ACRONIS BACKUP AND RECOVERY 10 SERVER FOR WINDOWS - UPDATE 3 User Manual

Hide thumbs Also See for BACKUP AND RECOVERY 10 SERVER FOR WINDOWS - UPDATE 3:
Table of Contents

Advertisement

Acronis® Backup & Recovery ™ 10
Server for Windows
Update 3
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS BACKUP AND RECOVERY 10 SERVER FOR WINDOWS - UPDATE 3

  • Page 1 Acronis® Backup & Recovery ™ 10 Server for Windows Update 3 User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.11 Proprietary Acronis technologies ....................39 2.11.1 Acronis Secure Zone ...........................39 2.11.2 Acronis Startup Recovery Manager ......................40 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............41 2.11.4 Acronis Active Restore ..........................42 Options ..........................45 Console options ........................45 3.1.1 Startup page ...............................45 3.1.2...
  • Page 4 3.3.1 Default backup options ..........................50 3.3.2 Default recovery options ..........................71 Vaults ............................ 80 Personal vaults .........................81 4.1.1 Working with the "Personal vault" view ....................81 4.1.2 Actions on personal vaults .........................82 Common operations ........................84 4.2.1 Operations with archives stored in a vault ....................84 4.2.2 Operations with backups ...........................84 4.2.3...
  • Page 5 6.11.7 Pending operations ..........................208 6.12 Collecting system information ....................208 Online backup ........................209 Introduction to Acronis Backup & Recovery 10 Online ............209 7.1.1 What is Acronis Backup & Recovery 10 Online? ..................209 7.1.2 What data can I back up and recover? ....................210 7.1.3...
  • Page 6 7.1.6 Initial Seeding FAQ ........................... 212 7.1.7 Large Scale Recovery FAQ ........................217 7.1.8 Subscription lifecycle FAQ ........................219 Where do I start? ........................221 Choosing a subscription ......................221 Activating online backup subscriptions ................222 7.4.1 Activating subscriptions .......................... 222 7.4.2 Reassigning an activated subscription ....................
  • Page 7: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Server for Windows inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 8: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace Name...
  • Page 9 2. In the navigation tree, right-click the machine's name (a root element of the navigation tree), and then select Create shortcut. If the console and agent are installed on the same machine, the shortcut to this machine will be added to the shortcuts bar automatically as Local machine [Machine name]. Copyright © Acronis, Inc., 2000-2010...
  • Page 10 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 11: Operations With Panes

    All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized.
  • Page 12: Action Pages

    An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Copyright © Acronis, Inc., 2000-2010...
  • Page 13 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu.
  • Page 14: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Components for a managed machine (agents) These are applications that perform data backup, recovery and other operations on the machines managed with Acronis Backup &...
  • Page 15: Management Console

    Universal Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 16: Supported Operating Systems

    XFS - volume recovery without the volume resize capability; particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node  JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node ...
  • Page 17: System Requirements

    If you need assistance with your Acronis product, please go to http://www.acronis.eu/support/ Product Updates You can download the latest updates for all your registered Acronis software products from our website at any time after logging into your Account (https://www.acronis.eu/my) and registering the product.
  • Page 18: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 228) on the machine which becomes a managed machine (p. 236) from this point on.
  • Page 19 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 20 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 21 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 22: Full, Incremental And Differential Backups

    2.2 Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes. All backup schemes are based on full, incremental and differential backup methods.
  • Page 23 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: ...
  • Page 24: User Privileges On A Managed Machine

    When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are cleared. This prevents the "modify settings, leave passwords" trick. The program displays Copyright © Acronis, Inc., 2000-2010...
  • Page 25: Gfs Backup Scheme

    It is sufficient that the machine be on (that is, not in standby or hibernate) at the scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task.
  • Page 26 You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 27 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 28 Here is how the first month of your backup plan will appear in real life. “F” stands for full backup. “Dif” stands for differential backup. “I” stands for incremental backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 29: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 30 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 31: Retention Rules

    Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 32 (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Copyright © Acronis, Inc., 2000-2010...
  • Page 33 The consolidation, however, may take a lot of time and system resources. And you still need some extra space in the vault for temporary files created during consolidation. What you need to know about consolidation Copyright © Acronis, Inc., 2000-2010...
  • Page 34: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 235) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 35: Recovering Dynamic Volumes

    Basic MBR volume Basic MBR volume Basic MBR volume Basic GPT volume Basic GPT volume Basic GPT volume Basic GPT volume Basic MBR volume Basic MBR volume Basic MBR volume Unallocated space (basic MBR disk) Copyright © Acronis, Inc., 2000-2010...
  • Page 36: Tape Support

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node. Storage nodes ensure fully automatic operation of tape libraries and autoloaders.
  • Page 37: Using A Single Tape Drive

    5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 239) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume.
  • Page 38: Support For Snmp

    1.3.6.1.4.1.24769.100.200.2.0:I0064000B Supported operations Acronis Backup & Recovery 10 supports only TRAP operations. It is not possible to manage Acronis Backup & Recovery 10 using GET- and SET- requests. This means that you need to use an SNMP Trap receiver to receive TRAP-messages.
  • Page 39: Proprietary Acronis Technologies

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 40: Acronis Startup Recovery Manager

    This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.
  • Page 41: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 42: Acronis Active Restore

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. Copyright © Acronis, Inc., 2000-2010...
  • Page 43: How It Works

    When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the selected disks or volumes in the backup. If this scan finds a supported operating system, the Acronis Active Restore option becomes available.
  • Page 44 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Restore icon appears in the system tray. The machine becomes operational and ready to provide necessary services. The immediate user sees the drive tree and icons and can open files or launch applications even though they were not yet recovered.
  • Page 45: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 46: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 47: Machine Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 48: Snmp Notifications

    The settings you obtain in this case will be plan-specific or task- specific. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 38)". The preset is: Disabled.
  • Page 49: Log Cleanup Rules

    This parameter can also be set by using Acronis Administrative Template. 3.2.3 Online backup proxy This option is effective only for backup to and recovery from Acronis Online Backup Storage over the Internet. This option defines whether the Acronis agent will connect to the Internet through a proxy server.
  • Page 50: Customer Experience Program

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 51 Fast incremental/differential backup (p. 64) Backup splitting (p. 64) File-level security (p. 65): Preserve files’ security settings in archives In archives, store encrypted files in decrypted state Copyright © Acronis, Inc., 2000-2010...
  • Page 52: Archive Protection

    Windows events log (p. 63) SNMP (p. 63) 3.3.1.1 Archive protection This option is effective for Windows and Linux operating systems and bootable media. This option is effective for both disk-level and file-level backup. The preset is: Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 53: Source Files Exclusion

    You can view file or folder attributes in the file/folder properties or by using the attrib command. For more information, refer to the Help and Support Center in Windows.  Exclude files matching the following criteria Copyright © Acronis, Inc., 2000-2010...
  • Page 54 This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the backup procedure. The following scheme illustrates when pre/post commands are executed. Copyright © Acronis, Inc., 2000-2010...
  • Page 55 Perform the backup command is the command only after the executed despite execution and command is execution failure irrespective of the successfully or success. command execution executed. Fail the result. task if the command execution fails. Copyright © Acronis, Inc., 2000-2010...
  • Page 56 This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 57 Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not back up until the command execution is complete Result Preset Continue the Continue the Copyright © Acronis, Inc., 2000-2010...
  • Page 58 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously. Use this option to create a time-consistent backup of data spanned across multiple volumes, for instance for an Oracle database. Copyright © Acronis, Inc., 2000-2010...
  • Page 59: Compression Level

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 60: Backup Performance

    This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk.
  • Page 61: Network Connection Speed

    3.3.1.10 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 62 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 63: Windows Event Log

    The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 64: Backup Splitting

    For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 38)". The preset is: Use the setting set in the Machine options. To select whether to send the backup operations events to the SNMP managers: Choose one of the following: ...
  • Page 65 To completely eliminate this kind of problem, disable preserving file security settings in archives. The recovered files and folders will always inherit the permissions from the folder to which they are recovered or from the disk, if recovered to the root. Copyright © Acronis, Inc., 2000-2010...
  • Page 66: Media Components

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 67: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 68: Task Start Conditions

    Delaying a backup might be unacceptable, for example, when you need to back up data strictly at the specified time. Then it makes sense to skip the backup rather than wait for the conditions, especially if the events occur relatively often. Copyright © Acronis, Inc., 2000-2010...
  • Page 69: Task Failure Handling

    Dismount media after backup has finished This option is effective in Windows and Linux operating systems. This option is effective when backing up to a removable media (CD, DVD, tape or floppy disk.) The preset is: Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 70 When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 71: Default Recovery Options

    Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target). Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node.
  • Page 72 Reboot machine automatically if it is required for recovery Windows Windows Change SID after recovery recovery recovery Notifications: E-mail (p. 75) Win Pop-up (p. 76) Event tracing: Windows events log (p. 76) SNMP (p. 77) Copyright © Acronis, Inc., 2000-2010...
  • Page 73 Perform the Perform the recovery after the recovery Perform the recovery command is concurrently with only after the executed despite the command command is execution failure execution and successfully executed. or success. irrespective of the Copyright © Acronis, Inc., 2000-2010...
  • Page 74: Recovery Priority

    This option is effective only for recovery from file-level backup of Windows files. This option defines whether to recover NTFS permissions for files along with the files. The preset is: Recover files with their security settings. Copyright © Acronis, Inc., 2000-2010...
  • Page 75 NTFS permissions from the folder to which they are recovered. 3.3.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 76 Application Event Log of Windows (to see this log, run eventvwr.exe or select Control Panel > Administrative tools > Event Viewer). You can filter the events to be logged. The preset is: Use the setting set in the Machine options. Copyright © Acronis, Inc., 2000-2010...
  • Page 77: Error Handling

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 38)".
  • Page 78 This option defines whether to check the integrity of the file system after a disk or volume recovery. Restart machine automatically if it is required for recovery This option is effective when recovery takes place on a machine running an operating system. The preset is Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 79 Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 80: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 81: Personal Vaults

    A personal vault can be organized on detachable or removable media. Acronis Secure Zone is considered as a personal vault available to all users that can log on the system.
  • Page 82: Actions On Personal Vaults

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Create Acronis Secure Zone. Click Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 174) section. Copyright © Acronis, Inc., 2000-2010...
  • Page 83: Creating A Personal Vault

    B, moving all the archives from vault A there. To do this, proceed as follows 1. Make sure that none of the backup plans uses vault A while merging, or temporarily disable (p. 111) schedules of the given plans. Copyright © Acronis, Inc., 2000-2010...
  • Page 84: Common Operations

    To perform any operation with a backup, you have to select it first. To select a backup, expand the archive, then click the backup. If the archive is protected with a password, you will be asked to provide it. Copyright © Acronis, Inc., 2000-2010...
  • Page 85: Deleting Archives And Backups

    The archive or backup you have chosen to delete has the check mark. Review the archive or backup that you have selected to delete. If you need to delete other archives and backups select the respective check boxes, then click Delete selected and confirm the deletion. Copyright © Acronis, Inc., 2000-2010...
  • Page 86: Filtering And Sorting Archives

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 87: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 88: Daily Schedule

    Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of days. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 89 As you can see, the time interval between the first and the second task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule Copyright © Acronis, Inc., 2000-2010...
  • Page 90: Weekly Schedule

    Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of weeks. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 91 Wednesday: every 3 hours from 9 AM till 9 PM  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)  Saturday: once at 9 PM Copyright © Acronis, Inc., 2000-2010...
  • Page 92: Monthly Schedule

    For example, setting the task frequency to Every 1 hour From 10:00:00 AM From: <...> Until: <...> until 10:00:00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day. In the Effective... area, set the following settings: Copyright © Acronis, Inc., 2000-2010...
  • Page 93 Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 94: At Windows Event Log Event

    For example, you may want to set up a backup plan that will automatically perform an emergency full backup of your data as soon as Windows discovers that your hard disk drive is about to fail. Copyright © Acronis, Inc., 2000-2010...
  • Page 95 Vista operating system records an event with the event source Microsoft-Windows- WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When creating the plan, type or select the following in the Schedule area: Copyright © Acronis, Inc., 2000-2010...
  • Page 96: When An Adrm Alert Is Received

    This schedule is effective in Windows operating systems when Acronis® Drive Monitor™ (ADRM) is installed. Acronis Drive Monitor reports on hard disk health by using the hard disk’s internal monitoring system (S.M.A.R.T.). Based on alerts from Acronis Drive Monitor, you can set up emergency backups of your data in addition to regular backups.
  • Page 97: User Is Idle

     Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a result, (1) If the user becomes idle before 9PM, the backup task will start at 9PM. Copyright © Acronis, Inc., 2000-2010...
  • Page 98: Location's Host Is Available

    – do not back up the users' data, i.e. skip task execution.  Event: When logging off, The following user: Any user.  Condition: Fits the time interval, from 04:30:00 PM until 10:00:00 PM.  Task start conditions: Skip the task execution. As a result, Copyright © Acronis, Inc., 2000-2010...
  • Page 99: User Logged Off

    (3) If any of the users is still logged on at 11PM, the backup task starts anyway. 5.6.5 Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until the specified time interval since the last successful backup completion passes. Copyright © Acronis, Inc., 2000-2010...
  • Page 100 (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 101: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 102 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 103: Backup Plans And Tasks

    You can also hide the unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 110) section for details.  In the backup table, select the backup plan (task). Copyright © Acronis, Inc., 2000-2010...
  • Page 104: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 105: Task States

    A task may also change to the Waiting state when the event specified by the schedule occurs but the condition set in the backup plan is not met. See Task start conditions (p. 68) for details. Need interaction Copyright © Acronis, Inc., 2000-2010...
  • Page 106: Task Statuses

    Edit the failed task to prevent its future failure  Edit the local plan to prevent its future failure in case a local plan has failed  Edit the backup policy on the management server in case a centralized plan has failed Copyright © Acronis, Inc., 2000-2010...
  • Page 107: Working With Backup Plans And Tasks

    You will be taken to the Log (p. 114) view containing the list of the plan-related log entries. Task Click View log. You will be taken to the Log (p. 114) view containing the list of the task-related log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 108 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 109 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 110: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 111: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 112 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 113: Backup Plan Details

    Archive name - name of the archive.  Archive comments - comments on the archive (if provided). Settings The Settings tab displays the following information:  Backup scheme - the selected backup scheme and all its settings with schedules. Copyright © Acronis, Inc., 2000-2010...
  • Page 114: Log

    Backup options - backup options changed against the default values. 6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log.
  • Page 115: Filtering And Sorting Log Entries

    As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 116: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 117 Archive(N) where N is the sequence number of the archive in the location you have selected. Name backup files using the archive name, as in Acronis True Image Echo, rather than auto- generated names (p. 124) Not available when backing up to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage.
  • Page 118: Backup Options

    Specify the conversion schedule if required. Host (p. 139) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 139)
  • Page 119: Why Is The Program Asking For The Password

    (p. 24) section. 6.2.3 Source type Select the type of data you want to be backed up on the managed machine. The list of available data types depends on the agents running on the machine: Files Copyright © Acronis, Inc., 2000-2010...
  • Page 120: Items To Back Up

    Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 121: Access Credentials For Source

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 122: Exclusions

    Excludes all files and folders with names starting with "F" (such as folders F, F1 and files F.log, F1.log) By mask (?) F???.log Excludes all .log files with names consisting of four symbols and starting with "F" Windows Copyright © Acronis, Inc., 2000-2010...
  • Page 123: Archive

     To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 221) to the online backup service and activate (p.
  • Page 124: Simplified Naming Of Backup Files

    This behavior is useful when you rotate USB hard drives and want each drive to keep a single full backup (p. 126) or all backups created during a week (p. 126). But you might end up with no backups if a full backup to your only drive fails. Copyright © Acronis, Inc., 2000-2010...
  • Page 125: Usage Examples

    Setting up full, incremental and differential backups within a single backup plan. You need to create separate backup plans for each type of backup  Backup to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage  Setting up retention rules ...
  • Page 126 You want to back up to the archive MyMachine on an external hard disk drive.  You have two such drives. Either of them has drive letter D in the operating system when attached to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 127 ServerFiles(1.31.2011)3.tib, and so on up to ServerFiles(1.31.2011)11.tib.  The following day, February 1, the backups will start with the full backup ServerFiles(2.1.2011).tib. The differential backups will start with ServerFiles(2.1.2011)2.tib. See also “The [Date] variable” (p. 128). Copyright © Acronis, Inc., 2000-2010...
  • Page 128: Access Credentials For Archive Location

    Specify credentials required for access to the location where the backup archive will be stored. The user whose name is specified will be considered as the archive owner. To specify credentials 1. Select one of the following:  Use the plan's credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 129: Backup Schemes

     Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 6.2.10.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 130: Simple Scheme

    (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Copyright © Acronis, Inc., 2000-2010...
  • Page 131 Let us consider a GFS backup scheme that many may find useful.  Back up files every day, including weekends  Be able to recover files as of any date over the past seven days  Have access to weekly backups of the past month Copyright © Acronis, Inc., 2000-2010...
  • Page 132 On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to:  Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). Copyright © Acronis, Inc., 2000-2010...
  • Page 133: Tower Of Hanoi Scheme

    Up to 16 levels of full, differential, and incremental backups  Next-level backups are twice as rare as previous-level backups  One backup of each level is stored at a time  Higher density of more recent backups Copyright © Acronis, Inc., 2000-2010...
  • Page 134 The following table shows full backup and roll-back periods for schemes of various levels. Number of Full backup On different Roll-back levels every days, can go period back Copyright © Acronis, Inc., 2000-2010...
  • Page 135: Custom Backup Scheme

    Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Copyright © Acronis, Inc., 2000-2010...
  • Page 136 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 137 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup location becomes available. Likewise, backup tasks for incremental and differential backups will wait until all users are logged off and users are idle, respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 138: Archive Validation

    2. What to validate – select either to validate the entire archive or the latest backup in the archive. Validation of a file backup imitates recovery of all files from the backup to a dummy destination. Validation of a volume backup calculates a checksum for every data block saved in the backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 139: Setting Up Regular Conversion To A Virtual Machine

    6.2.12.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 140: Recovering Data

    (p. 230) or using Acronis Startup Recovery Manager (p. 40). Then, create a recovery task. Acronis Universal Restore (p. 41) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 141 Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Virtual Appliance (OVA). The virtual appliance can then be imported to XenServer.
  • Page 142: Task Credentials

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 153) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 143: Archive Selection

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 24) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 144: Data Type

     The disk is new and does not have an MBR  Recovering custom or non-Windows boot loaders (such as LILO and GRUB)  The disk geometry is different to that stored in the backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 145: Access Credentials For Location

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 146: Disk Destination

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 147 Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected volumes will be recovered to the physical disks of the machine the console is connected to.
  • Page 148: Mbr Destination

    Then you proceed to the regular volume mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed to the regular volume mapping procedure described below.
  • Page 149: Volume Properties

    Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 150: Virtual Machine Settings

    Virtual machine type / virtualization server selection The new virtual machine can be created either on a virtualization server (this requires Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi to be installed) or in any accessible local or networked folder.
  • Page 151: File Destination

    Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Exclusion examples Criterion Example Description Windows and Linux By name F.log Excludes all files named "F.log" Excludes all folders named "F" Copyright © Acronis, Inc., 2000-2010...
  • Page 152: Access Credentials For Destination

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Copyright © Acronis, Inc., 2000-2010...
  • Page 153: When To Recover

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 154: How To Convert A Disk Backup To A Virtual Machine

    Rather than converting a TIB file to a virtual disk file, which requires additional operations to bring the virtual disk into use, Acronis Backup & Recovery 10 performs the conversion by recovery of a disk backup to a fully configured and operational new virtual machine. You have the ability to adapt the virtual machine configuration to your needs when configuring the recovery operation.
  • Page 155 (volume) backup to a new virtual machine on the respective virtualization server. Tip. Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to create a Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper-V virtual machine.
  • Page 156: Bootability Troubleshooting

    OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 157 This may happen when system or boot volumes are not recovered to their original location. Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this automatically and so you are not likely to experience the problem.
  • Page 158 13. Reconfigure the bootloader by using tools and documentation from the Linux distribution that you use. For example, in Debian and Ubuntu, you may need to edit some commented lines in the /boot/grub/menu.lst file and then run the update-grub script; otherwise, the changes might not take effect. Copyright © Acronis, Inc., 2000-2010...
  • Page 159: Recovering A Vast Number Of Files From A File Backup

    Entry type: DWORD Value  Base: Decimal  Value: 40 3. Add the PagedPoolSize entry to the subkey:  Entry type: DWORD Value  Base: Hexadecimal  Value: FFFFFFFF 4. Quit Registry Editor, and then restart the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 160: Validating Vaults, Archives And Backups

    To access this option, select the Advanced view check box. What to validate Validate Choose an object to validate: Archive (p. 161) - in that case, you need to specify the archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 161: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 24) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 162: Backup Selection

    The bottom part of the window displays the selected backup content, assisting you to find the right backup. 2. Click OK. 6.4.4 Location selection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree. Copyright © Acronis, Inc., 2000-2010...
  • Page 163: Access Credentials For Source

    As validation is a resource-intensive operation, it makes sense to schedule validation to the managed machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the data is not corrupted and can be successfully recovered, consider starting validation right after the task creation. Copyright © Acronis, Inc., 2000-2010...
  • Page 164: Mounting An Image

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: ...
  • Page 165: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 166: Backup Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 167: Managing Mounted Images

    (such as backing up through WAN using VPN access), you may want to save the initial full backup to a detachable media. Then, send the media to the remote location. There the backup will Copyright © Acronis, Inc., 2000-2010...
  • Page 168 Tip. When configuring export to a deduplicating managed vault, choose a machine where the deduplication add-on to the agent is installed. Otherwise the export task will fail. Operations with an export task Copyright © Acronis, Inc., 2000-2010...
  • Page 169 [Optional] Provide credentials for the destination if the task credentials do not have enough privileges to access it. To access this option, select the Advanced view check box. After you have performed all the required steps, click OK to start the export task. Copyright © Acronis, Inc., 2000-2010...
  • Page 170: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 24) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 171: Backup Selection

    To specify credentials 1. Select one of the following:  Use the task credentials The program will access the location using the credentials of the task account specified in the General section.  Use the following credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 172: Location Selection

    This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer.  To export data to a locally attached tape device, expand the Tape drives group, then click the required device. Copyright © Acronis, Inc., 2000-2010...
  • Page 173: Access Credentials For Destination

    6.8 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup archives on a managed machine disk space and therefore recovery of a disk to the same disk where the backup resides.
  • Page 174: Creating Acronis Secure Zone

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 175: Password For Acronis Secure Zone

    Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
  • Page 176: Managing Acronis Secure Zone

    6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 240). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans can use Acronis Secure Zone as well as local plans.
  • Page 177: Acronis Startup Recovery Manager

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 178: Bootable Media

    Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
  • Page 179: How To Create Bootable Media

    The wizard will guide you through the necessary operations. Please refer to Linux-based bootable media (p. 180) for details. PE-based bootable media Acronis Plug-in for WinPE can be added to WinPE distributions based on any of the following kernels:  Windows XP Professional with Service Pack 2 (PE 1.5) ...
  • Page 180 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 186) for details. 6.10.1.1...
  • Page 181: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 183). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 182: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 183: Network Port

    (enter the port number). If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console. Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to the media.
  • Page 184 Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 185 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 186: Connecting To A Machine Booted From Media

    8. Start the Bart PE builder. 9. Specify the path to the Windows installation files or Windows distribution CD. 10. Click Plugins and check whether the Acronis Backup & Recovery 10 plug-in is enabled. Enable if disabled. 11. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create.
  • Page 187: Working Under Bootable Media

    Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window.
  • Page 188: List Of Commands And Utilities Available In Linux-Based Bootable Media

    To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console. Acronis command line utilities  acronis  asamba  lash  restoreraids  trueimagecmd  trueimagemnt Copyright © Acronis, Inc., 2000-2010...
  • Page 189: Recovering Md Devices And Logical Volumes

    6.10.5 Recovering MD devices and logical volumes To recover MD devices, known as Linux Software RAID, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 190 6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 191: Creating The Volume Structure Manually

    8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 192 6. Activate the volume group by running the following command: lvm vgchange -a y my_volgroup 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the management console, click Recover. Copyright © Acronis, Inc., 2000-2010...
  • Page 193: Disk Management

    Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk configuration might change due to a HDD replacement or hardware loss. In such case with the help of Acronis Disk Director Lite, the user has the possibility to recreate the necessary disk Copyright © Acronis, Inc., 2000-2010...
  • Page 194: Basic Precautions

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 230) created with the Acronis Bootable Media Builder;...
  • Page 195: Disk Management" View

    The disk layout will be displayed according to the operating system you select. 6.11.4 "Disk management" view Acronis Disk Director Lite is controlled through the Disk management view of the console. The top part of the view contains a disks and volumes table enabling data sorting and columns customization and toolbar.
  • Page 196: Disk Initialization

    To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools.
  • Page 197: Selecting Source And Target Disks

    The new volume structure will be graphically represented in the Disk management view immediately. It is advisable that you deactivate Acronis Startup Recovery Manager (p. 227) (ASRM), if it is active, before cloning a system disk. Otherwise the cloned operating system might not boot. You can activate the ASRM again after the cloning is completed.
  • Page 198 1. Select a basic MBR disk to convert to GPT. 2. Right-click on the selected volume, and then click Convert to GPT in the context menu. You will receive a warning window, stating that you are about to convert MBR into GPT. Copyright © Acronis, Inc., 2000-2010...
  • Page 199 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 200) using the Convert to basic operation.
  • Page 200 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 201: Volume Operations

    System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 202: Creating A Volume

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 203: Create Volume Wizard

    In this case the Next button will be disabled and you will have to select another type of volume to proceed with the new volume creation. After you click the Next button, you will proceed forward to the next wizard page: Select destination disks (p. 204). Copyright © Acronis, Inc., 2000-2010...
  • Page 204: Select Destination Disks

    If you click the Back button, you will be returned to the previous page: Select destination disks (p. 204). If you click the Next button, you will proceed to the next page: Set the volume options (p. 205). Copyright © Acronis, Inc., 2000-2010...
  • Page 205: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 206: Set Active Volume

    If you need to change a letter assigned to a volume by the operating system: 1. Select a volume to change a letter. 2. Right-click on the selected volume, and then click Change letter in the context menu. 3. Select a new letter in the Change Letter window. Copyright © Acronis, Inc., 2000-2010...
  • Page 207: Change Volume Label

    Size is more than 2 GB), FAT32 (disabled, if the Volume Size is more than 2 TB) or NTFS. In the text window you will be able to enter the volume label, if necessary: by default this window is empty. Copyright © Acronis, Inc., 2000-2010...
  • Page 208: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 209: Online Backup

    What is Acronis Backup & Recovery 10 Online? Acronis Backup & Recovery 10 Online is a service that enables you to back up data to Acronis Online Backup Storage. To use this service, you need to buy a subscription that determines the amount of storage space reserved for your backups (storage quota) and how long the online service will be available to you.
  • Page 210: What Data Can I Back Up And Recover

    This way, you will obtain either a new full backup, or an incremental one. Since full backups take more storage space, Acronis recommends that you choose incremental backup if you want to run backups manually.
  • Page 211: Is The Online Storage Available Under Acronis Bootable Media

    7.1.5.2 Is the online storage available under Acronis bootable media? Recovery from Acronis Online Backup Storage is available but backup to the storage is not. 7.1.5.3 Can I use Acronis Universal Restore when recovering a system from the online storage? Yes.
  • Page 212: Initial Seeding Faq

    For example, you may want to upload a volume backup and a number of file backups. Do as many "initial seeding" backups as you wish and then send them to Acronis on the same disk. The Initial Seeding license gets used when uploading to the online storage starts. You will receive an e-mail notification informing you about this.
  • Page 213: How To Buy An Initial Seeding License

    6. Package (p. 213) the media along with a prepaid return shipping label and send it to Acronis by physical mail. The address is available on your account management Web page > Initial Seeding / Recovery tab >...
  • Page 214 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA, SATA, USB connected drives. SCSI drives are not accepted. Packaging If possible, use the original packaging. Otherwise, packaging materials can be obtained at any shipping outlet or stationary store.
  • Page 215 1. Shipping label for sending your hard drive. This label is placed on the top of the box. You should send your package to one of the Acronis data centers. The data center address can be obtained on the Initial seeding/Recovery tab of your account management page by clicking Show data center address.
  • Page 216: How Do I Track An Initial Seeding Order Status

    How do I track an Initial Seeding order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about the most important events.
  • Page 217: Large Scale Recovery Faq

    You can then recover data from this copy. Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with all of the backups made from this machine. You can recover data directly from the disk or copy the backups to a local or network folder.
  • Page 218: How To Buy A Large Scale Recovery License

    How do I track a Large Scale Recovery order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about most important events.
  • Page 219: Subscription Lifecycle Faq

    Your subscription begins when you choose to have it begin, not at the time of purchase. The time count will begin as soon as the subscription is activated. The first activation occurs when you assign a subscription to a certain machine. To do so, you need to have Acronis software installed. 7.1.8.4 What happens when my subscription expires? A month before the subscription expiration date you receive an e-mail notification with an alert.
  • Page 220: Can I Revoke A Subscription From A Machine

    Can I revoke a subscription from a machine? You cannot return an activated subscription to the list of available subscriptions, but you can reassign (p. 222) it to a different machine in Acronis Backup & Recovery 10 GUI. 7.1.8.8 Can I cancel my subscription? Just wait until the subscription expires.
  • Page 221: Where Do I Start

    7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not registered yet) and navigate to Online backup > For Business. This is your account management Web page. Here you can get a trial subscription, locate an Acronis partner or buy subscriptions online.
  • Page 222: Activating Online Backup Subscriptions

    You no longer need to back up one of your machines and you want to reuse that machine’s subscription for another machine.  You reinstalled Acronis Backup & Recovery 10 on a machine and want to resume its online backups. ...
  • Page 223 In our example, you have the following options. Before reassigning Delete backups from Subscription 1 using Machine 1 (if it is available and turned on). Delete backups from Subscription 2 using Machine 2. After reassigning Copyright © Acronis, Inc., 2000-2010...
  • Page 224: Configuring Proxy Settings

    4. Enter the proxy server settings. For detailed information about the settings please refer to the context-sensitive help. 7.6 Limitations of the online storage Unlike other types of storage available in Acronis Backup & Recovery 10, the online storage has the following limitations. Operations The following operations are not possible.
  • Page 225: Terminology Reference

    A service that you can use in addition to online backup subscriptions. Initial Seeding An extra service that enables you to save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 226 Registration code A character string for registering a subscription or license that was bought from an Acronis partner. When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the registration codes for each of them. You then enter the registration codes on the account management Web page, and these subscriptions and licenses become available for use.
  • Page 227: Glossary

    Limitations: Acronis Secure Zone cannot be organized on a dynamic disk (p. 234) or a disk using the GPT partitioning style. Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recovery Manager.
  • Page 228: Backup Operation

    (p. 236), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 229 The workflow when using policies is as follows. 1. The administrator creates a backup policy. 2. The administrator applies the policy to a group of machines or a single machine (p. 236). 3. The management server deploys the policy to the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 230: Backup Scheme

    (p. 230) or Windows Preinstallation Environment (WinPE) (p. 241) with the Acronis Plug-in for WinPE (p. 227). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 231: Centralized Management

    (p. 229) from the management server (p. 237). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 237). The centralized management operations include: ...
  • Page 232: Deduplicating Vault

    For more information please refer to Retention rules (p. 31). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 228) and Acronis Backup & Recovery 10 Management Server (p. 237).
  • Page 233: Disk Group

    A backup (p. 228) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 234: Dynamic Disk

    Dynamic group A group of machines (p. 236) which is populated automatically by the management server (p. 237) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 235: Dynamic Volume

    The export operation can be applied to a single archive, a single backup (p. 228) or to your choice of backups belonging to the same archive. An entire vault (p. 240) can be exported by using the command line interface. Copyright © Acronis, Inc., 2000-2010...
  • Page 236: Full Backup

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 236), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 228) is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 237: Managed Vault

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 238). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 238: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 239: Tower Of Hanoi

    CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 236) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 240: Unmanaged Vault

    Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 241: Virtual Machine

    Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 228) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...

This manual is also suitable for:

Backup & recovery 10 server for windows

Table of Contents