Acronis® Backup & Recovery ™ 10 Server for Windows Update 3 User's Guide
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ......................................................................... 7 1.1 Acronis Backup & Recovery 10 overview .................................................................................. 7 1.2 Getting started ........................................................................................................................... 7 1.2.1 1.3 Acronis Backup & Recovery 10 components ...........................................
3.3.1 3.3.2 4 Vaults .................................................................................................................................... 80 4.1 Personal vaults .........................................................................................................................81 4.1.1 4.1.2 4.2 Operations with archives stored in a vault ................................................................................................84 Operations with backups .......................
6.3.8 6.3.9 6.3.10 6.3.11 6.3.12 6.4 Validating vaults, archives and backups ............................................................................... 160 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 6.4.6 6.5 When to recover...................................................................................................................................... 153 Universal Restore ....................................................................................................................................
7.1.6 7.1.7 7.1.8 7.2 Where do I start? .................................................................................................................. 221 7.3 Choosing a subscription ........................................................................................................ 221 7.4 Activating online backup subscriptions ................................................................................ 222 7.4.1 7.4.2 8 Initial Seeding FAQ..............................................
1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
3. Connect the console to the machine where the agent is installed. Where to go from here For what to do next see "Basic concepts (p. 18)". For understanding of the GUI elements see the next section. 1.2.1 Using the management console As soon as the console connects to a managed machine (p. 236) or to a management server (p.
tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you perform all the operations, available on both panes. Menu items change dynamically. 1024x768 or higher display resolution is required for comfortable work with the management console. 1.2.1.1 "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar. Navigation tree The Navigation tree enables you to navigate across the program views.
1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu. Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Clicking the action opens the respective action page (p. 12).
"Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.
"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Information panel. Use filtering and sorting capabilities to search the table for the item in question In the table, select the desired item In the Information panel (collapsed by default), view the item's details Perform actions on the selected item.
Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc. When the advanced representation is enabled, all the available fields are displayed. You can switch between the views by selecting the Advanced view check box at the top of the action page. Most settings are configured by clicking the respective Change… links to the right.
Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Components for a managed machine (agents) These are applications that perform data backup, recovery and other operations on the machines managed with Acronis Backup & Recovery 10. Agents require a license to perform operations on each managed machine.
Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk file, which requires additional operations to bring the virtual disk into use, Agent for Windows performs the conversion by recovering a disk backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Virtual Appliance (OVA).
ReiserFS4 - volume recovery without the volume resize capability; particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node XFS - volume recovery without the volume resize capability; particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node Linux SWAP Acronis Backup & Recovery 10
1.
2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1 Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. 19 Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-bysector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2 Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.
Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3 User privileges on a managed machine When managing a machine running Windows, the scope of a user's management rights depends on the user's privileges on the machine.
a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warning, you have two options: Click Cancel and create your own plan or task. The original task will remain intact. Continue editing. You will have to enter all credentials required for the plan or task execution. Archive owner An archive owner is the user who saved the archive to the destination.
GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme. Tape rotation schemes, as such, do not provide automation. They just determine: how many tapes you need to enable recovery with the desired resolution (time interval between recovery points) and roll-back period which tapes you should overwrite with the forthcoming backup. Tape rotation schemes enable you to get by with the minimal number of cartridges and not to be buried in used tapes.
The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full. The Weekly/Monthly parameter splits the total schedule into daily, weekly and monthly schedules.
“D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M” stands for the backup that is considered Monthly. An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups will start to be deleted.
The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full backup will be deleted as soon as all differential and incremental backups based on this backup are deleted. An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months 2.
For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi backup scheme is based on the same patterns. It operates with Sessions instead of Moves and with Backup levels instead of Rings. Commonly an N-level scheme pattern contains (Nth power of two) sessions. So, the five-level Tower of Hanoi backup scheme cycles the pattern that consists of 16 sessions (moves from 1 to 16 in the above figure).
the pattern starts with a full backup since the very first backup cannot be incremental an old backup on a level is kept until a new backup has been successfully created on the level. the scheme forces every backup level to keep only the most recent backup, other backups from the level have to be deleted; however backup deletion is postponed in cases where the backup is a base for another incremental or differential one The table shows the pattern for the five-level backup scheme.
1. Delete backups older than This is a time interval counted back from the moment when the retention rules are applied. Every time a retention rule is applied, the program calculates the date and time in the past corresponding to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the archive size within This is the maximum size of the archive.
Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Example Delete backups older than = 3 Months Keep the archive size within = 200GB Never delete backups younger than = 10 Days Every time the retention rules are applied, the program will delete all backups created more than 3 months (or more exactly, 90 days) ago.
Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. Backups resulting from consolidation always have maximum compression. This means that all backups in an archive may acquire the maximum compression as a result of repeated cleanup with consolidation.
Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to unallocated space of a disk group to unallocated space of a basic disk. Recovery over an existing volume When a dynamic volume is recovered over an existing volume, either basic or dynamic, the target volume’s data is overwritten with the backup content. The type of target volume (basic, simple/spanned, striped, mirrored, RAID 0+1, RAID 5) will not change.
Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing volumes during recovery You can resize the resulting basic volume, both MBR and GPT, during recovery, or change the volume's location on the disk. A resulting dynamic volume cannot be moved or resized. Preparing disk groups and volumes Before recovering dynamic volumes to bare metal you should create a disk group on the target hardware.
device (tape drive or tape library) by... Agent for Windows Agent for Linux Tape written on a tape device through... 2.9.2 Backup Server Storage Node ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 + + + + + + + - + + + + + + + - + + + + + + + - + + + + + + + + + + + + Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device.
6. Acronis Active Restore (p. 227) is not available when recovering from a tape. Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape containing the backup you need to recover. When creating a recovery task, select the tape device from the list of available locations and then select the backup. After recovery is started, you will be prompted for other tapes if the tapes are needed for recovery. 2.
OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown" Text description of the event OID: 1.3.6.1.4.1.24769.100.200.2.0 Value: "?00000000" 2.11 Proprietary Acronis technologies This section describes the proprietary technologies inherited by Acronis Backup & Recovery 10 from Acronis True Image Echo and Acronis True Image 9.1 product families. 2.11.
list archives located in the zone and backups contained in each archive examine a backup's content mount a disk backup to copy files from the backup to a physical disk safely delete archives and backups from the archives. For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 81) section.
2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis products, including images of systems prepared with Microsoft System Preparation Tool (Sysprep). The following is an example of using both tools on the same system.
How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the selected disks or volumes in the backup. If this scan finds a supported operating system, the Acronis Active Restore option becomes available. If you do not enable the option, the system recovery will proceed in the usual way and the machine will become operational after the recovery is completed.
5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Restore icon appears in the system tray. The machine becomes operational and ready to provide necessary services. The immediate user sees the drive tree and icons and can open files or launch applications even though they were not yet recovered.
3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.
The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3 Time-based alerts Last backup This option is effective when the console is connected to a managed machine (p. 236) or to the management server (p. 237). The option defines whether to alert if no backup was performed on a given machine for a period of time.
The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items. To make a selection, choose the font from the respective combo-box and set the font's properties. You can preview the font's appearance by clicking the button to the right. 3.
Use the Types of events to log check box to filter the events to be logged in the Application Event Log of Windows: All events - all events (information, warnings and errors) Errors and warnings Errors only. To disable this option, clear the Log events check box. 3.2.1.2 SNMP notifications This option is effective for both Windows and Linux operating systems. This option is not available when operating under the bootable media.
3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine running Windows: 1. 2. 3. 4. 5. Start > Control Panel > Add or Remove Programs > Add/Remove Windows Components. Select Management and Monitoring Tools. Click Details. Select the Simple Network Management Protocol check box. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operating system.
3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy server requires authentication, specify the credentials in User name and Password. 5. To test the proxy server settings, click Test connection. If you do not know the proxy server settings, contact your network administrator or Internet service provider for assistance. Alternatively, you can try to take these settings from your Web browser’s configuration. This is how to find them in three popular browsers.
Availability of the backup options The set of available backup options depends on: The environment the agent operates in (Windows, bootable media) The type of the data being backed up (disk, file) The backup destination (networked location or local disk) The backup scheme (Back up now or using the scheduler) The following table summarizes the availability of the backup options.
Dest: removable media Dest: removable media - - Do not show messages and dialogs while processing (silent mode) + + + + Re-attempt if an error occurs + + + + Ignore bad sectors + + + + Dest: local Dest: local - - Task start conditions (p. 68) + + - - Task failure handling (p.
To protect the archive from unauthorized access 1. 2. 3. 4. Select the Set password for the archive check box. In the Enter the password field, type a password. In the Confirm the password field, re-type the password.
Select this check box to skip files and folders whose names match any of the criteria — called file masks — in the list; use the Add, Edit, Remove and Remove All buttons to create the list of file masks. You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.txt yields files such as Doc.txt and Document.
Pre-backup command Backup Post-backup command Examples of how you can use the pre/post commands: delete some temporary files from the disk before starting backup configure a third-party antivirus product to be started each time before the backup starts copy an archive to another location after the backup ends. The program does not support interactive commands, i.e. commands that require user input (for example, "pause"). To specify pre/post commands 1.
Post-backup command To specify a command/executable file to be executed after the backup is completed 1. In the Command field, type a command or browse to a batch file. 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field, specify the command execution arguments, if required. 4. If successful execution of the command is critical for your backup strategy, select the Fail the task if the command execution fails check box.
Pre-data capture command To specify a command/batch file to be executed before data capture 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. 4.
Continue the backup only after the command is successfully executed. Delete the TIB file and temporary files and fail the task if the command execution fails. 3.3.1.5 backup after the command is executed despite command execution failure or success. backup concurrently with the command execution and irrespective of the command execution result. File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems.
When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a result, if the data spans across several volumes, the resulting backup may be not consistent. 3.3.1.7 Volume Shadow Copy Service This option is effective only for Windows operating systems. The option defines whether a Volume Shadow Copy Service (VSS) provider—either Acronis VSS or Microsoft VSS—has to notify VSS-aware applications that the backup is about to start.
To specify the compression level Select one of the following: None – the data will be copied as is, without any compression. The resulting backup size will be maximal. Normal – recommended in most cases. High – the resulting backup size will typically be less than for the Normal level. Maximum – the data will be compressed as much as possible. The backup duration will be maximal.
The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the following: Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then drag the slider or select a percentage in the box Click Writing speed stated in kilobytes per second, and then enter the writing speed in kilobytes per second. Network connection speed This option is effective for Windows and Linux operating systems and bootable media.
3. Under Send notifications, select the appropriate check boxes as follows: When backup completes successfully – to send a notification when the backup task has completed successfully When backup fails – to send a notification when the backup task has failed The When user interaction is required check box is always selected. 4. For the e-mail message to include the log entries related to the backup, select the Add full log to the notification check box. 5.
2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported.
For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 38)". The preset is: Use the setting set in the Machine options. To select whether to send the backup operations events to the SNMP managers: Choose one of the following: Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 47).
A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size. Such might be the case when the backup is placed on FAT16 and FAT32 file systems that have a 4GB file size limit. If the destination disk runs out of free space while creating the backup, the task enters the Need interaction state.
Alternatively, you can disable recovery (p. 74) of the security settings, even if they are available in the archive. The result will be the same - the files will inherit the permissions from the parent folder. To access file or folder NTFS permissions, select Properties > Security. 3.3.1.15 Media components This option is effective for both Windows and Linux operating systems, when the backup destination is removable media.
the operation succeeds OR the specified number of attempts is performed, depending on which comes first. For example, if the backup destination on the network becomes unavailable or not reachable, the program will attempt to reach the destination every 30 seconds, but no more than 5 times. The attempts will be stopped as soon as the connection is resumed OR the specified number of attempts is performed, depending on which comes first. Ignore bad sectors The preset is: Disabled.
3.3.1.18 Task start conditions This option is effective in Windows and Linux operating systems. This option is not available when operating under bootable media. This option determines the program behavior in case a backup task is about to start (the scheduled time comes or the event specified in the schedule occurs), but the condition (or any of multiple conditions) is not met. For more information on conditions please see Scheduling (p. 87) and Conditions (p. 96).
3.3.1.19 Task failure handling This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media. This option determines the program behavior when any of the backup plan's tasks fails. The preset is not to restart a failed task. The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts.
The destination CD/DVD can be ejected or the tape can be dismounted after the backup is completed. Ask for the first media while backing up to removable media This option is effective only when backing up to removable media. The option defines whether to display the Insert First Media prompt when backing up to removable media. The preset is: Enabled.
Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target). Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node. The eventual size of the backup in the vault is independent of whether deduplication at source is turned on.
The following table summarizes the availability of the recovery options. Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery Disk recovery File recovery Pre/Post recovery commands (p. 73) + + PE only PE only Recovery priority (p.
3.3.2.1 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the data recovery. Example of how you can use the pre/post commands: launch the Checkdisk command in order to find and fix logical file system errors, physical errors or bad sectors to be started before the recovery starts or after the recovery ends.
Fail the task if the command execution failed. command execution result. Post-recovery command To specify a command/executable file to be executed after the recovery is completed 1. In the Command field, type a command or browse to a batch file. 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field, specify the command execution arguments, if required. 4.
If the file NTFS permissions were preserved during backup (p. 65), you can choose whether to recover the permissions or let the files inherit the NTFS permissions from the folder to which they are recovered. 3.3.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media.
User name – enter the user name. Password – enter the password. Click Send test e-mail message to check if the settings are correct. Messenger service (WinPopup) This option is effective for Windows and Linux operating systems. This option is not available when operating under bootable media. The option enables you to receive WinPopup notifications about about the recovery task's successful completion, failure or need for interaction. The preset is: Disabled.
To select whether to log the recovery operations events in the Application Event Log of Windows: Select one of the following: Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 47). Log the following event types – to log events of the recovery operations in the Application Event Log.
Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mode enabled, the program will automatically handle situations requiring user interaction where possible. If an operation cannot continue without user interaction, it will fail. Details of the operation, including errors, if any, can be found in the operation log. Re-attempt, if an error occurs The preset is: Enabled. Number of attempts: 5. Interval between attempts: 30 seconds.
The option defines whether to reboot the machine automatically if it is required for recovery. Such might be the case when a volume locked by the operating system has to be recovered. Reboot machine after recovery This option is effective when operating under bootable media. The preset is Disabled. This option enables booting the machine into the recovered operating system without user interaction.
4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each managed machine. Personal vaults are visible to any user that can log on to the system. A user's right to back up to a personal vault is defined by the user's permission for the folder or device where the vault is located. A personal vault can be organized on detachable or removable media.
Vault content The Vault content section contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Use the archives toolbar to perform actions on the selected archives and backups. The list of backups is expanded by clicking the "plus" sign to the left of the archive's name. All the archives are grouped by type on the following tabs: The Disk archives tab lists all the archives that contain disk or volume backups (images).
Explore a vault's content Click Validate a vault Click Explore. In the appearing Explorer window, examine the selected vault's content. Validate. You will be taken to the Validation (p. 160) page, where this vault is already preselected as a source. The vault validation checks all the archives stored in the vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut to the folder from the Vaults view. The folder itself remains untouched.
2. 3. 4. 5. Move the archives to vault B manually by means of a third-party file manager. Edit the backup plans that use vault A: redirect their destination to vault B. In the vaults tree, select vault B to check whether the archives are displayed. If not, click Refresh. Delete vault A. 4.2 4.2.1 Common operations Operations with archives stored in a vault To perform any operation with an archive, you have to select it first. If the archive is protected with a password, you will be asked to provide it.
All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the '[Backup name]' actions bar (on the Actions and tools pane) and from the '[Backup name]' actions item of the main menu. The following is a guideline for you to perform operations with backups. To Do View backup content in a separate window Click Recover Click View content. In the Backup Content window, examine the backup content. Recover.
The filters in this window are from the archives list of the vault view. Thus, if some filters have been applied to the archives list, only the archives and backups corresponding to these filters are displayed here. To see all content, clean all the filter fields. What happens if I delete a backup that is a base of an incremental or differential backup? To preserve archive consistency, the program will consolidate the two backups. For example, you delete a full backup but retain the next incremental one.
5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
The specified period of time has passed since the last successful backup completed The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not met is defined by the Task start conditions (p. 68) backup option. What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not completed? The event will be ignored.
Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6PM. If you have created the task after 6 PM, the task will be started for the first time on the next day at 6 PM. To: not set. The task will be performed for an indefinite number of days.
1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. 5.2 Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...
Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six months. The schedule's parameters are thus set up as follows. 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still be available in the Tasks view after this date.
Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the task: First schedule 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM. 3. Effective: From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: From: not set.
From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box is cleared, the task will be started on the nearest day and time you have specified above. To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server.
In the case when the task needs to be run on different days or weeks with different time intervals depending on the month, consider adding a dedicated schedule to every desired month or several months. Suppose that the task goes into effect on 11/01/2009. During northern winter, the task runs once at 10PM on every workday. During northern spring and autumn, the task runs every 12 hours on all workdays. During northern summer, the task runs every first and fifteenth of every month at 10 PM.
Parameters Log name Specifies the name of the log. Select the name of a standard log (Application, Security, or System) from the list, or type a log name—for example: Microsoft Office Sessions Event source Specifies the event source, which typically indicates the program or the system component that caused the event—for example: disk Event type Specifies the event type: Error, Warning, Information, Audit success, or Audit failure.
Log name: System Event source: Microsoft-Windows-WindowsUpdateClient Event type: Information Event ID: 18 Tip: To set up a similar backup plan for machines running Microsoft Windows XP, replace the text in Event source with Windows Update Agent and leave the remaining fields the same. How to view events in Event viewer To open a log in Event Viewer 1. On the Desktop or in the Start menu, right-click My Computer, and then click Manage. 2.
The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not met, is defined by the Task start conditions (p. 68) backup option. There, you can specify how important the conditions are for the backup strategy: conditions are obligatory - put the backup task run on hold until all the conditions are met. backup task start time matters - skip the backup task if the conditions are not met at the time when the task should be started.
(2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the user becomes idle. (3) If the user is still active at 11PM, the backup task starts anyway. 5.6.2 Location's host is available Applies to: Windows, Linux "Location's host is available" means that the machine hosting the destination for storing archives on a networked drive is available. Example: Backing up data to the networked location is performed on workdays at 9:00 PM.
(1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immediately following the logging off. (2) if the user logs off at any other time, the task will be skipped. What if... What if a task is scheduled to be executed at a certain time and this time is outside the specified time interval? For example: Event: Daily, Every 1 day(s); Once at 03:00:00 PM. Condition: Fits time interval, from 06:00:00 PM until 11:59:59 PM.
Example: Run the backup task at system startup, but only if more than 12 hours have passed since the last successful backup. Event: At startup, Start the task on machine startup. Condition: Time since last backup, Time since the last backup: 12 hour(s). Task start conditions: Wait until the conditions are met.
6 Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1 Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.
licenses. After a successful license check the agent will start working. Please make sure you have a valid license on Acronis License Server. Trial version of product expires in X day(s) Connect Once the trial version of the product is installed, the program starts the countdown of days remaining until the trial period expires. Connect 15 day trial period has expired. Enter a full license key.
Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date. Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on this date. Information Highlight the date in green if only "Information" log entries appeared on this date (normal activity.) The Select current date link focuses selection to the current date.
Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 107) section for details. You can run, edit, stop and delete the created plans and tasks. Use the Information panel to review detailed information on the selected plan (task). The panel chevron. The content of the panel is is collapsed by default. To expand the panel, click the also duplicated in the Plan details (p. 113) and Task details (p. 111) windows respectively. 6.1.2.
1 Status How it is determined How to handle Error At least one task has failed.
Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The next state may be Stopping (if the user chooses to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that can put the task to the Running state.) Stopping The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state. A waiting task can also be stopped.
2 Warning Last result is "Succeeded View the log to read the warnings -> [optionally] Perform with warning" actions to prevent the future warnings or failure. 3 OK Last result is "Succeeded", "-", or "Stopped" 6.1.2.2 No action is required. The "-" state means that the task has never been started or has been started, but has not finished yet and so its result is not available.
Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 111) window, select the task you need to be run. Running the backup plan starts the selected task of that plan immediately in spite of its schedule and conditions. Why can't I run the backup plan? Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot run plans owned by other users. Task Click Run. The task will be executed immediately in spite of its schedule and conditions.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 116), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1. It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2. If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. The backup plan has a centralized origin.
Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden.
Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing VM) Recovery of a virtual machine backup to an existing virtual machine Recovery (new VM) Recovery of a virtual machine b
Progress The Progress tab is available while the task is running. It is common for all types of tasks. The tab provides information about task progress, elapsed time and other parameters. Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates in four tabs all the information on the selected backup plan. The respective message will appear at the top of the tabs, if one of the plan's tasks requires user interaction.
Validation (if selected) - events before or after which the validation is performed, and validation schedule. Backup options - backup options changed against the default values. 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log. When the program executes a task, it adds multiple entries.
View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. The log entry's details will be displayed in a separate window. Expand the Information panel, by clicking the chevron. Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click Save Selected to File. 3. In the opened window, specify a path and a name for the file. Save all the log entries to a file 1. Make sure, that the filters are not set. 2.
Configuring the log table By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. 6.1.3.
To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan among others. Plan's credentials (p. 119) [Optional] The backup plan will run on behalf of the user who is creating the plan. You can change the plan account credentials if necessary. To access this option, select the Advanced view check box . Comments [Optional] Type a description of the backup plan.
[Optional] Provide credentials for the location if the plan account does not have access permissions to the location. To access this option, select the Advanced view check box. Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view check box. How to back up Backup scheme (p.
Here you select the resulting virtual machine type and location. Available options depend on the host you selected in the previous step. Storage (p. 139) Choose the storage on the virtualization server or the folder to place the virtual machine files in. Resultant VMs Specify the name of the virtual machine. After you have performed all the required steps, click OK to create the backup plan. After that, you might be prompted for the password (p. 119).
Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup. This will reduce the archive size, thus saving storage space.
The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernation (hiberfil.sys) are not backed up. After recovery, the files will be re-created in the appropriate place with the zero size.
6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folders, as well as files with specific extensions, to be stored in the archive. To specify which files and folders to exclude: Set up any of the following parameters: Exclude all hidden files and folders This option is effective only for file systems that are supported by Windows.
By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance By folder path C:\Finance\F\ Excludes the folder C:\Finance\F (be sure to specify the full path starting from the disk letter) Linux By file path /home/user/Finance/F.log Excludes the file named "F.log" located in the folder /home/user/Finance By folder path /home/user/Finance/ Excludes the folder /home/user/Finance 6.2.7 Archive Specify where the archive will be stored and the name of the archive.
To back up data to a locally attached tape device, expand the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destination, the table displays the names of the archives contained in each location you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3.
This behavior can be suppressed by adding the [Date] variable (p. 128) to the archive name. If you do not select the Name backup files using the archive name... check box: Each backup will have a unique file name with the exact time stamp and the backup type; for example: MyData_2010_03_26_17_01_38_960D.tib. This standard file naming allows for a wider range of backup destinations and backup schemes.
Your script can move older backups based on the date stamp. See also “The [Date] variable” (p. 128). Example 3. Hourly backups within a day Consider the following scenario: You want to perform hourly backups of your server's critical files every day. You want to keep older backups in the archive. You want the first backup of each day to be full and to run at midnight; and the subsequent backups of the day to be differential and to run at 01:00, 02:00, and so on.
You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday through Sunday), and the other drive those of the previous week. In this scenario, you need to create two backup plans as follows: a) When creating the first backup plan, specify MyMachine as the archive name and D:\ as the archive location, select the Name backup files using the archive name... check box, select Full as the backup type, and schedule the backups to run every week on Monday.
6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each backup will include that backup’s creation date. When using this variable, the first backup of a new day will be a full backup. Before creating the next full backup, the software deletes all backups taken earlier that day. Backups taken before that day are kept. This means you can store multiple full backups with or without incremental ones, but no more than one full backup per day.
The program will access the source data using the credentials of the backup plan account specified in the General section. Use the following credentials The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: User name.
In the Backup type field, select whether you want to create a full, incremental or differential backup (p. 22). 6.2.10.2 Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in the archive, a full backup will be created regardless of your selection.
Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly backups run every fourth Friday, and weekly backups run on all other Fridays. Monthly ("Grandfather") backups are full; Weekly ("Father") backups are differential; Daily ("Son") backups are incremental.
Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start backup at: 11:00 PM Back up on: All days Weekly/monthly: Saturday (for example) Keep backups: Daily: 1 week Weekly: 1 month Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be available for seven days since creation.
Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months.
Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 88), weekly (p. 90), or monthly (p. 92) schedule. Setting up schedule parameters allows creating simple schedules (example of a simple daily schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (example of a complex daily schedule: a task will be run every 3 days, starting from January 15.
2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups).
Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the archive contains no backups at the time of the task run, a full backup is created instead of the incremental backup. Differential Specifies on what schedule and under which conditions to perform a differential backup. If the archive contains no full backups at the time of the task run, a full backup is created instead of the differential backup.
Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full backup: Schedule: Weekly, every Friday, at 10:00 PM Here, all parameters except Schedule in Full backup are left empty. All backups in the archive are kept indefinitely (no archive cleanup is performed). Full and incremental backup plus cleanup With the following scheme, the archive will consist of weekly full backups and daily incremental backups.
Finally, we create retention rules for the archive: let us retain only backups that are no older than six months, and let the cleanup be performed after each backup task and also on the last day of every month. Retention rules: Delete backups older than 6 months Apply the rules: After backing up, On schedule Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted as long as it has dependent backups that must be kept.
Validation of the archive will validate all the archive’s backups and may take a long time and a lot of system resources. 3. Validation schedule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. For more information see the Scheduling (p. 87) section. 6.2.12 Setting up regular conversion to a virtual machine When creating a backup plan (p. 116), you can set up regular conversion of a disk or volume backup to a virtual machine.
You can choose between creating a virtual machine on the Hyper-V server and creating a VMware Workstation, Microsoft Virtual PC or Parallels Workstation machine in the folder you select. Virtual machines created on the Hyper-V server as a result of backup, will not appear on the management server, because such machines are not supposed to be backed up. What is the host's processing power? The conversion task will be created on the machine being backed up, and will use this machine's date and time.
Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Virtual Appliance (OVA). The virtual appliance can then be imported to XenServer. The VMware Workstation machine can be converted to the open virtualization format (OVF) using the VMware OVF tool.
serve incoming requests is recovered with the highest priority; everything else is recovered in the background. See Acronis Active Restore (p. 42) for details. Files (p. 151) You may have to specify credentials for the destination. Skip this step when operating on a machine booted with bootable media. Access credentials (p. 152) [Optional] Provide credentials for the destination if the task credentials do not enable recovery of the selected data. To access this option, select the Advanced view check box.
Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: User name.
You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer.
There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery, so there is no need to recover the MBR and Track 0 for Windows systems, unless the MBR is damaged. 6.3.4.
6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to. On selecting this, you proceed to the regular disk mapping procedure described below. New virtual machine (p. 150) If Acronis Backup & Recovery 10 Agent for Windows is installed.
NT signature When the MBR is selected along with the disk backup, you need to retain operating system bootability on the target disk volume. The operating system must have the system volume information (e.g. volume letter) matched with the disk NT signature, which is kept in the MBR disk record. But two disks with the same NT signature cannot work properly under one operating system.
If Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. These agents enable creating a new virtual machine on the virtualization server you specify. The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displayed in the Virtual Machine Settings (p. 150) section. Check the settings and make changes if necessary. Then you proceed to the regular volume mapping procedure described below.
Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...). Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and relocate the volume by dragging it or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this feature, you can redistribute the disk space between the volumes being recovered.
Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter from a drop-down list. With the default AUTO selection, the first unused letter will be assigned to the volume. If you select NO, no letter will be assigned to the recovered volume, hiding it from the OS.You should not assign letters to volumes that are inaccessible to Windows, such as to those other than FAT and NTFS. 6.3.6.
set by the virtualization product. You can add virtual disks to the machine configuration or, in some cases, delete the proposed disks. Implementation of Xen machines is based on Microsoft Virtual PC and inherits its limitations: up to 3 IDE disks and 1 processor. SCSI disks are not supported. Processors Initial setting: if not contained in the backup or the backed up setting is not supported by the virtualization server, the default server's setting.
By mask (*) By mask (?) *.log Excludes all files with the .log extension F* Excludes all files and folders with names starting with "F" (such as folders F, F1 and files F.log, F1.log) F???.log Excludes all .log files with names consisting of four symbols and starting with "F" Windows By file path Finance\F.log Excludes files named "F.
Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the recovery task: Recover now - the recovery task will be started immediately after you click the final OK. Recover later - the recovery task will be started at the date and time you specify. If you do not need to schedule the task and wish to start it manually afterwards, select the Task will be started manually (do no schedule the task) check box. 6.3.
Universal Restore settings Automatic driver search Specify where the program will search for the Hardware Abstraction Layer (HAL), HDD controller driver and network adapter driver(s): - If the drivers are on a vendor's disc or other removable media, turn on the Search removable media. - If the drivers are located in a networked folder or on the bootable media, specify the path to the folder in the Search folder field.
With Acronis Backup & Recovery 10 Agent for Windows, you can recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Virtual Appliance (OVA). Files of the new virtual machine will be placed in the folder you select. You can start the machine using the respective virtualization software or prepare the machine files for further usage.
You will be taken to the Backup plans and tasks view where you can examine the state and progress of the recovery task. Post-conversion operations The resulting machine always has SCSI disk interface and basic MBR volumes. If the machine uses a custom boot loader, you might need to configure the loader to point to the new devices and reactivate it. Configuring GRUB is described in "How to reactivate GRUB and change its configuration (p. 157)". Tip.
One part of the GRUB loader resides either in the first several sectors of the disk or in the first several sectors of the volume. The rest is on the file system of one of the volumes. System bootability can be recovered automatically only when the GRUB resides in the first several sectors of the disk and on the file system to which direct access is possible. In other cases, the user has to manually reactivate the boot loader. Solution: Reactivate the boot loader.
cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Linux distributions) or the /mnt/system/boot/grub/grub.conf file (for Fedora and Red Hat Enterprise Linux distributions)—for example, as follows: vi /mnt/system/boot/grub/menu.lst 6. In the menu.lst file (respectively grub.conf), find the menu item that corresponds to the system you are recovering.
6.3.11.2 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, the rest is in the files ntldr, boot.ini, ntdetect.com, ntbootdd.sys. boot.ini is a text file that contains the loader configuration.
If this does not resolve the problem, or for more details on adding these registry settings, see the corresponding Microsoft Help and Support article. Tip: In general, if a volume contains many files, consider using a disk-level backup instead of a file-level one. In this case, you will be able to recover the entire volume as well as particular files stored on it. 6.4 Validating vaults, archives and backups Validation is an operation that checks the possibility of data recovery from a backup.
Backup (p. 162) - specify the archive first, and then select the desired backup in this archive. Vault (p. 162) - select a vault (or other location), which archives to validate. Access Credentials (p. 163) [Optional] Provide credentials for accessing the source if the task account does not have enough privileges to access it. To access this option, select the check box for Advanced view. When to validate Validate (p. 163) Specify when and how often to perform validation.
If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder. If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first one when the program prompts. If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder.
To select a centralized vault, expand the Centralized group and click the appropriate vault. To select a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server.
Choose one of the following: Now - to start the validation task right after its creation, that is, after clicking OK on the Validation page. Later - to start the one-time validation task, at the date and time you specify. Specify the appropriate parameters as follows: Date and time - the date and time when to start the task. The task will be started manually (do not schedule the task) - select this check box, if you wish to start the task manually later. On schedule - to schedule the task.
Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mount point, choose the read/write or read only access mode. When you complete all the required steps, click OK to mount the volumes. 6.5.1 Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 6.5.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup.
Mount point (in Linux) - specify the directory where you want the volume to be mounted. 3. If several volumes are selected for mounting, click on every volume to set its mounting parameters, described in the previous step. 4. Click OK. 6.6 Managing mounted images Once a volume is mounted, you can browse files and folders contained in the backup using a file manager and copy the desired files to any destination.
be exported from the media to the target storage. Subsequent incremental backups, which are usually much smaller, can be transferred over the network. By exporting a managed vault to a detachable media, you obtain a portable unmanaged vault that can be used in the following scenarios: keeping an off-site copy of your vault or of the most important archives recovery of the storage node itself.
An export task starts immediately after you complete its configuration. An export task can be stopped or deleted in the same way as any other task. Once the export task is completed, you can run it again at any time. Before doing so, delete the archive that resulted from the previous task run if the archive still exists in the destination vault. Otherwise the task will fail. You cannot edit an export task to specify another name for the destination archive (this is a limitation). Tip.
6.7.1 Task credentials Provide credentials for the account under which the task will run. To specify credentials 1. Select one of the following: Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation.
If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access.
The program will access the location using the credentials you specify. Use this option if the task account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Password. The password for the account. 2. Click OK.
2. Using the archives table To assist you with choosing the right destination, the table on the right displays the names of the archives contained in each location you select in the tree. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Naming the new archive By default, the exported archive inherits the name of the original archive.
Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more about the advantages and limitations of the Acronis Secure Zone, see the Acronis Secure Zone (p. 39) topic in the "Proprietary Acronis technologies" section. 6.8.1 Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is running or using bootable media. To create Acronis Secure Zone, perform the following steps. Space Disk (p.
If you have to take space from the boot or the system volume, please bear the following in mind: Moving or resizing of the volume from which the system is currently booted will require a reboot. Taking all free space from a system volume may cause the operating system to work unstably and even fail to start. Do not set the maximum zone size if the boot or the system volume is selected. 6.8.1.
6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 240). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans can use Acronis Secure Zone as well as local plans. If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. The zone does not perform automatic cleanup, that is, deleting old archives, anymore.
typing an exact value in the Acronis Secure Zone Size field. 4. Click OK. 6.8.2.3 Deleting Acronis Secure Zone To delete Acronis Secure Zone: 1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from the zone and then click OK. If you select several volumes, the space will be distributed proportionally to each partition.
6.10 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
6.10.1 How to create bootable media To enable creating physical media, the machine must have a CD/DVD recording drive or allow a flash drive to be attached. To enable PXE or WDS/RIS configuration, the machine must have a network connection. Bootable Media Builder can also create an ISO image of a bootable disk to burn it later on a blank disk.
2. 3. 4. 5. 6. You can find system requirements for installation by following the above links. [optional] Burn the WAIK to DVD or copy to a flash drive. Install the Microsoft .NET Framework v.2.0 from this kit (NETFXx86 or NETFXx64, depending on your hardware.) Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. Install Windows AIK from this kit. Install Bootable Media Builder on the same machine.
upload the selected components to a WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 183). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected. 9. Path to the media ISO file or the name or IP and credentials for PXE or WDS/RIS. Kernel parameters This window lets you specify one or more parameters of the Linux kernel. They will be automatically applied when the bootable media starts.
Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you to use some USB drives in the USB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing on some hardware. nofw Disables the FireWire (IEEE1394) interface support. nopcmcia Disables detection of PCMCIA hardware. nomouse Disables mouse support.
Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network interface cards. To ensure that each NIC will be assigned the appropriate settings, create the media on the server for which the media is customized. When you select an existing NIC in the wizard window, its settings are selected for saving on the media. The MAC address of each existing NIC is also saved on the media.
to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the target hardware has a specific mass storage controller (such as a SCSI, RAID, or Fiber Channel adapter) for the hard disk. For more information please refer to Universal Restore (p. 153). The drivers will be placed in the visible Drivers folder on the bootable media.
6.10.1.3 Adding the Acronis Plug-in to WinPE 2.x or 3.0 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0: Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. Creating the PE ISO with the plug-in from scratch.
To create a PE image (ISO file) from the resulting WIM file: replace the default boot.wim file in your Windows PE folder with the newly created WIM file. For the above example, type: copy c:\AcronisMedia.wim c:\winpe_x86\ISO\sources\boot.wim use the Oscdimg tool. For the above example, type: oscdimg -n –bc:\winpe_x86\etfsboot.com c:\winpe_x86\ISO c:\winpe_x86\winpe_x86.iso For more information on customizing Windows PE, see the Windows Preinstallation Environment User’s Guide (Winpe.chm). 6.10.1.
Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window. 6.10.3 Working under bootable media Operations on a machine booted with bootable media are very similar to backup and recovery under the operating system. The difference is as follows: 1.
6.10.3.2 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Computer System Interface (iSCSI) devices and Network Direct Attached Storage (NDAS) devices when working under bootable media. These devices are connected to the machine through a network interface and appear as if they were locally-attached devices. On the network, an iSCSI device is identified by its IP address, and an NDAS device is identified by its device ID.
Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff
You can create the volume structure in either of the following ways: Automatically in Linux-based bootable media by using the management console or a script—see Creating the volume structure automatically (p. 190). Manually by using the mdadm and lvm utilities—see Creating the volume structure manually (p. 191). 6.10.5.
6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical volumes by using a Linux-based bootable media, and an example of such recovery. You can use a similar procedure in Linux. To recover MD devices and logical volumes 1. Boot the machine from a Linux-based bootable media. 2. Click Acronis Bootable Agent. Then, click Run management console. 3. On the toolbar, click Actions, and then click Start shell.
The following picture illustrates this configuration. Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the machine from a Linux-based bootable media. 2. In the management console, press CTRL+ALT+F2. 3. Run the following commands to create the MD devices: mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/sd[ab] mdadm --create /dev/md1 --level=1 --raid-devices=2 /dev/sd[cd] 4.
2. 3. 4. 5. 6. In Archive, click Change and then specify the name of the archive. In Backup, click Change and then select the backup from which you want to recover data. In Data type, select Volumes. In Items to recover, select the check box next to my_volgroup-my_logvol. Under Where to recover, click Change, and then select the logical volume that you created in Step 1. Click the chevron buttons to expand the list of disks. 7. Click OK to start the recovery.
configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the disk or volume structure the user might consider necessary. All operations on disks and volumes involve a certain risk of data damage. Operations on system, bootable or data volumes must be carried out very carefully to avoid potential problems with the booting process or hard disk data storage.
A volume may have a different letter in different Windows operating systems. For example, volume E: might appear as D: or L: when you boot another Windows operating system installed on the same machine. (It is also possible that this volume will have the same letter E: under any Windows OS installed on the machine.) A dynamic disk created in one Windows operating system is considered as a Foreign Disk in another Windows operating system or might be unsupported by this operating system.
Basic disk cloning (p. 196) - transfers complete data from the source basic MBR disk to the target Disk conversion: MBR to GPT (p. 198) - converts an MBR partition table to GPT Disk conversion: GPT to MBR (p. 199) - converts a GPT partition table to MBR Disk conversion: Basic to Dynamic (p. 199) - converts a basic disk to dynamic Disk conversion: Dynamic to Basic (p.
To plan the Clone basic disk operation: 1. Select a disk you want to clone. 2. Select a disk as target for the cloning operation. 3. Select a cloning method and specify advanced options. The new volume structure will be graphically represented in the Disk management view immediately. It is advisable that you deactivate Acronis Startup Recovery Manager (p. 227) (ASRM), if it is active, before cloning a system disk. Otherwise the cloned operating system might not boot.
Using advanced options When cloning a disk comprising of a system volume, you need to retain an operating system bootability on the target disk volume. It means that the operating system must have the system volume information (e.g. volume letter) matched with the disk NT signature, which is kept in the MBR disk record. But two disks with the same NT signature cannot work properly under one operating system.
3. By clicking OK, you'll add a pending operation of MBR to GPT disk conversion. (To finish the added operation you will have to commit (p. 208) it. Exiting the program without committing the pending operations will effectively cancel them.) Please note: A GPT-partitioned disk reserves the space in the end of the partitioned area necessary for the backup area, which stores copies of the GPT header and the partition table.
If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right-click on the selected volume, and then click Convert to dynamic in the context menu. You will receive a final warning about the basic disk being converted to dynamic. 3. If you click OK in this warning window, the conversion will be performed immediately and if necessary, your machine will be restarted.
In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when the size of one mirror establishes the size of the other mirror, or the last 8Mb of disk space are reserved for the future conversion of the disk from basic to dynamic). System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk. 2.
Format Volume (p. 207) - Formats a volume giving it the necessary file system The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time.
disks fails, the data can still be accessed from the remaining disks. Unfortunately, the hardware limitations on size and performance are even more severe with the use of mirrored volumes. Mirrored-Striped Volume A fault-tolerant volume, also sometimes called RAID 1+0, combining the advantage of the high I/O speed of the striped layout and redundancy of the mirror type. The evident disadvantage remains inherent with the mirror architecture - a low disk-to-volume size ratio.
Select destination disks The next wizard page will prompt you to choose the disks, whose space will be used for the volume creation. To create a basic volume: Select a destination disk and specify the unallocated space to create the basic volume on. To create a Simple/Spanned volume: Select one or more destination disks to create the volume on. To create a Mirrored volume: Select two destination disks to create the volume on.
Set the volume options On the next wizard page you can assign the volume Letter (by default - the first free letter of the alphabet) and, optionally, a Label (by default – none). Here you will also specify the File system and the Cluster size. The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size has been set at more than 2 GB), FAT32 (disabled, if the volume size has been set at more than 2 TB), NTFS or to leave the volume Unformatted.
2. Select Delete volume or a similar item in the Operations sidebar list, or click the Delete the selected volume icon on the toolbar. If the volume contains any data, you will receive the warning, that all the information on this volume will be lost irrevocably. 3. By clicking OK in the Delete volume window, you'll add the pending operation of volume deletion. (To finish the added operation you will have to commit (p. 208) it.
4. By clicking OK in the Change Letter window, you'll add a pending operation to volume letter assignment. (To finish the added operation you will have to commit (p. 208) it. Exiting the program without committing the pending operations will effectively cancel them.) The new volume structure will be graphically represented in the Disk management view immediately. 6.11.6.5 Change volume label The volume label is an optional attribute. It is a name assigned to a volume for easier recognition.
In setting the cluster size you can choose between any number in the preset amount for each file system. Note, the program suggests the cluster size best suited to the volume with the chosen file system. 3. If you click OK to proceed with the Format Volume operation, you'll add a pending operation of formatting a volume. (To finish the added operation you will have to commit (p. 208) it. Exiting the program without committing the pending operations will effectively cancel them.
To collect system information 1. In the management console, select from the top menu Help > Collect system information from 'machine name'. 2. Specify where to save the file with system information. 7 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online service. This service enables you to do online backups to Acronis Online Backup Storage. Acronis Backup & Recovery 10 Online might be unavailable in your region. To find more information, click here: http://www.
7.1.2 What data can I back up and recover? You can back up any files, volumes, or the entire physical machine as often as you wish. Unlike most online backup solutions, Acronis Backup & Recovery 10 Online enables bare metal recovery directly from the online storage. Files can be recovered from disk-level backups as well as from file-level backups. 7.1.
7.1.5.2 Is the online storage available under Acronis bootable media? Recovery from Acronis Online Backup Storage is available but backup to the storage is not. 7.1.5.3 Can I use Acronis Universal Restore when recovering a system from the online storage? Yes. Acronis Universal Restore is always available when recovering a system from the online storage. Using Acronis Universal Restore when recovering from other types of storage will require a separate license. 7.1.5.
7.1.6 Initial Seeding FAQ This section explains what Initial Seeding is, why you would want to use it and provides some usage details. 7.1.6.1 What is Initial Seeding? Initial Seeding is an extra service that lets you save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
7.1.6.7 How to buy an Initial Seeding license? You can buy an Initial Seeding license from an Acronis partner or in Acronis online store. Follow the link www.acronis.eu/my/backup-recovery-online/#buy http://www.acronis.eu/my/backup-recoveryonline/#buy to locate a partner or to buy online. Having purchased a license from an Acronis partner, you receive a confirmation e-mail with a registration code. Click Enter new registration code on the same web page and register the license.
Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA, SATA, USB connected drives. SCSI drives are not accepted. Packaging If possible, use the original packaging. Otherwise, packaging materials can be obtained at any shipping outlet or stationary store. The following are instructions about how to package your hard disk drive. Step 1 Delicately remove your hard disk drive from the machine.
Step 4 Choose the transport company that you will use for shipping. On this company's web site, prepare and print two prepaid shipping labels: 1. Shipping label for sending your hard drive. This label is placed on the top of the box. You should send your package to one of the Acronis data centers. The data center address can be obtained on the Initial seeding/Recovery tab of your account management page by clicking Show data center address.
Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending your hard drive to the top of the box, so the label does not wrap around the edge of the package. 7.1.6.10 How do I track an Initial Seeding order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about the most important events. Available – The license is available for using on any machine.
The order has been completed. The media has been returned (or: Returning the media was not requested) – Your media has been shipped back (the carrier and the tracking number are specified). If a prepaid shipping label was not provided with the media, the media will be discarded. [Occasional] The order is on hold – Your order was placed on hold due to technical difficulties processing the order. Acronis is working on resolving these issues.
7.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A separate hard drive is required for each machine. 7.1.7.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery license from an Acronis partner or in Acronis online store. Follow the link www.acronis.eu/my/backup-recovery-online/#buy http://www.acronis.eu/my/backuprecovery-online/#buy to locate a partner or to buy online.
7.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscription operations that you can perform on your account management Web page. 7.1.8.1 How to access my account management Web page? To access this Web page from the Acronis Web site: 1. Select User Login. 2. Log in to your account (create one if you are not registered yet). 3. Navigate to Online backup > For Business. To access this Web page from Acronis Backup & Recovery 10: 1.
An expired subscription can be renewed within five days after expiration. In such cases, the new subscription will be activated immediately. Renewing a single subscription To renew a subscription 1. Go to the account management Web page. 2. Make sure that you have an available subscription with the same storage quota. 3. Select the machine that you want to renew the subscription for, and then click Renew. The subscription appears in the Next subscription column for the selected machine.
7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not registered yet) and navigate to Online backup > For Business. This is your account management Web page. Here you can get a trial subscription, locate an Acronis partner or buy subscriptions online. The newly obtained subscriptions are listed as available subscriptions in the Manage Subscriptions tab.
the backup will fail. With a server subscription, you can only back up the Windows host. With a subscription for virtual machines, you can back up both the Windows host and its virtual machines. Trial subscriptions You can get one free workstation subscription, server subscription, or subscription for virtual machines per account. The storage quota of the trial subscription is equal to that of the standard subscription. The subscription period is limited to 2 months.
Reassigning a subscription does not restart its subscription period. To assign an activated subscription to a machine 1. On the machine to which you want to assign an activated subscription, go to the subscription activation window. 2. From Activated subscriptions, select the activated subscription that you want to reassign to the machine. 3. Click Activate now. Example The diagram below shows what happens if you reassign a subscription to a different machine.
Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subscription 2, unless you assign this subscription to any machine. 7.5 Configuring proxy settings If the machine connects to the Internet through a proxy server, configure Acronis Backup & Recovery 10 to use the proxy server. 1. 2. 3. 4. Start Acronis Backup & Recovery 10. On the toolbar, on the Options menu, click Machine options. Click Online backup proxy. Enter the proxy server settings.
By using the Backup performance > Network connection speed option, you can vary the transferring speed as kilobytes per second, but not as a percentage. Command-line mode Acronis Backup & Recovery 10 command-line utilities do not support online backup. 7.7 Terminology reference The following is the list of terms related to the Acronis Backup & Recovery 10 Online service. Activate a subscription Allow the machine to use the online storage according to the subscription.
Registration code A character string for registering a subscription or license that was bought from an Acronis partner. When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the registration codes for each of them. You then enter the registration codes on the account management Web page, and these subscriptions and licenses become available for use. Renew a subscription Assign a subscription that has the same storage quota as the current, activated subscription.
8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 233) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 236), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type.
Backup options Configuration parameters of a backup operation (p. 228), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 229). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: what data to back up where to store the backup archive (p. 228) (the backup archive name and location) the backup scheme (p.
4. On each machine, the agent (p. 228) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. 5. On each machine, the agent installed on the machine creates a backup plan (p. 229) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 231). 6. On each machine, the agent installed on the machine creates a set of centralized tasks (p. 231) that will carry out the plan.
Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a physical machine from the built-in group except for removing the machine from the management server. Virtual machines are removed as a result of their host server removal. A backup policy (p. 229) can be applied to a built-in group. C Centralized backup plan A backup plan (p. 229) that appears on the managed machine (p.
Cleanup Deleting backups (p. 228) from a backup archive (p. 228) in order to get rid of outdated backups or prevent the archive from exceeding the desired size. Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 229) that produces the archive. This operation checks if the archive has exceeded its maximum size and/or for expired backups. This may or may not result in deleting backups depending on whether the retention rules are violated or not.
Direct management Any management operation that is performed on a managed machine (p. 236) using the direct console (p. 232)-agent (p. 228) connection (as opposed to centralized management (p. 231) when the operations are configured on the management server (p. 237) and propagated by the server to the managed machines). The direct management operations include: creating and managing local backup plans (p. 236) creating and managing local tasks (p.
222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/ Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, better performance or larger volume size. A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition style.
the administrator changes the criteria so that the machine does not meet them anymore. There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server. Dynamic volume Any volume located on dynamic disks (p. 234), or more precisely, on a disk group (p. 233). Dynamic volumes can span multiple disks.
F Full backup A self-sufficient backup (p. 228) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. G GFS (Grandfather-Father-Son) A popular backup scheme (p. 230) aimed to maintain the optimal balance between a backup archive (p. 228) size and the number of recovery points (p. 238) available from the archive.
Managed vault A centralized vault (p. 231) managed by a storage node (p. 238). Archives (p. 228) in a managed vault can be accessed as follows: bsp://node_address/vault_name/archive_name/ Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 239) and storage node-side validation (p. 239) for each archive stored in the managed vault.
Plan See Backup plan (p. 229). Policy See Backup policy (p. 229). R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 236) managed by a management server (p. 237). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 238) procedure. Registration A procedure that adds a managed machine (p. 236) to a management server (p. 237).
prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malefactor, by using encrypted vaults (p. 235). Storage node-side cleanup Cleanup (p. 231) performed by a storage node (p. 238) according to the backup plans (p. 229) that produce the archives (p. 228) stored in a managed vault (p. 236). Being an alternative to the agentside cleanup (p. 228), the cleanup on the storage node side relieves the production servers of unnecessary CPU load.
U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. The Universal Restore is not available: when the machine is booted with Acronis Startup Recovery Manager (p.
Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 228) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server.