ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User Manual

Hide thumbs Also See for Backup & Recovery 10 Advanced Server Virtual Edition:
Table of Contents

Advertisement

Acronis® Backup & Recovery 10™
Advanced Server Virtual Edition
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition

  • Page 1 Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.13 Proprietary Acronis technologies ....................52 2.13.1 Acronis Secure Zone ...........................52 2.13.2 Acronis Startup Recovery Manager ......................53 2.13.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............54 2.13.4 Acronis Active Restore ..........................56 2.14 Understanding centralized management ................57 2.14.1 Basic concepts ............................57 2.14.2...
  • Page 4 2.14.6 Deduplication .............................72 2.14.7 Privileges for centralized management .....................76 2.14.8 Communication between Acronis Backup & Recovery 10 components ..........82 Options ..........................89 Console options ........................89 3.1.1 Startup page ...............................89 3.1.2 Pop-up messages ............................89 3.1.3 Time-based alerts ............................90 3.1.4 Number of tasks ............................90 3.1.5...
  • Page 5 5.6.5 Time since last backup ..........................179 Direct management ......................181 Administering a managed machine ..................181 6.1.1 Dashboard ............................... 181 6.1.2 Backup plans and tasks ........................... 183 6.1.3 Log ................................194 Creating a backup plan ......................196 6.2.1 Why is the program asking for the password? ..................198 6.2.2 Backup plan's credentials ........................
  • Page 6 6.11.6 Volume operations ..........................277 6.11.7 Pending operations ..........................284 6.12 Collecting system information ....................284 Centralized management ..................... 285 Administering Acronis Backup & Recovery 10 Management Server ........285 7.1.1 Dashboard ............................... 285 7.1.2 Backup policies ............................287 7.1.3 Physical machines ............................
  • Page 7: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Advanced Server Virtual Edition inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 8: Getting Started

    1. Install Acronis Backup & Recovery 10 Management Server (p. 19). 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installing the agents, register each of the machines on the management server. To do so, enter the server's IP or name and the centralized administrator's credentials in one of the installation wizard's windows.
  • Page 9 1. Install Acronis Backup & Recovery 10 Storage Node (p. 20) and add it to the management server. 2. Create the deduplicating managed vault on the storage node. 3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplicating vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 10: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Copyright © Acronis, Inc., 2000-2010...
  • Page 11 Disk management. Use this view to perform operations on the machine's hard disk drives. Views for a management server When the console is connected to a management server, the following views are available in the navigation tree. Copyright © Acronis, Inc., 2000-2010...
  • Page 12 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 13 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar...
  • Page 14: Operations With Panes

    Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace.
  • Page 15: Action Pages

    An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Copyright © Acronis, Inc., 2000-2010...
  • Page 16 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu.
  • Page 17: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes the following main types of components.
  • Page 18: Agent For Linux

    Universal Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.1.3 Agent for Hyper-V Acronis Backup &...
  • Page 19: Agent For Esx/Esxi

    It is possible to recover all files and directories that were backed up or select which of them to recover. 1.3.2.1 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.3 Agent for ESX/ESXi Acronis Backup &...
  • Page 20: Storage Node

    1.3.4.2 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various resources (such as the corporate storage capacity, the network bandwidth, or the managed machines' CPU load) required for the enterprise data protection. This goal is achieved through organizing and managing the locations that serve as dedicated storages of the enterprise backup archives (managed vaults).
  • Page 21: Management Console

    Acronis Backup & Recovery 10 Management Console is an administrative tool for remote or local access to Acronis Backup & Recovery 10 agents, and in the product editions that include the centralized management capability, to the Acronis Backup & Recovery 10 Management Server.
  • Page 22: Bootable Media Builder

    Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 23: Supported Operating Systems

    Windows Server 2008 x64 Edition with Hyper-V  Microsoft Hyper-V Server 2008 This agent installs on a Hyper-V host as an add-on to Acronis Backup & Recovery 10 Agent for Windows. On Hyper-V Server 2008, only remote installation is available. Copyright © Acronis, Inc., 2000-2010...
  • Page 24: System Requirements

    Acronis Backup & Recovery 10 Agent for Windows  Windows 2000 Professional SP4/XP Professional SP2+  Windows 2000 Server/2000 Advanced Server/Server 2003/Server 2008  Windows SBS 2003/SBS 2008  Windows XP Professional x64 Edition, Windows Server 2003/2008 x64 Editions ...
  • Page 25: Technical Support

    1.7 Technical support As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available, you may electronically access at no additional charge, Copyright © Acronis, Inc., 2000-2010...
  • Page 26 Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support.
  • Page 27: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 368) on the machine which becomes a managed machine (p. 377) from this point on.
  • Page 28 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 29 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 30 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 31: User Privileges On A Managed Machine

    Backup Operators group, additionally has the following management rights:  Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot. Members of the Administrators group also can: Copyright © Acronis, Inc., 2000-2010...
  • Page 32: Owners And Credentials

    When managing a machine running Linux, the user has or obtains the root privileges, and so can:  Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine.
  • Page 33: Full, Incremental And Differential Backups

    It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one.
  • Page 34 Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Maximal Medium Minimal Storage space Maximal Medium Minimal Creation time Minimal Medium Maximal Recovery time Copyright © Acronis, Inc., 2000-2010...
  • Page 35: Gfs Backup Scheme

    You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 36 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 37 The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. Copyright © Acronis, Inc., 2000-2010...
  • Page 38: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 39 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 40: Retention Rules

    Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 41 (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Copyright © Acronis, Inc., 2000-2010...
  • Page 42 The consolidation, however, may take a lot of time and system resources. And you still need some extra space in the vault for temporary files created during consolidation. What you need to know about consolidation Copyright © Acronis, Inc., 2000-2010...
  • Page 43: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 376) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 44: Recovering Dynamic Volumes

    Basic MBR volume Basic MBR volume Basic MBR volume Basic GPT volume Basic GPT volume Basic GPT volume Basic GPT volume Basic MBR volume Basic MBR volume Basic MBR volume Unallocated space (basic MBR disk) Copyright © Acronis, Inc., 2000-2010...
  • Page 45: Backing Up Lvm Volumes (Linux)

    This section explains in brief how you would back up and recover volumes managed by Linux Logical Volume Manager (LVM)—called logical volumes—using Acronis Backup & Recovery 10. Acronis Backup & Recovery 10 Agent for Linux can access, back up and recover such volumes when running in Linux with 2.6.x kernel or a Linux-based bootable media.
  • Page 46 Linux Swap The system has three physical disks (Disk 1, Disk 2, and Disk 3). Two logical volumes, DYN1 and DYN2, are arranged across basic volumes 1-2 and 2-1. Disk 3 includes Acronis Secure Zone which is not normally backed up.
  • Page 47: Backing Up Raid Arrays (Linux)

    2.10 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recover Linux Software RAID devices (known as multiple-disk devices or MD devices) and hardware RAID arrays. Software RAID arrays Software RAID arrays, or MD devices, combine several volumes and make solid block devices (/dev/md0, /dev/md1, ..., /dev/md31), information of which is stored in /etc/raidtab or in dedicated...
  • Page 48: Backing Up Virtual Machines

    Backing up such disks does not make sense as it won’t be possible to recover them. 2.11 Backing up virtual machines Acronis Backup & Recovery 10 Advanced Server Virtual Edition allows for backing up virtual machines from the host. Preparation On Windows 2008 Server x64 (any edition) or Microsoft Hyper-V Server 2008: ...
  • Page 49 Backing up an entire virtual machine or its volumes yields a standard disk backup (p. 374). With Acronis Backup & Recovery 10 Agent for Windows or Acronis Backup & Recovery 10 Agent for Linux, you can mount its volumes, recover individual files from this backup, and recover disks and volumes from the backup to a physical machine.
  • Page 50: How To Install Hyper-V Integration Services

    LDM/LVM. To do so, you will have to boot the target virtual machine using bootable media (p. 371) or its ISO image and use Acronis Disk Director Lite for LDM reconstruction or Linux command line tools for LVM reconstruction. Another option is to recover dynamic volumes as basic.
  • Page 51: Tape Support

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 20). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p.
  • Page 52: Proprietary Acronis Technologies

    5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 380) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume.
  • Page 53: Acronis Startup Recovery Manager

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 54: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media. The user can also back up using Acronis Startup Recovery Manager, while on the move.
  • Page 55 Universal Restore is not available when recovering Linux. Getting Universal Restore Universal Restore comes free with Acronis Backup & Recovery 10 Advanced Server SBS Edition and Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Copyright © Acronis, Inc., 2000-2010...
  • Page 56: Acronis Active Restore

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup.
  • Page 57: Understanding Centralized Management

    If you opt for Acronis Active Restore, the system will be operational in a short time. Users will be able to open the necessary files from the storage and use them while the rest of the files, which are not immediately necessary, are being recovered in the background.
  • Page 58 To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p. 379) and configure it to manage a centralized vault or multiple centralized vaults.
  • Page 59: Setting Up Centralized Data Protection In A Heterogeneous Network

    2. Install Acronis Backup & Recovery 10 Management Server [AMS] on one of the Windows servers (2). The management server is your single entry point to the Acronis infrastructure. 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's disks, volumes or files.
  • Page 60: Protecting The Servers

    5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The storage node enables you to organize the infrastructure for storing backup archives and to use the deduplication functionality. The node can be installed together with the management server if the host is capable enough.
  • Page 61: Protecting The Workstations

    To protect data on a daily basis, you can also use the GFS or Tower of Hanoi backup schemes. 2.14.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibility to protect virtual machines in multiple ways: ...
  • Page 62: Grouping The Registered Machines

    Advanced product editions other than Virtual Edition (Acronis Backup & Recovery 10 Advanced Server, Advanced Server SBS Edition and Advanced Workstation) allow using only the last of the above methods.
  • Page 63: Using Custom Groups

    An example of group hierarchy The backup policy on the server has to differ from that on the workstations. The administrator creates the G1 dynamic group that contains machines with the server operating systems, and applies Copyright © Acronis, Inc., 2000-2010...
  • Page 64: Policies On Machines And Groups

    Copyright © Acronis, Inc., 2000-2010...
  • Page 65: A Policy On A Machine Or A Group

    Please familiarize yourself with this section to be sure that your actions yield the desired result and to understand the result of the automated Acronis Backup & Recovery 10 Management Server operations.
  • Page 66: Operations With A Machine

    The "blue" policy is applied, but the "orange" policy remains on the machine. 4. Remove from the group: Machine #3 is removed from the group. The "orange" policy is revoked from the machine. The machine remains in the All machines group. Copyright © Acronis, Inc., 2000-2010...
  • Page 67: Inheritance Of Policies

    In the diagram below, the container stands for a group; the two-color circle stands for a machine with two applied policies; the three-color circle stands for a machine with three applied policies and so on. Copyright © Acronis, Inc., 2000-2010...
  • Page 68 All machines -> #1 or #2 or #3 "orange" Inherited G1 -> #1 or #2 or #3 "green" Inherited All machines -> #4 "orange" Inherited G1 -> G2 -> #4 "blue" Inherited G2 -> #4 "violet" Applied directly Copyright © Acronis, Inc., 2000-2010...
  • Page 69: Backup Policy's State And Statuses

    In this case, the first policy's state on the machine will be Revoking and the second policy's state will be Deploying. The policies can appear in the GUI simultaneously or one after another. Copyright © Acronis, Inc., 2000-2010...
  • Page 70: Policy Status On A Machine

    The policy that has to back up the [System] and the /dev/sda1 volumes, will get the Warning status on the Windows machines (since /dev/sda is not found) and on the Linux machines that have the Copyright © Acronis, Inc., 2000-2010...
  • Page 71: Policy Deployment State On A Group

    The status of the corresponding backup plan is Warning The status of the corresponding backup plan is OK Updating Error The updating log has errors: cannot delete the locked task, the Acronis service is stopped… Warning The updating log has warnings...
  • Page 72: Deduplication

    In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node to determine what data can be deduplicated, and does not transfer the data whose duplicates are already present in the vault.
  • Page 73: How Deduplication Works

    How deduplication works Deduplication at source When performing a backup to a deduplicating vault, Acronis Backup & Recovery 10 Agent reads items being backed up—disk blocks for disk backup or files for file backup—and calculates a fingerprint of each block. Such a fingerprint, often called a hash value, uniquely represents the item's content within the vault.
  • Page 74: When Deduplication Is Most Effective

    Follow these recommendations when using deduplication:  When creating a deduplicating vault, place the vault and its deduplication database on different disks. This will make deduplication faster, because deduplication involves extensive simultaneous use of both the vault and the database. Copyright © Acronis, Inc., 2000-2010...
  • Page 75: Deduplication Ratio

    When backing up multiple systems with similar content, back up one of the similar systems first, so that Acronis Backup & Recovery 10 Storage Node indexes all the system's files as potential deduplication items. This will lead to faster backup processes and less network traffic (because of effective deduplication at source), regardless of whether the backups are performed simultaneously or not.
  • Page 76: Privileges For Centralized Management

    This section describes the users' privileges that are required to manage a machine locally and remotely, to manage a machine registered on Acronis Backup & Recovery 10 Management Server, and to access and manage Acronis Backup & Recovery 10 Storage Node.
  • Page 77: Remote Connection

    Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Console on one machine and Acronis Backup & Recovery 10 Agent on another machine. You might need to specify logon credentials to establish a remote connection.
  • Page 78: Privileges For Remote Connection In Linux

    Remote connections by the root user are established according to the Acronisagent authentication policy, which is automatically set up during the installation of Acronis Backup & Recovery 10 Agent for Linux, by creating the file /etc/pam.d/Acronisagent with the following content: #%PAM-1.0...
  • Page 79: Acronis Security Groups

    When Acronis Backup & Recovery 10 Agent for Windows is being installed on a machine, the Acronis Remote Users group is created (or updated). A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery 10 Management Console, according to the management rights described in Users' privileges on a managed machine (p.
  • Page 80: Management Server Administrator Rights

    Administrators group itself is included. Tip: To ensure proper group names, you should install Acronis components in a domain controller after you have set up the domain controller itself. If the components were installed before you set up the domain controller, create the groups DCNAME $ Acronis Remote Users and DCNAME $ Acronis Centralized Admins manually, and then include the members of Acronis Remote Users and Acronis Centralized Admins in the newly created groups.
  • Page 81: User Privileges On A Storage Node

    2.14.7.7 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10 Storage Node depends on the user's rights on the machine where the storage node is installed. A regular user, such as a member of the Users group on the storage node, can: ...
  • Page 82: Communication Between Acronis Backup & Recovery 10 Components

     All three accounts are assigned the Log on as a service user right.  The Acronis Agent User user account is assigned the Adjust memory quotas for a process and Replace a process level token user rights.  The Acronis Agent User and ASN User user accounts are included in the Backup Operators group.
  • Page 83: Secure Communication

    For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup & Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. An Acronis component can act as a client application, a server application, or both, as shown in the following table.
  • Page 84: Configuring Communication Settings

    2. In the Group Policy console, expand Computer Configuration, then expand Administrative Templates, and then click Acronis. 3. In the Acronis pane to the right, double-click a communication option that you want to configure. The Administrative Template contains the following options (each option is explained later in this topic): ...
  • Page 85 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 87). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 86: Network Port Configuration

    The server listens to this port for incoming connection. This port is also used as default by the Acronis client. During component installation you might be asked to confirm the port opening or to open the port manually, in case you are using a firewall other than Windows Firewall.
  • Page 87: Ssl Certificates

    Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent. The choice is available between: ...
  • Page 88 Self-signed certificates On machines running Windows, if the certificate location contains no server certificate, a self-signed server certificate is automatically generated and installed during the installation of any Acronis component except Acronis Backup & Recovery 10 Management Console. If the machine is renamed after its self-signed certificate was generated, the certificate cannot be used and you will need to generate a new one.
  • Page 89: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 90: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 91: Management Server Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 92: Event Tracing

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical...
  • Page 93: Domain Access Credentials

    The preset is: Disabled. To bring this option into use: 1. Install Acronis WOL Proxy on any server in the subnet where the machines to be woken are located. The server has to provide continuous services availability. With multiple subnets, install Acronis WOL Proxy in every subnet where you need to use the Wake-On-LAN functionality.
  • Page 94: Machine Options

    ESX/ESXi is deployed (p. 312) to the virtual machine's host. Such machines appear as not manageable (grayed out). Once the agent is deployed to an ESX/ESXi host (this requires a license for Acronis Backup & Recovery 10 Advanced Server Virtual Edition), the virtual machines from this host are ready for applying a backup policy or individual backup.
  • Page 95: Machine Management

    3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
  • Page 96: Snmp Notifications

    The settings you obtain in this case will be plan-specific or task- specific. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical...
  • Page 97: Log Cleanup Rules

    /etc/snmp/snmptrapd.conf - configuration file for the Net-SNMP trap daemon. 3.3.3 Log cleanup rules This option specifies how to clean up the Acronis Backup & Recovery 10 agent log. This option defines the maximum size of the agent log folder (in Windows XP/2003 Server, %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery\MMS\LogEvents).
  • Page 98: Customer Experience Program

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 99 Copyright © Acronis, Inc., 2000-2010...
  • Page 100: Archive Protection

    The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the disk or in the backup file; the password hash is Copyright © Acronis, Inc., 2000-2010...
  • Page 101: Source Files Exclusion

    MyFolder and the file MyFile.tmp outside that folder, and selected to skip all .tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skipped. Copyright © Acronis, Inc., 2000-2010...
  • Page 102 Selected Cleared Cleared Do not back up until the command execution is complete Result Preset Perform the Perform the backup backup after the concurrently with Perform the backup command is the command only after the Copyright © Acronis, Inc., 2000-2010...
  • Page 103: Post-Backup Command

    This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 104: Pre-Data Capture Command

    5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not back up until the command execution is Copyright © Acronis, Inc., 2000-2010...
  • Page 105: File-Level Backup Snapshot

    (The File-level backup snapshot (p. 105) option determines whether a snapshot will be taken during file-level backup). The option determines whether to take snapshots of multiple volumes at the same time or one by one. The preset is: Enable. Copyright © Acronis, Inc., 2000-2010...
  • Page 106: Compression Level

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 107: Backup Performance

    This option is effective for Windows and Linux operating systems and bootable media. This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Copyright © Acronis, Inc., 2000-2010...
  • Page 108: Network Connection Speed

    Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk. You can limit the hard disk usage by the backup process to the desired level.
  • Page 109 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 110: Windows Event Log

    The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 111: Fast Incremental/Differential Backup

    Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup &...
  • Page 112 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size.
  • Page 113: Media Components

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 114: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 115: Task Start Conditions

    Select the Run the task anyway after check box and specify the time interval. The task will start as soon as the conditions are met OR the maximum time delay lapses, depending on which comes first. Time diagram: Wait until conditions are met Copyright © Acronis, Inc., 2000-2010...
  • Page 116: Task Failure Handling

    An archive can occupy several tapes. In such cases a so-called tape set is used for keeping the data backups. Tape set is a logical group of one or more tapes which contain backups of the specific protected data. A tape set can contain backups of other data as well. Copyright © Acronis, Inc., 2000-2010...
  • Page 117 The preset is: Disabled. When this option is enabled, each incremental backup will be written onto a free tape. This option is available only when using free tape for each full and differential backup is selected. Copyright © Acronis, Inc., 2000-2010...
  • Page 118: Additional Settings

    When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 119 The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 120: Default Recovery Options

    3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a recovery task, you can either use a default option, or override the default option with the custom value that will be specific for this task only.
  • Page 121: Pre-Recovery Command

    (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. Copyright © Acronis, Inc., 2000-2010...
  • Page 122: Post-Recovery Command

    However, the resulting effect will depend on the overall CPU usage and other factors like disk I/O speed or network traffic. The preset is: Normal. Copyright © Acronis, Inc., 2000-2010...
  • Page 123 NTFS permissions from the folder to which they are recovered. 3.4.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 124 3.4.2.5 Event tracing It is possible to duplicate log events of the recovery operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers. Copyright © Acronis, Inc., 2000-2010...
  • Page 125 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error)
  • Page 126: Error Handling

    The preset is Enabled. This option defines whether to recover the files’ date and time from the archive or assign the files the current date and time. Validate backup before recovery The preset is Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 127: Vm Power Management

    Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 128 To be on the safe side, power on the recovered virtual machine manually, after you take the necessary precautions. Select the check box for this option if automatic powering on of the virtual machine is required. Copyright © Acronis, Inc., 2000-2010...
  • Page 129: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 130: Centralized Vaults

    Members of the Administrators group can view and manage any archive stored on the storage node. A user who is a member of the Administrators group on a managed machine can view and manage archives created by any user of this machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 131: Working With The "Centralized Vault" View

    The Disk archives tab lists all the archives that contain disk or volume backups (images).  The File archives tab lists all the archives that contain file backups. Related sections: Operations with archives stored in a vault (p. 162) Copyright © Acronis, Inc., 2000-2010...
  • Page 132: Actions On Centralized Vaults

    The plans and tasks that use this vault will fail. If you choose to keep the archives for a managed vault, the vault will be detached from the storage node. Later on, you'll be able to attach this vault to the same or to Copyright © Acronis, Inc., 2000-2010...
  • Page 133: Creating A Managed Centralized Vault

    Type Select the Managed type. Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p. 134) Specify where the vault will be created. Managed centralized vaults can reside on a network share, SAN, NAS, or on a hard drive local to the storage node.
  • Page 134 1. In the Local folders of the storage node, select the desired folder or enter the full path to the folder in the Path field. To create a new folder for the database, click Create folder. 2. Click OK. When choosing a folder for the vault's database, follow these considerations: Copyright © Acronis, Inc., 2000-2010...
  • Page 135: Vault Encryption

    Specify a unique name for the vault. The creation of two centralized vaults with the same name is prohibited. Comments Enter the distinctive description of the vault. Type Select the Unmanaged type. Path (p. 136) Copyright © Acronis, Inc., 2000-2010...
  • Page 136: Attaching A Managed Vault

    To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. Path Specify the path to the location where the archives are stored.
  • Page 137: Tape Libraries

    Tape compatibility table (p. 51) section. Acronis Backup & Recovery 10 enables you to set up distribution of backups by media. For example, a separate tape set can be used to back up some specific data, and the backups of all other data will be written onto any currently mounted tape, which does not belong to the tape set.
  • Page 138: Rsm Media Pools

    To get information about the readability of the archives on tapes, written by different components of other versions of the product by means of Acronis Backup & Recovery 10, see the Tape compatibility table (p. 51) section.
  • Page 139: Getting Started With A Tape Library

    So the tape data will be lost. If all the backups are deleted from a tape, it will not return to the Free pool. It remains in the Acronis pool as a free tape to be reused. So if a storage node needs a new tape, it finds a free tape first in the Acronis pool, then in the Free pool.
  • Page 140: Tape Library As A Managed Vault

    You should have Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console installed on local or remote machines, as well as Acronis Backup &...
  • Page 141: Actions With Archives On Tapes In A Library

    At task creation, the program uses the storage node database instead of accessing tapes. However, selection of data to recover (e.g. some files or specific volumes) requires reading of one or more tapes, so it might be durational. Copyright © Acronis, Inc., 2000-2010...
  • Page 142: Managing A Tape Library

    To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage tapes and then click Start inventory on the Tape Management window. When inventorying is completed a user has the list of tapes currently loaded into the library. Copyright © Acronis, Inc., 2000-2010...
  • Page 143 Manage tapes on the toolbar. Then the Tape Management window will show a list of the library slots that contain tapes. For every tape belonging to the Free pool or to the Acronis pool, the slot data field indicates the tape label. Labels are also displayed for tapes that are in the Imported pool and contain backups written by Acronis (such might be the case when you bring a tape from another tape library).
  • Page 144 Use a separate tape set option. With some of the options below enabled, the program will add new tapes to the tape set every time when a full, incremental or differential backup is created. Copyright © Acronis, Inc., 2000-2010...
  • Page 145: Tape Rotation

    The same tape rotation enables you to get by with the minimum number of cartridges and not to be buried in used tapes. Acronis Backup & Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries.
  • Page 146: Criteria Of The Choice

    Legend for the case example figures Any daily/incremental backup (16 GB) is shown in the figures as a green rectangle: Weekly/differential backups (40 GB) are displayed as a blue rectangle: Any full monthly backup (320 GB) is drawn in orange: Copyright © Acronis, Inc., 2000-2010...
  • Page 147 The tape is marked with number 01 in the figure below. In accordance with the legend described in the Case to analyze (p. 146) section, the full data backup is displayed as an orange rectangle in the figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 148 This task deletes all the outdated backups. The next figure shows dark-gray rectangles instead of the backups deleted up to the current time. Physically the deleted backups are still on the tapes; however information about the backups is deleted from the storage node database. Copyright © Acronis, Inc., 2000-2010...
  • Page 149 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. Copyright © Acronis, Inc., 2000-2010...
  • Page 150 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Copyright © Acronis, Inc., 2000-2010...
  • Page 151 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 152 This scheme has the following advantages:  access to any full backup requires only one tape  backup deletion frees a tape so it can be reused. Copyright © Acronis, Inc., 2000-2010...
  • Page 153 ToH Example 2 requires 4 tapes, which is the minimum for the case. So its tape options settings are the best in comparison with options for other examples. ToH Example 1 Suppose, the backup plan has the following tape options: Copyright © Acronis, Inc., 2000-2010...
  • Page 154 (one tape - 16%, two tapes - 72%, three tapes - 12%) as well as rewinding and reading of one (6%), two (50%) or three (44%) backups  five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has the following tape options: Copyright © Acronis, Inc., 2000-2010...
  • Page 155 So in this specific case the selection of the Always use a free tape: For each full backup option considerably increases the usage efficiency of the tapes in the library. ToH Example 3 Imagine the backup plan has the following tape options:  the Use a separate tape set option is selected Copyright © Acronis, Inc., 2000-2010...
  • Page 156: Tape Planning

    It is implied that the Use a separate tape set option is enabled. To calculate the number of tapes you should take into account the following considerations:  full backup size  average size of incremental backups  average size of differential backups Copyright © Acronis, Inc., 2000-2010...
  • Page 157 ( (2*320 + 12*16 + 11*40) * 1 / 400 ) + 1 = round up ( 3.18 ) + 1 = 5 (tapes). Tape planning: Example 2 Imagine the case with the following features:  full backup size is F_GB  average size of incremental backups is I_GB  average size of differential backups is D_GB Copyright © Acronis, Inc., 2000-2010...
  • Page 158 What if I have to move tapes with backups from one tape library to another? 1. If both tape libraries are attached to the same machine with Acronis Backup & Recovery 10 Storage Node installed (i.e. the libraries are managed by the same storage node), the storage node database has all the required information about the content of the moved tapes.
  • Page 159: Personal Vaults

     What if I need to recover data from an Echo tape? Use the table from the Tape compatibility table (p. 51) section to find out which Acronis Backup & Recovery 10 components can read data from your tape. 4.2 Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine.
  • Page 160: Actions On Personal Vaults

    All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the [Vault name] actions bar (on the Actions and Tools pane) and from the [Vault name] actions item of the main menu respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 161: Creating A Personal Vault

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Click Create Acronis Secure Zone. Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 249) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 162: Common Operations

    The export of an archive creates a duplicate of the archive with all its backups in the location you specify. Delete a single archive 1. Select the archive or one of the archives you want to delete. Copyright © Acronis, Inc., 2000-2010...
  • Page 163: Operations With Backups

    Select one of the backups you want to delete, then click Delete. multiple backups The program duplicates your selection in the Backups deletion (p. 164) window that has check boxes for each archive and each backup. Review the selection and correct Copyright © Acronis, Inc., 2000-2010...
  • Page 164: Deleting Archives And Backups

    Configuring the archives table By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. Copyright © Acronis, Inc., 2000-2010...
  • Page 165 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 166: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 167: Daily Schedule

    Advanced scheduling settings (p. 175) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 168 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: Copyright © Acronis, Inc., 2000-2010...
  • Page 169: Weekly Schedule

    Advanced scheduling settings (p. 175) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 170 Saturday: once at 9 PM  Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the task: First schedule 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours Copyright © Acronis, Inc., 2000-2010...
  • Page 171: Monthly Schedule

    To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Copyright © Acronis, Inc., 2000-2010...
  • Page 172 Advanced scheduling settings (p. 175) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area. All the settings you made are displayed in the Result field at the bottom of the window.
  • Page 173: At Windows Event Log Event

    System) from the list, or type a log name—for example: Microsoft Office Sessions Event source Specifies the event source, which typically indicates the program or the system component that caused the event—for example: disk Event type Copyright © Acronis, Inc., 2000-2010...
  • Page 174 Windows Update Agent and leave the remaining fields the same. How to view events in Event viewer To open a log in Event Viewer 1. On the Desktop or in the Start menu, right-click My Computer, and then click Manage. Copyright © Acronis, Inc., 2000-2010...
  • Page 175: Advanced Scheduling Settings

    Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the Wake- On-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start. If the backup task on each machine starts with a delay (see the next setting), the management server will wake up the machines according to those delays.
  • Page 176: Conditions

    - put the task on hold for the specified time interval. If the time interval lapses and the conditions are still not met, run the Copyright © Acronis, Inc., 2000-2010...
  • Page 177: User Is Idle

    (3) If the user is still active at 11PM, the backup task starts anyway. 5.6.2 Location's host is available Applies to: Windows, Linux "Location's host is available" means that the machine hosting the destination for storing archives on a networked drive is available. Copyright © Acronis, Inc., 2000-2010...
  • Page 178: Fits Time Interval

    What if a task is scheduled to be executed at a certain time and this time is outside the specified time interval? For example:  Event: Daily, Every 1 day(s); Once at 03:00:00 PM.  Condition: Fits time interval, from 06:00:00 PM until 11:59:59 PM. Copyright © Acronis, Inc., 2000-2010...
  • Page 179: User Logged Off

    As a result, (1) if the machine is restarted before 12 hours pass since the completion of the latest successful backup, the scheduler will wait until 12 hours pass, and then will start the task. Copyright © Acronis, Inc., 2000-2010...
  • Page 180 (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 181: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 182 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 183: Backup Plans And Tasks

    Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 187) section for details. You can run, edit, stop and delete the created plans and tasks. Copyright © Acronis, Inc., 2000-2010...
  • Page 184: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 185: Task States

    The next state may be Stopping (if the user chooses to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that can put the task to the Running state.) Stopping Copyright © Acronis, Inc., 2000-2010...
  • Page 186: Task Statuses

    No action is required. "Succeeded", "-", or The "-" state means that the task has never been started or has "Stopped" been started, but has not finished yet and so its result is not available. Copyright © Acronis, Inc., 2000-2010...
  • Page 187: Working With Backup Plans And Tasks

    Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot run plans owned by other users. Task Click Run. The task will be executed immediately in spite of its schedule and conditions. Copyright © Acronis, Inc., 2000-2010...
  • Page 188 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 189 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 190: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 191: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 192 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 193: Backup Plan Details

    Backup scheme - the selected backup scheme and all its settings with schedules.  Validation (if selected) - events before or after which the validation is performed, and validation schedule.  Backup options - backup options changed against the default values. Copyright © Acronis, Inc., 2000-2010...
  • Page 194: Log

    6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log. When the program executes a task, it adds multiple entries.
  • Page 195: Filtering And Sorting Log Entries

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 196: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 197: Archive Validation

    [Optional] Configure parameters of the backup operation, such as pre/post backup commands, maximum network bandwidth allocated for the backup stream or the backup archive compression level. If you do nothing in this section, the default values (p. 98) will be used. Copyright © Acronis, Inc., 2000-2010...
  • Page 198: Why Is The Program Asking For The Password

    Specify the conversion schedule if required. Host (p. 215) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 215) Here you select the resulting virtual machine type and location.
  • Page 199: Source Type

    Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 200: Items To Back Up

    A separate archive will be created for each machine. Volumes of a virtual machine Available if Acronis Backup & Recovery 10 Agent for Hyper-V (or for ESX/ESXi) is installed. Select this option to back up individual disks or volumes within a virtual machine residing on a virtualization server.
  • Page 201: Selecting Files And Folders

    2. Click OK. Backing up an entire virtual machine yields a standard disk backup (p. 374). Having Acronis Backup & Recovery 10 Agent for Windows or for Linux, you can mount its volumes, recover individual files from this backup, and recover disks and volumes from the backup to a physical machine. The virtual machine configuration, stored in a virtual machine backup, will be suggested by default at recovering the backup content to a new virtual machine.
  • Page 202: Access Credentials For Source

    The virtual machine configuration will be also backed up. Backing up a virtual machine's volumes yields a standard disk backup (p. 374). Having Acronis Backup & Recovery 10 Agent for Windows or for Linux, you can mount its volumes, recover individual files from this backup, and recover disks and volumes from the backup to a physical machine.
  • Page 203: Archive

    To back up data to a network share, expand the Network folders group, select the required networked machine and, then click the shared folder. If the network share requires access credentials, the program will ask for them. Copyright © Acronis, Inc., 2000-2010...
  • Page 204 When it comes to recovery, every second counts, but you might be lost in the archive content. Backup plans that operate with the same archive should back up the same data items (say, both plans back up volume C.) Copyright © Acronis, Inc., 2000-2010...
  • Page 205: Access Credentials For Archive Location

    By setting up the backup schedule and selecting backup levels, you automatically obtain the rollback period – the guaranteed number of sessions that you can go back at any time. The automatic cleanup mechanism maintains the required Copyright © Acronis, Inc., 2000-2010...
  • Page 206: Simple Scheme

    Let us suppose that we want to set up a backup plan that will regularly produce a series of daily (D), weekly (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 207 This is why you might see a weekly or a monthly backup remain in the archive for a few days past its expected expiration date. If the schedule starts with a daily or a weekly backup, a full backup is created instead. Copyright © Acronis, Inc., 2000-2010...
  • Page 208 With this scheme, you will have a week to recover a previous version of a damaged file from a daily backup; as well as 10-day access to weekly backups. Each monthly full backup will be available for six months since the creation date. Copyright © Acronis, Inc., 2000-2010...
  • Page 209 The resulting “Grandfather-Father” archive will hence consist only of weekly differential and monthly full backups. Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in this situation. Copyright © Acronis, Inc., 2000-2010...
  • Page 210: Tower Of Hanoi Scheme

    8, a day before creating a new full backup. The scheme allows for efficient data storage: more backups accumulate toward the current time. Having four backups, we could recover data as of today, yesterday, half a week, or a week ago. Copyright © Acronis, Inc., 2000-2010...
  • Page 211: Custom Backup Scheme

    The roll-back period shows how many days we are guaranteed to have even in the worst case. For a four-level scheme, it is four days. 6.2.9.6 Custom backup scheme At a glance  Custom schedule and conditions for backups of each type  Custom schedule and retention rules Copyright © Acronis, Inc., 2000-2010...
  • Page 212 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 213 Further, we want to add conditions that have to be satisfied for a backup task to start. This is set up in the Conditions fields for each backup type. Full backup: Conditions: Location available Incremental: Conditions: User is logged off Differential: Conditions: User is idle Copyright © Acronis, Inc., 2000-2010...
  • Page 214: Archive Validation

    On the other hand, if the validation is a major part of your data protection strategy and you prefer to be immediately informed whether the backed up data is not corrupted and can be successfully recovered, think of starting the validation right after backup creation. Copyright © Acronis, Inc., 2000-2010...
  • Page 215: Setting Up Regular Conversion To A Virtual Machine

    6.2.11.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 216: Recovering Data

    (p. 371) or using Acronis Startup Recovery Manager (p. 53). Then, create a recovery task. Acronis Universal Restore (p. 54) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 217 Microsoft LDM (Dynamic volumes) (p. 43) section. Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer virtual appliance.
  • Page 218: Task Credentials

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 228) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 219: Archive Selection

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 220: Data Type

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 221: Access Credentials For Location

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 222: Disk Destination

    Then you proceed to the regular disk mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed to the regular disk mapping procedure described below.
  • Page 223 Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected volumes will be recovered to the physical disks of the machine the console is connected to.
  • Page 224: Mbr Destination

    Tip: A volume cannot be resized when being recovered from a backup split into multiple removable media. To be able to resize the volume, copy all parts of the backup to a single location on a hard disk. Copyright © Acronis, Inc., 2000-2010...
  • Page 225 Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 226: Virtual Machine Settings

    CPU configuration, the virtualization product and the guest operating system. Multiple virtual processors are generally available on multi-processor hosts. A multicore host CPU or hyperthreading may enable multiple virtual processors on a single-processor host. Copyright © Acronis, Inc., 2000-2010...
  • Page 227: File Destination

    Overwrite existing file - this will give the file in the backup priority over the file on the hard disk.  Overwrite existing file if it is older - this will give priority to the most recent file modification, whether it be in the backup or on the disk. Copyright © Acronis, Inc., 2000-2010...
  • Page 228: Access Credentials For Destination

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 229 SCSI drivers for the virtual environment, in the Mass storage drivers to install anyway step. Use drivers bundled with your virtual machine software or download the latest drivers versions from the software manufacturer Web site. Copyright © Acronis, Inc., 2000-2010...
  • Page 230: How To Convert A Disk Backup To A Virtual Machine

    Rather than converting a TIB file to a virtual disk file, which requires additional operations to bring the virtual disk into use, Acronis Backup & Recovery 10 performs the conversion by recovery of a disk backup to a fully configured and operational new virtual machine. You have the ability to adapt the virtual machine configuration to your needs when configuring the recovery operation.
  • Page 231: Bootability Troubleshooting

    OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 232 This may happen when system or boot volumes are not recovered to their original location. Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this automatically and so you are not likely to experience the problem.
  • Page 233: About Windows Loaders

    A part of the loader resides in the partition boot sector, the rest is in the files ntldr, boot.ini, ntdetect.com, ntbootdd.sys. boot.ini is a text file that contains the loader configuration. Example: [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect Copyright © Acronis, Inc., 2000-2010...
  • Page 234: Recovering Md Devices (Linux)

    1 million files, try recovering the first 500,000 of them and then the remaining 500,000.  Modify the registry as follows: Note: This procedure requires restarting the machine. Use standard precautions when modifying the registry. Copyright © Acronis, Inc., 2000-2010...
  • Page 235: Recovering The Storage Node

    6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed.
  • Page 236 To access this option, select the check box for Advanced view. When to validate Validate (p. 239) Specify when and how often to perform validation. After you configure all the required settings, click OK to create the validation task. Copyright © Acronis, Inc., 2000-2010...
  • Page 237: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 238: Backup Selection

    While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. Copyright © Acronis, Inc., 2000-2010...
  • Page 239: Access Credentials For Source

    Windows or Linux. Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Copyright © Acronis, Inc., 2000-2010...
  • Page 240: Archive Selection

    Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios:  Sharing: mounted images can be easily shared to networked users.  "Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine.
  • Page 241: Backup Selection

    According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. Copyright © Acronis, Inc., 2000-2010...
  • Page 242: Volume Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 243  an entire vault that can be exported by using the command line interface. For more information, please refer to Acronis Backup & Recovery 10 Command Line Reference. Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, writing onto removable or detachable media or other purposes.
  • Page 244 Backups (p. 246) - specify the archive first, and then select the desired backup(s) in this archive Access credentials (p. 246) [Optional] Provide credentials for accessing the source if the task account does not have enough privileges to access it. To access this option, select the Advanced view check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 245: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 246: Backup Selection

    To specify credentials 1. Select one of the following:  Use the task credentials The program will access the location using the credentials of the task account specified in the General section.  Use the following credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 247: Location Selection

    To export data to a locally attached tape device, expand the Tape drives group, then click the required device. For the management server the folders tree contains:  Local folders group to export data onto the hard drives that are local to the storage node. Copyright © Acronis, Inc., 2000-2010...
  • Page 248: Access Credentials For Destination

    According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. Copyright © Acronis, Inc., 2000-2010...
  • Page 249: Acronis Secure Zone

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 250: Acronis Secure Zone Size

    6.8.1.2 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and the maximum ones. The minimum size is approximately 50MB, depending on the geometry of the hard disk. The maximum size is equal to the disk's unallocated space plus the total free space on all the volumes you have selected in the previous step.
  • Page 251: Managing Acronis Secure Zone

    6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 381). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans can use Acronis Secure Zone as well as local plans.
  • Page 252: Acronis Startup Recovery Manager

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 253: Bootable Media

    Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
  • Page 254: How To Create Bootable Media

    The wizard will guide you through the necessary operations. Please refer to Linux-based bootable media (p. 255) for details. PE-based bootable media Acronis Plug-in for WinPE can be added to WinPE distributions based on any of the following kernels:  Windows XP Professional with Service Pack 2 (PE 1.5) ...
  • Page 255 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 261) for details. 6.10.1.1...
  • Page 256: Kernel Parameters

    8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 258). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected. 9. Path to the media ISO file or the name or IP and credentials for PXE or WDS/RIS.
  • Page 257: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 258: Network Port

    (enter the port number). If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console. Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to the media.
  • Page 259: Adding The Acronis Plug-In To Winpe 1.X

    Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 260 You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 5. Choose whether you want to create ISO or WIM image or upload the media on Acronis PXE Server.
  • Page 261: Connecting To A Machine Booted From Media

    7. Start the Bart PE builder. 8. Specify the path to the Windows installation files or Windows distribution CD. 9. Click Plugins and check whether the Acronis Backup & Recovery 10 plug-in is enabled. Enable if disabled. 10. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create.
  • Page 262: Setting Up A Display Mode

    The name of the iSCSI initiator is usually defined by an administrator of the server that hosts the device. To add an iSCSI device 1. In a bootable media (Linux-based or PE-based), run the management console. Copyright © Acronis, Inc., 2000-2010...
  • Page 263: List Of Commands And Utilities Available In Linux-Based Bootable Media

    Acronis command line utilities  acronis  asamba  lash  restoreraids  trueimagecmd  trueimagemnt Linux commands and utilities busybox ifconfig init rmmod cdrecord insmod route chmod iscsiadm chown kill scsi_id chroot kpartx sg_map26 lspci sleep Copyright © Acronis, Inc., 2000-2010...
  • Page 264: Recovering Md Devices And Logical Volumes

    6.10.5.1 Creating the volume structure automatically Suppose that you saved the volume structure to the /etc/Acronis directory—see Backing up LVM volumes (Linux) (p. 45)—and that the volume with this directory is included in the archive. To recreate the volume structure in Linux-based bootable media, use either of the methods described below.
  • Page 265: Creating The Volume Structure Manually

    6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 266 8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 267 For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 263). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 268: Acronis Pxe Server

    3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation. Later on it will automatically launch at each system restart. You can stop and start Acronis PXE Server in the same way as other Windows services.
  • Page 269: Disk Management

    PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh...
  • Page 270: Basic Precautions

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 371) created with the Acronis Bootable Media Builder;...
  • Page 271: Choosing The Operating System For Disk Management

    The disk layout will be displayed according to the operating system you select. 6.11.4 "Disk management" view Acronis Disk Director Lite is controlled through the Disk management view of the console. The top part of the view contains a disks and volumes table enabling data sorting and columns customization and toolbar.
  • Page 272: Disk Operations

    To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools.
  • Page 273: Selecting Source And Target Disks

    The new volume structure will be graphically represented in the Disk management view immediately. It is advisable that you deactivate Acronis Startup Recovery Manager (p. 368) (ASRM), if it is active, before cloning a system disk. Otherwise the cloned operating system might not boot. You can activate the ASRM again after the cloning is completed.
  • Page 274 If you need more than 4 primary volumes on one disk.  If you need additional disk reliability against any possible data damage. If you need to convert a basic MBR disk to basic GPT: 1. Select a basic MBR disk to convert to GPT. Copyright © Acronis, Inc., 2000-2010...
  • Page 275 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 276) using the Convert to basic operation.
  • Page 276 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 277: Volume Operations

    System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 278: Creating A Volume

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 279: Create Volume Wizard

    After you click the Next button, you will proceed forward to the next wizard page: Select destination disks (p. 279). Select destination disks The next wizard page will prompt you to choose the disks, whose space will be used for the volume creation. Copyright © Acronis, Inc., 2000-2010...
  • Page 280: Set The Volume Size

    On the next wizard page you can assign the volume Letter (by default - the first free letter of the alphabet) and, optionally, a Label (by default – none). Here you will also specify the File system and the Cluster size. Copyright © Acronis, Inc., 2000-2010...
  • Page 281: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 282: Set Active Volume

    (To finish the added operation you will have to commit (p. 284) it. Exiting the program without committing the pending operations will effectively cancel them.) The new volume structure will be graphically represented in the Disk management view immediately. Copyright © Acronis, Inc., 2000-2010...
  • Page 283: Change Volume Label

    (To finish the added operation you will have to commit (p. 284) it. Exiting the program without committing the pending operations will effectively cancel them.) The new volume structure will be graphically represented in the Disk management view. Copyright © Acronis, Inc., 2000-2010...
  • Page 284: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 285: Centralized Management

    Use the Dashboard to estimate at a glance the health of data protection on the registered machines. The Dashboard displays the summary of Acronis Backup & Recovery 10 agents' activities, lets you check for free space available in managed vaults, and rapidly identify and resolve any issues.
  • Page 286 Options > Console options > Time-based alerts. Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server.
  • Page 287: Backup Policies

    To be able to manage and protect multiple machines as a whole, you can create a backup plan template called a "backup policy". By applying this template to a group of machines, you will deploy multiple backup plans with a single action. Backup policies exist only on the Acronis Backup & Recovery 10 Management Server.
  • Page 288: Backup Policy Deployment States

    In the Tasks view, apply the Last result -> Failed filter if there are too many tasks. You can also sort the failed tasks by backup plans or by machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 289: Actions On Backup Policies

    In the Machines selection (p. 290) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Copyright © Acronis, Inc., 2000-2010...
  • Page 290: Machines Selection

    In the group tree, select the required group. Then, in the right part of the window, select the machines to apply the backup policy to. 2. Click OK. The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies.
  • Page 291: Policy Details

    In the Machine details (p. 299)/Group details (p. 308) window, examine all information on the selected machine (or the selected group). View tasks of the machine Click View tasks. (group). The Tasks (p. 320) view will display a list of the tasks, pre-filtered by the selected Copyright © Acronis, Inc., 2000-2010...
  • Page 292: Physical Machines

    7.1.3 Physical machines Acronis Backup & Recovery 10 lets the administrator protect data and perform management operations on multiple machines. The administrator adds a machine to the management server using the machine's name or IP address, imports machines from Active Directory, or from text files. Once a machine is registered (p.
  • Page 293: Actions On Machines

    In the Import machines from Active Directory (p. 296) window, specify the machines or organizational units whose machines you need to import to the management server. Import machines from a text Click Import machines from file. file Copyright © Acronis, Inc., 2000-2010...
  • Page 294: Applying Policies

    Delete a machine from the Click Delete machine from AMS. management server As a result, backup policies are revoked and shortcuts to centralized vaults are deleted from the machine. If the machine is not available at the moment, these Copyright © Acronis, Inc., 2000-2010...
  • Page 295 Manual refresh guarantees that the most recent data is displayed. Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & Recovery 10 Management Server to a managed machine and perform other centralized management operations, you need to register the machine on the management server.
  • Page 296: Importing Machines From Active Directory

    The registration procedure can be initiated on the machine side. 1. Connect the console to the machine where Acronis Backup & Recovery 10 agent is installed. If prompted for credentials, specify credentials of a member of the Administrators group on the machine.
  • Page 297 To synchronize machines with a text file using command line 1. Log on as a member of the Acronis Centralized Admins security group. 2. In the command prompt, change the directory to the folder where Acronis Backup & Recovery 10 Management Server has been installed—by default: C:\Program Files\Acronis\AMS.
  • Page 298: Importing Machines From A Text File

    1. In the groups tree, select the group whose machines you need to add. 2. In the right part of the window, select the machines. 3. To add more machines from other groups, repeat the steps 1 and 2 for each group. 4. Click OK to add machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 299: Machine Details

    Expired - the trial period of the machine's agent has expired. To specify a full license key, use the Change License functionality, or run the setup program and follow its instructions.  Installed agents - full name of Acronis agents, installed on the machine.  Operating system - the operating system the machine's agent runs.
  • Page 300 View details of a plan/task Backup plan Click View details. In the Plan Details (p. 193) window, review the plan details. Task Click View details. In the Task Details (p. 191) window, review the task details. Copyright © Acronis, Inc., 2000-2010...
  • Page 301 (from the file backup): The aborted operation may cause changes in the destination folder. Some files may be recovered, but some not, depending when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 302 When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 303 You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. View log related to a group Click View log. This opens Log view with pre-filtered log entries of the selected group. Copyright © Acronis, Inc., 2000-2010...
  • Page 304: Filtering And Sorting Machines

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 305: Actions On Groups

    Manual Refresh guarantees that the most recent data is displayed. Creating a custom static or dynamic group To create a group 1. In the Group name field, enter a name for the group being created. Copyright © Acronis, Inc., 2000-2010...
  • Page 306  the member changes so that it no longer meets the criteria  the administrator changes the criteria so that the member no longer meets the criteria Copyright © Acronis, Inc., 2000-2010...
  • Page 307: Organizational Unit Criterion

    1. In the groups tree, click the group to move the selected group to. You can move any type of custom group (either static, or dynamic) to another custom group of any type, or to the root folder. Copyright © Acronis, Inc., 2000-2010...
  • Page 308: Editing Custom Groups

    View log of a policy Click View log. The Log (p. 323) view will display a list of the log entries related to the selected backup policy. Revoke a policy from the Click Revoke. Copyright © Acronis, Inc., 2000-2010...
  • Page 309: Virtual Machines

    Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 295) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
  • Page 310: Virtual Machines On A Management Server

    4. The virtual machines hosted on the Hyper-V server appear in the All virtual machines group. Adding ESX/ESXi virtual machines 1. VMware Tools (p. 50) have to be installed in the guest systems. 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of the following: ...
  • Page 311 Virtual machines remain in the All virtual machines group and in other groups if their host is managed by Agent for ESX/ESXi. Policies applied to these groups or directly to the machines continue Copyright © Acronis, Inc., 2000-2010...
  • Page 312 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
  • Page 313: Support For Vcenter Clusters

    When installing the purchased product, select Use a license from the following Acronis License Server and specify the license server that has the appropriate number of licenses for Acronis Backup & Recovery 10 Advanced Server Virtual Edition. You need one license for every host you selected.
  • Page 314: Privileges For Vm Backup And Recovery

    In addition, the Global > Licenses privilege is required to be able to back up virtual machines of a specific ESX host. Operation Object Privilege Back up a Back up a Recover to Recover to VM's disk a new VM an existing deploymen Datastore Allocate space Browse datastore Copyright © Acronis, Inc., 2000-2010...
  • Page 315 Virtual machine > Configure CD Interaction media Console interaction Power off Power on Virtual machine > Create from Inventory existing Create new Remove Virtual machine > Allow disk access Provisioning Virtual machine > Create snapshot State Copyright © Acronis, Inc., 2000-2010...
  • Page 316 Remove disk Settings Virtual machine > Power off Interaction Power on Virtual machine > Create from Inventory existing Create new Remove Virtual machine > Allow disk access Provisioning Virtual machine > Create snapshot State Remove snapshot Copyright © Acronis, Inc., 2000-2010...
  • Page 317: Storage Nodes

    (p. 376). To learn more about Acronis Backup & Recovery 10 Storage Node, see the Acronis Backup & Recovery 10 Storage Node (p. 20) section.
  • Page 318: Actions On Storage Nodes

    (p. 81). 3. Add (p. 319) the storage node to the Acronis Backup & Recovery 10 Management Server. 4. Create a managed vault (p. 133): specify the path to the vault, select the storage node that will manage the vault and select the management operations such as deduplication or encryption.
  • Page 319: Adding A Storage Node

    7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on the selected Acronis Backup & Recovery 10 Storage Node. This information is also duplicated on the Information pane. Copyright © Acronis, Inc., 2000-2010...
  • Page 320: Tasks

    To learn more about task states and statuses, see the Task states (p. 185) and Task statuses (p. 186) sections. Way of working with tasks  Use the filtering and sorting (p. 322) capabilities to display the desired tasks in the table.  Select a task to take an action on it. Copyright © Acronis, Inc., 2000-2010...
  • Page 321: Actions On Tasks

    Only the management server administrator can do this.  Do not have the appropriate privilege Without Administrator privileges on the machine, a user cannot modify tasks owned by other users Copyright © Acronis, Inc., 2000-2010...
  • Page 322: Filtering And Sorting Tasks

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 323: Log

    7.1.7 The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log.
  • Page 324 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries. Display log entries for a 1. In the From field, select the date starting from which to display the log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 325: Centralized Log Entry Details

    Acronis support service to solve the problem.  Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem. Copyright © Acronis, Inc., 2000-2010...
  • Page 326: Reporting

    Reports are generated based on report templates. The templates define the information to be included in the report and the way the information is represented. Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines ...
  • Page 327: Report About The Machines

    Under Filters, choose which backup policies to include in the report. Only the backup policies that meet all filter criteria are included.  Backup policies: The list of backup policies.  Source type: The type of data backed up under the backup policies—Disks/volumes and/or Files. Copyright © Acronis, Inc., 2000-2010...
  • Page 328: Report About The Backup Plans

    Specify how to sort the table. 7.1.8.4 Report about the tasks In this view, you can generate a report about the tasks that run on registered machines. This report consists of one or more tables. Copyright © Acronis, Inc., 2000-2010...
  • Page 329: Report About The Archives And Backups

     Number of backups: The limits for the number of backups that each of the archives contains. With the default filter settings, the report includes all archives that are stored in the centralized managed vaults. Copyright © Acronis, Inc., 2000-2010...
  • Page 330: Report About The Vaults' Statistics

    Origin: The types of origin of the tasks—Centralized, Local, and/or Local without backup plan. A centralized task belongs to a centralized backup plan. A local task might not belong to a backup plan (for example, a recovery task). Copyright © Acronis, Inc., 2000-2010...
  • Page 331: Configuring Acronis Backup & Recovery 10 Components

    2. Make sure, that the Enable JavaScript check box is selected. 3. Click OK. 7.2 Configuring Acronis Backup & Recovery 10 components There are three ways to configure various parameters of Acronis Backup & Recovery 10 components in Windows:  By using Acronis Administrative Template ...
  • Page 332: Parameters Set Through Administrative Template

    7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup & Recovery 10 components that can be set by using Acronis Administrative Template. For information on how to apply the administrative template, see How to load Acronis Administrative Template (p. 332).
  • Page 333 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
  • Page 334 Vault Free Space Error Limit or less, an error is recorded in the storage node's log. Backups performed to the vault will keep failing until the vault's free space is above the limit. Vault Database Free Space Warning Limit Copyright © Acronis, Inc., 2000-2010...
  • Page 335 Database path when creating the vault. 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Backup & Recovery 10 Management Server that can be set by using Acronis Administrative Template. Collecting Logs Specifies when to collect log entries from machines managed by Acronis Backup & Recovery 10 Management Server.
  • Page 336 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 91). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Management Server's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record Acronis Backup &...
  • Page 337 (Note: Connections to machines with high synchronization priority—see Period-High Priority later in this topic—are likely to be always kept.) Synchronization connections are unrelated to connections such as those between Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console. Maximum Workers Description: Specifies the maximum number of threads to use for synchronization.
  • Page 338 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously). If there are fewer worker threads than normal-priority machines, the actual interval between synchronizations may be longer than the value of this parameter.
  • Page 339 Description: Specifies the initial size of the snapshot storage as a percentage of the disk space that is available at the time of starting the backup. Possible values: Any integer number between 0 and 100 Default value: 50 Copyright © Acronis, Inc., 2000-2010...
  • Page 340 The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template. Licensing Specifies how often the agent checks its license on the license server, and how long it can work without a license server.
  • Page 341 For details on how the agent log is cleaned up, see Log cleanup rules (p. 97). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Agent's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log.
  • Page 342 This setting is effective only when the Snapshot Storage Absolute Size setting is 0. Description: Specifies the initial size of the snapshot storage as a percentage of the disk space that is available at the time of starting the backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 343: Connection Parameters

    The size of the snapshot storage does not affect the size of the backup. 7.2.1.5 Acronis Backup & Recovery 10 This section of the administrative template specifies the connection parameters and event tracing parameters for the following Acronis Backup & Recovery 10 components:  Acronis Backup & Recovery 10 Management Server ...
  • Page 344 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 87). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 345 The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both. Each event has a level from zero to five based on the event's severity, as shown in the following...
  • Page 346: Parameters Set Through Gui

    Information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 347: Creating A Backup Policy

    Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its tape vaults database. This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libraries, and approximately equals 10 MB per hundred archives.
  • Page 348 The conversion can be performed by any machine that is registered on the management server and has Acronis Backup & Recovery 10 Agent with the corresponding functionality. The archive has to be stored in a shared location, such as a network folder or a managed vault, so that the selected machine can access the archive.
  • Page 349: Policy Credentials

    Folder on VMware vCenter If the management server is integrated with vCenter Server, the resultant virtual machines will appear in the Acronis Backups folder on the vCenter. You can specify a subfolder for the machines resulting from execution of the policy.
  • Page 350: Items To Back Up

    If multiple operating systems are installed on the computer, this is the boot volume of the operating system in which the agent is working. For more details, see "Note on Windows machines" below. Copyright © Acronis, Inc., 2000-2010...
  • Page 351 The names of templates are case-sensitive. Note: When backing up virtual machines by using Acronis Backup & Recovery 10 Agent for ESX/ESXi, [All Volumes] is the only template that can be used. What does a disk or volume backup store? For supported file systems, a disk or volume backup stores only those sectors that contain data.
  • Page 352 Since backup policies are commonly applied to multiple machines with various operating systems, Acronis recommends that you always select both the system and the boot volumes for backup, to ensure the integrity of every operating system. Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized backup policy.
  • Page 353: Files To Back Up Selection Rules

    Settings\All Users in Windows XP and C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment variables and text. For example, to refer to the Acronis folder in the machines' Program Files folder, type: %PROGRAMFILES%\Acronis Copyright © Acronis, Inc., 2000-2010...
  • Page 354: Access Credentials For Source

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 355: Exclusions

    1. Selecting the archives destination Choose where to store machines' archives:  Store all machines' archives in a single location  To store archives in a centralized vault, expand the Centralized group and click the vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 356: Access Credentials For Location

    Store each machine's archive in the machine's Acronis Secure Zone Acronis Secure Zone has to be created on each machine the policy will be applied to. For information on how to create Acronis Secure Zone, see the Creating Acronis Secure Zone (p. 249) section.
  • Page 357: Backup Scheme Selection

    With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page. In the Backup type field, select whether you want to create a full, incremental or differential backup (p. 33). Copyright © Acronis, Inc., 2000-2010...
  • Page 358 (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Feb 5—Feb 11 Feb 12—Feb 18 Feb 19—Feb 25 Copyright © Acronis, Inc., 2000-2010...
  • Page 359 If the schedule starts with a daily or a weekly backup, a full backup is created instead. Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that many may find useful.  Back up files every day, including weekends Copyright © Acronis, Inc., 2000-2010...
  • Page 360 Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thursdays. On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to: Copyright © Acronis, Inc., 2000-2010...
  • Page 361 Up to 16 levels of full, differential, and incremental backups  Next-level backups are twice as rare as previous-level backups  One backup of each level is stored at a time  Higher density of more recent backups Copyright © Acronis, Inc., 2000-2010...
  • Page 362 Having four backups, we could recover data as of today, yesterday, half a week, or a week ago. Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to have is called the roll-back period. Copyright © Acronis, Inc., 2000-2010...
  • Page 363 Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Copyright © Acronis, Inc., 2000-2010...
  • Page 364 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 365 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup location becomes available. Likewise, backup tasks for incremental and differential backups will wait until all users are logged off and users are idle, respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 366: Archive Validation

    Validation of a volume backup calculates a checksum for every data block saved in the backup. Validation of the archive will validate all the archive’s backups and may take a long time and a lot of system resources. Copyright © Acronis, Inc., 2000-2010...
  • Page 367 3. Validation schedule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. For more information see the Scheduling (p. 166) section. Copyright © Acronis, Inc., 2000-2010...
  • Page 368: Glossary

     can serve as the primary location for dual destination backup. Limitation: Acronis Secure Zone cannot be organized on a dynamic disk (p. 374) or a disk using the GPT partitioning style. Acronis Secure Zone is considered as a personal vault (p. 378).
  • Page 369: Agent-Side Cleanup

    (p. 377), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 370: Backup Plan (Plan)

    4. On each machine, the agent (p. 368) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. Copyright © Acronis, Inc., 2000-2010...
  • Page 371: Backup Scheme

    (p. 371) or Windows Preinstallation Environment (WinPE) (p. 381) with the Acronis Plug-in for WinPE (p. 368). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 372: Centralized Backup Plan

    (p. 370) from the management server (p. 378). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 378). The centralized management operations include: ...
  • Page 373: Deduplicating Vault

    For more information please refer to Retention rules (p. 40). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 368) and Acronis Backup & Recovery 10 Management Server (p. 378).
  • Page 374: Disk Group

    A backup (p. 369) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 375: Dynamic Disk

    Dynamic group A group of machines (p. 377) which is populated automatically by the management server (p. 378) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 376: Dynamic Volume

    Full backup A self-sufficient backup (p. 369) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 377: Gfs (Grandfather-Father-Son)

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 377), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 368) is installed. Managed vault A centralized vault (p.
  • Page 378: Media Builder

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 379). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 379: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 380: Storage Node-Side Validation

    CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 377) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 381: Unmanaged Vault

    Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 377) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 368) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...
  • Page 382 A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. The Acronis Plug-in for WinPE (p. 368) enables running the Acronis Backup & Recovery 10 Agent (p. 368) in the preinstallation environment.
  • Page 383: Index

    Access credentials for source • 197, 202, 236, 239, 244, 246, 347, 354 Actions with archives on tapes in a library • Acronis Active Restore • 52, 56, 216, 218, 228, 368, 381 Adding a machine to another group • 294, Acronis Backup &...
  • Page 384 Bootable Media Builder • 22 Backup • 27, 33, 369, 372, 373, 374, 376, 377, 381 Building Bart PE with Acronis Plug-in from Windows distribution • 255, 261 Backup archive (Archive) • 19, 27, 369, 370, 372, 373, 376, 377, 378, 379, 380, Built-in group •...
  • Page 385 Direct management • 58, 181, 368, 373, 377, 378 Creating a volume • 277, 278 Disk backup (Image) • 49, 201, 202, 215, Creating Acronis Secure Zone • 161, 249, 368, 374, 377 Disk conversion Creating an unmanaged centralized vault •...
  • Page 386 File-level security • 99, 112, 113, 120, 123 How to create bootable media • 254, 260 Files selection • 220 How to install Hyper-V Integration Files to back up selection rules • 350, 353 Services • 18, 48, 50, 310 Copyright © Acronis, Inc., 2000-2010...
  • Page 387 Importing machines from Active Directory • 293, 296 Managed machine • 10, 27, 90, 368, 370, Increasing Acronis Secure Zone • 251 372, 373, 377, 379, 380 Incremental backup • 369, 371, 373, 377 Managed vault • 58, 317, 373, 376, 377, Inheritance of policies •...
  • Page 388 Proprietary Acronis technologies • 52 Parameters set through Windows registry • Protecting the servers • 60 Password for Acronis Secure Zone • 249, Protecting the virtual machines • 61 Protecting the workstations • 61 Pending operations • 271, 272, 274, 275, PXE and DHCP on the same server •...
  • Page 389 Source type • 193, 197, 199, 200 358, 364, 365, 366, 373 SSL certificates • 83, 85, 87, 344 Rights for Acronis services • 82, 349 Startup page • 89 RSM Media Pools • 137, 138 Static and dynamic groups • 62 Run backup plan •...
  • Page 390 Tape libraries • 51, 137 Universal Restore • 18, 22, 218, 228, 258 Tape library as a managed vault • 140 Universal Restore (Acronis Backup & Tape planning • 145, 156 Recovery 10 Universal Restore) • 52, Example 1 • 157 54, 216, 228, 380 Example 2 •...
  • Page 391 121, 125 WinPE (Windows Preinstallation Environment) • 368, 371, 381 Work across subnets • 269 Working under bootable media • 261 Working with backup plans and tasks • Working with the • 130, 131, 159, 285 Copyright © Acronis, Inc., 2000-2010...

Table of Contents