Installation In Linux; Installation Procedure - ACRONIS Backup & Recovery 10 Advanced Server Installation Manual

Hide thumbs Also See for Backup & Recovery 10 Advanced Server:
Table of Contents

Advertisement

Prerequisites
You must be logged on to the domain controller as a domain administrator; if the domain has
more than one domain controller, log on to any of them as a domain administrator.
If you are planning to deploy the agent in an organizational unit, make sure that the
organizational unit exists in the domain.
Make sure that you have completed the steps described in Preparing the agent's deployment (p.
23).
Step 1: Creating a Group Policy object
1. In the Start menu, point to Administrative Tools, and then click Active Directory Users and
Computers.
2. Right-click the name of the domain or organizational unit, and then click Properties.
3. In the dialog box, click the Group Policy tab, and then click New.
4. Type the name of the new Group Policy object—for example: Acronis Backup & Recovery 10
Agent
5. Click Edit. The Group Policy Object Editor snap-in will open. You can now close the dialog box by
clicking Close.
Step 2: Configuring the Group Policy object
1. In the Group Policy Object Editor snap-in, expand Computer Configuration, and then expand
Software Settings.
2. Right-click Software installation, then point to New, and then click Package.
3. Select the agent's setup file in the shared folder that you previously created, and then click Open.
4. In the Deploy Software dialog box, click Advanced, and then click OK.
5. If you are reinstalling or updating the agent, do nothing.
If you are installing the agent, do the following: on the Modifications tab, click Add, and then
select the modification—also called transform—that you previously created; the transform file
has the name AcronisAgentWindows.mst and is located in the same folder as the agent's
installation package.
6. Click OK to close the Deploy Software dialog box.

2.6. Installation in Linux

This section describes installation of Acronis Backup & Recovery 10 components on a machine
running Linux.
By using command-line parameters, you can choose between the interactive and unattended
installation modes.
2.6.1.

Installation procedure

Preparation
Before proceeding with installation, you need to extract the installation files and assign them
necessary access permissions:
Copyright © Acronis, Inc., 2000-2009
25

Advertisement

Table of Contents
loading

Table of Contents