weekly summary of file changes since last month (Friday weekly differential backup). • Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months.
• • One backup of each level is stored at a time Higher density of more recent backups Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 163), weekly (p. 165), or monthly (p. 167) schedule.
Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to have is called the roll-back period. The following table shows full backup and roll-back periods for schemes of various levels.
7.3.7.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Incremental Specifies on what schedule and under which conditions to perform an incremental backup.
might end up with no backups if the program is not able to create the new backup for some reason. Apply the rules Specifies when to apply the retention rules (p. 39). (only if the retention rules are set) For example, the cleanup procedure can be set up to run after each backup, and also on schedule. This option is available only if you have set at least one retention rule in Retention rules. Cleanup schedule Specifies a schedule for archive cleanup.
Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates the use of all options available in the Custom scheme. Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and daily incremental backups. Then the backup schedule can look as follows.
• • Full backup, runs every Friday at 10:00 PM • Differential backup, runs manually Incremental backup, runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans and tasks section in the left pane. If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks: three backup tasks and one cleanup task. 7.3.8. Archive validation Set up the validation task to check if the backed up data is recoverable.
Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 374) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 377), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers. Agent-side cleanup Cleanup (p. 373) performed by an agent (p.
Backup options Configuration parameters of a backup operation (p. 369), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 370). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: • • • what data to back up where to store the backup archive (p. 369) (the backup archive name and location) the backup scheme (p.
3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 369) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. 5. On each machine, the agent installed on the machine creates a backup plan (p. 370) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 372). 6.
A management server has two built-in groups that contain all machines of each type: All physical machines (p. 378), All virtual machines (p. 381). Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a physical machine from the built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p.
On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user's archives will be managed by the storage node as well as other archives stored in the vault. Cleanup Deleting backups (p. 369) from a backup archive (p. 369) in order to get rid of outdated backups or prevent the archive from exceeding the desired size.
Differential backup A differential backup stores changes to the data against the latest full backup (p. 377). You need access to the corresponding full backup to recover the data from a differential backup. Direct management Any management operation that is performed on a managed machine (p. 377) using the direct console (p. 373)-agent (p. 369) connection (as opposed to centralized management (p. 372) when the operations are configured on the management server (p.
and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine. For more information about disk groups please refer to the following Microsoft knowledge base article: 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/ Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000.
• IP address range. A machine remains in a dynamic group as long as the machine meets the group's criteria. The machine is removed from the group automatically as soon as • • the machine's properties change so that the machine does not meet the criteria anymore OR the administrator changes the criteria so that the machine does not meet them anymore. There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server.
F Full backup A self-sufficient backup (p. 369) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. G GFS (Grandfather-Father-Son) A popular backup scheme (p. 371) aimed to maintain the optimal balance between a backup archive (p. 369) size and the number of recovery points (p. 379) available from the archive.
Managed vault A centralized vault (p. 372) managed by a storage node (p. 379). Archives (p. 369) in a managed vault can be accessed as follows: bsp://node_address/vault_name/archive_name/ Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 380) and storage node-side validation (p. 380) for each archive stored in the managed vault.
Plan See Backup plan (p. 370). Policy See Backup policy (p. 370). R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 377) managed by a management server (p. 378). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 379) procedure. Registration A procedure that adds a managed machine (p. 377) to a management server (p. 378).
• prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malefactor, by using encrypted vaults (p. 376). Storage node-side cleanup Cleanup (p. 373) performed by a storage node (p. 379) according to the backup plans (p. 370) that produce the archives (p. 369) stored in a managed vault (p. 377). Being an alternative to the agentside cleanup (p. 369), the cleanup on the storage node side relieves the production servers of unnecessary CPU load.
U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. The Universal Restore is not available: • • when the machine is booted with Acronis Startup Recovery Manager (p. 368) (using F11) or • when using Acronis Active Restore (p.
Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 377) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 369) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server.
Actions on a tape library vault • 135 Index Actions on backup plans and tasks • 181, 184 A Actions on backup policies • 288, 290 A policy on a machine or a group • 57 Actions on centralized vaults • 54, 124, 125, 126 About Windows loaders • 232 Access credentials • 238, 239 Access credentials for archive location • 194, 201 Access credentials for destination • 215, 226, 243, 247 Access credentials for location • 215, 219, 347, 356 Actions on groups • 294, 306 Actions on log entries • 191, 321, 322 A
At Windows Event Log event • 171 Backup splitting • 91, 105 Attaching a managed vault • 127, 131 Basic concepts • 8, 25, 51, 194 B Basic disk cloning • 272, 273 Basic precautions • 270 Back up later scheme • 202, 357 Back up now scheme • 202, 357 Backing up dynamic volumes (Windows) • 41, 214 Backing up to tape library • 136 Backup • 25, 29, 369, 373, 374, 376, 377, 381 Backup archive (Archive) • 19, 25, 369, 370, 372, 373, 376, 377, 378, 379, 380, 381 Backup operation • 369, 370 Backup options • 370,
Components for centralized management • 19 D Compression level • 91, 100 Daily schedule • 163, 207, 316, 362 Conditions • 108, 173 Dashboard • 178, 180, 286 Configuring Acronis Backup & Recovery 10 components • 330 Data type • 215, 217 Configuring communication settings • 74, 75, 78 Deduplicating vault • 373 Configuring iSCSI and NDAS devices • 262 Connecting to a machine booted from media • 261 Console (Acronis Backup & Recovery 10 Management Console) • 25, 368, 371, 373, 374 Decreasing Acronis
Drivers for Universal Restore • 254, 257 Dual destination • 46, 92, 108 Full, incremental and differential backups • 25, 29, 202, 357 Dynamic disk • 41, 368, 374, 375, 376 G Dynamic group • 372, 375 Getting started • 8 Dynamic volume • 41, 371, 376 Getting started with a tape library • 134 E GFS (Grandfather-Father-Son) • 371, 377, 380 Editing custom groups • 306, 309 E-mail • 92, 102, 115, 117 Encrypted archive • 376 Encrypted vault • 315, 376, 380 Error handling • 92, 107, 114, 120 GFS backup s
Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 134, 137, 154 Items to back up • 194, 197, 347, 349 K Kernel parameters • 254, 255 Management Server • 8, 19 Management server (Acronis Backup & Recovery 10 Management Server) • 10, 20, 51, 82, 370, 371, 372, 373, 374, 375, 378, 379 Management server administrator rights • 72 Management server options • 83 L Managing a tape library • 127, 137 Labeling • 137, 138 Managing Acronis Secure Zone • 249 License Server • 21 Managing mounted images •
Organizational unit criterion • 85, 307, 308 Privileges for centralized management • 69 Overview • 64, 113, 124, 128, 132, 315 Privileges for local connection • 70 Overwriting • 226 Privileges for remote connection in Windows • 70 Owners and credentials • 31, 155, 217, 235, 244, 324 P Proprietary Acronis technologies • 46 Protecting the servers • 54 Protecting the virtual machines • 56 Parameters set through administrative template • 330 Protecting the workstations • 55 Parameters set through GUI
Running Acronis Disk Director Lite • 270 Storage node details • 315, 316, 317 S Storage nodes • 315 Scheduling • 108, 162, 203, 212, 237, 358, 367 Storage node-side cleanup • 20, 124, 315, 378, 379, 380 Secure communication • 74 Storage node-side validation • 20, 124, 315, 378, 379, 380 Select destination disks • 280, 281 Supported file systems • 23 Select the type of volume being created • 280, 281 Supported operating systems • 22 Selecting a host that will perform conversion • 196, 213, 348, 3
Tower of Hanoi backup scheme • 37, 132, 141, 380 Virtual machine • 372, 382 Tower of Hanoi scheme • 206, 361 Virtual machine settings • 220, 221, 224, 229 Types of connection to a managed machine • 69 Virtual machine type / virtualization server selection • 219, 221, 223 Types of dynamic volumes • 279 Virtual machines • 311 U Virtual machines on a management server • 305, 312 Understanding Acronis Backup & Recovery 10 • 25 VM protection options • 86 Understanding centralized management • 51 Unde