Table of Contents

Advertisement

Quick Links

User's Guide
Acronis
®
True Image Echo
Enterprise Server

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS TRUE IMAGE ECHO - ENTERPRISE SERVER

  • Page 1 User’s Guide Acronis ® True Image Echo Enterprise Server...
  • Page 2 Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.2.4 Security parameters in Acronis Administrative Template ..........15 2.3 Installing Acronis True Image Echo Enterprise Server components ........16 2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis True Image Agent for Windows ................... 17 2.3.2 Installation of Acronis True Image Agent for Linux ............
  • Page 4 3.8.1 Backing up to a locally attached tape device ..............34 3.8.2 Understanding backup to tape devices attached to the Backup Server ......34 3.8.3 Backing up to a tape device through Acronis Backup Server .......... 36 3.8.4 Restoring data from archives located on tape devices ........... 36 3.9 Viewing disk and partition information ................
  • Page 5 Chapter 10. Creating bootable media ............. 113 10.1 Creating Acronis rescue media ..................113 10.2 Creating a Win PE ISO with Acronis True Image Echo Enterprise Server ......115 Chapter 11. Operations with archives ............. 117 11.1 Validating backup archives ................... 117 11.2 Exploring archives and mounting images ...............
  • Page 6 16.1.5 ICompGS.exe tool: adding machines to the group server out of a *.txt file ....159 16.1.6 Ebasrvdb.exe tool: generate an XML file with the backup mapping details ....159 16.1.7 Tdbrepair.exe tool: rescan tapes and add information to Acronis tape database ... 159 16.1.9 Command-line mode usage under DOS ..............160 16.2 Scripting ........................
  • Page 7: Chapter 1. Introduction

    The complete system restoration can be performed to an existing system, to a new system with different hardware, or to virtual machines. With the Acronis Active Restore feature, users can access the server and begin working during the restore process, further decreasing downtime.
  • Page 8 Disk cloning and new disk deployment Acronis True Image Echo Enterprise Server can be used to clone an image onto multiple servers. For example, let’s say a company purchased several servers and needs similar environments on each of them. Traditionally, the IT manager would install the operating system and programs on every server.
  • Page 9: Acronis True Image Echo Enterprise Server Components

    1.2 Acronis True Image Echo Enterprise Server components Acronis True Image Echo Enterprise Server includes the following components. 1. Acronis True Image Management Console is a tool for remote access to Acronis components. Administrator uses the console to install, configure and control the components from remote.
  • Page 10 Archive bit reset (file-level backup only) Generating time-based names for backup files Recovery Recovery of dynamic volumes Recovery of system dynamic volumes on dissimilar hardware using Acronis Universal Restore or Acronis Active Restore Scheduling Schedule archive validation Start every N hours within daily schedule...
  • Page 11: Supported File Systems And Storage Media

    ReiserFS Reiser4 Linux SWAP If a file system is not supported or is corrupted, Acronis True Image Echo Enterprise Server can copy data using a sector-by-sector approach. For XFS and JFS file systems the partition resizing feature is not supported.
  • Page 12: License Policy

    (with the local program version) or remotely (using Acronis True Image Agent), or use both ways of control. The number of Acronis True Image Management Console, Acronis Group Server and Acronis Backup Server installations is not counted.
  • Page 13: Chapter 2. Acronis True Image Echo Enterprise Server Installation And Startup

    Windows Server 2000/Advanced Server 2000/Server 2003 Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions Windows Server 2008, Windows Server 2008 x64 Edition (except for the Acronis Active Restore feature) Windows Vista all Editions (except for the Acronis Active Restore feature) Acronis True Image Agent for Linux Linux 2.4.9 or later kernel...
  • Page 14: Security Parameters

    To install Acronis components on a computer, the user must be a member of the Administrators group on the computer. To get access to Acronis True Image Agent, installed on a computer, the user must be a member of the Administrators or Backup operators group on the computer.
  • Page 15: Encrypted Communication

    Once Acronis True Image Echo Enterprise Server components are installed, encrypted communication between the components is enabled automatically. The earlier versions of Acronis True Image Enterprise Server did not support encrypted communication, therefore connection to such components, if they present on the network, will not be encrypted.
  • Page 16: Installing Acronis True Image Echo Enterprise Server Components

    To install Acronis True Image Echo Enterprise Server components, run the Acronis True Image Echo Enterprise Server setup file. If you have the trial version of Acronis True Image Echo Enterprise Server installed on your system, you must uninstall it before installing the commercial version of the product.
  • Page 17: Installation Of Acronis True Image Echo Enterprise Server Local Version And Acronis True Image Agent For Windows

    Acronis True Image Echo Enterprise Server Install Window It is recommended that you install Acronis True Image Management Console first. After that you will be able to install Acronis True Image Echo Enterprise Server (local version) and Acronis True Image Agent for Windows remotely to networked computers.
  • Page 18: Installation Of Acronis True Image Agent For Linux

    2.3.2 Installation of Acronis True Image Agent for Linux To install the Acronis True Image Agent for Linux, extract its setup file to a shared Executable network drive or removable media, assign the attribute to this file, then perform installation procedure on a Linux-based system. For how to extract the file, see 2.4 Extracting Acronis True Image Echo Enterprise Server...
  • Page 19 Set the default limitations for users/computers, if needed, according to the selected policy. To do so, select Acronis Backup Server Management -> Specify Default Settings -> Set Quotas and time limits. The maximum disk space allowed for a user/computer can be set as the max location size divided by total number of users and computers.
  • Page 20 Click Set up User profiles -> Add. Choose the user name. Choose Use default settings. Click Proceed. Define the computers which administrators will back up using Acronis True Image Agents. Add the computers as follows. Copyright © Acronis, Inc., 2000-2009...
  • Page 21 Adding a computer to the administrator profile Schedule a check for exceeding the quotas and time limits, if needed according to the selected policy. To do so, select Acronis Backup Server Management -> Specify Default Settings -> Schedule automatic consolidation and backup management. Choose Periodically.
  • Page 22: Acronis Universal Restore Installation

    Acronis Universal Restore has its own serial number that is required at installation. Acronis Universal Restore can only be installed on a computer where at least one of the following Acronis components is installed:...
  • Page 23: Running Acronis True Image Management Console

    In case you remove Acronis True Image Agent or Acronis True Image Echo Enterprise Server local version from the system, there is an option to keep the Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone.
  • Page 24: Chapter 3. General Information And Proprietary Acronis Technologies

    When you back up files and folders, only the data, along with the folder tree, is compressed and stored. Backing up disks and partitions is performed in a different way: Acronis True Image Echo Enterprise Server saves a sector-based snapshot of the disk, which includes the operating system, registry, drivers, software applications and data files, as well as system areas hidden from the user.
  • Page 25: Acronis Secure Zone

    See details in destination backup Acronis Secure Zone is always available for archive creation as long as there is space for the backup file. If there is not enough space, older archives will be deleted to create space.
  • Page 26: Acronis Startup Recovery Manager

    The Acronis Secure Zone should not be the only location where a backup is stored. Should the disk have a physical failure, the Acronis Secure Zone could be lost. This is particularly critical for backups of servers; the Acronis Secure Zone should only be one part of an overall backup strategy.
  • Page 27: Acronis Backup Server

    Be careful! Disk letters in standalone Acronis True Image Echo Enterprise Server might sometimes differ from the way Windows identifies drives. For example, the D: drive identified in the standalone Acronis True Image might correspond to the E: drive in Windows.
  • Page 28: Quotas And Time Limits For Computers And Users

    Acronis Backup Server will combine the first full backup with the next incremental one into one full backup which will be dated the later backup date. Then, if necessary, this backup will be combined with the next, until the occupied storage space (or number of backups) decreases to the preset limit.
  • Page 29: Operations With Archives

    Backup Server. 3.5.4 Operations with archives Acronis Backup Server can display a list of backups, stored on the backup server, and sort the list by location or owners (users and computers). An administrator, if need be, can consolidate any backup (except for the oldest one in the archive) manually with the preceding backup file.
  • Page 30: How To Use

    10 minutes. The larger the image size, the more time you save. 3.6.3 How to use To be able to use Acronis Active Restore, prepare your system this way: (you can do it either locally, using Acronis True Image Echo Enterprise Server local version, or remotely using Acronis True Image Management Console): 1.
  • Page 31: Acronis Universal Restore

    3.7.2 Acronis Universal Restore general principles 1. Automatic HAL and mass storage drivers selection Acronis Universal Restore searches the Windows default driver storage folders (in the image being restored) for HAL and mass storage device drivers and installs drivers that better fit the target hardware.
  • Page 32: Acronis Universal Restore And Microsoft Sysprep

    If you already have Acronis Universal Restore, the prompt will not come up and you will have an option to enable Acronis Universal Restore later in the Restore Data Wizard. Copyright © Acronis, Inc., 2000-2009...
  • Page 33: Backing Up To Tape Libraries And Tape Drives

    Tape libraries, autoloaders and tape drives are accessible through the Acronis Backup Server. Acronis True Image Echo Enterprise Server local version can access tape drives only. The following diagram illustrates ways of access to tape devices for networks with (I) and without (II) backup server.
  • Page 34: Backing Up To A Locally Attached Tape Device

    Acronis True Image Agent doesn’t support a locally attached tape device. If you want to back up to tape via Acronis True Image Agent, select the tape device attached to the Backup Server as the backup location.
  • Page 35 -> Media pools -> Acronis. 2. Right click on the tape in the Acronis pool, dismount the tape if it is has a status Loaded and select Free from the context menu. The tape will be moved to the Free pool.
  • Page 36: Backing Up To A Tape Device Through Acronis Backup Server

    The reason for this is when you are trying to restore\validate an archive spanned over two or more tapes made by earlier versions of Acronis True Image Echo (builds up to 8163) via Acronis Backup Server of the latest version. Use the Tdbrepair.exe command- line tool to add information about such tape archives to the Backup Server database.
  • Page 37: Viewing Disk And Partition Information

    A prompt comes up if the required tape is not found. Archives created on tape devices through Acronis Backup Server cannot be accessed by a locally attached tape device in Acronis True Image Echo Enterprise Server local version.
  • Page 38: Chapter 4. Using Acronis True Image Management Console

    4.2 Installing/updating Acronis components on remote machines Acronis True Image Management Console allows for group installation and updates of Acronis True Image Echo Enterprise Server (local version) and Acronis True Image Agent for Windows on remote computers. To perform any of these operations, you will need administrator rights on the target machines.
  • Page 39 2.3 Installing Acronis True Image Echo Enterprise (for custom component features see Server components 4. Select computers on which the Acronis component is to be installed. This can be done - browsing the network. When browsing the network, you can select entire workgroups or domains - typing the computers names or addresses (click Next then add computers to the list) - importing the computers list from .txt or .csv files.
  • Page 40 Reboot the remote computer box. This option also can be applied to all computers or set to each machine individually. 6. The summary window displays a list of computers where the Acronis component will be installed.
  • Page 41: Managing A Single Remote Computer

    4.3.1 Connecting to a remote computer To establish a remote connection: 1. Click Connect to a remote computer in the center of Acronis True Image Management Console main window or on the toolbar, or select New connection from the sidebar or the Connect menu.
  • Page 42: Backup And Recovery Tasks

    Backup and Recovery Tasks (using the Acronis True Image Agent; and if the MSE Agent is installed at the local computer, the Microsoft Exchange Tasks and Tools will become available as well), Acronis Group Server Management and Acronis Backup Server Management.
  • Page 43 Wizard’s instructions. See details in 6. Creating backup archives Chapter 7. Restoring the backup data. 12.3 Browse logs of Acronis True Image Agent Click Show Log. See details in Viewing logs operation Set up default backup or restore options, Click Remote Computer Options, select...
  • Page 44 13. 4 Converting disk images to details in virtual disks Hard Disk Management Manage Acronis Secure Zone (create, Click Manage Acronis Secure Zone, then delete, resize, remove or change password) follow the wizard’s instructions. See details Chapter 9. Managing the Acronis Secure Zone...
  • Page 45 Click Manage Tasks, then follow the for MSE, as well as edit the scheduled sets Wizard’s instructions. of tasks. View Acronis Recovery for MS Exchange Click Logs. working logs. See the prepared Disaster Recovery Plan in Click Disaster Recovery Plan.
  • Page 46: Managing Groups Of Computers

    New connection on the toolbar, sidebar or the Connect menu. 4.4 Managing groups of computers 4.4.1 Group status display When connected to a computer where Acronis Group Server is installed, click Acronis Group Server management to display the following window. Copyright © Acronis, Inc., 2000-2009...
  • Page 47 Here you can monitor states of Acronis True Image Echo Enterprise Server tasks (backup, restore, validating backup archives) on all networked computers: Ready – the remote computer is available for the next task Prepare - preparations are being made on a remote machine for the task execution (analyzing partitions, preparing backup scripts, etc.)
  • Page 48: Creating New Group Tasks

    3. Export computers from the group server to a .txt or .csv file that can be used by other application or new versions of Acronis Group Server. To do so: click Export on the toolbar specify name of the file and a path to a folder where you want to create it.
  • Page 49 5. Specify the paths for the backup archives. To place every archive on its local computer, specify Local path or select Acronis Secure Zone, if there is such a zone on every 3.3 Acronis remote computer. For more information about the Acronis Secure Zone see Secure Zone .
  • Page 50: Group Tasks Management

    12. After you click Proceed, Acronis True Image Management Console connects to every computer of the group in turn to distribute the task. If a remote computer is inaccessible (shut down, for example), a dialog box appears. In this box, choose Ignore to exclude the computer from the group or Cancel to cancel the entire task.
  • Page 51: Acronis Group Server Options

    After the scanning is disabled, Acronis Group Server stops sending the packets, but the response may come to the packets already sent. Therefore, some computers may be added to the computer list after scanning is disabled.
  • Page 52: Managing Backup Server

    To adjust the status refresh rate, connect the console to the computer where Acronis Group Server is installed and select Tools -> Options -> Network -> Status check interval. 4.5 Managing backup server 3.5 Acronis Backup Before you start managing the backup server, be sure to read section Server stating the basic operating principles of this application.
  • Page 53: Default Settings

    Otherwise the name will be identified as a domain one. 4.5.1 Default settings Each user or computer, added to Acronis Backup Server database, is associated with the default backup location and the default user/computer quotas and time limits. When installed on a computer (which becomes a backup server from this point on), Acronis Backup Server creates the following folder: C:\Documents and Settings\All Users\Application Data\Acronis\BackupServer.
  • Page 54: Set Up Administrator Profiles

    4.5.2 Set up Administrator profiles Add a remote computer to Acronis Backup Server database if you want to be able to remotely back up data from that networked computer where Acronis True Image Agent is installed. Click Set up Administrator profiles -> Add, select the computer and specify backup location, quotas and time limits for this computer in Add Computer Profile Wizard windows.
  • Page 55: Adding Users And Administrators To The Acronis Backup Server Database

    Deleting a computer profile will disable backup to backup server for this computer and delete its existing archives. This operation can be time-consuming so schedule it for the off-peak period. 4.5.3 Adding Users and Administrators to the Acronis Backup Server database Acronis Backup Server creates a user group named AcronisBackupServerUsers (see Control Panel ->...
  • Page 56 To enable any other user to back up data from any networked computer where Acronis True Image Echo Enterprise Server local version is installed to backup server, an administrator should add this user to Acronis Backup Server database. To do so, first, add this person’s local or domain account to the AcronisBackupServerUsers group.
  • Page 57: Changing User Profiles

    To change a user’s backup location within the same device, you must have at least as much free space on the device as the user’s archives occupy because the archives will first be copied to the new location and then deleted from the old place. Copyright © Acronis, Inc., 2000-2009...
  • Page 58: Configuring Backup Locations

    To delete all archives stored in a backup location, select the location and click Clear. Copyright © Acronis, Inc., 2000-2009...
  • Page 59: Managing Archives

    4. Export an archive from Acronis Backup Server to a local hard drive or network share. To do so, select any backup belonging to the archive and click Export. Then provide name for the archive copy and a path to the location where the copy will be created.
  • Page 60: Limiting Access To Acronis Backup Server

    Acronis Backup Server may speed up each taken separately backup procedure at the expense of its possible delay. If maximum number of connections is set, then some agents or local Acronis True Image Echo Enterprise Server versions may be unable to access the server immediately after starting their task.
  • Page 61: Chapter 5. Using Acronis True Image Echo Enterprise Server (Local Version)

    Chapter 5. Using Acronis True Image Echo Enterprise Server (local version) Acronis True Image Echo Enterprise Server (local version) supports the GUI mode, the command-line mode, and can be used to execute XML scripts. Here we describe the operations available in the GUI mode, which provides the widest functionality. For console Chapter 16.
  • Page 62 Options – open a window for editing default backup/restore options, setting text appearance (fonts), configuring e-mail or Windows pop-up notifications etc. The Help menu is used to view help and obtain information about Acronis True Image Echo Enterprise Server. Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.
  • Page 63: Managing A Local Computer

    See details in 6. Creating backup archives Chapter 7. Restoring the backup data. Browse logs of Acronis True Image Echo Click Logs in the Manage Tasks group or Enterprise Server operation select the Show Log tool on the sidebar to navigate to the Event Log window.
  • Page 64 Hard Disk Management Manage Acronis Secure Zone (create, Click Manage Acronis Secure Zone, then delete, resize, remove or change password) follow the wizard’s instructions. See details Chapter 9. Managing the Acronis Secure Zone Activate Acronis Startup Recovery Manager Click Activate Acronis Startup Recovery...
  • Page 65 Turn on/off Windows System Restore tool Some of the above operations can be executed in command-line mode. For more 16.1 information on Acronis True Image Echo Enterprise Server command-line mode see Working in the command-line mode Copyright © Acronis, Inc., 2000-2009...
  • Page 66: Chapter 6. Creating Backup Archives

    4. You can exclude specific files from a backup by setting filters for the types of files you do not wish to back up. For example, you may want to exclude database files, hidden and system files and folders or files with .~, .tmp and .bak extensions. Copyright © Acronis, Inc., 2000-2009...
  • Page 67 If you are going to create a differential backup, select the full backup which will be a base, or any of the existing differential backups. Either way, the program will create a new differential backup. Copyright © Acronis, Inc., 2000-2009...
  • Page 68 Data saved to a network disk, ftp server or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.3 Acronis Secure Zone 3.5 Acronis Backup...
  • Page 69 Back to make changes in the created task. Clicking Proceed will launch the task. 10. (For Acronis True Image Echo Enterprise Server local version only) The task progress will be shown in a special window. You can stop the procedure by clicking Cancel.
  • Page 70: Backing Up Disks And Partitions (Image Backup)

    1. Start the Create Backup Wizard by clicking on the backup operation icon in the main program window. 2. Select My Computer. 3. Select disks, partitions or dynamic volumes to back up. You can select a random set of disks, partitions and dynamic volumes. Copyright © Acronis, Inc., 2000-2009...
  • Page 71 ) for storing backups. In those cases, you need not provide the file name. When backing up to Acronis Secure Zone, you have an option of dual destination backup. If enabled, the program will automatically place a copy of your backup archives on a local 6.3.12 Dual destination backup.
  • Page 72: Setting Backup Options

    See notes and recommendations for using the FTP server in media. 5. If your choice was not Acronis Backup Server, select whether you want to create a full or incremental backup. If you have not backed up the selected disks/partitions yet, or the full archive seems too old to append incremental changes to it, choose full backup.
  • Page 73: Archive Protection

    Server will ask for the password in a special window, allowing access only to authorized users. Passwords cannot be set for archives created in the Acronis Secure Zone. To protect such archives, set a password for the zone itself. Encryption The preset is 128 bit.
  • Page 74: Pre/Post Commands

    An example of a batch file, resuming the Windows services for MS Exchange: net start “Microsoft Exchange System Attendant” net start “Microsoft Exchange Event” net start “Microsoft Exchange IMAP4” net start “Microsoft Exchange MTA Stacks” Copyright © Acronis, Inc., 2000-2009...
  • Page 75: Compression Level

    6.3.6 Backup performance The three options below might have a more or less noticeable effect on the backup process speed. This depends on overall system configuration and physical characteristics of devices. 1. Backup process priority Copyright © Acronis, Inc., 2000-2009...
  • Page 76: Fast Incremental/Differential Backup

    2. HDD writing speed The preset is Maximum. Backing up in the background to an internal hard disk (for example, to the Acronis Secure Zone) may slow other programs’ performance because of the large amounts of data transferred to the disk. You can limit the hard disk usage by Acronis True Image Echo Enterprise Server to the desired level.
  • Page 77: Archive Splitting

    FTP server requires the archive to be split into files no more than 2GB in size). The preset is Automatic. With this setting, Acronis True Image Echo Enterprise Server will act as follows: When backing up to the hard disk: The program will create a single archive file if the selected disk has enough space and its file system allows the estimated file size.
  • Page 78: Media Components

    Acronis One-Click Restore always restores the entire disk. Therefore, if your disk consists of several partitions and you are planning to use Acronis One-Click Restore, all the partitions must be included in the image. Any partitions missing from the image will be lost.
  • Page 79: Dual Destination Backup

    If saving a backup copy to the Acronis Secure Zone please note: even when a password is set for the Acronis Secure Zone, the copy archive will not be protected with the password.
  • Page 80: Additional Settings

    1. Find the computer to be backed up in the list of computers. 2. Select the computer and enter its MAC address in the Acronis Group Server (sidebar -> Computer details -> MAC address: Set -> type the hex MAC address as XXXXXXXXXXXX or XX-XX-XX-XX-XX ->...
  • Page 81 With Reset archive bit enabled, Acronis True Image Echo Enterprise Server will reset archive bits of all files being backed up. Acronis True Image Echo Enterprise Server itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 82: Chapter 7. Restoring The Backup Data

    Acronis True Image Echo Enterprise Server might correspond to the E: drive in Windows. If a backup image is located on bootable media, you might have a choice of using Acronis One-Click Restore. This operation always restores the entire physical disk. Therefore, if your disk consists of several partitions, the partitions that are missing from the image will be lost.
  • Page 83: Recovering Dynamic Volumes

    1. Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 2. Select the archive. If the archive is located in the Acronis Secure Zone, select it to choose the archive on the next step.
  • Page 84 If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Enterprise Server will ask for it. The comment and the Next button will be unavailable until you enter the correct password.
  • Page 85 Set the options manually. If you set options manually, the settings will be applied only to the current restore task. Alternatively, you can edit the default options 7.4 Setting from the current screen. Then your settings will be saved as default. See restore options for more information. Copyright © Acronis, Inc., 2000-2009...
  • Page 86 Do not overwrite existing file – this will give the file on the hard disk unconditional priority over the archived file. 9. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. Copyright © Acronis, Inc., 2000-2009...
  • Page 87: Restoring Disks/Partitions Or Files From Images

    Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 7.3.2 Archive selection 1. Select the archive. If the archive is located in the Acronis Secure Zone, select it to choose the archive at the next step. Copyright © Acronis, Inc., 2000-2009...
  • Page 88: Restoration Type Selection

    If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Enterprise Server will ask for it. The partitions layout, the comment and the Next button will be unavailable until you enter the correct password.
  • Page 89 Using Active Restore When restoring a system disk/partition image (except for Windows Vista images) from the Acronis Secure Zone, you will have the third choice – to use Acronis Active Restore. 7.3.14 Having selected this option, you will proceed directly to the summary window ( Restoration summary and executing restoration ).
  • Page 90: Selecting A Disk/Partition To Restore

    Recover from backup The program will replace the existing disk signature with the one from the backup. Set this option when you are performing a disaster recovery restoration. Recovering a disk signature will allow you to: Copyright © Acronis, Inc., 2000-2009...
  • Page 91: Selecting A Target Disk/Partition

    Universal Restore . To buy the option, follow the link. If you already have Acronis Universal Restore, the prompt will not come up and you will have an option to enable Acronis Universal Restore later in the Restore Data Wizard.
  • Page 92: Changing The Restored Partition Type

    You can change the partition file system during its restoration, although it is seldom required. Acronis True Image Echo Enterprise Server can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For partitions with other native file systems, this option is not available.
  • Page 93: Changing The Restored Partition Size And Location

    (7.3.4) again and will have to repeat the above steps. Otherwise, do not set this switch. 7.3.12 Using Acronis Universal Restore Acronis Universal Restore is an add-on to Acronis True Image Echo Enterprise Server. It is purchased separately and installed from a separate setup file. The following is true for Acronis True Image Echo Enterprise Server installations including Acronis Universal Restore.
  • Page 94: Setting Restore Options

    1. Using Acronis Universal Restore will help you create a bootable system clone on 3.7 Acronis Universal Restore different hardware (for more information see ). Choose this when restoring a system disk to a computer with a dissimilar processor, different motherboard or other mass storage device than in the imaged system.
  • Page 95: Restoration Summary And Executing Restoration

    If you are going to restore Microsoft Exchange Server on bare metal, select the Run Acronis Recovery for MS Exchange Bare Metal Restore after data Recovery parameter in order to start the Acronis Recovery for MS Exchange bare metal restore task automatically after the image restoration is finished.
  • Page 96: Files To Exclude From Restoration

    Click Edit to open the Edit Command window where you can easily input the command, its arguments and working directory or browse folders to find a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, “pause”.) Copyright © Acronis, Inc., 2000-2009...
  • Page 97: Restoration Priority

    This option appears only in those computers’ options, where Acronis Universal Restore is installed. Acronis Universal Restore is an option to Acronis True Image Echo Enterprise Server. It should be purchased separately and installed from a separate setup file. For more 3.7 Acronis Universal Restore...
  • Page 98: Additional Settings

    The preset is disabled If you are going to restore Microsoft Exchange Server on bare metal, select this parameter in order to start the Acronis Recovery for MS Exchange bare metal restore task automatically after the image restoration is finished.
  • Page 99: Error Handling

    7.5 Creating dynamic disks and volumes Acronis True Image Echo Enterprise Server must obtain exclusive access to the disks to perform operations with disks and volumes. This means no other applications can access it at that time.
  • Page 100 The resulting volume size is displayed under the disk selection field. At this step, you can deselect disks that you do not want to be included in the volume. Copyright © Acronis, Inc., 2000-2009...
  • Page 101 6. Click Proceed in the summary window. On completion of operations, the dynamic volumes are unformatted and have no letters assigned. You will be able to assign the letters using Windows Disk Management tool after restoring Windows on the created volumes. Copyright © Acronis, Inc., 2000-2009...
  • Page 102: Chapter 8. Scheduling Tasks

    Chapter 8. Scheduling tasks Acronis True Image Echo Enterprise Server allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week.
  • Page 103 5. Specify the task start time and other schedule parameters, according to the selected periodicity (see 8.1.1 - 8.1.5). 6. Next you will have to specify the name of the user who owns the executed task; otherwise no scheduled execution will be available. Copyright © Acronis, Inc., 2000-2009...
  • Page 104: Setting Up Daily Execution

    If you select daily execution, set the Start time and days on which you want to execute the task: Every day Weekdays Every х days – once in several days (specify the interval). Repeat task every – set this if the task must be performed several times a day. Copyright © Acronis, Inc., 2000-2009...
  • Page 105: Setting Up Weekly Execution

    If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. Copyright © Acronis, Inc., 2000-2009...
  • Page 106: Setting Up Monthly Execution

    Start time fields. 8.1.4 Setting up one-time execution If you select the one-time execution, set the Start time and date on which to execute the task: Copyright © Acronis, Inc., 2000-2009...
  • Page 107: Setting Up Event-Driven Execution

    To rename a task, select it, click Rename on the toolbar, enter the new task name and press Enter. In Acronis True Image Echo Enterprise Server local version there is an option to duplicate a task so that you need program it only once. Select the task and click Clone on the toolbar.
  • Page 108: Chapter 9. Managing The Acronis Secure Zone

    Partition resizing may require a reboot. A computer can have only one Acronis Secure Zone. To create a zone on another disk, you must first delete an existing zone.
  • Page 109 4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is approximately 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step.
  • Page 110: Resizing The Acronis Secure Zone

    The opposite situation could arise if either partition lacks free space. 3. Select partitions from which free space will be used to increase Acronis Secure Zone or that will receive free space after the zone is reduced.
  • Page 111: Managing Backups In The Acronis Secure Zone

    4. To perform the password change operation, click Proceed in the final wizard window. 9.4 Managing backups in the Acronis Secure Zone The purpose of the Acronis Secure Zone management is to manually free up space in the Acronis Secure Zone by deleting or consolidating backups.
  • Page 112: Deleting Acronis Secure Zone

    Acronis Secure Zone deletion will destroy all backups stored in the zone. There is an option to keep the Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove the Acronis Secure Zone if you remove Acronis True Image Agent or Acronis True Image Echo Enterprise Server local version from the system.
  • Page 113: Chapter 10. Creating Bootable Media

    Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Echo Enterprise Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive.
  • Page 114 If this parameter is not specified, at booting a computer the program will display the boot menu and wait for someone to select whether to boot the OS or the Acronis component. If you set 10 sec for Acronis Bootable Agent, for example, the agent will launch in 10 seconds after the menu is displayed.
  • Page 115: Creating A Win Pe Iso With Acronis True Image Echo Enterprise Server

    To add the Acronis True Image Echo Enterprise Server plug-in to your Win PE distribution: 1. Make sure that Acronis Bart PE plug-in is installed on the computer (the default path is \Program Files\Acronis\TrueImageEchoEnterpriseServer\BartPE). If not, run Acronis True Image Echo Enterprise Server setup file, choose Modify and install the Acronis Bart PE plug-in.
  • Page 116 Media based on Win PE 2.0 and including Acronis True Image Echo Enterprise Server requires at least 768MB RAM to work. Copyright © Acronis, Inc., 2000-2009...
  • Page 117: Chapter 11. Operations With Archives

    Tools group or click Validate Backup Archive on the toolbar. 2. Select the archive to validate. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step.
  • Page 118: Exploring An Archive

    Yes (in R/W mode) Files extraction Acronis True Image Echo Enterprise Server can mount or explore an image archive only if all its volumes reside in the same directory. If your archive spans several CD-R/RW discs and you want to mount the image, copy all volumes to a hard disk drive or network drive.
  • Page 119: Mounting An Image

    1. Start the Mount Image Wizard by selecting Operations -> Mount Image in the main program menu. 2. Select the archive from the drives tree. If the archive is located in the Acronis Secure Zone, select it to choose the archive. The mount operation does not support Acronis Backup Server, so backup servers are not displayed in the tree.
  • Page 120 If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Enterprise Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password.
  • Page 121: Unmounting An Image

    The operation is somewhat similar to consolidating backups on the Acronis Backup Server. In either case, you can delete from an archive, if need be, the base full backup. The program will create another full backup in place of the oldest remaining backup.
  • Page 122 2. Select the archive from the drives tree. The file name based consolidation does not support Acronis Backup Server and Acronis Secure Zone, so these are not displayed in the 9.4 Managing backups in tree. For a backup consolidation in Acronis Secure Zone, see the Acronis Secure Zone.
  • Page 123 4. Choose location and name for the archive copy. By default, the program suggests the same location and the source archive name with (1) added. New archive will be created in the same folder and named MyBackup(1) 5. The program displays the summary window. Click Proceed to start consolidation. Copyright © Acronis, Inc., 2000-2009...
  • Page 124 MyBackup(1)2 is an incremental backup containing data as of Tuesday, July 17, 2007, 6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window. The resulting archive contents Copyright © Acronis, Inc., 2000-2009...
  • Page 125: Email Notification

    Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Enterprise Server can notify you when it is finished through the WinPopup service or e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion.
  • Page 126: Viewing Logs

    - during the operation when user interaction is required. 12.3 Viewing logs Acronis True Image Echo Enterprise Server allows users to view its working logs. These logs can provide information about scheduled tasks results, including reasons for failure, if any.
  • Page 127: Event Tracing

    12.4 Event tracing 12.4.1 Windows event log You can choose whether to store event log messages issued by Acronis True Image Echo Enterprise Server to Windows Event Log (to see this log, run eventvwr.exe or select Control Panel -> Administrative tools -> Event Viewer -> Application).
  • Page 128: Snmp Notifications

    Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing text description of occurred event (it looks identically to messages published by Acronis True Image Echo Enterprise Server in its log). Sending SNMP messages is disabled by default. To set up sending messages, select Send...
  • Page 129 If you run Acronis True Image Echo Enterprise Server regularly, this feature in your operating system is redundant. You can turn it off, freeing up to 12% of your hard disk space, directly from Acronis True Image Echo Enterprise Server.
  • Page 130: Chapter 13. Working With A Virtual Environment

    Workstation. Generally, a virtual machine can be treated: 1. As a physical computer (when it is online). Most Acronis True Image Echo Enterprise Server features and settings are applicable to a VM. The backup procedure is almost the Chapter 6. Creating backup archives same (see details in 2.
  • Page 131: Using The Disk Conversion Feature

    A Windows system image will be supplemented with appropriate system drivers during conversion, so that Windows could boot up on the VM. (In fact, the Acronis Universal Restore technology is applied in background because the program is aware which drivers are needed for compatible virtual machines.)
  • Page 132: Converting Workloads

    The procedure is the same as with restoring physical machines. To ensure booting up the system on the virtual machine, use Acronis Universal Restore. If the target virtual drive is a SCSI hard drive, provide appropriate drivers. For example, the VMware environment requires Buslogic or LSI logic drivers.
  • Page 133 Tools -> Convert to Virtual Disk in the main program menu. 2. Select the disk image to convert. If the image is located on an Acronis Backup Server or in the Acronis Secure Zone, select Personal backup location or Acronis Secure Zone, to select the image during the next step.
  • Page 134: Chapter 14. Transferring The System To A New Disk

    In this case, you have to transfer the system to a higher-capacity hard disk. This feature is available in Acronis True Image Echo Enterprise Server local version only. Transferring systems using Acronis True Image Management Console is not supported.
  • Page 135: Security

    14.3.2 Selecting source disk If the program finds several partitioned disks, it will ask you which is the source (i.e. the older data disk). Copyright © Acronis, Inc., 2000-2009...
  • Page 136: Selecting Destination Disk

    After you select the source disk, select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step. Copyright © Acronis, Inc., 2000-2009...
  • Page 137: Partitioned Destination Disk

    If you selected the manual mode, the program will ask you what to do with the old disk: Create a new partition layout – All existing partitions and their data will be deleted (but they will also be cloned to the new disk, so you won’t lose them) Copyright © Acronis, Inc., 2000-2009...
  • Page 138: Destroying The Old Disk Data

    14.3.7 Destroying the old disk data If you elected to destroy the old disk data in the previous step, you will have to select the destruction method now: Quick – quick one-pass destruction Normal – multipass destruction Copyright © Acronis, Inc., 2000-2009...
  • Page 139: Selecting Partition Transfer Method

    The first method is less secure, but is still suitable for most cases. 14.3.8 Selecting partition transfer method Acronis True Image Echo Enterprise Server will offer you the following data transfer methods: As is Proportional – the new disk space will be proportionally distributed among cloned partitions Manual –...
  • Page 140: Partitioning The Old Disk

    Director Suite. As a rule, "as is" transfers are not recommended, as they leave much unallocated space on the new disk. Using the "as is" method, Acronis True Image Echo Enterprise Server transfers unsupported and damaged file systems. If you transfer data proportionally, each partition will be enlarged, according to the proportion of the old and new disk capacities.
  • Page 141: Cloning Summary

    Cloning a non-system disk or a disk containing an operating system, but one that is not currently active, will proceed without reboot. After you click Proceed, Acronis True Image Echo Enterprise Server will start cloning the old disk to the new disk, indicating the progress in a special window.
  • Page 142 Having provided the new location and size, click Next. You will be taken two steps back to the partition layout. You might have to perform some more resizing and relocation before you get the layout you need. Copyright © Acronis, Inc., 2000-2009...
  • Page 143: Chapter 15. Adding A New Hard Disk

    This feature is available in Acronis True Image Echo Enterprise Server local version only. Adding disks using Acronis True Image Management Console is not supported.
  • Page 144: Disk Add Summary

    The disk add summary contains a list of operations to be performed on disks. After you click Proceed, Acronis True Image Echo Enterprise Server will start creating and formatting new partitions, indicating the progress in a special window. You can stop this procedure by clicking Cancel.
  • Page 145: Chapter 16. Command-Line Mode And Scripting

    Scripting is intended only for backup. 16.1 Working in the command-line mode An administrator might need a console interface in some situations. Acronis True Image Echo Enterprise Server supports this mode with TrueImageCmd.exe utility as well as ICompGS.exe, Ebasrvdb.exe, Tdbrepair.exe, and Adv_report.exe tools.
  • Page 146 /ftp_user /ftp_password letter] /start:[start sector] /oss_numbers /reboot /fat16_32 /size:[partition size in /log:[file name] sectors] /log_net_user:[remote user] /type:[active|primary|logical] /log_net_password:[password] /preserve_mbr When using the Acronis Universal Restore option: /ur_path:[path] /ur_username:[user] /ur_password:[pwd] /ur_driver:[inf-filename] /filename:[file name] /harddisk:[disk number] deploy_mbr /password:[password] /asz /target_harddisk:[disk number]...
  • Page 147 /log:[file name] /size:[ASZ size in Secure Zone on the /log_net_user:[remote user] sectors]|unallocated /asz_activate selected drive /log_net_password:[password] /password:[password] asz_activate Activates the Acronis Startup Recovery Manager /password:[password] asz_content Displays the Acronis Secure Zone size, free space contents Copyright © Acronis, Inc., 2000-2009...
  • Page 148: Common Options (Options Common For Most Trueimagecmd Commands)

    ASZ, use archive: /asz_content 1 = basic full backup 2 = 1st increment… and so on 0 (default) = latest increment Specify a user name for network drive Network drive /net_user:[username] Copyright © Acronis, Inc., 2000-2009...
  • Page 149: Specific Options (Options Specific For Individual Trueimagecmd Commands)

    If the log file is created on a network /log_net_password:[password] share, include the password for logon to the share 16.1.3 Specific options (options specific for individual trueimagecmd commands) Option Description create Copyright © Acronis, Inc., 2000-2009...
  • Page 150 .exe files with names consisting of five symbols and starting with “my”. /exclude_masks:*.txt,111.* Excludes all system files from the backup. /exclude_system Excludes all hidden files from the backup. /exclude_hidden Deploy Specifies the partition where the image file is stored (by letter or /file_partition:[partition Copyright © Acronis, Inc., 2000-2009...
  • Page 151 - if the target disk is the 1st according to BIOS and there are other primary partitions on it, the restored partition will be set logical - if the target disk is not the 1st, the restored partition will be set logical. Copyright © Acronis, Inc., 2000-2009...
  • Page 152 MBR saved in the image. If the position is not empty, the existing entry will be moved to another position. The following options are available when using the Acronis Universal Restore add-on to Acronis True 3.7 Acronis Universal Restore Image Echo Enterprise Server. For more information see...
  • Page 153 /partition image by its physical number, use /partition:<number in the image> /target_partition:<physical number of the target keys. For the above example, to restore partition 2-5 partition> to its original place use: /partition:2-2 /target partition:2-5 Explore Copyright © Acronis, Inc., 2000-2009...
  • Page 154 Disconnects all virtual drives. /letter:all asz_create Sets a password for the Acronis Secure Zone. /password:[password] Specifies the hard disk number where the Acronis Secure Zone will /harddisk:X be created. Specifies partitions from which free space will be taken for Acronis /partition:[partition Secure Zone.
  • Page 155: Trueimagecmd.exe Usage Examples

    This will create an image named 1.tib of the partitions 2-1 and 1-3. The image will be saved to the C:\Test\ folder. trueimagecmd /create /asz /partition:2-1,1-3 This will create an image of the partitions 2-1 and 1-3 in the Acronis Secure Zone. trueimagecmd /create /filename:"\Test\1.tib" /partition:2- 1,1-3 /file_partition:3-1 This will create an image named 1.tib of the partitions 2-1 and 1-3.
  • Page 156 This will restore MBR from the image of hard disk 1 to the same hard disk 1. The image is contained in the backup 3rd created in the archive number 2, located in the Acronis Secure Zone that is protected with the ‘pswd’ password.
  • Page 157 /list This will list available partitions. trueimagecmd /list /asz This will list contents of the latest image located in the Acronis Secure Zone. 8. Acronis Secure Zone: managing backups by archive numbers trueimagecmd /asz_content This will list the Acronis Secure Zone size, free space and contents.
  • Page 158 In our example (7), the incremental backup created on 8/14/2007 at 2:19 will be deleted. The next execution of the same command will delete the base FAAB backup. By continuing with the FAAA and AAA names, you can clear the Acronis Secure Zone except for the last remaining base backup that cannot be deleted.
  • Page 159: Icompgs.exe Tool: Adding Machines To The Group Server Out Of A *.Txt File

    EBaSrvDB.exe tool has the write access to it. If a file with the same name already exists at the target location, it will be overwritten without any warnings. 16.1.7 Tdbrepair.exe tool: rescan tapes and add information to Acronis tape database Syntax: tdbrepair.exe /...
  • Page 160: Command-Line Mode Usage Under Dos

    Acronis True Image Echo (builds up to 8163) via Acronis Backup Server of the latest version. This may also happen if Acronis tape database is corrupted or missing (after Windows reinstallation, for example).
  • Page 161: Script Structure

    Arguments include the following: /help – outputs help information about TrueImageTerminal.exe parameters. /progress – outputs progress of backup operations run either from Acronis True Image Echo Enterprise Server graphics user interface, or from the script. /execute: [script file name] – executes a script. If there are several scripts to be executed, they are queued.
  • Page 162: Script Usage Examples

    The script for backing up to tape (tapeN specifies the tapes numbers): <? xml version="1.0" encoding="utf-8" ?> <backup> <source letter =”c” /> <source letter ="f" /> <target cdrw="\taperecorder\\\.\tape0|||” /> <target cdrw="\taperecorder\\\.\tape1|||” /> <options compression="high" incremental="true" description="this is my backup" /> </backup> Copyright © Acronis, Inc., 2000-2009...

Table of Contents