ACRONIS Backup & Recovery 10 Server for Windows User Manual

Hide thumbs Also See for Backup & Recovery 10 Server for Windows:
Table of Contents

Advertisement

Acronis® Backup & Recovery ™ 10
Server for Windows
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS Backup & Recovery 10 Server for Windows

  • Page 1 Acronis® Backup & Recovery ™ 10 Server for Windows User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    Proprietary Acronis technologies ..................38 2.10.1. Acronis Secure Zone ..........................38 2.10.2. Acronis Startup Recovery Manager ......................39 2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ..........40 2.10.4. Acronis Active Restore ..........................41 Options ........................ 44 3.1. Console options ......................... 44 3.1.1.
  • Page 4 Vaults ........................80 4.1. Personal vaults ........................81 4.1.1. Working with the "Personal vault" view ....................81 4.1.2. Actions on personal vaults ........................82 4.2. Common operations ......................84 4.2.1. Operations with archives stored in a vault ....................84 4.2.2. Operations with backups ..........................
  • Page 5 Recovering MD devices and logical volumes ..................187 6.11. Disk management ......................191 6.11.1. Basic precautions ............................. 191 6.11.2. Running Acronis Disk Director Lite ......................192 6.11.3. Choosing the operating system for disk management ................. 192 6.11.4. "Disk management" view ........................193 6.11.5.
  • Page 6: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Server for Windows inherits the benefits of the Acronis True Image Echo product family: •...
  • Page 7: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace Name...
  • Page 8 To add a shortcut to a machine 1. Connect the console to a managed machine. 2. In the navigation tree, right-click the machine's name (a root element of the navigation tree), and then select Create shortcut. Copyright © Acronis, Inc., 2000-2009...
  • Page 9 1.2.1.2. "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 10: Operations With Panes

    All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3. Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized.
  • Page 11: Main Area, Views And Action Pages

    By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); By selecting the items in the Actions menu; By right-clicking the item and selecting the operation in the context menu. Copyright © Acronis, Inc., 2000-2009...
  • Page 12: Action Pages

    Most settings are configured by clicking the respective Change… links to the right. Others are selected from the drop-down list, or typed manually in the page's fields. Action page - Controls Copyright © Acronis, Inc., 2000-2009...
  • Page 13: Acronis Backup & Recovery 10 Components

    Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu. Or, if you have passed several steps forward, click the Down arrow and select the page where you started the plan creation from the list.
  • Page 14: Bootable Components And Media Builder

    Acronis Bootable Media Builder is a dedicated tool for creating bootable media (p. 211). The media builder can create bootable media based on either Windows Preinstallation Environment, or Linux kernel.
  • Page 15: Management Console

    Windows 7 - all editions except for the Starter and Home editions Remote connection to the agent is not possible. 1.5. Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: •...
  • Page 16: Hardware Requirements

    Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support.
  • Page 17: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 209) on the machine which becomes a managed machine (p. 217) from this point on.
  • Page 18 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2009...
  • Page 19 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2009...
  • Page 20 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 21: Full, Incremental And Differential Backups

    2.2. Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes. All backup schemes are based on full, incremental and differential backup methods.
  • Page 22 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: •...
  • Page 23: User Privileges On A Managed Machine

    Tasks, belonging to a backup plan, either local or centralized, are owned by the backup plan owner. Tasks that do not belong to a backup plan, such as the recovery task, are owned by the user who has created or last modified the task. Copyright © Acronis, Inc., 2000-2009...
  • Page 24 It is sufficient that the machine be on (that is, not in standby or hibernate) at the scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task.
  • Page 25: Gfs Backup Scheme

    GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 26 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 27 Weekly. “M” stands for the backup that is considered Monthly. An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly backups: 2 weeks Keep monthly backups: 6 months Copyright © Acronis, Inc., 2000-2009...
  • Page 28 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 29: Tower Of Hanoi Backup Scheme

    For the five-level scheme you can also recover data backed up two weeks ago. So every additional backup level doubles the maximal roll-back period for your data. Copyright © Acronis, Inc., 2000-2009...
  • Page 30 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 31: Retention Rules

    This is the maximum size of the archive. Every time a retention rule is applied, the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value. The diagram below shows the archive content before and after the deletion. Copyright © Acronis, Inc., 2000-2009...
  • Page 32 You cannot, say, delete an outdated full backup and keep its incremental “children”. When deletion of a backup affects other backups, one of the following rules is applied: Copyright © Acronis, Inc., 2000-2009...
  • Page 33: Backing Up Dynamic Volumes (Windows)

    2.8. Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 216) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 34: Recovering Dynamic Volumes

    Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic GPT volumes. Backing up dynamic volumes Dynamic and basic GPT volumes are backed up in the same way as basic MBR volumes. When creating a backup plan through the GUI, all types of volumes are available for selection as Items to back up.
  • Page 35 0+1, RAID 5). This can be done by deleting the target volume and creating a new volume on the resulting unallocated space. Acronis Backup & Recovery 10 includes a handy disk management utility which enables you to perform the above operations both under the operating system and on bare metal. To find out more about Acronis Disk Director Lite, see the Disk management (p.
  • Page 36: Tape Support

    Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape drives as storage devices. A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup &...
  • Page 37: Using A Single Tape Drive

    5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 221) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume.
  • Page 38: Proprietary Acronis Technologies

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 39: Acronis Startup Recovery Manager

    This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.
  • Page 40: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 41: Acronis Active Restore

    Universal Restore is not available when recovering Linux. Getting Universal Restore Universal Restore comes free with Acronis Backup & Recovery 10 Advanced Server SBS Edition and Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Universal Restore for the other product editions is purchased separately, has its own license, and is installed as a separate feature from the setup file.
  • Page 42: How It Works

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup.
  • Page 43 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Restore check box. Acronis Active Restore will choose for the boot-up and subsequent recovery the first operating system found during the backup scan. Do not try to recover more than one operating system using Active Restore if you want the result to be predictable.
  • Page 44: Options

    3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1. Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 45: Time-Based Alerts

    Tasks view to limit the number of displayed tasks. The preset is: 400. The adjustment range is: 20 to 500. To make a selection, choose the desired value from the Number of tasks drop-down menu. Copyright © Acronis, Inc., 2000-2009...
  • Page 46: Fonts

    This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements.
  • Page 47: Snmp Notifications

    The settings you obtain in this case will be plan-specific or task- specific. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to...
  • Page 48: Log Cleanup Rules

    /etc/snmp/snmptrapd.conf - configuration file for the Net-SNMP trap daemon. 3.2.2. Log cleanup rules This option specifies how to clean up the Acronis Backup & Recovery 10 agent log. This option defines the maximum size of the agent log folder (in Windows XP/2003 Server, %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery\MMS\LogEvents).
  • Page 49: Default Backup And Recovery Options

    3.3.1. Default backup options Each Acronis agent has its own default backup options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a backup plan, you can either use a default option, or override the default option with the custom value that will be specific for this plan only.
  • Page 50 Ask for first media while Dest: Dest: Dest: Dest: creating backup archives on removable removable removable removable removable media media media media media Validate backup after creation Reset archive bit Copyright © Acronis, Inc., 2000-2009...
  • Page 51: Archive Protection

    This option is effective for Windows and Linux operating systems and bootable media. This option is effective for disk-level backup of NTFS and FAT file systems only. This option is effective for file-level backup of all supported file systems. Copyright © Acronis, Inc., 2000-2009...
  • Page 52 3.3.1.3. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the backup procedure. Copyright © Acronis, Inc., 2000-2009...
  • Page 53: Pre-Backup Command

    Do not back up until the Selected Selected Cleared Cleared command execution is complete Result Preset Perform the Perform the backup after the backup Perform the command is concurrently with backup only after Copyright © Acronis, Inc., 2000-2009...
  • Page 54: Post-Backup Command

    This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 55: Pre-Data Capture Command

    1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. Copyright © Acronis, Inc., 2000-2009...
  • Page 56: File-Level Backup Snapshot

    Always back up files directly. Administrator or Backup Operator privileges are not required. Trying to back up files that are opened for exclusive access will result in a read error. Files in the backup may be not time-consistent. Copyright © Acronis, Inc., 2000-2009...
  • Page 57: Multi-Volume Snapshot

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 58: Compression Level

    CPU to the backup application. However, the resulting effect will depend on the overall CPU usage and other factors like disk in/out speed or network traffic. The preset is: Low. Copyright © Acronis, Inc., 2000-2009...
  • Page 59: Hdd Writing Speed

    This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk.
  • Page 60 3.3.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 61: Windows Event Log

    This option defines whether the agent(s) operating on the managed machine have to log events of the backup operations in the Application Event Log of Windows (to see this log, run eventvwr.exe or select Control Panel > Administrative tools > Event Viewer). You can filter the events to be logged. Copyright © Acronis, Inc., 2000-2009...
  • Page 62 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error)
  • Page 63: Fast Incremental/Differential Backup

    The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis Backup & Recovery 10 will act as follows. • When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size.
  • Page 64: Media Components

    The result will be the same - the files will inherit the permissions from the parent folder. To access file or folder NTFS permissions, select Properties > Security. 3.3.1.15. Media components This option is effective for both Windows and Linux operating systems, when the backup destination is removable media. Copyright © Acronis, Inc., 2000-2009...
  • Page 65: Error Handling

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 66: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 67: Task Failure Handling

    Then it makes sense to skip the backup rather than wait for the conditions, especially if the events occur relatively often. 3.3.1.19. Task failure handling This option is effective for Windows and Linux operating systems. Copyright © Acronis, Inc., 2000-2009...
  • Page 68: Additional Settings

    This option is effective when backing up to a removable media (CD, DVD, tape or floppy disk.) The preset is: Disabled. The destination CD/DVD can be ejected or the tape can be dismounted after the backup is completed. Copyright © Acronis, Inc., 2000-2009...
  • Page 69 When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 70: Default Recovery Options

    The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 71 Validate backup archive before recovery Check file system after recovery Reboot machine automatically if it is required for recovery Change SID after recovery Windows Windows recovery recovery Notifications: E-mail (p. 74) Win Pop-up (p. 75) Copyright © Acronis, Inc., 2000-2009...
  • Page 72: Pre-Recovery Command

    4. Depending on the result you want to obtain, select the appropriate options as described in the table below. 5. Click Test command to check if the command is correct. Check box Selection Fail the task if the command Selected Cleared Selected Cleared execution fails Copyright © Acronis, Inc., 2000-2009...
  • Page 73: Post-Recovery Command

    However, the resulting effect will depend on the overall CPU usage and other factors like disk I/O speed or network traffic. The preset is: Normal. Copyright © Acronis, Inc., 2000-2009...
  • Page 74 NTFS permissions from the folder to which they are recovered. 3.3.2.4. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 75 3. Under Send notifications, select the appropriate check boxes as follows: When recovery completes successfully – to send notification when the recovery task has completed successfully When recovery fails – to send notification when the recovery task has failed. Copyright © Acronis, Inc., 2000-2009...
  • Page 76 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error)
  • Page 77 30 seconds, but no more than 5 times. The attempts will be stopped as soon as the connection is resumed OR the specified number of attempts is performed, depending on which comes first. Copyright © Acronis, Inc., 2000-2009...
  • Page 78 This option is effective when operating under bootable media. The preset is Disabled. This option enables booting the machine into the recovered operating system without user interaction. Change SID after the recovery is finished The preset is Disabled. Copyright © Acronis, Inc., 2000-2009...
  • Page 79 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system. You do not need a new SID when recovering a system over itself or when creating a system replica that will replace the original system. Generate a new SID if the original and the recovered systems will work concurrently in the same workgroup or domain.
  • Page 80: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 81: Personal Vaults

    A personal vault can be organized on detachable or removable media. Acronis Secure Zone is considered as a personal vault available to all users that can log on the system.
  • Page 82: Actions On Personal Vaults

    The procedure of creating personal vaults is described in-depth in the Creating a personal vault (p. 83) section. Edit a vault Select the vault. Click Edit. The Edit personal vault page lets you edit the vault's name and information in the Comments field. Copyright © Acronis, Inc., 2000-2009...
  • Page 83: Creating A Personal Vault

    In the appearing dialog box, provide the credentials required for accessing the vault. accessing a vault Create Acronis Click Create Acronis Secure Zone. Secure Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 170) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 84: Common Operations

    Please be aware that if filters have been applied to the vaults list, you see only a the vault part of the vault content. Be sure that the vault does not contain archives you need to retain before starting the operation. Click Delete all. Copyright © Acronis, Inc., 2000-2009...
  • Page 85: Operations With Backups

    Delete all. The program duplicates your selection in the Backups deletion (p. 86) window that has check boxes for each archive and each backup. Review the selection and correct if need be, then confirm the deletion. Copyright © Acronis, Inc., 2000-2009...
  • Page 86: Deleting Archives And Backups

    To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2009...
  • Page 87: Scheduling

    5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 88: Daily Schedule

    Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of days. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 89 For example, suppose that the task has to be run every 3rd day, starting from 09/20/2009, five times a day: • first at 8 AM • second at 12 PM (noon) • third at 3 PM • fourth at 5 PM • fifth at 7 PM Copyright © Acronis, Inc., 2000-2009...
  • Page 90: Weekly Schedule

    To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of weeks. Copyright © Acronis, Inc., 2000-2009...
  • Page 91 Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area. All the settings you made are displayed in the Result field at the bottom of the window.
  • Page 92 From 09:00:00 AM until 09:00:00 PM. 3. Effective: From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. Copyright © Acronis, Inc., 2000-2009...
  • Page 93: Monthly Schedule

    Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 94 Thus, the following three schedules are added to the task. First schedule 1. Months: December, January, February. 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. Second schedule 1. Months: March, April, May, September, October, November. Copyright © Acronis, Inc., 2000-2009...
  • Page 95: At Windows Event Log Event

    For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block on a disk, whereas an Error event with Event source disk and Event ID 15 occurs when a disk is not ready for access yet. Copyright © Acronis, Inc., 2000-2009...
  • Page 96 3. In Event Viewer, click the name of a log that you want to view—for example, Application. Note: To be able to open the security log (Security), you must be a member of the Administrators group. Copyright © Acronis, Inc., 2000-2009...
  • Page 97: Conditions

    Task start conditions: Wait until the conditions are met. If the free space changes by more than 1 GB, the scheduler will wait until both conditions are met at the same time and then run the backup task. Copyright © Acronis, Inc., 2000-2009...
  • Page 98: User Is Idle

    (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available. (3) If the location's host will never be available on workdays at 9:00 PM, the task never starts. 5.5.3. Fits time interval Applies to: Windows, Linux Copyright © Acronis, Inc., 2000-2009...
  • Page 99: User Logged Off

    3:00 PM) will start at 4:00 PM—the time when the waiting period ends. 5.5.4. User logged off Applies to: Windows Enables to put a backup task run on hold until all users log off from Windows on the managed machine. Copyright © Acronis, Inc., 2000-2009...
  • Page 100: Time Since Last Backup

    (3) if the free space never changes by more than 1GB, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2009...
  • Page 101: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 102: System View

    Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 103: Backup Plans And Tasks

    A backup plan can be in one of the following execution states: Idle; Waiting; Running; Stopping; Need Interaction. Plan states names are the same as task state names because a plan state is a cumulative state of the plan's tasks. Copyright © Acronis, Inc., 2000-2009...
  • Page 104: Backup Plan Statuses

    When creating a backup plan or policy the administrator can turn on the option to stop executing the backup plan as soon as the backup plan gets the Error status. The backup Copyright © Acronis, Inc., 2000-2009...
  • Page 105: Task States

    The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state. A waiting task can also be stopped. In this case, since the task is not running, "stop" means removing it from the queue . Copyright © Acronis, Inc., 2000-2009...
  • Page 106: Task Statuses

    No action is required. "Succeeded", "-", or The "-" state means that the task has never been started or "Stopped" has been started, but has not finished yet and so its result is not available. Copyright © Acronis, Inc., 2000-2009...
  • Page 107: Working With Backup Plans And Tasks

    Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot run plans owned by other users. Task Click Run. The task will be executed immediately in spite of its schedule and conditions. Copyright © Acronis, Inc., 2000-2009...
  • Page 108 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2009...
  • Page 109 Only the management server administrator can do so. • Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2009...
  • Page 110: Filtering And Sorting Backup Plans And Tasks

    Type a plan's/task's name or an owner's name in the field below the or owner. corresponding header name. As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Copyright © Acronis, Inc., 2000-2009...
  • Page 111: Run Backup Plan

    When a task requires user interaction, a message and action buttons appear above the tabs. The message contains a brief description of the problem. The buttons allow you to retry or stop the task or the backup plan. Copyright © Acronis, Inc., 2000-2009...
  • Page 112 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 113: Backup Plan Details

    The Source tab provides the following information on the data selected for backup: • Source type - the type of data (p. 120) selected for backing up. • Items to back up - items selected to back up and their size. Copyright © Acronis, Inc., 2000-2009...
  • Page 114: Log

    Backup options - backup options changed against the default values. 6.1.3. The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log.
  • Page 115: Actions On Log Entries

    In the To field, select the date up to which to display the log entries. Filter log entries by Press or release the following toolbar buttons: type to filter error messages to filter warning messages Copyright © Acronis, Inc., 2000-2009...
  • Page 116: Log Entry Details

    • Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem. • Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 117: Creating A Backup Plan

    Date and time presentation varies depending on your locale settings. 6.2. Creating a backup plan Before creating your first backup plan (p. 210), please familiarize yourself with the basic concepts (p. 17) used in Acronis Backup & Recovery 10. To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for the backup plan.
  • Page 118: Archive Validation

    Create backup plan page. To reset all the settings to the default values, click Reset to default. Convert to VM Applies to: Disk/volume backup, backup of Entire virtual machines Volumes of a virtual machine Copyright © Acronis, Inc., 2000-2009...
  • Page 119: Why Is The Program Asking For The Password

    Specify the conversion schedule if required. Host (p. 136) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 136) Here you select the resulting virtual machine type and location.
  • Page 120: Source Type

    Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 121: Selecting Files And Folders

    Use the table in the right part of the window to browse and select the nested items. Selecting the check box beside the Name column’s header automatically selects all items in the table. Clearing this check box automatically deselects all items. 3. Click OK. Copyright © Acronis, Inc., 2000-2009...
  • Page 122: Access Credentials For Source

    Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Copyright © Acronis, Inc., 2000-2009...
  • Page 123: Archive

    This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. • To back up data to a locally attached tape device, expand the Tape drives group, then click the required device. Copyright © Acronis, Inc., 2000-2009...
  • Page 124: Access Credentials For Archive Location

    The program will access the source data using the credentials you specify. Use this option if the plan account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Copyright © Acronis, Inc., 2000-2009...
  • Page 125: Backup Schemes

    In the Backup type field, select whether you want to create a full, incremental or differential backup (p. 21). 6.2.9.2. Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Copyright © Acronis, Inc., 2000-2009...
  • Page 126: Simple Scheme

    Feb 19—Feb 25 Feb 26—Mar 4 Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly backups run every fourth Friday, and weekly backups run on all other Fridays. Copyright © Acronis, Inc., 2000-2009...
  • Page 127 Back up files every day, including weekends • Be able to recover files as of any date over the past seven days • Have access to weekly backups of the past month • Keep monthly backups indefinitely. Copyright © Acronis, Inc., 2000-2009...
  • Page 128 Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thursdays. On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to: Copyright © Acronis, Inc., 2000-2009...
  • Page 129: Tower Of Hanoi Scheme

    Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in this situation. 6.2.9.5. Tower of Hanoi scheme At a glance • Up to 16 levels of full, differential, and incremental backups • Next-level backups are twice as rare as previous-level backups Copyright © Acronis, Inc., 2000-2009...
  • Page 130 8, a day before creating a new full backup. The scheme allows for efficient data storage: more backups accumulate toward the current time. Having four backups, we could recover data as of today, yesterday, half a week, or a week ago. Copyright © Acronis, Inc., 2000-2009...
  • Page 131 On day 14, the interval is five days. It increases on subsequent days before decreasing again, and so The roll-back period shows how many days we are guaranteed to have even in the worst case. For a four-level scheme, it is four days. Copyright © Acronis, Inc., 2000-2009...
  • Page 132: Custom Backup Scheme

    This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults. This setting enables deletion of the last backup in the archive, in case your storage device cannot accommodate more than one backup.
  • Page 133 This example demonstrates the use of all options available in the Custom scheme. Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and daily incremental backups. Then the backup schedule can look as follows. Copyright © Acronis, Inc., 2000-2009...
  • Page 134 • Full backup, runs every Friday at 10:00 PM • Incremental backup, runs manually • Differential backup, runs manually Copyright © Acronis, Inc., 2000-2009...
  • Page 135: Archive Validation

    If this happens, you can restart the conversion task manually after powering off the machine. Any changes made to the machine while it was powered on, will be overwritten. Copyright © Acronis, Inc., 2000-2009...
  • Page 136 6.2.11.2. Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 137: Recovering Data

    Microsoft LDM (Dynamic volumes) (p. 33) section. Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer virtual appliance.
  • Page 138 [OPTIONAL] The Acronis Active Restore check box is available when recovering Windows starting from Windows 2000. Acronis Active Restore brings a system online immediately after the recovery is started. The operating system boots from the backup image and the machine becomes operational and ready to provide necessary services.
  • Page 139: Task Credentials

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 150) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 140: Archive Selection

    To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 23) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 23) section.
  • Page 141: Content Selection

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 142: Access Credentials For Location

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 143: Disk Destination

    Then you proceed to the regular disk mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed to the regular disk mapping procedure described below.
  • Page 144 Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected volumes will be recovered to the physical disks of the machine the console is connected to.
  • Page 145: Mbr Destination

    Using this feature, you can redistribute the disk space between the volumes being recovered. In this case, you will have to recover the volume to be reduced first. Copyright © Acronis, Inc., 2000-2009...
  • Page 146 Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 147: Virtual Machine Settings

    127 GB and 1 processor. SCSI disks are not supported. Processors Initial setting: if not contained in the backup or the backed up setting is not supported by the virtualization server, the default server's setting. Copyright © Acronis, Inc., 2000-2009...
  • Page 148: File Destination

    Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Copyright © Acronis, Inc., 2000-2009...
  • Page 149: Access Credentials For Destination

    Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Copyright © Acronis, Inc., 2000-2009...
  • Page 150: When To Recover

    6.3.9. Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 151: How To Convert A Disk Backup To A Virtual Machine

    Rather than converting a TIB file to a virtual disk file, which requires additional operations to bring the virtual disk into use, Acronis Backup & Recovery 10 performs the conversion by recovery of a disk backup to a fully configured and operational new virtual machine. You have the ability to adapt the virtual machine configuration to your needs when configuring the recovery operation.
  • Page 152 Workstation machine can be converted to the open virtualization format (OVF) using the VMware OVF tool. With Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi, you can recover a disk (volume) backup to a new virtual machine on the respective virtualization server.
  • Page 153: Bootability Troubleshooting

    OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. •...
  • Page 154 This may happen when system or boot volumes are not recovered to their original location. Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this automatically and so you are not likely to experience the problem.
  • Page 155: About Windows Loaders

    A part of the loader resides in the partition boot sector, the rest is in the files ntldr, boot.ini, ntdetect.com, ntbootdd.sys. boot.ini is a text file that contains the loader configuration. Example: [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] Copyright © Acronis, Inc., 2000-2009...
  • Page 156: Recovering A Vast Number Of Files From A File Backup

    Tip: In general, if a volume contains many files, consider using a disk-level backup instead of a file-level one. In this case, you will be able to recover the entire volume as well as particular files stored on it. Copyright © Acronis, Inc., 2000-2009...
  • Page 157: Validating Vaults, Archives And Backups

    Archive (p. 158) - in that case, you need to specify the archive. Backup (p. 159) - specify the archive first, and then select the desired backup in this archive. Vault (p. 159) - select a vault (or other location), which archives to validate. Copyright © Acronis, Inc., 2000-2009...
  • Page 158: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 23) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 159: Backup Selection

    • To select a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. Copyright © Acronis, Inc., 2000-2009...
  • Page 160: Access Credentials For Source

    Now - to start the validation task right after its creation, that is, after clicking OK on the Validation page. • Later - to start the one-time validation task, at the date and time you specify. Specify the appropriate parameters as follows: Copyright © Acronis, Inc., 2000-2009...
  • Page 161: Mounting An Image

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: •...
  • Page 162: Archive Selection

    2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup. To obtain information on a volume, right-click it and then click Information. 3. Click OK. Copyright © Acronis, Inc., 2000-2009...
  • Page 163: Access Credentials

    Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 164: Exporting Archives And Backups

    • recovery of the storage node itself. Export from an HDD-based vault to a tape device can be considered as simple on-demand archive staging. Copyright © Acronis, Inc., 2000-2009...
  • Page 165 Otherwise the task will fail. You cannot edit an export task to specify another name for the destination archive (this is a limitation). Tip. You can implement the staging scenario manually, by regularly running the archive deletion task followed by the export task. Copyright © Acronis, Inc., 2000-2009...
  • Page 166: Task Credentials

    To access this option, select the Advanced view check box. After you have performed all the required steps, click OK to start the export task. 6.7.1. Task credentials Provide credentials for the account under which the task will run. Copyright © Acronis, Inc., 2000-2009...
  • Page 167: Archive Selection

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 23) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 168: Backup Selection

    According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. Copyright © Acronis, Inc., 2000-2009...
  • Page 169: Location Selection

    By default, the exported archive inherits the name of the original archive. Because having multiple archives of the same names in the same location is not advisable, the following actions are disabled with the default archive name: Copyright © Acronis, Inc., 2000-2009...
  • Page 170: Access Credentials For Destination

    Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more about the advantages and limitations of the Acronis Secure Zone, see the Acronis Secure Zone (p. 38) topic in the "Proprietary Acronis technologies" section.
  • Page 171: Acronis Secure Zone Disk

    The Acronis Secure Zone can be located on any fixed hard drive. Acronis Secure Zone is always created at the end of the hard disk. A machine can have only one Acronis Secure Zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space.
  • Page 172: Managing Acronis Secure Zone

    Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
  • Page 173: Increasing Acronis Secure Zone

    If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. The zone does not perform automatic cleanup, that is, deleting old archives, anymore. Use backup schemes with automatic cleanup to back up to the zone, or delete outdated archives manually using the vault management functionality.
  • Page 174: Acronis Startup Recovery Manager

    GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 175: Bootable Media

    Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
  • Page 176: How To Create Bootable Media

    The wizard will guide you through the necessary operations. Please refer to Linux-based bootable media (p. 177) for details. PE-based bootable media Acronis Plug-in for WinPE can be added to WinPE distributions based on any of the following kernels: • Windows XP Professional with Service Pack 2 (PE 1.5) •...
  • Page 177 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 183) for details. 6.10.1.1.
  • Page 178: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 181). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 179: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: •...
  • Page 180: Network Port

    (enter the port number). If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console. Copyright © Acronis, Inc., 2000-2009...
  • Page 181: Drivers For Universal Restore

    Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 182: Adding The Acronis Plug-In To Winpe 2.X

    Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x: • Adding the Acronis Plug-in to the existing PE 2 ISO. This comes in handy when you have to add the plug-in to the previously configured PE 2 ISO that is already in use. •...
  • Page 183 You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 5. Choose whether you want to create ISO or WIM image or upload the media on Acronis PXE Server.
  • Page 184: Connecting To A Machine Booted From Media

    Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window.
  • Page 185: Setting Up A Display Mode

    7. If prompted, specify the user name and password to access the iSCSI device. To add an NDAS device 1. In a Linux-based bootable media, run the management console. 2. Click Configure iSCSI/NDAS devices. 3. In NDAS devices, click Add device. 4. Specify the 20-character device ID. Copyright © Acronis, Inc., 2000-2009...
  • Page 186: List Of Commands And Utilities Available In Linux-Based Bootable Media

    Linux commands and utilities busybox ifconfig readcd init reboot cdrecord insmod chmod iscsiadm rmmod chown kill route chroot kpartx scsi_id lspci sg_map26 dmesg dmraid sleep e2fsck mdadm e2label mkdir sshd echo mke2fs strace egrep mknod swapoff Copyright © Acronis, Inc., 2000-2009...
  • Page 187: Recovering Md Devices And Logical Volumes

    6.10.5.1. Creating the volume structure automatically Suppose that you saved the volume structure to the /etc/Acronis directory—see Backing up LVM volumes (Linux)—and that the volume with this directory is included in the archive. To recreate the volume structure in Linux-based bootable media, use either of the methods described below.
  • Page 188: Creating The Volume Structure Manually

    6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 189 8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 190 For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 186). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 191: Disk Management

    HDD replacement or hardware loss. In such case with the help of Acronis Disk Director Lite, the user has the possibility to recreate the necessary disk configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the disk or volume structure the user might consider necessary.
  • Page 192: Running Acronis Disk Director Lite

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 211) created with the Acronis Bootable Media Builder;...
  • Page 193: Disk Management" View

    The full version of Acronis Disk Director will provide more tools and utilities for working with disks. Acronis Disk Director Lite must obtain exclusive access to the target disk. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the disk cannot be blocked, close the disk management applications that use this disk and start again.
  • Page 194: Disk Initialization

    To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools.
  • Page 195: Selecting Source And Target Disks

    NT signature and assigns it to the second disk. As a result, all the volumes Copyright © Acronis, Inc., 2000-2009...
  • Page 196 3. By clicking OK, you'll add a pending operation of MBR to GPT disk conversion. (To finish the added operation you will have to commit (p. 206) it. Exiting the program without committing the pending operations will effectively cancel them.) Copyright © Acronis, Inc., 2000-2009...
  • Page 197 MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 198) using the Convert to basic operation.
  • Page 198 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 199: Volume Operations

    System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 200: Creating A Volume

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 201: Create Volume Wizard

    • Basic • Simple/Spanned • Striped • Mirrored • RAID-5 You will obtain a brief description of every type of volume for better understanding of the advantages and limitations of each possible volume architecture. Copyright © Acronis, Inc., 2000-2009...
  • Page 202: Select Destination Disks

    The maximum value normally includes the most possible unallocated space. But in some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when the size Copyright © Acronis, Inc., 2000-2009...
  • Page 203: Set The Volume Options

    Operations window. If you set a 64K cluster size for FAT16/FAT32 or on 8KB-64KB cluster size for NTFS, Windows can mount the volume, but some programs (e.g. Setup programs) might calculate its disk space incorrectly. Copyright © Acronis, Inc., 2000-2009...
  • Page 204: Delete Volume

    6.11.6.2. Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 205: Change Volume Letter

    (To finish the added operation you will have to commit (p. 206) it. Exiting the program without committing the pending operations will effectively cancel them.) The new label will be graphically represented in the Disk Management view of the console immediately. Copyright © Acronis, Inc., 2000-2009...
  • Page 206: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 207: Collecting System Information

    Cancel. Then no changes will be done to the pending operation list. Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so if you try to exit Disk management without committing the pending operations, you will receive the appropriate warning.
  • Page 208: Glossary

    • can serve as the primary location for dual destination backup. Limitation: Acronis Secure Zone cannot be organized on a dynamic disk (p. 215) or a disk using the GPT partitioning style. Acronis Secure Zone is considered as a personal vault (p. 218).
  • Page 209: Agent-Side Cleanup

    (p. 217), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 210: Backup Plan (Plan)

    By applying a policy to a group of machines, the administrator deploys multiple backup plans with a single action. The workflow when using policies is as follows. 1. The administrator creates a backup policy. 2. The administrator applies the policy to a group of machines or a single machine (p. 217). Copyright © Acronis, Inc., 2000-2009...
  • Page 211: Backup Scheme

    (p. 211) or Windows Preinstallation Environment (WinPE) (p. 222) with the Acronis Plug-in for WinPE (p. 208). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 212: Centralized Management

    (p. 210) from the management server (p. 218). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 218). The centralized management operations include: •...
  • Page 213: Deduplicating Vault

    For more information please refer to Retention rules (p. 31). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 209) and Acronis Backup & Recovery 10 Management Server (p. 218).
  • Page 214: Disk Group

    A backup (p. 209) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 215: Dynamic Disk

    Dynamic group A group of machines (p. 217) which is populated automatically by the management server (p. 218) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria: • Operating system •...
  • Page 216: Dynamic Volume

    The export operation can be applied to a single archive, a single backup (p. 209) or to your choice of backups belonging to the same archive. An entire vault (p. 221) can be exported by using the command line interface. Copyright © Acronis, Inc., 2000-2009...
  • Page 217: Full Backup

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 217), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 209) is installed. Copyright © Acronis, Inc., 2000-2009...
  • Page 218: Managed Vault

    On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 219). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 219: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 220: Storage Node-Side Cleanup

    Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 217) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 221: Unmanaged Vault

    Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 222: Virtual Machine

    Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 217) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 209) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...
  • Page 223: Index

    Access credentials for source • 117, 122, 158, 160, 166, 168 Backing up dynamic volumes (Windows) • 33, 137 Acronis Active Restore • 37, 41, 137, 138, 150, 208, 221 Backup • 17, 21, 209, 213, 214, 216, 217, Acronis Backup & Recovery 10 components •...
  • Page 224 Bootable agent • 39, 174, 208, 211 Creating a volume • 199, 200 Bootable components and media builder • Creating Acronis Secure Zone • 83, 170 Creating the volume structure Bootable media • 14, 17, 65, 102, 137, automatically • 187 174, 175, 192, 208, 211, 214, 218 Creating the volume structure manually •...
  • Page 225 Encrypted vault • 216, 220 Error handling • 50, 65, 71, 77 Image • 217 Event tracing • 46, 61, 76 Increasing Acronis Secure Zone • 173 Exclusions • 118, 122, 148, 149 Incremental backup • 209, 211, 213, 217 Export • 216 Introducing Acronis®...
  • Page 226 Operations with backups • 81, 82, 85 Operations with panes • 10 Run backup plan • 107, 111 Options • 44 Running Acronis Disk Director Lite • 192 Overwriting • 149 Owners and credentials • 23, 81, 140, 158, Scheduling • 67, 87, 126, 135, 161 Select destination disks •...
  • Page 227 User is idle • 98 Static group • 212, 219 User logged off • 99 Storage node (Acronis Backup & Recovery User privileges on a managed machine • 10 Storage Node) • 212, 213, 216, 218, 23, 120, 140, 158, 167 219, 220 Using a single tape drive •...
  • Page 228 Windows event log • 46, 51, 61, 72, 76 WinPE (Windows Preinstallation Environment) • 208, 211, 222 Working under bootable media • 184 Working with backup plans and tasks • 107 Working with the • 81 Copyright © Acronis, Inc., 2000-2009...

Table of Contents