ACRONIS DNS-1250-04 User Manual

Acronis backup software user manual for dns-1250-04
Table of Contents

Advertisement

Quick Links

User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS DNS-1250-04

  • Page 1 User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
  • Page 3: Table Of Contents

    Table of contents Introducing Acronis Backup & Recovery Server OEM ...............6 Acronis Backup & Recovery Server OEM overview ..............6 Getting started ........................... 6 1.2.1 Using the management console ........................6 Acronis Backup & Recovery Server OEM components ............13 1.3.1 Agent for Windows ............................
  • Page 4 Direct management ......................59 Administering a managed machine ..................59 5.1.1 Dashboard ..............................60 5.1.2 Backup plans and tasks ..........................62 5.1.3 Log .................................. 71 Creating a backup plan ......................74 5.2.1 Why is the program asking for the password? ................... 75 5.2.2 Backup plan's credentials ..........................
  • Page 5 5.9.8 Pending operations ............................. 121 5.10 Collecting system information ....................121 Command-line mode and scripting in Windows ..............122 Agent for Windows command-line utility ................122 6.1.1 Supported commands ..........................122 6.1.2 Common options ............................126 6.1.3 Specific options ............................129 6.1.4 trueimagecmd.exe usage examples ......................
  • Page 6: Introducing Acronis Backup & Recovery Server Oem

    1 Introducing Acronis Backup & Recovery Server 1.1 Acronis Backup & Recovery Server OEM overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery Server OEM is the powerful disaster recovery solution. 1.2 Getting started Direct management 1.
  • Page 7 Acronis Backup & Recovery Server OEM Management Console - Welcome screen Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate to the different views (see the Navigation pane section.) Actions and tools pane Contains bars with a set of actions that can be performed and tools (see the Actions and Tools pane section).
  • Page 8 Views for a managed machine When the console is connected to a managed machine, the following views are available in the navigation tree.  [Machine name]. Root of the tree also called a Welcome view. Displays the name of the machine the console is currently connected to.
  • Page 9 Examples of "'Item name' actions" bars Actions Contains a list of common operations that can be performed on a managed machine. Always the same for all views. Clicking the operation opens the respective action page (see the Action pages section.) All the actions can also be accessed in the Actions menu.
  • Page 10 Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery Server OEM provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace.
  • Page 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Information panel.  Use filtering and sorting capabilities to search the table for the item in question ...
  • Page 12 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc. When the advanced representation is enabled, all the available fields are displayed. You can switch between the views by selecting the Advanced view check box at the top of the action page.
  • Page 13: Acronis Backup & Recovery Server Oem Components

    Navigation buttons 1.3 Acronis Backup & Recovery Server OEM components This section contains a full list of Acronis Backup & Recovery Server OEM components with a brief description of their functionality. Acronis Backup & Recovery Server OEM includes the following main types of components. Components for a managed machine (agents) These are applications that perform data backup, recovery and other operations on the machines managed with Acronis Backup &...
  • Page 14: Management Console

    volumes; changing a disk partitioning style between MBR and GPT or changing a disk label, can be performed either in the operating system or using bootable media. 1.3.1.1 Universal Restore The Universal Restore add-on enables you to use the restore to dissimilar hardware functionality on the machine where the agent is installed, and create bootable media with this functionality.
  • Page 15: Supported File Systems

    1.5 Supported file systems Acronis Backup & Recovery Server OEM can back up and recover the following file systems with the following limitations:  FAT16/32  NTFS  Ext2/Ext3  ReiserFS3  ReiserFS4  XFS - volume recovery without the volume resize capability; ...
  • Page 16: Basic Concepts

    2.1 Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery Server OEM graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help. Backup under operating system 1.
  • Page 17 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary.
  • Page 18 Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-by- sector an unsupported file system.
  • Page 19 The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup &...
  • Page 20: Full Backups

    If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2 Full backups Acronis Backup &...
  • Page 21: User Privileges On A Managed Machine

    software updates only). The backup time is not crucial in this case and the recovery time will be minimal when recovering the systems from the full backup. The administrator can have several copies of the full backup for additional reliability. 2.3 User privileges on a managed machine Windows When managing a machine running Windows, the scope of a user's management rights depends on...
  • Page 22: Backing Up Dynamic Volumes (Windows)

    Archive owner An archive owner is the user who saved the archive to the destination. To be more precise, this is the user whose account was specified when creating the backup plan in the Where to back up step. By default, the plan's credentials are used.
  • Page 23 Acronis Backup & Recovery Server OEM can back up and recover dynamic volumes and, with minor limitations, basic GPT volumes. Backing up dynamic volumes Dynamic and basic GPT volumes are backed up in the same way as basic MBR volumes. When creating a backup plan through the GUI, all types of volumes are available for selection as Items to back up.
  • Page 24: Tape Support

    Dynamic volume Dynamic volume Unallocated space (disk group) Type as of the Simple source Basic MBR volume Basic MBR volume Basic MBR volume Basic MBR volume Basic GPT volume Basic GPT volume Basic GPT volume Basic GPT volume Basic MBR volume Basic MBR volume Basic MBR volume Unallocated space (basic MBR disk)
  • Page 25: Proprietary Acronis Technologies

    An archive can span multiple tapes but can contain only one full backup. Every time you create a full backup, you start with a new tape and create a new archive. As soon as the tape is full, a dialog window with a request to insert a new tape will appear.
  • Page 26: Universal Restore (Acronis Backup & Recovery Server Oem Universal Restore)

    Manager…" (or removes the corresponding entry from GRUB's boot menu). This means you will need bootable media in case the system fails to boot. Limitation Acronis Startup Recovery Manager requires re-activation of third-party loaders after activation. 2.7.2 Universal Restore (Acronis Backup & Recovery Server OEM Universal Restore) Acronis Backup &...
  • Page 27: Options

    If the target hardware has a specific mass storage controller (such as a SCSI, RAID, or Fibre Channel adapter) for the hard disk, you can install the appropriate driver manually, bypassing the automatic driver search-and-install procedure. 3. Installing drivers for Plug and Play devices. Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system start, such as video, audio and USB.
  • Page 28: Pop-Up Messages

    This option can also be set on the Welcome screen. If you select the check box for At startup, show the Dashboard instead of the current view on the Welcome screen, the setting mentioned above will be updated accordingly. 3.1.2 Pop-up messages About tasks that need interaction This option is effective when the console is connected to a managed machine.
  • Page 29: Machine Options

    To make a selection, choose the font from the respective combo-box and set the font's properties. You can preview the font's appearance by clicking the button to the right. 3.2 Machine options The machine options define the general behavior of all Acronis Backup & Recovery Server OEM agents operating on the managed machine, and so the options are considered machine-specific.
  • Page 30 3.2.1.2 SNMP notifications This option is effective for Windows operating systems. This option is not available when operating under the bootable media. The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent.
  • Page 31: Log Cleanup Rules (Umms)

    You might be asked for lmmib2.dll that can be found on the installation disc of your operating system. 3.2.2 Log cleanup rules (UMMS) This option specifies how to clean up the Acronis Backup & Recovery Server OEM agent log. This option defines the maximum size of the agent log folder (in Windows XP/2003 Server, %ALLUSERSPROFILE%\Application Data\ASM\UniversalBMR\UMMS\LogEvents).
  • Page 32 Dest: HDD Dest: HDD HDD writing speed Dest: Dest: Network connection speed network network share share Backup splitting Error handling: Do not show messages and dialogs while processing (silent mode) Re-attempt if an error occurs Ignore bad sectors Task failure handling Dest: Dest: Tape support...
  • Page 33 To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2. In the Enter the password field, type a password. 3. In the Confirm the password field, re-type the password. 4. Click OK. 3.3.1.2 Pre/Post commands This option is effective for Windows operating systems and PE-based bootable media.
  • Page 34 Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not back up until the command execution is complete Result Preset Perform the Perform the backup backup after the concurrently with Perform the backup command is the command only after the...
  • Page 35 Using the pre/post data capture commands, you can suspend and resume a database or application that is not compatible with VSS. As opposed to the Pre/Post commands, the pre/post data capture commands will be executed before and after the data capture process, which takes seconds, while the entire backup procedure may take much longer, depending on the amount of data to be backed up.
  • Page 36 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. 4. Depending on the result you want to obtain, select the appropriate options as described in the table below.
  • Page 37 Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery. The preset is: Create snapshots using VSS Acronis Backup & Recovery Server OEM will select the VSS provider automatically based on the operating system running on the machine and whether the machine is a member of an Active Directory domain.
  • Page 38 3.3.1.7 Backup performance Use this group of options to specify the amount of network and system resources to allocate to the backup process. Backup performance options might have a more or less noticeable effect on the speed of the backup process.
  • Page 39 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server) is selected as the backup destination. The option defines the amount of network connection bandwidth allocated for transferring the backup data. By default the speed is set to maximum, i.e. the software uses all the network bandwidth it can get when transferring the backup data.
  • Page 40  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types are available for selection.  Some Internet service providers require authentication on the incoming mail server before being allowed to send something. If this is your case, select the Log on to incoming mail server check box to enable a POP server and to set up its settings: ...
  • Page 41 3.3.1.9 Event tracing It is possible to duplicate log events of the backup operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media.
  • Page 42 Select the Send messages to SNMP server check box. Specify the appropriate options as follows: Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. Server name/IP – type the name or IP address of the host running the SNMP management application, the messages will be sent to.
  • Page 43 3.3.1.11 Error handling These options are effective for Windows operating systems and bootable media. These options enable you to specify how to handle errors that might occur during backup. Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mode enabled, the program will automatically handle situations requiring user interaction (except for handling bad sectors, which is defined as a separate option).
  • Page 44 The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts. The program stops trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depending on which comes first.
  • Page 45 Always use a free tape If you leave the options below unchanged, then each backup will be written onto the tape specified by the Use a separate tape set option. With some of the options below enabled, the program will add new tapes to the tape set every time when a full, incremental or differential backup is created.
  • Page 46: Default Recovery Options

    When the option is enabled, Acronis Backup & Recovery Server OEM will restart the machine after the backup process is completed. For example, if the machine boots from a hard disk drive by default and you select this check box, the machine will be restarted and the operating system will start as soon as the bootable agent has finished creating the backup.
  • Page 47 Check file system after recovery Reboot machine automatically if it is required for recovery Notifications: E-mail Win Pop-up Event tracing: Windows events log (p. 51) SNMP 3.3.2.1 Pre/Post commands This option is effective for Windows operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the data recovery.
  • Page 48 5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not recover until the command execution is complete Result Preset Perform the Perform the...
  • Page 49  Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine  Normal – to run the recovery process with normal speed, allocating resources on a par with other processes ...
  • Page 50  Some Internet service providers require authentication on the incoming mail server before being allowed to send something. If this is your case, select the Log on to incoming mail server check box to enable a POP server and to set up its settings: ...
  • Page 51 3.3.2.5 Event tracing It is possible to duplicate log events of the recovery operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media.
  • Page 52 Select the Send messages to SNMP server check box. Specify the appropriate options as follows: Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. Server name/IP – type the name or IP address of the host running the SNMP management application, the messages will be sent to.
  • Page 53: Vaults

    This option defines whether to recover the files’ date and time from the archive or assign the files the current date and time. Validate backup before recovery The preset is Disabled. This option defines whether to validate a backup to ensure that the backup is not corrupted, before data is recovered from it.
  • Page 54: Personal Vaults

    We recommend that you create a vault in each destination where you are going to store backup archives. This will ease your work as follows. Quick access to the vault You will not have to remember paths to the folders where the archives are stored. When creating a backup plan or a task that requires selection of an archive or an archive destination place, the list of vaults will be available for quick access without drilling down through the folders tree.
  • Page 55: Working With The "Personal Vault" View

    Sharing a personal vault Multiple machines can refer to the same physical location, say, to the same shared folder, but each of the machines has its own shortcut in the Vaults tree. Users that back up to a shared folder can see and manage each other's archives according to their access permissions for that folder.
  • Page 56: Actions On Personal Vaults

    Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates actions of the vault's toolbar.  [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicates actions of the archives toolbar.
  • Page 57: Common Operations

    4.1.2.1 Creating a personal vault To create a personal vault 1. In the Name field, type a name for the vault being created. 2. [Optional] In the Comments field, add a description of the vault. 3. In the Path field, click Change... In the opened Personal Vault Path window, specify a path to the folder that will be used as the vault.
  • Page 58: Operations With Backups

    Validate an archive Click Validate. The Validation (p. 92) page will be opened with the pre-selected archive as a source. Validation of an archive will check all the archive's backups. Delete a single archive 1. Select the archive or one of the archives you want to delete. or multiple archives 2.
  • Page 59: Deleting Archives And Backups

    Click Delete all. The program duplicates your selection in the Backups deletion window that has check boxes for each archive and each backup. Review the selection and correct if need be, then confirm the deletion. 4.2.3 Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view, but with check boxes for each archive and backup.
  • Page 60: Dashboard

    5.1.1 Dashboard Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery Server OEM agent's activities and enables you to rapidly identify and resolve any issues. Alerts The alerts section draws your attention to issues that have occurred on the machine and offers you ways of fixing or examining them.
  • Page 61 valid license on Acronis License Server. Vaults with low free space: X View vaults View vaults will take you to the Vaults view where you can examine the vault size, free space, content and take the necessary steps to increase the free space. Bootable media was not Create now To be able to recover an operating system when the...
  • Page 62: Backup Plans And Tasks

    5.1.1.1 Tasks need interaction This window accumulates all the tasks that require user interaction in one place. It enables you to specify your decision, such as to confirm reboot or to retry after freeing-up the disk space, on each of the tasks.
  • Page 63 Need interaction At least one task needs Identify the tasks that need interaction (the program will user interaction. display what action is needed) -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault;...
  • Page 64 Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The next state may be Stopping (if the user chooses to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that can put the task to the Running state.) Stopping The user can stop a running task or a task that needs interaction.
  • Page 65 "Succeeded", "-", or The "-" state means that the task has never been started or has "Stopped" been started, but has not finished yet and so its result is not available. 5.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you to perform operations with backup plans and tasks.
  • Page 66 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, conversion, migration).
  • Page 67 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation. In all other cases the scheme can be changed, and should continue to operate as if existing archives were created by a new scheme. For empty archives all changes are possible.
  • Page 68 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan?  The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. ...
  • Page 69 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Run backup plan The backup plan is considered as running if at least one of its tasks is running.
  • Page 70 Validation (backup) Validation of backups Validation (vault) Validation of all archives stored in a vault Cleanup Deleting backups from a backup archive in accordance with retention rules Disk management Disk management operations Depending on the type of task and whether it is running or not, a combination of the following tabs will appear: Task The Task tab is common for all types of tasks.
  • Page 71: Log

    Settings The Settings tab displays the following information:  Backup scheme - the selected backup scheme and all its settings with schedules.  Validation (if selected) - events before or after which the validation is performed, and validation schedule.  Backup options - backup options changed against the default values.
  • Page 72 entry. All the entries between the first and last selections will be selected too. View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. The log entry's details will be displayed in a separate window.
  • Page 73 entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Configuring the log table By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones.
  • Page 74: Creating A Backup Plan

    5.2 Creating a backup plan Before creating your first backup plan, please familiarize yourself with the basic concepts used in Acronis Backup & Recovery Server OEM. To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan among others.
  • Page 75: Why Is The Program Asking For The Password

    Archive validation When to validate (p. 80) [Optional] Define when and how often to perform validation and whether to validate the entire archive or the latest backup in the archive. Backup options Settings [Optional] Configure parameters of the backup operation, such as pre/post backup commands, maximum network bandwidth allocated for the backup stream or the backup archive compression level.
  • Page 76: Items To Back Up

    5.2.4 Items to back up The items to backup depend on the source type selected previously. 5.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks and/or volumes to back up. You can select a random set of disks and volumes.
  • Page 77: Archive

     User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. 5.2.6 Archive Specify where the archive will be stored and the name of the archive. 1.
  • Page 78: Access Credentials For Archive Location

    Backup plans that operate with the same archive should back up the same data items (say, both plans back up volume C.) Applying multiple retention rules to an archive makes the archive content in some way unpredictable. Since each of the rules will be applied to the entire archive, the backups belonging to one backup plan can be easily deleted along with the backups belonging to the other.
  • Page 79 5.2.8.2 Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Backup type Select the type of backup. Date and time Specify when to start the backup.
  • Page 80: Archive Validation

     Delete the oldest full backup  If there is only one full backup left and a full backup is in progress, then delete the last full backup This setting is recommended when backing up to a USB drive. This setting is not applicable to managed vaults.
  • Page 81: Recovering Data

    5.3 Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running the operating system and create the recovery task. If the managed machine's operating system fails to start or you need to recover data to bare metal, boot the machine from the bootable media or using Acronis Startup Recovery Manager.
  • Page 82: Task Credentials

    Files (p. 88) You may have to specify credentials for the destination. Skip this step when operating on a machine booted with bootable media. Access credentials (p. 89) [Optional] Provide credentials for the destination if the task credentials do not enable recovery of the selected data.
  • Page 83: Archive Selection

     Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) ...
  • Page 84: Access Credentials For Location

    5.3.4.1 Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive backups by its creation date and time. Thus, you can revert the disk data to a certain moment in time. Specify the items to recover. By default, all items of the selected backup will be selected. If you do not want to recover certain items, just uncheck them.
  • Page 85: Destination Selection

    The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location. You might need to provide special credentials for a network share. Specify:  User name.
  • Page 86 If there are two disks having the same NT signature and comprising of a system volume on a machine, at the startup the operating system runs from the first disk, discovers the same signature on the second one, automatically generates a new unique NT signature and assigns it to the second disk. As a result, all the volumes on the second disk will lose their letters, all paths will be invalid on the disk, and programs won't find their files.
  • Page 87 Volume destination To specify a destination volume: 1. Select a volume or unallocated space where you want the selected volume to be recovered to. The destination volume/unallocated space should be at least the same size as the uncompressed image data. 2.
  • Page 88 File system Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery Server OEM can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available. Assume you are going to recover a volume from an old, low-capacity FAT16 disk to a newer disk.
  • Page 89: Access Credentials For Destination

    The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.
  • Page 90: Universal Restore

    5.3.9 Universal Restore Use Acronis Backup & Recovery Server OEM Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset. To learn more about the Universal Restore technology, see the Universal Restore section.
  • Page 91: Bootability Troubleshooting

    Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the target hardware has a specific mass storage controller such as RAID (especially NVIDIA RAID) or a fibre channel adapter, specify the appropriate drivers in the Drivers field. The drivers defined here will have priority.
  • Page 92: Validating Vaults, Archives And Backups

    [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect Windows Vista/2008 A part of the loader resides in the partition boot sector, the rest is in the files bootmgr, boot\bcd. At starting Windows, boot\bcd is mounted to the registry key HKLM \BCD00000000. 5.4 Validating vaults, archives and backups Validation is an operation that checks the possibility of data recovery from a backup.
  • Page 93: Task Credentials

    Choose an object to validate: Archive - in that case, you need to specify the archive. Backup (p. 94) - specify the archive first, and then select the desired backup in this archive. Vault - select a vault (or other location), which archives to validate. Access Credentials [Optional] Provide credentials for accessing the source if the task account does not have enough privileges to access it.
  • Page 94: Backup Selection

     To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer.
  • Page 95: When To Validate

    To specify credentials 1. Select one of the following:  Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section.  Use the following credentials The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location.
  • Page 96: Archive Selection

     "Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine. This will give access to the database until the failed machine is recovered.  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable media and creates an image.
  • Page 97: Access Credentials

    3. Click OK. 5.5.3 Access credentials To specify credentials 1. Select one of the following:  Use the current user credentials The program will access the location using the credentials of the current user.  Use the following credentials The program will access the location using the credentials you specify. Use this option if the current user account does not have access permissions to the location.
  • Page 98: Acronis Startup Recovery Manager

    To explore a mounted volume select it in the table and click Explore. The default file manager window opens, allowing the user to examine the mounted volume contents. Unmounting images Maintaining the mounted volumes takes considerable system resources. It is recommended that you unmount the volumes after the necessary operations are completed.
  • Page 99: How To Create Bootable Media

     back up sector-by-sector a disk with an unsupported file system  back up offline any data that cannot be backed up online because of restricted access, being permanently locked by the running applications or for any other reason. A machine can be booted into the above environments either with physical media, or using the network boot from Windows Deployment Services (WDS) or Remote Installation Services (RIS).
  • Page 100 Automated Installation Kit (AIK) for Windows Vista (PE 2.0): http://www.microsoft.com/Downloads/details.aspx?familyid=C7D4BC6D-15F3-4284-9123- 679830D629F2&displaylang=en Automated Installation Kit (AIK) for Windows Vista SP1 and Windows Server 2008 (PE 2.1): http://www.microsoft.com/downloads/details.aspx?FamilyID=94bb6e34-d890-4932-81a5- 5b50c657de08&DisplayLang=en Automated Installation Kit (AIK) for Windows 7 (PE 3.0): http://www.microsoft.com/downloads/details.aspx?familyid=696DD665-9F76-4177-A811- 39C26D3B3B34&displaylang=en 2. [optional] Burn the WAIK to DVD or copy to a flash drive. 3.
  • Page 101  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use.  Creating the PE ISO with the plug-in from scratch. ...
  • Page 102: Working Under Bootable Media

    For more information on customizing Windows PE, see the Windows Preinstallation Environment User’s Guide (Winpe.chm). 5.8.1.3 Building Bart PE with Acronis Plug-in from Windows distribution 1. Get the Bart PE builder. 2. Install Bootable Media Builder from the Acronis Backup & Recovery Server OEM setup file. 3.
  • Page 103 5.8.2.1 Setting up a display mode For a machine booted from media, a display video mode is detected automatically based on the hardware configuration (monitor and graphics card specifications). If, for some reason, the video mode is detected incorrectly, do the following: 1.
  • Page 104: Recovering Md Devices And Logical Volumes

    5.8.3 Recovering MD devices and logical volumes To recover MD devices, known as Linux Software RAID, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery. You can create the volume structure in either of the following ways: ...
  • Page 105 5.8.3.2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical volumes by using a Linux-based bootable media, and an example of such recovery. You can use a similar procedure in Linux. To recover MD devices and logical volumes 1.
  • Page 106: Disk Management

    Step 1: Creating the volume structure 1. Boot the machine from a Linux-based bootable media. 2. In the management console, press CTRL+ALT+F2. 3. Run the following commands to create the MD devices: mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/sd[ab] mdadm --create /dev/md1 --level=1 --raid-devices=2 /dev/sd[cd] 4.
  • Page 107: Supported File Systems

    All operations on disks and volumes involve a certain risk of data damage. Operations on system, bootable or data volumes must be carried out very carefully to avoid potential problems with the booting process or hard disk data storage. Operations with hard disks and volumes take a certain amount of time, and any power loss, unintentional turning off of the machine or accidental pressing of the Reset button during the procedure could result in volume damage and data loss.
  • Page 108: Choosing The Operating System For Disk Management

    5.9.4 Choosing the operating system for disk management On a machine with two or more operating systems, representation of disks and volumes depends on which operating system is currently running. A volume may have a different letter in different Windows operating systems. For example, volume E: might appear as D: or L: when you boot another Windows operating system installed on the same machine.
  • Page 109: Disk Operations

    shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including changing the volume letter or label, are also immediately displayed in the view. 5.9.6 Disk operations Acronis Disk Director Lite includes the following operations that can be performed on disks: ...
  • Page 110 5.9.6.2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It can be a case of expanding the system volume, starting a new system layout or disk evacuation due to a hardware fault. In any case, the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the source disk data to a target disk exactly as it is.
  • Page 111 volumes, then the Clone basic disk operation will be impossible and the user will not be able to continue. If you are about to clone a disk comprising of a system volume, pay attention to the Advanced options. By clicking Finish, you'll add the pending operation of the disk cloning. (To finish the added operation you will have to commit it.
  • Page 112 5.9.6.3 Disk conversion: MBR to GPT You would want to convert an MBR basic disk to a GPT basic disk in the following cases:  If you need more than 4 primary volumes on one disk.  If you need additional disk reliability against any possible data damage. If you need to convert a basic MBR disk to basic GPT: 1.
  • Page 113 (To finish the added operation you will have to commit it. Exiting the program without committing the pending operations will effectively cancel them.) 5.9.6.5 Disk conversion: basic to dynamic You would want to convert a basic disk to dynamic in the following cases: ...
  • Page 114 dynamic disks (all volume types except Simple volumes), then you will be warned here about the possible damage to the data involved in the conversion. Please note, the operation is unavailable for a dynamic disk containing Spanned, Striped, or RAID-5 volumes.
  • Page 115: Volume Operations

    5.9.7 Volume operations Acronis Disk Director Lite includes the following operations that can be performed on volumes:  Create Volume - Creates a new volume with the help of the Create Volume Wizard.  Delete Volume - Deletes the selected volume. ...
  • Page 116 Striped volumes are created for improved performance, not for their better reliability - they do not contain redundant information. Mirrored Volume A fault-tolerant volume, also sometimes called RAID 1, whose data is duplicated on two identical physical disks. All of the data on one disk is copied to another disk to provide data redundancy. Almost any volume can be mirrored, including the system and boot volumes, and if one of the disks fails, the data can still be accessed from the remaining disks.
  • Page 117 If the current operating system, installed on this machine, does not support the selected type of volume , you will receive the appropriate warning. In this case the Next button will be disabled and you will have to select another type of volume to proceed with the new volume creation. After you click the Next button, you will proceed forward to the next wizard page: Select destination disks (p.
  • Page 118 For basic volumes if some unallocated space is left on the disk, you also will be able to choose the position of the new volume on the disk. If you click the Back button, you will be returned to the previous page: Select destination disks (p. 117).
  • Page 119 2. Select Delete volume or a similar item in the Operations sidebar list, or click the Delete the selected volume icon on the toolbar. If the volume contains any data, you will receive the warning, that all the information on this volume will be lost irrevocably.
  • Page 120 (To finish the added operation you will have to commit it. Exiting the program without committing the pending operations will effectively cancel them.) The new volume structure will be graphically represented in the Disk management view immediately. 5.9.7.5 Change volume label The volume label is an optional attribute.
  • Page 121: Pending Operations

    (To finish the added operation you will have to commit it. Exiting the program without committing the pending operations will effectively cancel them.) The new volume structure will be graphically represented in the Disk management view. If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the volume, but some programs (e.g.
  • Page 122: Command-Line Mode And Scripting In Windows

    6 Command-line mode and scripting in Windows Acronis Backup & Recovery Server OEM supports the command-line mode and enables backup automation by executing XML scripts. The following features are available: 1. Ability to use the before/after data capture commands. 2. Ability to use the VSS support option. 3.
  • Page 123 /incremental /use_vss /compression:[0…9] /split:[size in MB] /oss_numbers /progress:[on|off] /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] deploy /vault:[path] /file_partition:[partition letter] /arc:[archive name] /harddisk:[disk number] Restores disks and /arc_id:[archive id] /partition:[partition number] partitions, except for /filename:[file name] /target_harddisk:[disk number] the MBR, from an /password:[password] /target_partition:[partition number] image...
  • Page 124 verify /vault:[path] /arc:[archive name] Verifies the archive /arc_id:[archive id] data integrity /filename:[file name] /password:[password] /asz:[number of archive] /net_user:[username] /net_password:[password] /ftp_user:[username] /ftp_password:[password] /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] pit_info /filename:[file name] /password:[password] Displays the numbered /asz:[number of archive] list of backups, /net_user:[username] contained in the /net_password:[password]...
  • Page 125 /index:N /net_user:[username] /net_password:[password] /log:[file name] /log_net_user:[remote user] /log_net_password:[password] *for a split image, the name of the last created file unplug /letter:X /letter:all Disconnects the image connected as a virtual drive asz_create /password:[password] /harddisk:X /oss_numbers /partition:[partition number] Creates the Acronis /reboot /size:[ASZ size in sectors|unallocated] Secure Zone on the /log:[file name]...
  • Page 126: Common Options

    clone /reboot /harddisk:[disk number] /target_harddisk:[disk number] Clones a hard disk help Shows usage ls_check Checks if there are licenses for the local machine on the license server 6.1.2 Common options 6.1.2.1 Access to archives vault:[path] Specifies a path to the location that contains the archive. Used in combination with the arc, or the arc_id option.
  • Page 127 b) Archive name, when restoring or deleting files from ASZ. Can be obtained with asz_files. If the vault option is specified the filename option is ignored. password:[password] a) Password for the archive, if the archive location is other than ASZ. b) Password for the ASZ, if archive location is ASZ.
  • Page 128 6.1.2.2 Backup options incremental Set the backup type to incremental. If not specified or there is no basic full backup, a full backup will be created. compression:[0…9] Specify the data compression level. It ranges from 0 to 9 and is set to 3 by default. split:[size in MB] Split the backup into parts of the specified size, if the archive location is other than ASZ.
  • Page 129: Specific Options

    no option No reboot, operation fails No reboot, operation succeeds log:[file name] Create a log file of the current operation with the specified file name. Please note, logs can be saved only to a network share. log_net_user:[remote user] If the log file is created on a network share, include the user name for logon to the share. log_net_password:[password] If the log file is created on a network share, include the password for logon to the share.
  • Page 130 file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This option is used with filename:[file_name]. In that case the file name must be specified without a drive letter or root folder. For example: /file_partition:D /filename:”\1.tib”...
  • Page 131 6.1.3.2 deploy file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This option is used with filename:[file_name]. In that case the file name must be specified without a drive letter or root folder. For example: /file_partition:D /filename:”\1.tib”...
  • Page 132 fat16_32 Enables the file system conversion from FAT16 to FAT32 if the partition size after recovery is likely to exceed 2 GB. Without this option, the recovered partition will inherit the file system from the image. type:[active | primary | logical] Sets the restored partition active, primary or logical, if possible (for example, there cannot be more than four primary partitions on the disk).
  • Page 133 ur_password:[pwd] Specifies using Acronis Universal Restore and a password associated with the ur_username option value. ur_driver:[inf-filename] Specifies using Acronis Universal Restore and the mass-storage driver to be installed. 6.1.3.3 deploy_mbr harddisk:[disk number] Specifies the basic hard disk to restore the MBR from. target_harddisk:[disk number] Specifies the target hard disk where the MBR will be deployed to.
  • Page 134 net_src_user:[username] Specifies the user name for logon to the network share to access the source archive. net_src_password:[password] Specifies the password for logon to the network share to access the source archive. net_user:[username] Specifies the user name for logon to the network share to save the resulting archive. net_password:[password] Specifies the password for logon to the network share to save the resulting archive.
  • Page 135 target_arc:[target archive name] The name of the target archive. Has to be unique within the target folder. If there is an archive with the same name, the operation will fail. net_user:[username] Specifies the user name for logon to the network share to save the resulting archive. net_password:[password] Specifies the password for logon to the network share to save the resulting archive.
  • Page 136 6.1.3.8 list filename:[file name] With this option, the image contents are displayed. When listing image contents, the partition numbers may not coincide with those in the drives/partitions list, if the image does not contain all the disk partitions. For example, if the image contains partitions 2-3 and 2-5, they will be listed as 2-1 and 2-2.
  • Page 137 6.1.3.9 explore partition:[partition number] Specifies a list of partitions to be mounted as virtual drives. Without this option, all partitions stored in the image will be mounted. To obtain the partition number for this option, list the image contents with the /list/filename command and use the number from the Idx column.
  • Page 138: Trueimagecmd.exe Usage Examples

    6.1.3.13 clone harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk. target_harddisk:[disk number] Specifies the target hard disk number where the source hard disk will be cloned. 6.1.4 trueimagecmd.exe usage examples 6.1.4.1 Image disks and partitions The following command will create an image named 1.tib of partitions 2-1 and 1- 3: trueimagecmd /create /filename:"C:\Test\1.tib"...
  • Page 139: Restore Files

    trueimagecmd /deploy /filename:"C:\Test\1.tib" /password:qwerty /harddisk:2  The following command will restore partition 2-1, stored in image 1.tib, to partition 1-1: trueimagecmd /deploy /filename:"C:\Test\1.tib" /partition:2-1 /target_partition:1-1  The following command will restore partition 2-1, stored in image 1.tib, to hard disk 3: trueimagecmd /deploy /filename:"C:\Test\1.tib"...
  • Page 140 C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /pit_info /filename:\\srv\elenel\kons.tib Pit number: 1 type: image; kind: base; date: 6/27/2009 11:39:10 AM Pit number: 2 type: image; kind: incremental; date: 6/27/2009 11:43:13 AM Pit number: 3 type: image; kind: incremental; date: 6/27/2009 11:44:04 AM Pit number: 4 type: image;...
  • Page 141 The following command will list contents of the specified image: trueimagecmd /list /filename:"C:\My Folder\Backup.tib" The following command will list all archives and their UUID's in the specified location: trueimagecmd /list /vault:D:Backups The following command will list all backups of the specified archive: trueimagecmd /list /vault:D:Backups /arc:"Archive 1"...
  • Page 142 6.1.4.11 Acronis Secure Zone: managing backups by file names  The following command will list the Acronis Secure Zone size, free space and contents using generated filenames: trueimagecmd /asz_files /password:aszpw Assume that the contents of Acronis Secure Zone are as follows: C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files /password: aaa ASZ size: 5.387 GB...
  • Page 143: Scripting

    C:\Program Files\Acronis\BackupAndRecovery>trueimagecmd /asz_files /password: aaa ASZ size: 5.387 GB ASZ free space: 4.363 GB FILE name: AAA2.TIB; size: 56414317 byte type: image, base; creation time: 2/16/2009 3:43:34 PM type: image, incremental; creation time: 4/25/2009 11:44:47 AM FILE name: FAAA.TIB; size: 3125550 byte type: file, base;...
  • Page 144: Script Structure

    /nowait – an optional script execution argument. Enables to terminate TrueImageTerminal before backup is finished. Example: TrueImageTerminal /execute:C:\MyBackup.tis /nowait By pressing Ctrl+C you can forcibly turn off backup progress output and switch TrueImageTerminal to a background operation. You can terminate the backup operation executed by TrueImageTerminal by pressing Ctrl+B. 6.2.2 Script structure Scripts are written in the XML language and you can use the following tags:...
  • Page 145: Script Usage Examples

    Split splits a large image file into a number of smaller files of the specified size, which can be provided in bytes, kilobytes, megabytes, etc. Password adds password protection to an image file. 6.2.3 Script usage examples The following example illustrates the usage of a script to back up two partitions (logical drives), C and F.
  • Page 146: Glossary

    7 Glossary Acronis Plug-in for WinPE A modification of Acronis Backup & Recovery Server OEM Agent for Windows that can run in the preinstallation environment. The plug-in can be added to a WinPE image using Bootable Media Builder. The resulting bootable media can be used to boot any PC-compatible machine and perform, with certain limitations, most of the direct management operations without help of an operating system.
  • Page 147 Backup The result of a single backup operation (p. 147). Physically, it is a file or a tape record that contains a copy of the backed up data as of specific date and time. Backup files created by Acronis Backup & Recovery Server OEM have a TIB extension.
  • Page 148 Physically, a backup plan is a bundle of tasks (p. 151) configured for execution on a managed machine (p. 151). A backup plan can be created directly on the machine (local plan). Backup scheme A part of the backup plan that includes the backup schedule and [optionally] the retention rules and the cleanup schedule.
  • Page 149  creating and managing local tasks (p. 151), such as recovery tasks  creating and managing personal vaults (p. 151) and archives stored there  viewing the state, progress and properties  viewing and managing the log of the agent's operations ...
  • Page 150 occupies the last 1MB of an MBR disk. On a GPT disk, Windows creates the dedicated LDM Metadata partition, taking space from the Microsoft Reserved Partition (MSR.) Disk 1 database 1 MB Protec- Microsoft Disk 2 tive Reserved database Partition (MSR) LDM Metadata partition 1 MB...
  • Page 151 Local task A task (p. 151) belonging to a local backup plan (p. 150) or a task that does not belong to any plan, such as a recovery task. A local task belonging to a backup plan can be modified by editing the plan only;...
  • Page 152 Universal Restore (Acronis Backup & Recovery Server OEM Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. The Universal Restore is not available: when the machine is booted with Acronis Startup Recovery Manager (p.
  • Page 153  Windows XP Professional with Service Pack 2 (PE 1.5)  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Windows Server 2008 (PE 2.1). WinPE is commonly used by OEMs and corporations for deployment, test, diagnostic and system repair purposes.

This manual is also suitable for:

Dns-1250-06Backup & recovery server oem

Table of Contents