User’s Guide Acronis® True Image Echo Workstation
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
Table of Contents Chapter 1. Introduction ......................................................................................7 1.1 1.2 1.3 1.4 Acronis® True Image Echo Workstation – a complete solution for corporate users ...................7 Acronis True Image Echo Workstation components ..............................................................8 New in Acronis True Image Echo Workstation ......................................................................
3.7.4 Limitations in using Acronis Universal Restore.............................................................. 32 3.7.5 Getting Acronis Universal Restore ............................................................................... 32 3.8 Backing up to tape libraries and tape drives ....................................................................... 33 3.8.1 3.8.2 3.8.3 3.8.4 Backing up to a locally attached tape device ................................................................
7.2 Restoring files and folders from file archives ...................................................................... 82 7.3 Restoring disks/partitions or files from images ................................................................... 85 7.3.1 Starting the Restore Data Wizard................................................................................ 86 7.3.2 Archive selection ....................................................................................................... 86 7.3.
12.2 WinPopup notification .................................................................................................. 122 12.3 Viewing logs ................................................................................................................ 123 12.4 Event tracing ............................................................................................................... 124 12.4.1 Windows event log ......................................................................................
Chapter 1. Introduction 1.1 Acronis® True Image Echo Workstation – a complete solution for corporate users Acronis True Image Echo Workstation is a comprehensive backup and recovery solution for heterogeneous computer infrastructure that may include any combination of physical and virtual, networked and standalone Windows-based computers.
availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used during backups, allowing minimal disruption of business operations. Supports Leading Edge Technology Businesses today are moving to leverage the latest technologies, including dual-core, 64bit processors and 64-bit operating systems.
agents for the status of running tasks and provides the administrator with the summary tasks state display over the network. 4. Acronis Backup Server is an application for centralized storage and management of enterprise backup archives. The administrator can set space quotas and backup schemes, schedule check tasks that consolidate backups in case of quota violation, perform one-time backups consolidation. This ensures optimal usage of the storage capacity.
Multi-volume snapshot for databases spread on several disks Control network bandwidth usage when backing up to FTP Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all errors) Dual destination backup: local + network share Archive bit reset (file-level backup only) Generating time-based names for backup files Recovery Recovery of dynamic volumes Recovery of system dynamic volumes on dissimilar hardware using Acronis Universal Restore or Acronis Active Restore Scheduling Schedule arch
1.4 Supported file systems and storage media 1.4.1 Supported file systems • FAT16/32 • NTFS • Ext2/Ext3 • ReiserFS • Linux SWAP • DFS If a file system is not supported or is corrupted, Acronis True Image Echo Workstation can copy data using a sector-by-sector approach. 1.4.
1.6 Technical support As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available, you may electronically access at no additional charge, Support services for the Software, which Acronis shall endeavor to make available twenty four (24) hours a day, seven (7) days per week.
Chapter 2. Acronis True Image Echo Workstation installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis True Image Echo Workstation requires the following hardware: • Pentium processor or higher • 512MB RAM • FDD or CD-RW drive for bootable media creation • Mouse (recommended). 2.1.
2.2 Security parameters 2.2.1 Credentials Acronis True Image Echo Workstation fully supports all security standards used in Windows. To install Acronis components on a computer, the user must be a member of the Administrators group on the computer. To get access to Acronis True Image Agent, installed on a computer, the user must be a member of the Administrators or Backup operators group on the computer. The Acronis Group Server uses administrator’s credentials to perform data backup tasks on the computers.
Once Acronis True Image Echo Workstation components are installed, encrypted communication between the components is enabled automatically. The earlier versions of Acronis True Image Workstation did not support encrypted communication, therefore connection to such components, if they present on the network, will not be encrypted. You have an option to completely disable non-encrypted communication with some or all Acronis True Image Echo Workstation components.
Encryption Options • Server Requires Encryption This option defines the server behavior in case the client does not support encryption. When enabled, connection to the client will be terminated. When disabled, the client will be allowed to establish non-encrypted connection. • Client Requires Encryption When connecting to server applications, the Acronis client applications always attempt to establish an encrypted connection.
Acronis True Image Echo Workstation Install Window It is recommended that you install Acronis True Image Management Console first. After that you will be able to install Acronis True Image Echo Workstation (local version) and Acronis True Image Agent for Windows remotely to networked computers. 2.3.
2.3.2 Installation of Acronis Group Server The Acronis Group Server only can be installed locally on a computer by running the setup program. When installing Acronis Group Server, you will be asked for credentials. The credentials you provide are used for running the Acronis Group Server service and also applied to all networked computers. Enter the uniform account information discussed in 2.2.1 Credentials.
4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can create a folder for the backup location on the storage drive. To see the folder in the tree and add it to the path, collapse and expand the drive. 5. Click Back -> Configure Backup Locations -> make sure that the new default location is created and delete the location in \Documents and Settings. 6.
Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator? 9. Define which users will be allowed to back up data on the backup server. Add the users as follows: Add the person’s local or domain account to the AcronisBackupServerUsers group on the backup server. Click Set up User profiles -> Add. Choose the user name. Choose Use default settings. Click Proceed. 10.
Click Set up Administrator profiles -> Add. Choose the computer or enter its name. Choose Use default settings. Click Proceed. Adding a computer to the administrator profile 11. Schedule a check for exceeding the quotas and time limits, if needed according to the selected policy. To do so, select Acronis Backup Server Management -> Specify Default Settings -> Schedule automatic consolidation and backup management. Choose Periodically. Choose Weekly.
2.3.4 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image Echo Workstation. It is purchased separately and installed from a separate setup file. Acronis Universal Restore has its own serial number that is required at installation.
True Image Echo Workstation will be run in the standalone mode, allowing you to recover the damaged partitions. If your disk data is totally corrupted and you cannot boot (or if you have not activated Acronis Startup Recovery Manager), load the standalone Acronis True Image Echo Workstation version from the bootable media (created by you using Rescue Media Builder) or RIS-server. Then you will be able to restore the disk from a previously created image. 2.5.
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone, full backup could be an optimal solution if you often roll back the system to the initial state (for example, systems in a gaming club or Internet café where you need to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial and the restore time will be minimal.
You can back up data automatically on a schedule (see Chapter 8. Scheduling tasks), and not worry about zone overflow issues. However, if you keep long chains of incremental backups, it is a good practice to check the zone free space periodically. To do so, start the Manage Acronis Secure Zone wizard and check the zone free space, or manually remove or consolidate unnecessary backups. Acronis Secure Zone contents can be viewed directly from Windows Explorer.
Recovery Manager. Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you see the "Press F11 for Acronis Startup Recovery Manager" message. This will run a standalone version of Acronis True Image Echo Workstation that only slightly differs from the complete version. For information on restoring damaged partitions, see Chapter 7. Restoring the backup data.
Maintaining multiple small backup locations on a single disk does not allow for tracking changes in total disk space usage. At the same time, manual management of thousands of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup locations or edit their size limitations and storage period. 3.5.
Control Panel -> Administrative Tools -> Computer Management -> Local Users and Groups -> AcronisBackupServerUsers. The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Generally, there are two types of profiles on the backup server: Administrators and Users. The Administrators profiles are designed to perform backups on remote computers with Acronis True Image Agents.
3.6.2 How it works When the restoration procedure is started, Acronis True Image Echo Workstation: 1. Finds the sectors in the image which contain system files, and restores these sectors first. First the OS is restored and can be started very quickly. Having started the OS, the user sees the folder tree with files, though file contents still is not recovered. Nevertheless, the user can start working. 2.
3.7 Acronis Universal Restore 3.7.1 Acronis Universal Restore purpose A system disk image can be deployed easily on the hardware where it was created or to identical hardware. However, if you change a motherboard or use another processor version — a likely possibility in case of hardware failure — the restored system could be unbootable.
3.7.3 Acronis Universal Restore and Microsoft Sysprep Acronis Universal Restore is not a system preparation tool. You can apply it to any system image created by Acronis products, including images prepared with Microsoft System Preparation Tool (Sysprep). The following is an example of using both tools on the same system.
3.8 Backing up to tape libraries and tape drives A tape library is a high-capacity storage device consisting of one or more tape drives and a loader that automatically selects and loads multiple tape cartridges. Tape libraries with only one drive and loader are known as autoloaders. Acronis True Image Echo Workstation supports tape libraries, autoloaders, and SCSI tape drives as storage devices. Tape libraries, autoloaders and tape drives are accessible through the Acronis Backup Server.
All backups stored on one tape must be of the same backup type - either image backups, or file-level backups, performing an image backup on the tape containing a file-level backup also is not supported. Acronis True Image Echo Workstation does not support tape devices when working in preinstallation environment such as Win PE or Bart PE. 3.8.
3.8.2 Understanding backup to tape devices attached to the Backup Server Archives cataloguing Acronis True Image Echo Workstation creates a dedicated database for archives and tapes cataloguing (\Program files\Common Files\Acronis\Fomatik\tape_archives.fdb.) Each tape of an RSM-managed device has its own GUID stored in the Windows registry.
1. Select Control panel -> Administrative tools -> Computer management -> Removable storage -> Media pools -> Acronis. 2. Right click on the tape in the Acronis pool, dismount the tape if it is has a status Loaded and select Free from the context menu. The tape will be moved to the Free pool. After putting a tape in the Free pool RSM and then Acronis will rescan it and record it to the database with a new GUID.
Acronis Backup Server does not allow for creating manageable backup locations on tape devices. This means that you cannot limit the number of backups or the period while the archives are stored on tape devices. This functionality is supported only on the backup server internal hard drives. 3.8.4 Restoring data from archives located on tape devices Data recovery from archives located on tape devices is performed in the same way as with other storage devices.
the box that opens, click the "Advanced" tab. Next, click the button "Environment Variables". Create a system variable “ACRONIS_SNAPSHOT_TMP_DIR” and specify the location for Acronis temporary files. 38 Copyright © Acronis, Inc.
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managing data backup/restore on remote computers where Acronis True Image Agent is installed. The console allows for the managing of computer groups and corporate backup archives using Group and Backup Servers, as well as managing individual backup/restore tasks for every computer. Acronis True Image Management Console main window 4.
To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main window, on the toolbar or the sidebar, or select the same item from the Tools menu. 2. Select the installer location from the list (Registered Components, Search removable media or Specify location). The default selection Registered Components will use setup files from the default C:\Program Files\Common Files\Acronis\RemoteInstall folder. 3.
If you do not specify credentials for all machines involved, or if the credentials are not valid for some machines, you will have an option to provide credentials during installation (there is an option Other user in the username/password error prompt.) Most Acronis components require the system restart on their installation. To allow immediate remote computer reboot, check the Reboot the remote computer box. This option also can be applied to all computers or set to each machine individually. 6.
Otherwise the name will be identified as a domain one. After a connection is established, you will see a list of operations available in the central part of Acronis True Image Management Console main window: Main window of Acronis True Image Management Console when connected to a remote computer The task list content depends on the programs installed on the connected computer.
4.3.2 Backup and recovery tasks After clicking on Backup and Recovery Tasks, the program window will appear like the graphic below: You can perform the following operations on the remote computer. Operation How to access Back up and Recover Back up and restore data, including system Click Backup or Recovery, then follow the disks/partitions Wizard’s instructions. See details in Chapter 6. Creating backup archives and Chapter 7. Restoring the backup data.
Scheduling Tasks Schedule backup and archive validation Click Show tasks to navigate to the operations Manage Computer Tasks window. Click Create then follow the wizard’s instructions. See details in Chapter 8. Scheduling tasks. Run, stop, edit, clone, rename, delete Click Show tasks to navigate to the backup and archive validation tasks Manage Computer Tasks window. See details in 8.2 Managing scheduled tasks.
4.4 Managing groups of computers 4.4.1 Group status display When connected to a computer where Acronis Group Server is installed, click Acronis Group Server management to display the following window.
You can also search computers by their IP. To use this function you should proceed to Tools->Options->Network->Computers Discovery and specify the search parameters in the “Search for computers whose IP match the mask” and/or in the “Search for computers in the following domain” fields. If you do not remember the correct IP or you want to expand the search results to several computers, you can use the IP masks. To define the range of necessary digits, for example, 192.168.1.12 - 192.168.1.
computers in the Filter group, select the hidden computer, then select on the sidebar Computer details -> Visibility: Unhide. 7. Create a group backup task for several remote computers at once (see 4.4.2 Creating new group tasks). 8. Connect to a remote computer to see the operation log, start or edit tasks for this computer etc. (see 4.3 Managing a single remote computer). To do so, select a computer and click Connect. 9. Switch to the Group tasks management window for managing group tasks. 4.4.
enter backup server administrator’s credentials. For more information about backup servers see 3.5 Acronis Backup Server. You should also provide the archive name for each computer, unless the archives are targeted to Acronis Secure Zones or a backup server. Pressing the button to the right of the name input field will assign to each archive the respective computer’s name. 6.
When distribution is complete, the group task appears in Group Tasks Management window. If you connect to any computer included into the group, you will see its individual task, based on the group task you successfully created. 4.4.3 Group tasks management The Group Tasks Management window displays the list of group tasks. To see details of a group task, mouse over the task name. To create new or delete existing backup task, use the New and Delete items on the Group tasks toolbar.
When managing a group task, enter the same username and password you entered when created the task. 4.4.4 Acronis Group Server options Acronis Group Server regularly polls computers included in its database for their status (Ready, Offline and so on, according to 4.4.1 Group status display.) The default interval between enquires is 2 seconds. You have an option to set the status refresh rate based on your network requirements.
When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entered Windows on a network computer using your domain account while your local account is registered, enter the local user name along with the backup server name (for example, Server1\username). Otherwise the name will be identified as a domain one. 4.5.
The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (the largest value of this parameter is not limited, but it is recommended that you do not set unreasonably large values). You can change the default user/computer quotas/time limits by selecting Specify Default Settings -> Set Quotas/Time limits and entering the desired values.
Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas/time limits. The actual number of backups created in a backup location can exceed the Maximum number of backups by one. This enables the program to detect the fact of exceeding and start consolidation. Backup to the full location will be prohibited until the consolidation takes place. 4.5.
To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy because the archives will first be copied to the new location and then deleted from the old folder. If you select a computer and click Clear, all archives of this computer data will be deleted. Deleting a computer profile will disable backup to backup server for this computer and delete its existing archives.
If you opted for picking the user name out of the domain user list, you will skip the above window and proceed to the other windows where you will select the user name and specify backup location, quotas and time limits for this user in Add User Profile Wizard windows. Use the default backup location, quotas and time limits or make specific settings for the new user. If you specify a new path to backup location for the new user, a new backup location will be created.
backup location, quotas and time limits like common users are and uses the administrator profile for both remotely and locally controlled backups. 4.5.4 Changing User profiles You might need to change a user profile that is already set. To do so, select the user and click Edit. The Edit User Profile Wizard will guide you through the same selections, as the Add User Profile Wizard, except administrator’s or user’s rights.
To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window. To move a backup location along with all archives existing on it, select the backup location and click Move to. The Move Backup Location Wizard will display all users and computers associated with the selected backup location so you could make sure your choice is right. Then select the new location for the archives.
You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the list all user’s or all computer’s backups (use buttons in the Filter group). 3. Consolidate any backup (except for the oldest one in the archive) with the preceding backup file. This operation deletes the preceding backup and sets concatenation between the backup being consolidated and the backup before the deleted one.
their task. They will be trying to connect to the server every 5 seconds until the connection is allowed. Therefore, the real backup start time may differ from the scheduled one. If it is not practical or efficient for you, be aware of this setting when creating group tasks so that number of computers in the group does not exceed the limit you set. By default, the number of connections is unlimited. This corresponds to setting “0”. The console connection to Acronis Backup Server is not counted. 2.
Chapter 5. Using Acronis True Image Echo Workstation (local version) Acronis True Image Echo Workstation (local version) supports the GUI mode, the command-line mode, and can be used to execute XML scripts. Here we describe the operations available in the GUI mode, which provides the widest functionality. For console commands and scripting please see Chapter 16. Command-line mode and scripting. 5.1 Main program window The main program window contains the menu, the toolbar, the sidebar and the main area.
• Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity checking procedure • Manage Hard Disks – clone disk (i.e.
Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience. For example, you can start the necessary operation or tool by clicking its icon in the main area or by selecting the same item from the Operations or Tools menu. Status bar There is a status bar divided into two parts at the bottom of the main window.
Run, stop, edit, clone, rename, delete Click Tasks in the Manage Tasks group backup and archive validation tasks or select the Task Scheduling category on the sidebar to navigate to the Scheduled Tasks window. See details in 8.2 Managing scheduled tasks. Archives Management Explore any archive’s contents and restore Select Tools -> Explore Backup Archive individual files from any archive and follow the wizard’s instructions. See details in 11.2.
Other Tools Create bootable rescue media, its ISO or See Chapter 10. Creating bootable media. RIS package Turn on/off Windows System Restore tool See 12.5 Managing System Restore. Some of the above operations can be executed in command-line mode. For more information on Acronis True Image Echo Workstation command-line mode see 16.1 Working in the command-line mode. 64 Copyright © Acronis, Inc.
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will exclude all .exe files with names consisting of five symbols and starting with “my”. All of these settings will take effect for the current task. For information on how to set the default filters that will be called each time you create a file backup task, see 6.3.2 Source files exclusion. 5. Select the name and location of the archive.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged, but won’t be useful if the computer is destroyed in a fire or flood. Data saved to a network disk, ftp server or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may select Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 6.3 Setting backup options for more information. 8. Provide a comment for the archive.
You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from the menu that appears. For information on how to set the default priority, see 6.3.6 Backup performance. 11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar.
4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing full backup, it will be overwritten. Including [date] in the backup file name will add to the name the time and date of the backup creation formatted as . Example: C:\MyBackup[date].tib. If you are going to create an incremental backup (see 3.
See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select whether you want to create a full or incremental backup. If you have not backed up the selected disks/partitions yet, or the full archive seems too old to append incremental changes to it, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backup). 6.
6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being accessed by anybody except you, enter a password and its confirmation into the text fields. A password should consist of at least eight symbols and contain both letters (in the upper and lower cases preferably) and numbers to make it more difficult to guess.
This option is effective for file/folders backup only. When creating a disk/partition image, you cannot filter out any files. 6.3.3 Pre/post commands You can specify commands or batch files to be automatically executed before and after the backup procedure. For example, you may want to remove some tmp files from the disk before starting backup or configure a third-party antivirus product to be started each time before the backup starts.
the entire backup procedure may take much longer, depending on the amount of data to be imaged. Therefore, the database idle time will be minimal. Before/after data capture commands can also be used for other purposes. You may want to suspend an application other than a database, for example. The backup process will run concurrently with your commands if you uncheck the Do not perform operations until the commands execution is complete box, which is checked by default. 2.
Workstation to the desired level. To set the desired HDD writing speed for data being backed up, drag the slider or enter the writing speed in kilobytes per second. 3. Network connection speed The preset is Maximum. If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Echo Workstation. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second.
FAT16 and FAT32 file systems have a 4GB file size limit. However, the existing hard drive’s capacity can reach as much as 2TB. Therefore, an archive file might easily exceed this limit if you are going to back up the entire disk. If you do not have enough space to store the backup on your hard disk, the program will warn you and wait for your decision as to how you plan to fix the problem. You can try to free some additional space and continue or click Back and select another disk.
Choose the basic components necessary for boot and restoring data on the General tab. The Acronis One-Click Restore is a minimal addition to the image archive, stored on removable media, allowing one-click disk recovery from this archive. This means that at boot from the media and clicking “restore” all the data contained in the image will be silently restored.
When the backup destination location on the network is not available or not reachable, the program will attempt to reach the location at the specified time interval. 6.3.12 Dual destination backup The preset is disabled. If enabled, the program will automatically place a copy of each backup being created locally to a separate location on a local drive or network share. The consistency of the additional archive copy is maintained automatically.
3. Find out the computer MAC address (Local Area Connection -> Status -> Support -> Details -> Physical Address.) 4. Repeat steps 1-3 for all computers you wish to wake on LAN. To enable the Wake On LAN option on the Acronis Group Server: 1. Find the computer to be backed up in the list of computers. 2. Select the computer and enter its MAC address in the Acronis Group Server (sidebar -> Computer details -> MAC address: Set -> type the hex MAC address as XXXXXXXXXXXX or XX-XX-XX-XX-XX -> click OK).
With Reset archive bit enabled, Acronis True Image Echo Workstation will reset archive bits of all files being backed up. Acronis True Image Echo Workstation itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved. 80 Copyright © Acronis, Inc.
Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1 Running Acronis True Image Echo Workstation (local version)), Acronis True Image Echo Workstation can be run in several ways. We recommend that you first try to restore data running Acronis True Image Echo Workstation under Windows because this method provides more functionality. Boot from the bootable media or use the Startup Recovery Manager (see 3.
7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). For more information on dynamic disks, please refer to your Windows documentation. Acronis True Image Echo Workstation can back up and recover dynamic volumes. A dynamic volume can be recovered over the same volume or unallocated space of a dynamic group.
(see 11.2.2 Mounting an image) or start the image restoration and select Restore specified files or folders (see 7.3 Restoring disks/partitions or files from images). To restore files and folders from an XFS, JFS, or ReiserFS image, mount it under Linux and copy the necessary files and folders. 1. Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 2. Select the archive.
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 5. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 6. Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority, file-level security settings etc.).
7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be restored from the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will reject all .exe files with names consisting of five symbols and starting with “my”.
not be blocked, close applications that use this partition (disk) and start over. If you can not determine which applications use the partition (disk), close them all. 7.3.1 Starting the Restore Data Wizard Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 7.3.2 Archive selection 1. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step. If the archive is located on removable media, e.g.
7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offered to select where to restore selected folders/files (original or new location), choose files/folders to be restored and so on. These steps look like those in file archive restore. However, watch your selection; if you want to restore files instead of disk/partition, uncheck the unnecessary folders. Otherwise you will restore a lot of extra files.
Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecting a disk/partition to restore The selected backup can contain images of several partitions or even disks. Select which disk/partition to restore. Disks and partitions images contain a copy of track 0 along with the MBR (Master Boot Record). It appears in this window in a separate line.
Set this option when you are performing a disaster recovery restoration.
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Yes, I want to delete all the partitions on the destination hard disk before restoring – all existing partitions will be deleted and all their data will be lost. • No, I do not want to delete partitions – no existing partition will be deleted, discontinuing the recovery operation.
7.3.9 Changing the restored partition size and location You can resize and relocate a partition by dragging it or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this feature, you can redistribute the disk space between partitions being restored. In this case, you will have to restore the partition to be reduced first.
1. Using Acronis Universal Restore will help you create a bootable system clone on different hardware (for more information see 3.7 Acronis Universal Restore). Choose this when restoring a system disk to a computer with a dissimilar processor, different motherboard or other mass storage device than in the imaged system. 2.
7.3.14 Restoration summary and executing restoration 1. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, no changes will be made to disk(s). Clicking Proceed will launch the task execution. 2. (For Acronis True Image Echo Workstation local or standalone version) The task progress will be shown in a special window. You can stop the procedure by clicking Cancel.
You can set the default filters for the specific types of files that are not to be restored. Use the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will exclude all .exe files with names, consisting of five symbols and starting with “my”. This option is effective only when restoring files from file/folders archives. When restoring files from a disk/partition image, you cannot filter out any files. 7.4.
7.4.6 Specifying mass storage drivers This option appears only in those computers’ options, where Acronis Universal Restore is installed. Acronis Universal Restore is an option to Acronis True Image Echo Workstation. It should be purchased separately and installed from a separate setup file. For more information see 3.7 Acronis Universal Restore.
The preset is disabled. When enabled, files and folders are restored directly to the folder that you specified as a target folder. When disabled, the full path to the files and folders that exists in the backup will be reproduced within the target folder. 5. Change SID after restoration is finished The preset is disabled. Acronis True Image Echo Workstation can generate a unique security identifier (SID) for the restored system.
Disk Management) before starting the disk conversion and dynamic volume creation wizards. 7.5.1 Creating dynamic volumes This operation is available only in Acronis True Image Echo Workstation local version, including bootable version of this component. Having booted to the Acronis environment, you can easily prepare the desired dynamic group on bare metal or a computer with a non-Windows operating system. The operation supports both dynamic disks and MBR or GPT basic disks.
For a spanned volume, amount of space on each disk is selected independently. If only one disk is selected, a simple volume is created. Striped, mirrored and RAID 5 volumes imply even distribution of data between disks. Therefore, the volume must occupy the same space on each disk. If you set different values, your latest setting will be applied to all the disks. If the set value is more than unallocated space on any disk, the minimal available space amount will be applied to all the disks.
Chapter 8. Scheduling tasks Acronis True Image Echo Workstation allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Scheduled Tasks window, where you can start, stop, edit, delete and rename them.
• Manually later – the task will be saved, but not launched automatically.
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, all settings will be lost. Click Finish to save the task. 8. The task schedule and default name appear in the Scheduled Tasks window. You can rename the task, if need be. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.5 Setting up event-driven execution Execution on increasing or decreasing free space on a disk. The task will be started when the free space on the either disk selected for the backup changes by the specified value. The preset is 20MB. 8.
There are two ways of changing the task parameters. Editing allows you to change any task parameters. This is performed in the same way as creation, however, the earlier selected options will be set, so you have to enter only the changes. To edit a task, select it and click Edit on the toolbar. If you want to change only the task start trigger (time or event), click Schedule on the toolbar. Then you will have to perform only scheduling steps, leaving other settings the same.
Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a special partition for storing archives on the computer system itself. For more information see 3.3 Acronis Secure Zone. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives. If a zone is found, the wizard will offer to manage it (consolidate or remove backups, resize or change the password) or delete. If there is no zone, you’ll be prompted to create it.
4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is approximately 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased.
5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup and recovery, mounting images or validating archives on the zone, using the Acronis Startup Recovery Manager with the F11 key, resizing and deleting the zone. Acronis True Image Echo Workstation repair or update will not affect the password.
9.3 Changing the password for Acronis Secure Zone 1. When prompted by the wizard, select Manage Acronis Secure Zone. 2. Select Change password. 3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question that will be asked in case you forget the password. 4. To perform the password change operation, click Proceed in the final wizard window. 9.
4. [Consolidation]: Select the backup. Backups created earlier will be consolidated into the selected backup. Backups created later will remain untouched. [Remove]: Select the backup you want to remove. Be careful: all dependent incremental and differential backups will be also removed. 5. After you click Proceed, Acronis True Image Echo Workstation will start backup consolidation\deletion. 9.5 Deleting Acronis Secure Zone Acronis Secure Zone deletion will destroy all backups stored in the zone.
Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Echo Workstation on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Echo Workstation version.
The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from remote locations. To find more about components of other Acronis products, see the respective user guides. The Start automatically after parameter specifies the timeout interval for the boot menu. If this parameter is not specified, at booting a computer the program will display the boot menu and wait for someone to select whether to boot the OS or the Acronis component.
4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to create a bootable disk ISO image, specify the ISO file name and the folder in which to place it. If you chose to save bootable data on a RIS server, specify the server and provide the user name and password to access it. 5.
Media based on Win PE 2.0 and including Acronis True Image Echo Workstation requires at least 768MB RAM to work. 114 Copyright © Acronis, Inc.
Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is not damaged. Here’s how to run a one-time validation task. For how to schedule regular archive validation, see 8.1 Creating scheduled tasks. 1. To start the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools group or click Validate Backup Archive on the toolbar. 2. Select the archive to validate.
Both operations are performed through the Backup Archives category. Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives lets you access them as though they were physical drives.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Workstation will ask for it. Further steps will not be enabled until you enter the correct password. 3. The program opens a Windows Explorer window displaying the archive contents.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Workstation will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 3. If you selected an archive containing incremental images, Acronis True Image Echo Workstation will suggest that you select one of the successive incremental images by its creation date/time.
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the comment to this file. 7. The program displays a summary containing a single operation. Click Proceed to connect the selected partition image as a virtual disk. 8.
tree. For a backup consolidation in Acronis Secure Zone, see 9.4 Managing backups in Acronis Secure Zone. An archive MyBackup consisting of one full (MyBackup) and four incremental backups (MyBackup2-5) is selected 3. The program displays a list of backups belonging to the selected archive with the backups creation date and time. The list is similar to that in the restore wizard. The upper backup is the full backup; the rest are incremental backups. Select the backups you want to keep.
The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full backup 4. Choose location and name for the archive copy. By default, the program suggests the same location and the source archive name with (1) added. New archive will be created in the same folder and named MyBackup(1) 5. The program displays the summary window. Click Proceed to start consolidation.
Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Workstation can notify you when it is finished through the WinPopup service or e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion. By default all notifications are disabled. 12.
1. Enable the Messenger service on both the computer executing the task and the computer that will receive messages. 2. Select Tools -> Options -> Notifications -> Windows Messenger (WinPopup): Provide the name of the computer to which notifications will be sent. Below in this window you can choose whether you want to get notifications: - when the operation is completed successfully - when the operation failed - during the operation when user interaction is required. 12.
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows. To delete a log, select it and click Delete. If any step was terminated by an error, the corresponding log will be marked with a red circle with a white “X” inside. The right window features the list of steps contained in the selected log.
An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image Echo Workstation can provide the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying a type of occurred event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.
This feature is available in Acronis True Image Echo Workstation local version only. Managing System Restore using Acronis True Image Management Console is not possible. 1. To start the System Restore Management Wizard, click the Manage System Restore icon in the main program window. 2. Click Next. 3. Now you can turn on/off System Restore on all your hard disk(s) partitions at once or do it individually for each partition.
Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, deployment and support of PC applications. As with physical machines, virtual machine (VM) data needs to be backed up periodically to prevent its loss due to hardware failure or human errors.
The procedure is the same as with physical machines. See details in Chapter 7. Restoring the backup data. The alternative way of recovering a VM is by converting the image (.tib) file to a virtual disk file of appropriate format and adding this disk to the VM. This is the easiest way to recover data on a virtual machine. 13.3 Using the disk conversion feature A virtual hard disk is a file that provides storage for a virtual machine.
This allows: • the fastest replacement of the physical machine with the previously created virtual copy • moving multiple workloads from legacy physical computers to virtual machines to reduce hardware maintenance and power consumption costs. The alternative method of physical to virtual migration is by restoring a physical disk from an image to a virtual machine. The procedure is the same as with restoring physical machines.
Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and click Convert to Virtual disk. On a computer where Acronis True Image Echo Workstation local version is installed, select Tools -> Convert to Virtual Disk in the main program menu. 2. Select the disk image to convert.
Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too small. If you don’t have space for more data, you can add another disk specifically for data storage. For example, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software. In this case, you have to transfer the system to a higher-capacity hard disk.
14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 14.3.3 Selecting destination disk After you select the source disk, select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 14.3.
If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system and label. The unused space will become unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers are not recommended, as they leave much unallocated space on the new disk.
Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including primary, logical and unallocated space are marked with different colors. If you selected manual partition creation earlier, the partition layout will look different. This partitioning method is described below. 14.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks.
Along with the hard disk number, you will see disk capacity, label, partition and file system information. Different partition types, including primary, logical and unallocated space are marked with different colors. To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window.
Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk to store data, leaving the system on the old disk. If the computer has space for another disk, it would be easier to add a data disk drive than to clone a system one. This feature is available in Acronis True Image Echo Workstation local version only.
You will be prompted to set the new partition location and size. You can do this by entering values to the Unallocated space before, Partition size, or Unallocated space after fields, by dragging the partition borders or by dragging the partition itself. If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size.
Chapter 16. Command-line mode and scripting Acronis True Image Echo Workstation (local version) supports the command-line mode and enables backup automation by executing XML scripts. The command-line mode functionality is somewhat limited as compared to the GUI mode. You will not be able to perform operations that require the reboot of the system, such as restore a system partition or clone a system drive. These operations only can be done through the GUI. Scripting is intended only for backup. 16.
filebackup Backs up specified files and folders deploy Restores disks and partitions, except for the MBR, from an image /filename:[file name] /password:[password] /asz /net_user:[username] /net_password:[password] /ftp_user /ftp_password /incremental /differential /compression:[0…9] /split:[size in MB] /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] /include:[names] /exclude_names:[names] /exclude_masks:[masks] /exclude_system /exclude_hidden /filename:[file name] /pass
archive consolidate Creates a consistent copy of the archive which will contain only the specified backups convert Converts an image to virtual disk format for using with a virtual machine list Lists available drives and partitions.
Displays the Acronis Secure Zone size, free space and contents using the generated file names asz_delete_fi les Deletes the most recent backup in the archive located in the Acronis Secure Zone /filename:[file name] /password:[password] /log:[file name] /log_net_user:[remote user] /log_net_password:[password] /partition:[partition number] Deletes the Acronis Secure Zone /password:[password] /oss_numbers /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] clone /reboot /h
/net_password:[password] Specify a password for network drive access Network drive /ftp_user:[username] Specify a user name for access to an FTP server FTP server /ftp_password:[password] Specify a password for access to an FTP server FTP server Set the backup type to incremental. If not specified or there is no basic full backup, a full backup will be created Any Set the backup type to differential.
16.1.3 Specific options (options specific for individual trueimagecmd commands) Option Description create /harddisk:[disk number] Specifies the hard disks to include into the image file. The list of available hard disks is provided by the /list command. An image may contain data of more than one hard disk. In that case, separate disk numbers by commas, e.g.: /harddisk:1,3 By specifying /harddisk:DYN you will back up all dynamic volumes present in the system.
“my”. /exclude_masks:*.txt,111.* /exclude_system Excludes all system files from the backup. /exclude_hidden Excludes all hidden files from the backup. deploy /file_partition:[partition letter] Specifies the partition where the image file is stored (by letter or number). This option is used with /filename:file_name. In this case the file name must be specified without drive letter or root folder. For example: /file_partition:D /filename:"\1.tib” Dynamic volumes are specified with prefix DYN, e.g.
extracts the partition type from the image. For the primary partition, the type will be set as follows: - if the target disk is the 1st according to BIOS and it has not other primary partitions, the restored partition will be set active - if the target disk is the 1st according to BIOS and there are other primary partitions on it, the restored partition will be set logical - if the target disk is not the 1st, the restored partition will be set logical.
consolidate /target_filename:[file name] /include_pits:[pits numbers] Specifies the path to and name of the archive copy to be created. If there are two or more backups (pits) in the copy, numbers will be added to their names. Specifies the backups (pits) to be included in the archive copy. To get the numbers of pits, use /pit_info.
list /filename:[file_name] With this option, the image contents is displayed. When listing image contents, partition numbers may not coincide with those in the drives/partitions list, if the image does not contain all the disk partitions. For example, if the image contains partitions 2-3 and 2-5, they will be listed as 2-1 and 2-2.
asz_delete /partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally to each partition’s size. clone /harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk. /target_harddisk:[disk number] Specifies the target hard disk number where the source hard disk will be cloned. 16.1.4 Trueimagecmd.exe usage examples 1.
2. Restore disks and partitions trueimagecmd /deploy /filename:"C:\Test\1.tib" /partition:2-1 • This will restore partition 2-1 from image 1.tib. trueimagecmd /deploy /filename:"C:\Test\1.tib" /password:qwerty /harddisk:2 • This will restore hard disk 2 from image 1.tib, protected with password ‘qwerty’. trueimagecmd /deploy /filename:"C:\Test\1.tib" /partition:2-1 /target_partition:1-1 • This will restore partition 2-1, stored in image 1.tib, to partition 1-1.
5. Consolidate backups trueimagecmd /pit_info /filename:\\smbsrv\Archives\Kons.tib • This will display the numbered list of backups, contained in the archive Kons.tib residing on the network share \\smbsrv\Archives\. trueimagecmd /consolidate /filename:\\smbsrv\Archives\Kons.tib /target_filename:D:\Kons_new.tib /include pits:2,4,5 • This will create on the disk D: an archive consisting of three files Kons_new.tib, (pit 2 of the archive \\smbsrv\Archives\Kons.tib, former \\smbsrv\Archives\Kons2.
In our example, the Acronis Secure Zone contains two archives. The older archive #1 consists of one full (base) file-level backup created on 4/2/2007 at 3:52. The second archive contains a base file-level backup with two increments. You can restore data from any backup as follows: trueimagecmd /filerestore /asz:2 /index:2 /target_folder:e: • This will restore files and folders from the backup created on 4/4/2007 at 6:31 PM with their original paths to the root of partition E.
10. Acronis Secure Zone: deleting backups trueimagecmd /asz_delete_files /password:aszpw /filename:FAAB.tib • This will delete the most recent backup in the FAAB archive. In our example (7), the incremental backup created on 8/14/2007 at 2:19 will be deleted. The next execution of the same command will delete the base FAAB backup. By continuing with the FAAA and AAA names, you can clear the Acronis Secure Zone except for the last remaining base backup that cannot be deleted. 11.
recovery, it should not be used to manipulate directly the file stored on the backup server. Doing so may lead to inconsistencies in the backup server management and result in turning the archives unusable through backup server or even directly. The EBaSrvDB.exe tool has to be executed on the same machine where the Backup Server resides. The generated XML file can be located anywhere as long as the EBaSrvDB.exe tool has the write access to it.
16.1.9 Command-line mode usage under DOS For use in the MS-DOS-compatible environments Acronis True Image Echo Workstation includes the TrueImageCmdDos.exe utility whichis located in the folder where Acronis True Image Echo Workstation has been installed, by default it is C:\Program Files\Acronis\TrueImageEchoWorkstation. 16.2 Scripting 16.2.1 Script execution parameters Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True Image Echo Workstation installation folder (i.e.
username and password parameters are optional. They are used to access networked resources. As a target for the image files you can indicate CD-R/RW or tape drive. Options. This tag can be used with a number of additional parameters: Compression: specifies the backup compression level. Can be None, Low, Normal, High. Incremental: specifies whether you need to create an incremental image file.
incremental="true" 160 Copyright © Acronis, Inc.