User guide
Table Of Contents
- 1 Introducing Acronis Snap Deploy 5
- 1.1 Overview
- 1.2 What's new in Acronis Snap Deploy 5
- 1.3 What you can do with Acronis Snap Deploy 5
- 1.3.1 Taking an image of the master system
- 1.3.2 Deployment to specific machines (immediate, manual, and scheduled deployment)
- 1.3.3 Deployment to any ready machines (event-driven deployment)
- 1.3.4 Stand-alone deployment
- 1.3.5 Deployment with individual deployment settings
- 1.3.6 User-initiated deployment (custom deployment)
- 1.3.7 Deployment of a disk volume and MBR
- 1.3.8 Command-line mode and scripting under WinPE
- 1.4 Features of Acronis Snap Deploy 5
- 1.4.1 List of machines
- 1.4.2 List of deployment tasks
- 1.4.3 Per-deployment licensing
- 1.4.4 Support for the VHD format
- 1.4.5 Graphical user interface in WinPE
- 1.4.6 E-mail notifications about deployment
- 1.4.7 Compatibility with images created by other Acronis products
- 1.4.8 Support for multiple network adapters
- 1.4.9 Multicast TTL and network bandwidth throttling
- 1.4.10 Falling back to unicast
- 1.4.11 Encrypted communication
- 1.4.12 Password protection
- 1.5 Supported operating systems for imaging and deployment
- 1.6 Licensing policy
- 1.7 Upgrading to Acronis Snap Deploy 5
- 1.8 Technical Support
- 2 Understanding Acronis Snap Deploy 5
- 3 Getting started with Acronis Snap Deploy 5
- 4 Installation of Acronis Snap Deploy 5
- 4.1 Supported operating systems
- 4.2 System requirements
- 4.3 Used ports and IP addresses
- 4.4 Typical installation
- 4.5 Custom installation
- 4.5.1 Installation procedure
- 4.5.2 Common installation configurations
- 4.5.3 Installation of components
- 4.5.3.1 Installation of Acronis Snap Deploy 5 Management Console
- 4.5.3.2 Installation of Acronis Snap Deploy 5 License Server
- 4.5.3.3 Installation of Acronis Snap Deploy 5 OS Deploy Server
- 4.5.3.4 Installation of Acronis PXE Server
- 4.5.3.5 Installation of Acronis Wake-on-LAN Proxy
- 4.5.3.6 Installation of Acronis Snap Deploy 5 Management Agent
- 4.6 Other ways of installation
- 4.7 Upgrading Acronis Snap Deploy 5
- 4.8 Uninstalling Acronis Snap Deploy 5
- 5 Using Acronis Snap Deploy 5 Management Console
- 6 Using Acronis Snap Deploy 5 License Server
- 7 Deployment tools
- 8 Creating a master image
- 9 Validating a master image
- 10 Deploying a master image
- 10.1 Files supported as master images
- 10.2 Licenses for deployment
- 10.3 Deployment templates
- 10.4 Deployment through a deployment task
- 10.5 Stand-alone deployment
- 10.6 User-initiated deployment (custom deployment)
- 10.7 Deploying BIOS-based systems to UEFI-based and vice versa
- 11 Managing the list of machines (the Machines view)
- 12 Individual deployment settings
- 13 Managing deployment tasks (the Deployment tasks view)
- 14 Command-line mode and scripting under WinPE
- 15 Collecting system information
2 Copyright © Acronis International GmbH, 2002-2014
Copyright Statement
Copyright © Acronis International GmbH, 2002-2014. All rights reserved.
“Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
"Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore”,
“Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH.
Linux is a registered trademark of Linus Torvalds.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the
United States and/or other jurisdictions.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at http://kb.acronis.com/content/7696
Acronis patented technologies
Technologies, used in this product, are covered and protected by one or more U.S. Patent Numbers:
7,047,380; 7,275,139; 7,281,104; 7,318,135; 7,353,355; 7,366,859; 7,475,282; 7,603,533; 7,636,824;
7,650,473; 7,721,138; 7,779,221; 7,831,789; 7,886,120; 7,895,403; 7,934,064; 7,937,612; 7,949,635;
7,953,948; 7,979,690; 8,005,797; 8,051,044; 8,069,320; 8,073,815; 8,074,035; 8,145,607; 8,180,984;
8,225,133; 8,261,035; 8,296,264; 8,312,259; 8,347,137; 8,484,427; 8,645,748; 8,732,121 and patent
pending applications.