Datasheet

Table Of Contents
Table of Contents
Chapter 1. Introduction ......................................................................................8
1.1 Acronis
®
True Image Echo Enterprise Server – a complete solution for corporate users ...........8
1.2 Acronis True Image Echo Enterprise Server components.....................................................10
1.3 New in Acronis True Image Echo Enterprise Server ............................................................10
1.4 Supported file systems and storage media.........................................................................12
1.4.1 Supported file systems ..............................................................................................12
1.4.2 Supported storage media...........................................................................................12
1.5 License policy..................................................................................................................13
1.6 Technical support............................................................................................................13
Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
............................................................................................................................14
2.1 System requirements.......................................................................................................14
2.1.1 Minimum hardware requirements ...............................................................................14
2.1.2 Supported operating systems.....................................................................................14
2.2 Security parameters.........................................................................................................15
2.2.1 Credentials...............................................................................................................15
2.2.2 Firewall setup...........................................................................................................15
2.2.3 Encrypted communication..........................................................................................16
2.2.4 Security parameters in Acronis Administrative Template...............................................16
2.3 Installing Acronis True Image Echo Enterprise Server components.......................................17
2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis
True Image Agent for Windows...........................................................................................18
2.3.2 Installation of Acronis True Image Agent for Linux.......................................................19
2.3.3 Installation of Acronis Group Server............................................................................19
2.3.4 Acronis Backup Server installation and setup...............................................................19
2.3.5 Acronis Universal Restore installation..........................................................................23
2.4 Extracting Acronis True Image Echo Enterprise Server components .....................................23
2.5 Running Acronis True Image Echo Enterprise Server components........................................23
2.5.1 Running Acronis True Image Echo Enterprise Server (local version)...............................23
2.5.2 Running Acronis True Image Management Console......................................................24
2.5.3 Running other Acronis components.............................................................................24
2.6 Removing Acronis True Image Echo Enterprise Server components......................................24
Chapter 3. General information and proprietary Acronis technologies ............25
3.1 The difference between file archives and disk/partition images............................................25
3.2 Full, incremental and differential backups..........................................................................25
3.3 Acronis Secure Zone
®
......................................................................................................26
3.4 Acronis Startup Recovery Manager....................................................................................27
3.4.1 How it works ............................................................................................................27
3.4.2 How to use...............................................................................................................27
3.5 Acronis Backup Server .....................................................................................................28
3.5.1 Backup locations.......................................................................................................28
3.5.2 Quotas and time limits for computers and users...........................................................29
3.5.3 Administrators and Users...........................................................................................29
3.5.4 Operations with archives............................................................................................30
3.6 Acronis Snap Restore.......................................................................................................30
3.6.1 Limitations in using Acronis Snap Restore....................................................................30
3.6.2 How it works ............................................................................................................30
3.6.3 How to use...............................................................................................................31
3.7 Acronis Universal Restore.................................................................................................31
3.7.1 Acronis Universal Restore purpose..............................................................................31
3.7.2 Acronis Universal Restore general principles ................................................................32
3.7.3 Acronis Universal Restore and Microsoft Sysprep..........................................................32
3.7.4 Limitations in using Acronis Universal Restore..............................................................33
4 Copyright © Acronis, Inc., 2000-2007