ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - UPDATE 3 User Manual

Hide thumbs Also See for BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - UPDATE 3:
Table of Contents

Advertisement

Acronis® Backup & Recovery ™ 10
Advanced Server SBS Edition
Update 3
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - UPDATE 3

  • Page 1 Acronis® Backup & Recovery ™ 10 Advanced Server SBS Edition Update 3 User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.11 Proprietary Acronis technologies ....................46 2.11.1 Acronis Secure Zone ...........................46 2.11.2 Acronis Startup Recovery Manager ......................47 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............48 2.11.4 Acronis Active Restore ..........................49 2.12 Understanding centralized management ................51 2.12.1 Basic concepts ............................51 2.12.2...
  • Page 4 Logging level ...............................81 3.2.2 Log cleanup rules ............................81 3.2.3 Event tracing ...............................82 3.2.4 Domain access credentials .........................83 3.2.5 Acronis WOL Proxy .............................83 3.2.6 VM protection options ..........................83 3.2.7 Online backup proxy ...........................84 Machine options ........................85 3.3.1 Machine management ..........................85 3.3.2 Event tracing ...............................86...
  • Page 5 Exporting archives and backups ................... 240 6.7.1 Task credentials ............................243 6.7.2 Archive selection ............................. 243 6.7.3 Backup selection ............................244 6.7.4 Access credentials for source ........................244 6.7.5 Location selection ............................ 245 6.7.6 Access credentials for destination ......................246 Acronis Secure Zone ......................247...
  • Page 6 6.11.6 Volume operations ..........................276 6.11.7 Pending operations ..........................282 6.12 Collecting system information ....................283 Centralized management ..................... 284 Administering Acronis Backup & Recovery 10 Management Server ........284 7.1.1 Dashboard ............................... 284 7.1.2 Backup policies ............................286 7.1.3 Physical machines ............................
  • Page 7 8.1.9 Subscription lifecycle FAQ ........................377 Where do I start? ........................379 Choosing a subscription ......................379 Activating online backup subscriptions ................380 8.4.1 Activating subscriptions .......................... 380 8.4.2 Reassigning an activated subscription ....................381 Configuring proxy settings ....................382 Limitations of the online storage ..................
  • Page 8: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Advanced Server SBS Edition inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 9: Getting Started

    1. Install Acronis Backup & Recovery 10 Management Server (p. 19). 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installing the agents, register each of the machines on the management server. To do so, enter the server's IP or name and the centralized administrator's credentials in one of the installation wizard's windows.
  • Page 10 2. Create the deduplicating managed vault on the storage node. 3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplicating vault. 4. Ensure that the backup plans you create use the managed vault as destination for the backup archives.
  • Page 11: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace Name...
  • Page 12 Storage nodes. Use this view to manage storage nodes. Add a storage node to be able to create centralized vaults that will be managed by the node.  Tasks. Use this view to manage tasks, run, edit, stop and delete tasks, monitor their states, examine task history. Copyright © Acronis, Inc., 2000-2010...
  • Page 13 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 14: Operations With Panes

    All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized.
  • Page 15 In the Information panel (collapsed by default), view the item's details  Perform actions on the selected item. There are several ways of performing the same action on selected items:  By clicking the buttons on the table toolbar; Copyright © Acronis, Inc., 2000-2010...
  • Page 16: Action Pages

    Most settings are configured by clicking the respective Change… links to the right. Others are selected from the drop-down list, or typed manually in the page's fields. Copyright © Acronis, Inc., 2000-2010...
  • Page 17: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes the following main types of components.
  • Page 18: Agent For Windows

    Universal Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. Copyright © Acronis, Inc., 2000-2010...
  • Page 19: Components For Centralized Management

    1.3.2 Components for centralized management This section lists the components included in the Acronis Backup & Recovery 10 editions that provide the centralized management capability. Besides these components, Acronis Backup & Recovery 10 Agents have to be installed on all machines that need data protection.
  • Page 20: Storage Node

    1.3.2.2 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various resources (such as the corporate storage capacity, the network bandwidth, or the managed machines' CPU load) required for the enterprise data protection. This goal is achieved through organizing and managing the locations that serve as dedicated storages of the enterprise backup archives (managed vaults).
  • Page 21: Management Console

    Acronis Backup & Recovery 10 Management Console is an administrative tool for remote or local access to Acronis Backup & Recovery 10 agents, and in the product editions that include the centralized management capability, to the Acronis Backup & Recovery 10 Management Server.
  • Page 22: Acronis Wake-On-Lan Proxy

    Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 23: System Requirements

     Windows MultiPoint Server 2010* Acronis Backup & Recovery 10 Storage Node handles tape libraries and autoloaders by using Removable Storage Management (RSM). Since Windows 7, Windows Server 2008 R2 and Windows MultiPoint Server 2010 do not support RSM, a storage node installed in these operating systems does not support tape libraries and autoloaders.
  • Page 24: Technical Support

    If you need assistance with your Acronis product, please go to http://www.acronis.eu/support/ Product Updates You can download the latest updates for all your registered Acronis software products from our website at any time after logging into your Account (https://www.acronis.eu/my) and registering the product.
  • Page 25: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 387) on the machine which becomes a managed machine (p. 395) from this point on.
  • Page 26 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 27 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 28 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 29: Full, Incremental And Differential Backups

    2.2 Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes. All backup schemes are based on full, incremental and differential backup methods.
  • Page 30 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: ...
  • Page 31: User Privileges On A Managed Machine

    When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are cleared. This prevents the "modify settings, leave passwords" trick. The program displays Copyright © Acronis, Inc., 2000-2010...
  • Page 32: Gfs Backup Scheme

    It is sufficient that the machine be on (that is, not in standby or hibernate) at the scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task.
  • Page 33 You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 34 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 35 Here is how the first month of your backup plan will appear in real life. “F” stands for full backup. “Dif” stands for differential backup. “I” stands for incremental backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 36: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 37 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 38: Retention Rules

    Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 39 (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Copyright © Acronis, Inc., 2000-2010...
  • Page 40 The consolidation, however, may take a lot of time and system resources. And you still need some extra space in the vault for temporary files created during consolidation. What you need to know about consolidation Copyright © Acronis, Inc., 2000-2010...
  • Page 41: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 394) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 42: Recovering Dynamic Volumes

    Basic MBR volume Basic MBR volume Basic MBR volume Basic GPT volume Basic GPT volume Basic GPT volume Basic GPT volume Basic MBR volume Basic MBR volume Basic MBR volume Unallocated space (basic MBR disk) Copyright © Acronis, Inc., 2000-2010...
  • Page 43: Tape Support

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 20). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p.
  • Page 44: Using A Single Tape Drive

    5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 398) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume.
  • Page 45: Support For Snmp

    1.3.6.1.4.1.24769.100.200.2.0:I0064000B Supported operations Acronis Backup & Recovery 10 supports only TRAP operations. It is not possible to manage Acronis Backup & Recovery 10 using GET- and SET- requests. This means that you need to use an SNMP Trap receiver to receive TRAP-messages.
  • Page 46: Proprietary Acronis Technologies

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 47: Acronis Startup Recovery Manager

    This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.
  • Page 48: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 49: Acronis Active Restore

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. Copyright © Acronis, Inc., 2000-2010...
  • Page 50: How It Works

    When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the selected disks or volumes in the backup. If this scan finds a supported operating system, the Acronis Active Restore option becomes available.
  • Page 51: Understanding Centralized Management

    5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Restore icon appears in the system tray. The machine becomes operational and ready to provide necessary services. The immediate user sees the drive tree and icons and can open files or launch applications even though they were not yet recovered.
  • Page 52: Setting Up Centralized Data Protection In A Heterogeneous Network

    To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p. 397) and configure it to manage a centralized vault or multiple centralized vaults.
  • Page 53 2. Install Acronis Backup & Recovery 10 Management Server [AMS] on one of the Windows servers (2). The management server is your single entry point to the Acronis infrastructure. 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's disks, volumes or files.
  • Page 54: Protecting The Servers

    There can be multiple storage nodes on the network. Each of the nodes can manage up to 20 local or remote vaults.  Multiple Acronis Backup & Recovery 10 components can be installed on a machine with a single installation procedure. ...
  • Page 55: Protecting The Workstations

    To protect data on a daily basis, you can also use the GFS or Tower of Hanoi backup schemes. 2.12.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibility to protect virtual machines in multiple ways: ...
  • Page 56: Grouping The Registered Machines

    Please familiarize yourself with this section to be sure that your actions yield the desired result and to understand the result of the automated Acronis Backup & Recovery 10 Management Server operations.
  • Page 57: A Policy On A Machine Or A Group

    4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.12.4.2 Operations with a machine This section is a simplified illustration of what happens with the policies on a machine when the machine is moved, copied, or deleted from a group. Copyright © Acronis, Inc., 2000-2010...
  • Page 58: Inheritance Of Policies

    2.12.4.3 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group besides the All machines group. Let's start from this simplified approach. Copyright © Acronis, Inc., 2000-2010...
  • Page 59 Inheritance column and the inheritance order will be as follows: For machine Name of the policy Inheritance Inheritance order #1 or #2 or #3 "green" Inherited All machines -> #1 or #2 or #3 "orange" Inherited G1 -> #1 or #2 or #3 Copyright © Acronis, Inc., 2000-2010...
  • Page 60: Backup Policy's State And Statuses

    Revoking. You may change grouping conditions or the machine may change its properties so that the machine leaves one group and is included into another. This may result in revoking one policy and deploying Copyright © Acronis, Inc., 2000-2010...
  • Page 61: Policy Status On A Machine

    Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is applied to both Linux and Windows machines. Once the first backup is started, the policy gets the Error status on the Linux machines and on the Windows machines that do not have such volumes. Copyright © Acronis, Inc., 2000-2010...
  • Page 62: Policy Deployment State On A Group

    The status of the corresponding backup plan is Warning The status of the corresponding backup plan is OK Updating Error The updating log has errors: cannot delete the locked task, the Acronis service is stopped… Warning The updating log has warnings...
  • Page 63: Deduplication

    Deduplication is performed on disk blocks (block-level deduplication) and on files (file-level deduplication), for disk-level and file-level backups respectively. In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Copyright © Acronis, Inc., 2000-2010...
  • Page 64: How Deduplication Works

    Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node to determine what data can be deduplicated, and does not transfer the data whose duplicates are already present in the vault. Deduplication at target Performed in the vault after a backup is completed.
  • Page 65: When Deduplication Is Most Effective

    Deduplication and incremental backups In case of random changes to the data, de-duplication at incremental backup will not produce much effect because:  The deduplicated items that have not changed are not included in the incremental backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 66: Deduplication Best Practices

    When backing up multiple systems with similar content, back up one of the similar systems first, so that Acronis Backup & Recovery 10 Storage Node indexes all the system's files as potential deduplication items. This will lead to faster backup processes and less network traffic (because of effective deduplication at source), regardless of whether the backups are performed simultaneously or not.
  • Page 67: Deduplication Restrictions

    In the NTFS file system, a file may have one or more additional sets of data associated with it—often called alternate data streams. When such file is backed up, so are all its alternate data streams. However, these streams are never deduplicated—even when the file itself is. Copyright © Acronis, Inc., 2000-2010...
  • Page 68: Privileges For Centralized Management

    This section describes the users' privileges that are required to manage a machine locally and remotely, to manage a machine registered on Acronis Backup & Recovery 10 Management Server, and to access and manage Acronis Backup & Recovery 10 Storage Node.
  • Page 69: Acronis Security Groups

    When Acronis Backup & Recovery 10 Agent for Windows is being installed on a machine, the Acronis Remote Users group is created (or updated). A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery 10 Management Console, according to the management rights described in Users' privileges on a managed machine (p.
  • Page 70: User Privileges On A Storage Node

    Administrators group itself is included. Tip: To ensure proper group names, you should install Acronis components in a domain controller after you have set up the domain controller itself. If the components were installed before you set up the domain controller, create the groups DCNAME $ Acronis Remote Users and DCNAME $ Acronis Centralized Admins manually, and then include the members of Acronis Remote Users and Acronis Centralized Admins in the newly created groups.
  • Page 71: Management Server Administrator Rights

    In this case, the user account must exist on all the machines to which the centralized policy will be deployed. This is not always efficient. To be a management server administrator, the user must be a member of the Acronis Centralized Admins group on the machine where the management server is installed.
  • Page 72: Communication Between Acronis Backup & Recovery 10 Components

    2.12.8.1 Secure communication Acronis Backup & Recovery 10 provides the capability to secure the data transferred between its components within a local area network and through a perimeter network (also known as demilitarized zone, DMZ).
  • Page 73: Client And Server Applications

    For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup & Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. An Acronis component can act as a client application, a server application, or both, as shown in the following table.
  • Page 74 Windows. If restart is not possible, make sure you do the following:  If Acronis Backup & Recovery 10 Management Console is running, close it and start it again.  If other Acronis components, such as Acronis Backup & Recovery 10 Agent for Windows or Acronis Backup &...
  • Page 75 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 76). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 76: Network Port Configuration

    Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent. The choice is available between: ...
  • Page 77 Thawte™—or by your organization's CA. Certificate path All Acronis components installed on a machine, when acting as a server application, use an SSL certificate called the server certificate. In Windows, the certificate path and the server certificate's file name are specified in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Encryption\Server.
  • Page 78 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the option to use trusted third-party certificates or certificates created by your organization's CA as an alternative to self-signed certificates, by using Acronis Certificate Command- line Utility. To install a third-party certificate 1.
  • Page 79: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 80: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 81: Management Server Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 82: Event Tracing

    This option defines whether the management server has to send its own log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 45)". The preset is: Disabled.
  • Page 83: Domain Access Credentials

    The preset is: Disabled. To bring this option into use: 1. Install Acronis WOL Proxy on any server in the subnet where the machines to be woken are located. The server has to provide continuous services availability. With multiple subnets, install Acronis WOL Proxy in every subnet where you need to use the Wake-On-LAN functionality.
  • Page 84: Online Backup Proxy

    ESX/ESXi is deployed (p. 311) to the virtual machine's host. Such machines appear as not manageable (grayed out). Once the agent is deployed to an ESX/ESXi host (this requires a license for Acronis Backup & Recovery 10 Advanced Server Virtual Edition), the virtual machines from this host are ready for applying a backup policy or individual backup.
  • Page 85: Machine Options

    3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
  • Page 86: Event Tracing

    The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 87 The settings you obtain in this case will be plan-specific or task- specific. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 45)". The preset is: Disabled.
  • Page 88: Log Cleanup Rules

    This parameter can also be set by using Acronis Administrative Template (p. 337). 3.3.4 Online backup proxy This option is effective only for backup to and recovery from Acronis Online Backup Storage over the Internet. This option defines whether the Acronis agent will connect to the Internet through a proxy server.
  • Page 89: Default Backup And Recovery Options

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 90 Dest: Dest: Dest: Tape support (p. 108) managed managed managed managed vault on a vault on a vault on a vault on a tape library tape library tape library tape library Additional settings (p. 109): Copyright © Acronis, Inc., 2000-2010...
  • Page 91: Archive Protection

    AES 192 – the archive will be encrypted using the AES algorithm with a 192-bit key  AES 256 – the archive will be encrypted using the AES algorithm with a 256-bit key. 5. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 92: Source Files Exclusion

    Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt To exclude a folder specified by a path containing the drive letter, add a backslash (\) to the folder name in the criterion; for example: C:\Finance\ Exclusion examples Criterion Example Description Copyright © Acronis, Inc., 2000-2010...
  • Page 93 The program does not support interactive commands, i.e. commands that require user input (for example, "pause"). To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  Execute before the backup  Execute after the backup Copyright © Acronis, Inc., 2000-2010...
  • Page 94 When the check box is not selected, the command execution result does not affect the task execution failure or success. You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard. Copyright © Acronis, Inc., 2000-2010...
  • Page 95 This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 96 TIB file and temporary files and fail the task if the command execution fails. 3.4.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. Copyright © Acronis, Inc., 2000-2010...
  • Page 97: Volume Shadow Copy Service

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 98: Compression Level

    Acronis Backup & Recovery 10 will select the VSS provider automatically based on the operating system running on the machine and whether the machine is a member of an Active Directory domain. Create snapshots without using VSS Choose this option if your database is incompatible with VSS. The data snapshot will be taken by Acronis Backup &...
  • Page 99: Backup Performance

    This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk.
  • Page 100: Network Connection Speed

    3.4.1.10 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 101 The When user interaction is required check box – to send notification during the operation when user interaction is required – is always selected. Click Send test WinPopup message to check if the settings are correct. Copyright © Acronis, Inc., 2000-2010...
  • Page 102: Windows Event Log

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 45)".
  • Page 103: Backup Splitting

    The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size.
  • Page 104: Media Components

    The result will be the same - the files will inherit the permissions from the parent folder. To access file or folder NTFS permissions, select Properties > Security. 3.4.1.15 Media components This option is effective for both Windows and Linux operating systems, when the backup destination is removable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 105: Error Handling

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 106: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 107: Task Failure Handling

    This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media. This option determines the program behavior when any of the backup plan's tasks fails. The preset is not to restart a failed task. Copyright © Acronis, Inc., 2000-2010...
  • Page 108 When this option is enabled, the backups, belonging to the policy or plan being created, will be located on a separate tape set. Other backups will not be written to this tape set. Copyright © Acronis, Inc., 2000-2010...
  • Page 109: Additional Settings

    When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To disable this warning, select this check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 110 When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 111: Default Recovery Options

    The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 112 Set current date and time for recovered files Validate backup archive before recovery Check file system after recovery Reboot machine automatically if it is required for recovery Windows Windows Change SID after recovery recovery recovery Notifications: Copyright © Acronis, Inc., 2000-2010...
  • Page 113 5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not recover until the command execution is Copyright © Acronis, Inc., 2000-2010...
  • Page 114: Recovery Priority

    Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine  Normal – to run the recovery process with normal speed, allocating resources on a par with other processes Copyright © Acronis, Inc., 2000-2010...
  • Page 115 NTFS permissions from the folder to which they are recovered. 3.4.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 116 Application Event Log of Windows; or send the events to the specified SNMP managers. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 117 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 45)".
  • Page 118 When operating under bootable media, this option is not effective for the NTFS file system. The preset is Disabled. This option defines whether to check the integrity of the file system after a disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 119 Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 120: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 121: Centralized Vaults

    Members of the Administrators group can view and manage any archive stored on the storage node. A user who is a member of the Administrators group on a managed machine can view and manage archives created by any user of this machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 122: Working With The "Centralized Vault" View

    All the archives are grouped by type on the following tabs:  The Disk archives tab lists all the archives that contain disk or volume backups (images).  The File archives tab lists all the archives that contain file backups. Related sections: Copyright © Acronis, Inc., 2000-2010...
  • Page 123: Actions On Centralized Vaults

    1. Select the vault. 2. Click Validate. You will be taken to the Validation (p. 233) page with an already pre-selected vault as a source. The vault validation checks all the archives in this vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 124: Creating A Managed Centralized Vault

    Specify a unique name for the vault. Creation of two centralized vaults with the same name is prohibited. Comments [Optional] Enter the distinctive description of the vault being created. Type Select the Managed type. Storage node Copyright © Acronis, Inc., 2000-2010...
  • Page 125 Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p. 125) Specify where the vault will be created. Managed centralized vaults can reside on a network share, SAN, NAS, or on a hard drive local to the storage node.
  • Page 126: Vault Encryption

    The password itself is not stored anywhere on the disk; the password hash is used for verification purposes. With this two-level security, the archives are protected from any unauthorized access, but recovering a lost password is not possible. Copyright © Acronis, Inc., 2000-2010...
  • Page 127: Creating An Unmanaged Centralized Vault

    When deleting a managed vault, you have the option to retain archives contained in the vault. The location resulting from such deletion can also be attached to the same or another storage node. Personal or centralized unmanaged vaults cannot be attached. Copyright © Acronis, Inc., 2000-2010...
  • Page 128: Tape Libraries

    4.1.3.1 Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acronis Backup & Recovery 10 Storage Node. The storage node should be installed on the machine a tape library is attached to. Storage node can simultaneously use more than one tape library for keeping archives.
  • Page 129 Tape compatibility table (p. 43) section. Acronis Backup & Recovery 10 enables you to set up distribution of backups by media. For example, a separate tape set can be used to back up some specific data, and the backups of all other data will be written onto any currently mounted tape, which does not belong to the tape set.
  • Page 130: Rsm Media Pools

    So the tape data will be lost. If all the backups are deleted from a tape, it will not return to the Free pool. It remains in the Acronis pool as a free tape to be reused. So if a storage node needs a new tape, it finds a free tape first in the Acronis pool, then in the Free pool.
  • Page 131: Getting Started With A Tape Library

    Getting started with a tape library If you have a tape library device attached to a machine with Acronis Backup & Recovery 10 Storage Node installed, all you need to do to back up onto the tape library is to create an archive vault on the device under storage node management.
  • Page 132: Actions On A Tape Library Vault

    To view and change the tape options, select Options > Default backup and recovery options > Default backup options > Tape support from the top menu. Copyright © Acronis, Inc., 2000-2010...
  • Page 133: Recovering From Tape Library

    (loaded or not). 4.1.3.6 Managing a tape library To manage a tape library the following tasks/procedures are in the product:  Inventory (p. 134)  Rescan (p. 134)  Labeling (p. 135) Copyright © Acronis, Inc., 2000-2010...
  • Page 134 At rescanning a tape label should be saved in the storage node database. If a slot, selected for the procedure, contains a tape that still does not have a label, the Rescan task for the tape is paused to perform the Labeling (p. 135) procedure. Copyright © Acronis, Inc., 2000-2010...
  • Page 135 Manage tapes on the toolbar. Then the Tape Management window will show a list of the library slots that contain tapes. For every tape belonging to the Free pool or to the Acronis pool, the slot data field indicates the tape label. Labels are also displayed for tapes that are in the Imported pool and contain backups written by Acronis (such might be the case when you bring a tape from another tape library).
  • Page 136: Tape Rotation

    If all backups are deleted from a tape, i.e. if information about the last backup on the tape is deleted from the storage node database, the tape is considered as empty and can be reused during a backup Copyright © Acronis, Inc., 2000-2010...
  • Page 137: Choosing A Backup Scheme

    The same tape rotation enables you to get by with the minimum number of cartridges and not to be buried in used tapes. Acronis Backup & Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries.
  • Page 138: Case To Analyze

    Keep in mind that a monthly backup is full, a weekly backup is differential, and a daily backup is incremental in this implementation of the GFS scheme. The first backup is always full. So if the Copyright © Acronis, Inc., 2000-2010...
  • Page 139 Further, a free tape is loaded into the same drive and mounted, and then the backup (last 24 Gb) is continued onto the beginning of the new tape. Copyright © Acronis, Inc., 2000-2010...
  • Page 140 This task deletes all the outdated backups. The next figure shows dark-gray rectangles instead of the backups deleted up to the current time. Physically the deleted backups are still on the tapes; however information about the backups is deleted from the storage node database. Copyright © Acronis, Inc., 2000-2010...
  • Page 141 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. Copyright © Acronis, Inc., 2000-2010...
  • Page 142 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Copyright © Acronis, Inc., 2000-2010...
  • Page 143 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 144 To recover the data only one tape is required for a full backup, two tapes for a differential backup, and two or three tapes for an incremental backup. This scheme has the following advantages:  access to any full backup requires only one tape Copyright © Acronis, Inc., 2000-2010...
  • Page 145 It requires 7 tapes in rotation. ToH Example 2 requires 4 tapes, which is the minimum for the case. So its tape options settings are the best in comparison with options for other examples. Copyright © Acronis, Inc., 2000-2010...
  • Page 146 (one tape - 16%, two tapes - 72%, three tapes - 12%) as well as rewinding and reading of one (6%), two (50%) or three (44%) backups Copyright © Acronis, Inc., 2000-2010...
  • Page 147 So in this specific case the selection of the Always use a free tape: For each full backup option considerably increases the usage efficiency of the tapes in the library. Copyright © Acronis, Inc., 2000-2010...
  • Page 148: Tape Planning

    (incremental backups, 50%) tapes. So on average the operation takes more time than in the previous examples. Tape planning Once you have specified the backup scheme and tape options, you should determine the minimal number of tapes necessary to achieve full automation of tape rotation. Copyright © Acronis, Inc., 2000-2010...
  • Page 149 Its backup line was the following: E (full), A, B, A, C, A, B, A, D, A, B, A, C, A, B, A, E, A, B, A, C, A, B, A, D. Copyright © Acronis, Inc., 2000-2010...
  • Page 150 What if I have to move tapes with backups from one tape library to another? 1. If both tape libraries are attached to the same machine with Acronis Backup & Recovery 10 Storage Node installed (i.e. the libraries are managed by the same storage node), the storage...
  • Page 151: Personal Vaults

    What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis agents create backups on tapes in a format that differs from the format used by the storage node. It is the reason why it is impossible to interchange tapes between tape devices attached to a storage node and attached to a managed machine: a tape written by a storage node cannot be read by an agent in a locally attached tape device.
  • Page 152: Working With The "Personal Vault" View

    Filtering and sorting archives (p. 157) Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates actions of the vault's toolbar. Copyright © Acronis, Inc., 2000-2010...
  • Page 153: Actions On Personal Vaults

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Click Create Acronis Secure Zone. Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 247) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 154: Common Operations

    These operations can be also accessed from the [Archive name] actions bar (on the Actions and tools pane) and from the [Archive name] actions item of the main menu respectively. The following is a guideline for you to perform operations with archives stored in a vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 155: Operations With Backups

    The Recover data (p. 212) page will be opened with the pre-selected backup as a source. Select the location and the type of new virtual machine and then proceed as with regular disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 156: Deleting Archives And Backups

    The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. There should be enough space in the vault for temporary files created during consolidation. Backups resulting from consolidation always have maximum compression. Copyright © Acronis, Inc., 2000-2010...
  • Page 157: Filtering And Sorting Archives

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 158: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 159: Daily Schedule

    Advanced scheduling settings (p. 165) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 160 As you can see, the time interval between the first and the second task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule Copyright © Acronis, Inc., 2000-2010...
  • Page 161: Weekly Schedule

    Advanced scheduling settings (p. 165) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 162 Wednesday: every 3 hours from 9 AM till 9 PM  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)  Saturday: once at 9 PM Copyright © Acronis, Inc., 2000-2010...
  • Page 163: Monthly Schedule

    For example, setting the task frequency to Every 1 hour From 10:00:00 AM From: <...> Until: <...> until 10:00:00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day. In the Effective... area, set the following settings: Copyright © Acronis, Inc., 2000-2010...
  • Page 164 Advanced scheduling settings (p. 165) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 165: Advanced Scheduling Settings

    Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the Wake- On-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start. If the backup task on each machine starts with a delay (see the next setting), the management server will wake up the machines according to those delays.
  • Page 166 09:59:59 AM; the interval between the first and the second run is exactly two hours—for instance: First machine: Every day at 09:30:03 AM and 11:30:03 AM Second machine: Every day at 09:00:00 AM and 11:00:00 AM Third machine: Every day at 09:59:59 AM and 11:59:59 AM Copyright © Acronis, Inc., 2000-2010...
  • Page 167: At Windows Event Log Event

    When Windows detects a bad block on a hard disk, it records an event with the event source disk and the event number 7 into the System log; the type of this event is Error. Copyright © Acronis, Inc., 2000-2010...
  • Page 168 3. In the Event Properties dialog box, view the event's properties such as the event source, shown in the Source field; and the event number, shown in the Event ID field. When you are finished, click OK to close the Event Properties dialog box. Copyright © Acronis, Inc., 2000-2010...
  • Page 169: When An Adrm Alert Is Received

    This schedule is effective in Windows operating systems when Acronis® Drive Monitor™ (ADRM) is installed. Acronis Drive Monitor reports on hard disk health by using the hard disk’s internal monitoring system (S.M.A.R.T.). Based on alerts from Acronis Drive Monitor, you can set up emergency backups of your data in addition to regular backups.
  • Page 170: User Is Idle

    (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available. (3) If the location's host will never be available on workdays at 9:00 PM, the task never starts. Copyright © Acronis, Inc., 2000-2010...
  • Page 171: Fits Time Interval

    3:00 PM) will start at 4:00 PM—the time when the waiting period ends. 5.7.4 User logged off Applies to: Windows Enables to put a backup task run on hold until all users log off from Windows on the managed machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 172: Time Since Last Backup

    (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 173: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 174 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 175: Backup Plans And Tasks

    You can also hide the unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 182) section for details.  In the backup table, select the backup plan (task). Copyright © Acronis, Inc., 2000-2010...
  • Page 176: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 177: Task States

    A task may also change to the Waiting state when the event specified by the schedule occurs but the condition set in the backup plan is not met. See Task start conditions (p. 106) for details. Need interaction Copyright © Acronis, Inc., 2000-2010...
  • Page 178: Task Statuses

    Edit the failed task to prevent its future failure  Edit the local plan to prevent its future failure in case a local plan has failed  Edit the backup policy on the management server in case a centralized plan has failed Copyright © Acronis, Inc., 2000-2010...
  • Page 179: Working With Backup Plans And Tasks

    You will be taken to the Log (p. 186) view containing the list of the plan-related log entries. Task Click View log. You will be taken to the Log (p. 186) view containing the list of the task-related log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 180 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 181 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 182: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 183: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 184 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 185: Backup Plan Details

    Archive name - name of the archive.  Archive comments - comments on the archive (if provided). Settings The Settings tab displays the following information:  Backup scheme - the selected backup scheme and all its settings with schedules. Copyright © Acronis, Inc., 2000-2010...
  • Page 186: Log

    Backup options - backup options changed against the default values. 6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log.
  • Page 187: Filtering And Sorting Log Entries

    As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 188: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 189 Archive(N) where N is the sequence number of the archive in the location you have selected. Name backup files using the archive name, as in Acronis True Image Echo, rather than auto- generated names (p. 196) Not available when backing up to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage.
  • Page 190: Archive Validation

    Specify the conversion schedule if required. Host (p. 211) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 211)
  • Page 191: Why Is The Program Asking For The Password

    (p. 31) section. 6.2.3 Source type Select the type of data you want to be backed up on the managed machine. The list of available data types depends on the agents running on the machine: Files Copyright © Acronis, Inc., 2000-2010...
  • Page 192: Items To Back Up

    Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 193: Access Credentials For Source

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 194: Exclusions

    Excludes all files and folders with names starting with "F" (such as folders F, F1 and files F.log, F1.log) By mask (?) F???.log Excludes all .log files with names consisting of four symbols and starting with "F" Windows Copyright © Acronis, Inc., 2000-2010...
  • Page 195: Archive

     To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 379) to the online backup service and activate (p.
  • Page 196: Simplified Naming Of Backup Files

    This behavior is useful when you rotate USB hard drives and want each drive to keep a single full backup (p. 198) or all backups created during a week (p. 198). But you might end up with no backups if a full backup to your only drive fails. Copyright © Acronis, Inc., 2000-2010...
  • Page 197: Usage Examples

    Setting up full, incremental and differential backups within a single backup plan. You need to create separate backup plans for each type of backup  Backup to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage  Setting up retention rules ...
  • Page 198 You want to back up to the archive MyMachine on an external hard disk drive.  You have two such drives. Either of them has drive letter D in the operating system when attached to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 199 ServerFiles(1.31.2011)3.tib, and so on up to ServerFiles(1.31.2011)11.tib.  The following day, February 1, the backups will start with the full backup ServerFiles(2.1.2011).tib. The differential backups will start with ServerFiles(2.1.2011)2.tib. See also “The [Date] variable” (p. 200). Copyright © Acronis, Inc., 2000-2010...
  • Page 200: Access Credentials For Archive Location

    Specify credentials required for access to the location where the backup archive will be stored. The user whose name is specified will be considered as the archive owner. To specify credentials 1. Select one of the following:  Use the plan's credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 201: Backup Schemes

     Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 6.2.10.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 202: Simple Scheme

    (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Copyright © Acronis, Inc., 2000-2010...
  • Page 203 Let us consider a GFS backup scheme that many may find useful.  Back up files every day, including weekends  Be able to recover files as of any date over the past seven days  Have access to weekly backups of the past month Copyright © Acronis, Inc., 2000-2010...
  • Page 204 On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to:  Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). Copyright © Acronis, Inc., 2000-2010...
  • Page 205: Tower Of Hanoi Scheme

    Up to 16 levels of full, differential, and incremental backups  Next-level backups are twice as rare as previous-level backups  One backup of each level is stored at a time  Higher density of more recent backups Copyright © Acronis, Inc., 2000-2010...
  • Page 206 The following table shows full backup and roll-back periods for schemes of various levels. Number of Full backup On different Roll-back levels every days, can go period back Copyright © Acronis, Inc., 2000-2010...
  • Page 207: Custom Backup Scheme

    Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Copyright © Acronis, Inc., 2000-2010...
  • Page 208 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 209 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup location becomes available. Likewise, backup tasks for incremental and differential backups will wait until all users are logged off and users are idle, respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 210 If you back up a large amount of data, initial seeding ensures faster delivery of the backed-up data and lower traffic costs. Please refer to the "Initial Seeding FAQ (p. 370)" section for more details. Copyright © Acronis, Inc., 2000-2010...
  • Page 211: Archive Validation

    6.2.12.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 212: Recovering Data

    6.3 Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running the operating system and create the recovery task. Copyright © Acronis, Inc., 2000-2010...
  • Page 213 (p. 389) or using Acronis Startup Recovery Manager (p. 47). Then, create a recovery task. Acronis Universal Restore (p. 48) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 214: When To Recover

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 225) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 215: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 216: Data Type

    Disks - to recover disks  Volumes - to recover volumes  Files - to recover specific files and folders 6.3.4 Content selection The representation of this window depends on the type of data stored in the archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 217: Access Credentials For Location

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 218: Destination Selection

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 219: Disk Destination

    Recovering the disk signature may be desirable due to the following reasons:  Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. If you recover the same disk signature, you don't need to re-create or edit the tasks created previously ...
  • Page 220 Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected volumes will be recovered to the physical disks of the machine the console is connected to.
  • Page 221: Mbr Destination

     Logical. Information about logical volumes is located not in the MBR, but in the extended partition table. The number of logical volumes on a disk is unlimited. A logical volume cannot be Copyright © Acronis, Inc., 2000-2010...
  • Page 222: Virtual Machine Settings

    Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 223: File Destination

    New location - files will be recovered to the location that you specify in the tree. The files and folders will be recovered without recreating a full path, unless you clear the Recover without full path check box. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 224: Recovery Exclusions

    Overwrite existing file - this will give the file in the backup priority over the file on the hard disk.  Overwrite existing file if it is older - this will give priority to the most recent file modification, whether it be in the backup or on the disk. Copyright © Acronis, Inc., 2000-2010...
  • Page 225: Access Credentials For Destination

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 226 The drivers defined here will have priority. They will be installed, with appropriate warnings, even if the program finds a better driver. Use this option only if the automatic drivers search does not help to boot the system. Copyright © Acronis, Inc., 2000-2010...
  • Page 227: How To Convert A Disk Backup To A Virtual Machine

    (volume) backup to a new virtual machine on the respective virtualization server. Tip. Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to create a Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper-V virtual machine.
  • Page 228: Bootability Troubleshooting

    Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
  • Page 229 OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 230 Generally, you should refer to the boot loader manual pages for the appropriate procedure. There is also the corresponding Knowledge Base article on the Acronis Web site. The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to identical hardware.
  • Page 231: Recovering A Vast Number Of Files From A File Backup

    To resolve the problem, do either of the following:  Recover the files as two or more groups. For example, if the problem occurs when recovering 1 million files, try recovering the first 500,000 of them and then the remaining 500,000. Copyright © Acronis, Inc., 2000-2010...
  • Page 232: Recovering The Storage Node

    6.3.13 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed.
  • Page 233: Validating Vaults, Archives And Backups

    Backup (p. 235) - specify the archive first, and then select the desired backup in this archive. Vault (p. 235) - select a vault (or other location), which archives to validate. Access Credentials (p. 236) Copyright © Acronis, Inc., 2000-2010...
  • Page 234: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 235: Backup Selection

    Enter the full path to the location in the Path field or select the desired location in the folders tree.  To select a centralized vault, expand the Centralized group and click the appropriate vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 236: Access Credentials For Source

    As validation is a resource-intensive operation, it makes sense to schedule validation to the managed machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the data is not corrupted and can be successfully recovered, consider starting validation right after the task creation. Copyright © Acronis, Inc., 2000-2010...
  • Page 237: Mounting An Image

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: ...
  • Page 238: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 239: Backup Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 240: Managing Mounted Images

     an entire vault that can be exported by using the command line interface. For more information, please refer to Acronis Backup & Recovery 10 Command Line Reference. Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, writing onto removable or detachable media or other purposes.
  • Page 241 Tip. When configuring export to a deduplicating managed vault, choose a machine where the deduplication add-on to the agent is installed. Otherwise the export task will fail. Operations with an export task Copyright © Acronis, Inc., 2000-2010...
  • Page 242 [Optional] Provide credentials for the destination if the task credentials do not have enough privileges to access it. To access this option, select the Advanced view check box. After you have performed all the required steps, click OK to start the export task. Copyright © Acronis, Inc., 2000-2010...
  • Page 243: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 244: Backup Selection

    The program will access the location using the credentials you specify. Use this option if the task account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: Copyright © Acronis, Inc., 2000-2010...
  • Page 245: Location Selection

    Local folders group to export data onto the hard drives that are local to the storage node.  Network folders group to export data to a network share. If the network share requires access credentials, the program will ask for them. Copyright © Acronis, Inc., 2000-2010...
  • Page 246: Access Credentials For Destination

    According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. Copyright © Acronis, Inc., 2000-2010...
  • Page 247: Acronis Secure Zone

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 248: Acronis Secure Zone Size

    6.8.1.2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and the maximum ones. The minimum size is approximately 50MB, depending on the geometry of the hard disk. The maximum size is equal to the disk's unallocated space plus the total free space on all the volumes you have selected in the previous step.
  • Page 249: Managing Acronis Secure Zone

    6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 399). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans can use Acronis Secure Zone as well as local plans.
  • Page 250: Acronis Startup Recovery Manager

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 251: Bootable Media

    Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
  • Page 252: How To Create Bootable Media

    The wizard will guide you through the necessary operations. Please refer to Linux-based bootable media (p. 253) for details. PE-based bootable media Acronis Plug-in for WinPE can be added to WinPE distributions based on any of the following kernels:  Windows XP Professional with Service Pack 2 (PE 1.5) ...
  • Page 253 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 259) for details. 6.10.1.1...
  • Page 254: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 256). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 255: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 256: Network Port

    (enter the port number). If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console. Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to the media.
  • Page 257 Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 258 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 259: Connecting To A Machine Booted From Media

    8. Start the Bart PE builder. 9. Specify the path to the Windows installation files or Windows distribution CD. 10. Click Plugins and check whether the Acronis Backup & Recovery 10 plug-in is enabled. Enable if disabled. 11. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create.
  • Page 260: Working Under Bootable Media

    Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window.
  • Page 261: List Of Commands And Utilities Available In Linux-Based Bootable Media

    To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console. Acronis command line utilities  acronis  asamba  lash  restoreraids  trueimagecmd  trueimagemnt Copyright © Acronis, Inc., 2000-2010...
  • Page 262: Recovering Md Devices And Logical Volumes

    6.10.5 Recovering MD devices and logical volumes To recover MD devices, known as Linux Software RAID, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 263 6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 264: Creating The Volume Structure Manually

    8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 265 6. Activate the volume group by running the following command: lvm vgchange -a y my_volgroup 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the management console, click Recover. Copyright © Acronis, Inc., 2000-2010...
  • Page 266: Acronis Pxe Server

    For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 261). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 267: Acronis Pxe Server Installation

    3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation. Later on it will automatically launch at each system restart. You can stop and start Acronis PXE Server in the same way as other Windows services.
  • Page 268: Disk Management

    PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh...
  • Page 269: Running Acronis Disk Director Lite

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 389) created with the Acronis Bootable Media Builder;...
  • Page 270: Disk Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with disks. Acronis Disk Director Lite must obtain exclusive access to the target disk. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the disk cannot be blocked, close the disk management applications that use this disk and start again.
  • Page 271: Basic Disk Cloning

    To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools.
  • Page 272: Cloning Method And Advanced Options

    1. Copy NT signature – to provide the target disk with the source disk NT signature matched with the Registry keys also copied on the target disk. 2. Leave NT signature – to keep the old target disk signature and update the operating system according to the signature. Copyright © Acronis, Inc., 2000-2010...
  • Page 273 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: Copyright © Acronis, Inc., 2000-2010...
  • Page 274 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: Copyright © Acronis, Inc., 2000-2010...
  • Page 275 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 276: Volume Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 277: Types Of Dynamic Volumes

    In Acronis Disk Director Lite the tool for creating volumes is the Create volume Wizard. Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can consist of one region on the disk or several regions, virtually united by the Logical Disk Manager (LDM).
  • Page 278: Create Volume Wizard

    Select two destination disks to create the volume on. To create a Striped volume:  Select two or more destination disks to create the volume on. To create a RAID-5 volume:  Select three destination disks to create the volume on. Copyright © Acronis, Inc., 2000-2010...
  • Page 279: Set The Volume Size

    Typically Primary is selected to install an operating system to a volume. Select the Active (default) value if you want to install an operating system on this volume to boot at machine startup. If the Copyright © Acronis, Inc., 2000-2010...
  • Page 280: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 281: Change Volume Letter

    LABEL3(E:), etc. LABEL1, LABEL2 and LABEL3 are volume labels. A volume label is shown in all application dialog boxes for opening and saving files. If you need to change a volume label: 1. Right-click on the selected volume, and then click Change label. Copyright © Acronis, Inc., 2000-2010...
  • Page 282: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 283: Collecting System Information

    Cancel. Then no changes will be done to the pending operation list. Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so if you try to exit Disk management without committing the pending operations, you will receive the appropriate warning.
  • Page 284: Centralized Management

    Use the Dashboard to estimate at a glance the health of data protection on the registered machines. The Dashboard displays the summary of Acronis Backup & Recovery 10 agents' activities, lets you check for free space available in managed vaults, and rapidly identify and resolve any issues.
  • Page 285 Options > Console options > Time-based alerts. Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server.
  • Page 286: Backup Policies

    To be able to manage and protect multiple machines as a whole, you can create a backup plan template called a "backup policy". By applying this template to a group of machines, you will deploy multiple backup plans with a single action. Backup policies exist only on the Acronis Backup & Recovery 10 Management Server.
  • Page 287: Backup Policy Deployment States

    In the Tasks view, apply the Last result -> Failed filter if there are too many tasks. You can also sort the failed tasks by backup plans or by machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 288: Actions On Backup Policies

    In the Machines selection (p. 289) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Copyright © Acronis, Inc., 2000-2010...
  • Page 289: Machines Selection

    In the group tree, select the required group. Then, in the right part of the window, select the machines to apply the backup policy to. 2. Click OK. The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies.
  • Page 290: Policy Details

    The tab displays information about the backup scheme used by the policy and backup options that were modified against the default settings. Applied to The tab displays a list of machines and groups the selected policy is applied to. Actions Copyright © Acronis, Inc., 2000-2010...
  • Page 291: Physical Machines

    7.1.3 Physical machines Acronis Backup & Recovery 10 lets the administrator protect data and perform management operations on multiple machines. The administrator adds a machine to the management server using the machine's name or IP address, imports machines from Active Directory, or from text files. Once a machine is registered (p.
  • Page 292: Actions On Machines

    All physical machines group in the navigation tree. Add a new machine to the Click Add a machine to AMS. management server In the Add machine (p. 295) window, select the machine that needs to be Copyright © Acronis, Inc., 2000-2010...
  • Page 293: Applying Policies

    All the backup policies applied to the group the machine was in will be revoked. The backup policies applied to the group the machine is now a member of will be deployed to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 294 Though the list of machines is refreshed automatically based on events, the data may not be retrieved immediately from the management server due to some latency. Manual refresh guarantees that the most recent data is displayed. Copyright © Acronis, Inc., 2000-2010...
  • Page 295: Importing Machines From Active Directory

    Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & Recovery 10 Management Server to a managed machine and perform other centralized management operations, you need to register the machine on the management server.
  • Page 296: Synchronizing Machines With A Text File

    4. Under Logon settings, specify the user name and password of a user who is a member of the Administrators group on all machines listed in the file. 5. Click OK to start synchronizing the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 297: Importing Machines From A Text File

    To synchronize machines with a text file using command line 1. Log on as a member of the Acronis Centralized Admins security group. 2. In the command prompt, change the directory to the folder where Acronis Backup & Recovery 10 Management Server has been installed—by default: C:\Program Files\Acronis\AMS.
  • Page 298: Moving A Machine To Another Group

    Connection is established every 2 minutes.  Offline - the machine is unavailable for the management server: it is turned off, or its network cable is unplugged. Copyright © Acronis, Inc., 2000-2010...
  • Page 299 Expired - the trial period of the machine's agent has expired. To specify a full license key, use the Change License functionality, or run the setup program and follow its instructions.  Installed agents - full name of Acronis agents, installed on the machine.  Operating system - the operating system the machine's agent runs.
  • Page 300 Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task again. Copyright © Acronis, Inc., 2000-2010...
  • Page 301 When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 302 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. View log related to a group Click View log. Copyright © Acronis, Inc., 2000-2010...
  • Page 303: Filtering And Sorting Machines

    Configuring the machines table By default, the table has five columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. Copyright © Acronis, Inc., 2000-2010...
  • Page 304: Actions On Groups

    Deletion of a parent group will delete its child groups as well. Backup policies applied to the parent group and inherited by its child groups will be revoked from all members of the deleted groups. The the policies that are directly applied to the members will remain. Copyright © Acronis, Inc., 2000-2010...
  • Page 305: Creating A Custom Static Or Dynamic Group

    Windows 2000 OR Windows 2003. b) Entries of different criteria are combined by logical multiplication (AND) For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windows Server 2003 Organizational unit: SERVERS Copyright © Acronis, Inc., 2000-2010...
  • Page 306: Organizational Unit Criterion

    192.168.1.14 192.168.1.15 A registered machine has to be specified by its registration address, that is, you need to provide exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified Copyright © Acronis, Inc., 2000-2010...
  • Page 307: Move One Group To Another

     Criteria (for dynamic groups only) - grouping criteria  Comments - the group description (if specified) Backup policies Displays a list of backup policies related to the group and allows performing the following operations: Copyright © Acronis, Inc., 2000-2010...
  • Page 308: Virtual Machines

    Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 295) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
  • Page 309: Virtual Machines On A Management Server

    4. The virtual machines hosted on the Hyper-V server appear in the All virtual machines group. Adding ESX/ESXi virtual machines 1. VMware Tools have to be installed in the guest systems. 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of the following: ...
  • Page 310 1. In the Navigation tree, right click Virtual machines and select VMware vCenter Integration 2. Click Configure integration 3. Select the Enable VMware vCenter integration check box 4. Specify the vCenter Server's IP address or name and provide access credentials for the server Copyright © Acronis, Inc., 2000-2010...
  • Page 311 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
  • Page 312 When installing the product for online backup only, select Online backup only (license key is not required). This option presumes that you have or will obtain a subscription to the Acronis Backup & Recovery 10 Online service by the time of the first backup.
  • Page 313: Storage Nodes

    7.1.5 Storage nodes Acronis Backup & Recovery 10 Storage Node helps you to optimize usage of various resources required for the enterprise data protection. This goal is achieved through organizing managed vaults (p. 395) that serve as dedicated storages of the enterprise backup archives.
  • Page 314: Actions On Storage Nodes

    (p. 394). To learn more about Acronis Backup & Recovery 10 Storage Node, see the Acronis Backup & Recovery 10 Storage Node (p. 20) section.
  • Page 315: Adding A Storage Node

    To add a storage node 1. In the IP/Name field, enter the name or the IP address of the machine the storage node resides on, or click Browse... and browse the network for the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 316: Storage Node Details

    7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on the selected Acronis Backup & Recovery 10 Storage Node. This information is also duplicated on the Information pane. Storage node properties The tab displays the following information about the selected storage node: ...
  • Page 317: Tasks

    View log. The Log (p. 319) view will display a list of the log entries related to the selected task. Run a task Click Run. The task will be executed immediately in spite of its schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 318 Though the list of tasks is refreshed automatically based on events, the data may not be retrieved immediately from the managed machine due to some latency. Manual refresh guarantees that the most recent data is displayed. Copyright © Acronis, Inc., 2000-2010...
  • Page 319: Log

    7.1.7 The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log.
  • Page 320 Acronis Backup & Recovery 10 Storage Node has its own local event log. This log's events are accessible through the centralized log only. Centralized event log Way of working with log entries  The maximum number of entries stored in the centralized log is 50000. The maximum number of entries that can be displayed is 10000.
  • Page 321 As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 322: Centralized Log Entry Details

     Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem.  Owner - User name of the policy/backup plan owner (p. 31) ...
  • Page 323: Reporting

    Reports are generated based on report templates. The templates define the information to be included in the report and the way the information is represented. Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines ...
  • Page 324: Report About The Backup Policies

    Select whether to show all items in a single table or to group them by a particular column.  Specify which table columns to show, and in which order.  Specify how to sort the table. Copyright © Acronis, Inc., 2000-2010...
  • Page 325: Report About The Backup Plans

    Last result: The last results of the tasks—Succeeded, Succeeded with warnings, and/or Failed.  Schedule: The types of the tasks' schedules—Manual or Scheduled. Manual schedule means that a task runs only when you start it manually. Copyright © Acronis, Inc., 2000-2010...
  • Page 326: Report About The Archives And Backups

    Under Report coverage, choose the time interval for which you want to generate the report. The report will show the state of the selected vaults at the specified time on each day in the report period. Copyright © Acronis, Inc., 2000-2010...
  • Page 327: Report About The Task Activities

    The tables in the report will contain columns, from left to right, as listed in Display in report. The topmost column in the list will be the leftmost column in the report. Copyright © Acronis, Inc., 2000-2010...
  • Page 328: Configuring Acronis Backup & Recovery 10 Components

    2. Make sure, that the Enable JavaScript check box is selected. 3. Click OK. 7.2 Configuring Acronis Backup & Recovery 10 components There are three ways to configure various parameters of Acronis Backup & Recovery 10 components in Windows:  By using Acronis Administrative Template ...
  • Page 329: Parameters Set Through Administrative Template

    7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup & Recovery 10 components that can be set by using Acronis Administrative Template. For information on how to apply the administrative template, see How to load Acronis Administrative Template (p. 329).
  • Page 330 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
  • Page 331 In this case, the component's connection to the storage node will fail. If the component is an Acronis Backup & Recovery 10 Agent, the corresponding backup or recovery task will stop with the Failed status. Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as a percentage) below which a warning or error is recorded in the log.
  • Page 332 Database path when creating the vault. 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Backup & Recovery 10 Management Server that can be set by using Acronis Administrative Template. Collecting Logs Specifies when to collect log entries from machines managed by Acronis Backup & Recovery 10 Management Server.
  • Page 333 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 81). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Management Server's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record Acronis Backup &...
  • Page 334 (Note: Connections to machines with high synchronization priority—see Period-High Priority later in this topic—are likely to be always kept.) Synchronization connections are unrelated to connections such as those between Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console. Maximum Workers Description: Specifies the maximum number of threads to use for synchronization.
  • Page 335 Possible values: Any integer number between 120 and 2147483647 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously).
  • Page 336 When connecting to a registered machine, Acronis Backup & Recovery 10 Management Server first uses the machine's network name—provided that the machine was added to the management server by name. If Second Connection Attempt is set to True and a connection to the machine by using its network name has failed, the management server performs a second connection attempt, this time using the latest IP address which was associated with that network name.
  • Page 337 The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template. Licensing Specifies how often the agent checks its license on the license server, and how long it can work without a license server.
  • Page 338 Possible values: any integer number between 0 and 24 Default value: 1 If, during a check for the license key (see License Check Interval earlier in this topic), Acronis Backup & Recovery 10 Agent could not connect to the license server, it will try to reconnect once in the number of hours given by License Server Connection Retry Interval.
  • Page 339 Description: Specifies the folder in which to create the snapshot storage. Possible values: Any string 0 to 32765 characters long Default value: Empty string An empty string means a temporary files folder, which is typically given by the TMP or TEMP environment variable. Copyright © Acronis, Inc., 2000-2010...
  • Page 340: Connection Parameters

    The size of the snapshot storage does not affect the size of the backup. 7.2.1.5 Acronis Backup & Recovery 10 This section of the administrative template specifies the connection parameters and event tracing parameters for the following Acronis Backup & Recovery 10 components:  Acronis Backup & Recovery 10 Management Server ...
  • Page 341 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 76). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 342 The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both. Each event has a level from zero to five based on the event's severity, as shown in the following...
  • Page 343: Parameters Set Through Gui

    Information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 344: Parameters Set Through Windows Registry

    7.2.3 Parameters set through Windows registry The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set only by editing the registry. Parameter related to deduplication CompactingTriggerThreshold Description: Specifies the percentage of used items in the data stores below which compacting occurs.
  • Page 345: Creating A Backup Policy

    Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its tape vaults database. This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libraries, and approximately equals 10 MB per hundred archives.
  • Page 346 To reset all the settings to the default values, click Reset to default. During the backup operation, the registered machines' default backup options are ignored. Convert to VM Applies to: Disk/volume backup Not effective for machines running Linux Copyright © Acronis, Inc., 2000-2010...
  • Page 347: Policy Credentials

    Folder on VMware vCenter If the management server is integrated with vCenter Server, the resultant virtual machines will appear in the Acronis Backups folder on the vCenter. You can specify a subfolder for the machines resulting from execution of the policy.
  • Page 348: Items To Back Up

    2. Click OK. To learn more about Acronis service credentials, see the Rights for Acronis services (p. 71) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 31) section.
  • Page 349 GPT volumes is not backed up. A disk backup stores all volumes of the selected disk (including hidden volumes such as the vendor's maintenance partitions) and the zero track with the master boot record. Copyright © Acronis, Inc., 2000-2010...
  • Page 350 Since backup policies are commonly applied to multiple machines with various operating systems, Acronis recommends that you always select both the system and the boot volumes for backup, to ensure the integrity of every operating system. Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized backup policy.
  • Page 351: Files To Back Up Selection Rules

    … Tip: To be able to automatically create the volume structure information during recovery, make sure that the volume with the /etc/Acronis directory of each machine is selected for backup. For more details, see “Saving the volume structure information”. 7.3.2.2...
  • Page 352 Settings\All Users in Windows XP and C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment variables and text. For example, to refer to the Acronis folder in the machines' Program Files folder, type: %PROGRAMFILES%\Acronis Templates Templates are similar to environment variables, but are already pre-customized.
  • Page 353: Access Credentials For Source

    This option is effective only for file systems that are supported by Windows. Select this check box to skip files and folders with the System attribute. If a folder is System, all of its contents — including files that are not System — will be excluded. Copyright © Acronis, Inc., 2000-2010...
  • Page 354: Archive

    Archive Specify where to store the archives and define names for the new backup archives. 1. Selecting the archives destination Choose where to store machines' archives:  Store all machines' archives in a single location Copyright © Acronis, Inc., 2000-2010...
  • Page 355  To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 379) to the online backup service and activate (p.
  • Page 356: Access Credentials For Location

    – the guaranteed number of sessions that you can go back at any time. The automatic cleanup mechanism maintains the required rollback period by deleting the expired backups and keeping the most recent backups of each level. Copyright © Acronis, Inc., 2000-2010...
  • Page 357  Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 7.3.7.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 358 Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day. The default value is Friday. Copyright © Acronis, Inc., 2000-2010...
  • Page 359 For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted. Copyright © Acronis, Inc., 2000-2010...
  • Page 360 The following GFS scheme suits such purposes:  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Friday  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Copyright © Acronis, Inc., 2000-2010...
  • Page 361 The guaranteed number of sessions that one can go back in the archive at any time. Calculated automatically, depending on the schedule parameters and the numbers of levels you select. See the example below for details. Example Schedule parameters are set as follows Copyright © Acronis, Inc., 2000-2010...
  • Page 362 Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups). Copyright © Acronis, Inc., 2000-2010...
  • Page 363 Using retention rules Specify the retention rules and when to apply them. This setting is recommended for backup destinations such as shared folders or centralized vaults. When there is insufficient space while backing up Copyright © Acronis, Inc., 2000-2010...
  • Page 364 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 365 Manual (if the schedule has not been set up). You can manually run any backup task or cleanup task at any time, regardless of whether it has a schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 366: Archive Validation

    For more information see the Scheduling (p. 158) section. 8 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online service. This service enables you to do online backups to Acronis Online Backup Storage.
  • Page 367: Introduction To Acronis Backup & Recovery 10 Online

    What is Acronis Backup & Recovery 10 Online? Acronis Backup & Recovery 10 Online is a service that enables you to back up data to Acronis Online Backup Storage. To use this service, you need to buy a subscription that determines the amount of storage space reserved for your backups (storage quota) and how long the online service will be available to you.
  • Page 368: How Long Will My Backups Be Kept In The Online Storage

    File-level backup and recovery is not possible for virtual machines, but is possible for a Windows host. Installing the software, backing up, and recovery are described in the Quick Start Guide for Acronis Backup & Recovery 10 Virtual Edition. When installing Acronis Backup & Recovery 10 for online backup only, you do not need to enter a license key during installation.
  • Page 369: Backup And Recovery Faq

    This way, you will obtain either a new full backup, or an incremental one. Since full backups take more storage space, Acronis recommends that you choose incremental backup if you want to run backups manually.
  • Page 370: Initial Seeding Faq

    Initial Seeding is an extra service that lets you save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 371: What Types Of Hard Drive Can I Use For Initial Seeding

    For example, you may want to upload a volume backup and a number of file backups. Do as many "initial seeding" backups as you wish and then send them to Acronis on the same disk. The Initial Seeding license gets used when uploading to the online storage starts. You will receive an e-mail notification informing you about this.
  • Page 372: How To Package A Hard Drive For Shipment

    6. Package (p. 372) the media along with a prepaid return shipping label and send it to Acronis by physical mail. The address is available on your account management Web page > Initial Seeding / Recovery tab >...
  • Page 373 1. Shipping label for sending your hard drive. This label is placed on the top of the box. You should send your package to one of the Acronis data centers. The data center address can be obtained on the Initial seeding/Recovery tab of your account management page by clicking Show data center address.
  • Page 374: How Do I Track An Initial Seeding Order Status

    How do I track an Initial Seeding order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about the most important events.
  • Page 375: Large Scale Recovery Faq

    You can then recover data from this copy. Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with all of the backups made from this machine. You can recover data directly from the disk or copy the backups to a local or network folder.
  • Page 376: Is Large Scale Recovery A Paid Service

    How do I track a Large Scale Recovery order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about most important events.
  • Page 377: Subscription Lifecycle Faq

    The time count will begin as soon as the subscription is activated. The first activation occurs when you assign a subscription to a certain machine. To do so, you need to have Acronis software installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 378: What Happens When My Subscription Expires

    What is the “Group”column for? So you can apply actions, such as Renew all or Auto-renew all, to your selection of the subscriptions. Specify the desired group name, for example, SalesDept, near each of the subscriptions you want to Copyright © Acronis, Inc., 2000-2010...
  • Page 379: Where Do I Start

    8.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not registered yet) and navigate to Online backup > For Business. This is your account management Web page. Here you can get a trial subscription, locate an Acronis partner or buy subscriptions online.
  • Page 380: Activating Online Backup Subscriptions

    To be able to back up a machine to the online storage, you need to purchase and activate a subscription to the Acronis Backup & Recovery 10 Online service. You can purchase subscriptions on the Acronis Web site or from an Acronis reseller.
  • Page 381: Reassigning An Activated Subscription

    You no longer need to back up one of your machines and you want to reuse that machine’s subscription for another machine.  You reinstalled Acronis Backup & Recovery 10 on a machine and want to resume its online backups. ...
  • Page 382: Configuring Proxy Settings

    The management server connects to the Internet to retrieve information about online backup subscriptions. The proxy settings for the management server also need to be configured. Proxy settings for the agent and the management server are configured separately, even if both are installed on the same machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 383: Limitations Of The Online Storage

    4. Enter the proxy server settings. For detailed information (p. 88) about the settings please refer to the context-sensitive help. 8.6 Limitations of the online storage Unlike other types of storage available in Acronis Backup & Recovery 10, the online storage has the following limitations. Operations The following operations are not possible.
  • Page 384: Terminology Reference

    A service that you can use in addition to online backup subscriptions. Initial Seeding An extra service that enables you to save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 385 Assign a subscription that is already activated, to a different machine. Registration code A character string for registering a subscription or license that was bought from an Acronis partner. When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the registration codes for each of them.
  • Page 386: Glossary

    Limitations: Acronis Secure Zone cannot be organized on a dynamic disk (p. 393) or a disk using the GPT partitioning style. Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recovery Manager.
  • Page 387: Backup Operation

    (p. 395), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 388 The workflow when using policies is as follows. 1. The administrator creates a backup policy. 2. The administrator applies the policy to a group of machines or a single machine (p. 395). 3. The management server deploys the policy to the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 389: Bootable Agent

    (p. 389) or Windows Preinstallation Environment (WinPE) (p. 400) with the Acronis Plug-in for WinPE (p. 386). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 390: Centralized Backup Plan

    (p. 388) from the management server (p. 396). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 396). The centralized management operations include: ...
  • Page 391: Deduplicating Vault

    For more information please refer to Retention rules (p. 38). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 387) and Acronis Backup & Recovery 10 Management Server (p. 396).
  • Page 392: Disk Group

    A backup (p. 387) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 393: Dynamic Disk

    Dynamic group A group of machines (p. 395) which is populated automatically by the management server (p. 396) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 394: Dynamic Volume

    The export operation can be applied to a single archive, a single backup (p. 387) or to your choice of backups belonging to the same archive. An entire vault (p. 399) can be exported by using the command line interface. Copyright © Acronis, Inc., 2000-2010...
  • Page 395: Full Backup

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 395), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 387) is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 396: Managed Vault

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 397). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 397: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 398 CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 395) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 399: Unmanaged Vault

    Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 400 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 395) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 387) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...

This manual is also suitable for:

Backup & recovery 10 advanced server sbs edition

Table of Contents