ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER - UPDATE 3 User Manual

Hide thumbs Also See for BACKUP AND RECOVERY 10 ADVANCED SERVER - UPDATE 3:
Table of Contents

Advertisement

Acronis® Backup & Recovery ™ 10
Advanced Server
Update 3
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BACKUP AND RECOVERY 10 ADVANCED SERVER - UPDATE 3 and is the answer not in the manual?

Questions and answers

Summary of Contents for ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER - UPDATE 3

  • Page 1 Acronis® Backup & Recovery ™ 10 Advanced Server Update 3 User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.13 Proprietary Acronis technologies ....................51 2.13.1 Acronis Secure Zone ...........................51 2.13.2 Acronis Startup Recovery Manager ......................52 2.13.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............53 2.13.4 Acronis Active Restore ..........................55 2.14 Understanding centralized management ................56 2.14.1 Basic concepts ............................57 2.14.2...
  • Page 4 2.14.5 Backup policy's state and statuses ......................68 2.14.6 Deduplication .............................71 2.14.7 Privileges for centralized management .....................76 2.14.8 Communication between Acronis Backup & Recovery 10 components ..........82 Options ..........................89 Console options ........................89 3.1.1 Startup page ...............................89 3.1.2 Pop-up messages ............................89 3.1.3...
  • Page 5 Conditions ..........................179 5.7.1 User is idle ..............................180 5.7.2 Location's host is available ........................180 5.7.3 Fits time interval ............................181 5.7.4 User logged off ............................181 5.7.5 Time since last backup ..........................182 Direct management ......................183 Administering a managed machine ..................183 6.1.1 Dashboard ...............................
  • Page 6 6.11.6 Volume operations ..........................287 6.11.7 Pending operations ..........................293 6.12 Collecting system information ....................294 Centralized management ..................... 295 Administering Acronis Backup & Recovery 10 Management Server ........295 7.1.1 Dashboard ............................... 295 7.1.2 Backup policies ............................297 7.1.3 Physical machines ............................
  • Page 7 8.1.1 What is Acronis Backup & Recovery 10 Online? ..................378 8.1.2 What data can I back up and recover? ....................378 8.1.3 How long will my backups be kept in the online storage? ..............379 8.1.4 How to secure my data? ......................... 379 8.1.5...
  • Page 8: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Advanced Server inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 9: Getting Started

    1. Install Acronis Backup & Recovery 10 Management Server (p. 20). 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installing the agents, register each of the machines on the management server. To do so, enter the server's IP or name and the centralized administrator's credentials in one of the installation wizard's windows.
  • Page 10 2. Create the deduplicating managed vault on the storage node. 3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplicating vault. 4. Ensure that the backup plans you create use the managed vault as destination for the backup archives.
  • Page 11: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace Name Description Copyright ©...
  • Page 12 [Management server name]. Root of the tree also called a Welcome view. Displays the name of the management server the console is currently connected to. Use this view for quick access to the main operations, available on the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 13 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 14 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar...
  • Page 15: Operations With Panes

    Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace.
  • Page 16: Action Pages

    An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Copyright © Acronis, Inc., 2000-2010...
  • Page 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu.
  • Page 18: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes the following main types of components.
  • Page 19: Agent For Linux

    Universal Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.2 Agent for Linux This agent enables disk-level and file-level data protection under Linux.
  • Page 20: Components For Centralized Management

    1.3.2.1 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.3 Components for centralized management This section lists the components included in the Acronis Backup &...
  • Page 21: Storage Node

    1.3.3.2 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various resources (such as the corporate storage capacity, the network bandwidth, or the managed machines' CPU load) required for the enterprise data protection. This goal is achieved through organizing and managing the locations that serve as dedicated storages of the enterprise backup archives (managed vaults).
  • Page 22: Management Console

    Acronis Backup & Recovery 10 Management Console is an administrative tool for remote or local access to Acronis Backup & Recovery 10 agents, and in the product editions that include the centralized management capability, to the Acronis Backup & Recovery 10 Management Server.
  • Page 23: Acronis Wake-On-Lan Proxy

    Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 24  Windows MultiPoint Server 2010* Acronis Backup & Recovery 10 Storage Node handles tape libraries and autoloaders by using Removable Storage Management (RSM). Since Windows 7, Windows Server 2008 R2 and Windows MultiPoint Server 2010 do not support RSM, a storage node installed in these operating systems does not support tape libraries and autoloaders.
  • Page 25: System Requirements

    Windows Server 2008 R2 - the Standard, Enterprise, Small Business Server, Datacenter, Foundation editions  Windows MultiPoint Server 2010 Acronis Backup & Recovery 10 Agent for Linux  Linux with kernel 2.4.20 or later (including 2.6.x kernels) and glibc 2.3.2 or later ...
  • Page 26: Technical Support

    If you need assistance with your Acronis product, please go to http://www.acronis.eu/support/ Product Updates You can download the latest updates for all your registered Acronis software products from our website at any time after logging into your Account (https://www.acronis.eu/my) and registering the product.
  • Page 27: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 398) on the machine which becomes a managed machine (p. 406) from this point on.
  • Page 28 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 29 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 30 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 31: User Privileges On A Managed Machine

    A user who has administrative privileges on the machine, such as a member of the Administrators or Backup Operators group, additionally has the following management rights:  Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot. Copyright © Acronis, Inc., 2000-2010...
  • Page 32: Owners And Credentials

    When managing a machine running Linux, the user has or obtains the root privileges, and so can:  Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine.
  • Page 33: Full, Incremental And Differential Backups

    It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one.
  • Page 34 Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Maximal Medium Minimal Storage space Maximal Medium Minimal Creation time Minimal Medium Maximal Recovery time Copyright © Acronis, Inc., 2000-2010...
  • Page 35: Gfs Backup Scheme

    You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 36 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 37 The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. Copyright © Acronis, Inc., 2000-2010...
  • Page 38: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 39 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 40 Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 41: Retention Rules

    This is the maximum size of the archive. Every time a retention rule is applied, the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value. The diagram below shows the archive content before and after the deletion. Copyright © Acronis, Inc., 2000-2010...
  • Page 42 You cannot, say, delete an outdated full backup and keep its incremental “children”. When deletion of a backup affects other backups, one of the following rules is applied:  Retain the backup until all dependent backups become subject to deletion Copyright © Acronis, Inc., 2000-2010...
  • Page 43: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 405) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 44: Recovering Dynamic Volumes

    This will back up DYN1 and DYN2 volumes to the Acronis Secure Zone. trueimagecmd /create /harddisk:DYN /asz This will back up all dynamic volumes in the system to the Acronis Secure Zone. The boot code on basic GPT volumes is not backed up or recovered.
  • Page 45: Backing Up Lvm Volumes And Md Devices (Linux)

    Manager (LVM), called logical volumes; and multiple-disk (MD) devices, called Linux Software RAID. 2.9.1 Backing up logical volumes Acronis Backup & Recovery 10 Agent for Linux can access, back up and recover such volumes when running in Linux with 2.6.x kernel or a Linux-based bootable media. Backup (GUI) In Acronis Backup &...
  • Page 46: Backing Up Md Devices

    When recovering MD devices under bootable media, the structure of MD devices can be automatically created if it has been saved in the backup (p. 47). For detailed information about recovering MD devices under bootable media, see Recovering MD devices and logical volumes (p. 273). Copyright © Acronis, Inc., 2000-2010...
  • Page 47: Saving The Volume Structure Information

    Before performing the first disk backup on a source machine, run the following command: trueimagecmd --dumpraidinfo Either operation saves the machine’s logical volume structure to the /etc/Acronis directory. Make sure that the volume with this directory is selected for backup.
  • Page 48: Backing Up Hardware Raid Arrays (Linux)

    Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a bad partition table or no partition table at all. Backing up such disks does not make sense as it won’t be possible to recover them. Copyright © Acronis, Inc., 2000-2010...
  • Page 49: Tape Support

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 21). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p.
  • Page 50: Support For Snmp

    5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 409) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume.
  • Page 51: Proprietary Acronis Technologies

    1.3.6.1.4.1.24769.100.200.2.0:I0064000B Supported operations Acronis Backup & Recovery 10 supports only TRAP operations. It is not possible to manage Acronis Backup & Recovery 10 using GET- and SET- requests. This means that you need to use an SNMP Trap receiver to receive TRAP-messages.
  • Page 52: Acronis Startup Recovery Manager

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 53: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.
  • Page 54 Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis products, including images of systems prepared with Microsoft System Preparation Tool (Sysprep). The following is an example of using both tools on the same system.
  • Page 55: Acronis Active Restore

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup.
  • Page 56: Understanding Centralized Management

    If you opt for Acronis Active Restore, the system will be operational in a short time. Users will be able to open the necessary files from the storage and use them while the rest of the files, which are not immediately necessary, are being recovered in the background.
  • Page 57: Basic Concepts

    To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p. 408) and configure it to manage a centralized vault or multiple centralized vaults.
  • Page 58: Setting Up Centralized Data Protection In A Heterogeneous Network

    2. Install Acronis Backup & Recovery 10 Management Server [AMS] on one of the Windows servers (2). The management server is your single entry point to the Acronis infrastructure. 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's disks, volumes or files.
  • Page 59: Protecting The Servers

    IP addresses. 4. Install Acronis Backup & Recovery 10 Agent for ESX/ESXi [Agent (ESX)] on the ESX server (4) to back up the virtual machines from the host. The agent is delivered as a virtual appliance.
  • Page 60: Protecting The Workstations

    Backup policies view. To protect data on a daily basis, you can also use the GFS or Tower of Hanoi backup schemes. Copyright © Acronis, Inc., 2000-2010...
  • Page 61: Grouping The Registered Machines

    2.14.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibility to protect virtual machines in multiple ways:  Connect the console to the virtual appliance (Agent for ESX/ESXi) and create a backup plan that will back up all or some of the virtual machines.
  • Page 62: Using Custom Groups

    The diagram below presents an example of group hierarchy. Six machines are registered on the management server: 1 - the international sales manager's laptop (Windows Vista) 2 - the server that holds the corporate database and the shared document storage (Windows Server 2008) Copyright © Acronis, Inc., 2000-2010...
  • Page 63 You create empty groups in the generic root (Physical machines or Virtual machines) or within existing groups and populate them by manual adding machines (static groups) or by adding criteria of dynamic group membership. You can also Copyright © Acronis, Inc., 2000-2010...
  • Page 64: Policies On Machines And Groups

    Please familiarize yourself with this section to be sure that your actions yield the desired result and to understand the result of the automated Acronis Backup & Recovery 10 Management Server operations.
  • Page 65: A Policy On A Machine Or A Group

    2. A policy, revoked from the group, remains on the machine. 3. A policy, revoked from the machine, remains on the group and therefore on the machine. 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 66: Operations With A Machine

    The "blue" policy is applied, but the "orange" policy remains on the machine. 4. Remove from the group: Machine #3 is removed from the group. The "orange" policy is revoked from the machine. The machine remains in the All machines group. Copyright © Acronis, Inc., 2000-2010...
  • Page 67: Inheritance Of Policies

    Inheritance column and the inheritance order will be as follows: For machine Name of the policy Inheritance Inheritance order #1 or #2 or #3 "green" Inherited All machines -> #1 or #2 or #3 "orange" Inherited G1 -> #1 or #2 or #3 Copyright © Acronis, Inc., 2000-2010...
  • Page 68: Backup Policy's State And Statuses

    Revoking. You may change grouping conditions or the machine may change its properties so that the machine leaves one group and is included into another. This may result in revoking one policy and deploying Copyright © Acronis, Inc., 2000-2010...
  • Page 69: Policy Status On A Machine

    Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is applied to both Linux and Windows machines. Once the first backup is started, the policy gets the Error status on the Linux machines and on the Windows machines that do not have such volumes. Copyright © Acronis, Inc., 2000-2010...
  • Page 70: Policy Deployment State On A Group

    The status of the corresponding backup plan is Warning The status of the corresponding backup plan is OK Updating Error The updating log has errors: cannot delete the locked task, the Acronis service is stopped… Warning The updating log has warnings...
  • Page 71: Deduplication

    Deduplication is performed on disk blocks (block-level deduplication) and on files (file-level deduplication), for disk-level and file-level backups respectively. In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Copyright © Acronis, Inc., 2000-2010...
  • Page 72: How Deduplication Works

    Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node to determine what data can be deduplicated, and does not transfer the data whose duplicates are already present in the vault. Deduplication at target Performed in the vault after a backup is completed.
  • Page 73: When Deduplication Is Most Effective

    Deduplication and incremental backups In case of random changes to the data, de-duplication at incremental backup will not produce much effect because:  The deduplicated items that have not changed are not included in the incremental backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 74: Deduplication Best Practices

    When backing up multiple systems with similar content, back up one of the similar systems first, so that Acronis Backup & Recovery 10 Storage Node indexes all the system's files as potential deduplication items. This will lead to faster backup processes and less network traffic (because of effective deduplication at source), regardless of whether the backups are performed simultaneously or not.
  • Page 75: Deduplication Restrictions

    In the NTFS file system, a file may have one or more additional sets of data associated with it—often called alternate data streams. When such file is backed up, so are all its alternate data streams. However, these streams are never deduplicated—even when the file itself is. Copyright © Acronis, Inc., 2000-2010...
  • Page 76: Privileges For Centralized Management

    This section describes the users' privileges that are required to manage a machine locally and remotely, to manage a machine registered on Acronis Backup & Recovery 10 Management Server, and to access and manage Acronis Backup & Recovery 10 Storage Node.
  • Page 77: Privileges For Remote Connection In Linux

    Remote connections by the root user are established according to the Acronisagent authentication policy, which is automatically set up during the installation of Acronis Backup & Recovery 10 Agent for Linux, by creating the file /etc/pam.d/Acronisagent with the following content: #%PAM-1.0...
  • Page 78 If necessary, also add the root user to the file. 3. Create the file /etc/pam.d/Acronisagent-trusted with the following content: #%PAM-1.0 auth required pam_unix.so auth required pam_listfile.so item=user sense=allow file=/etc/pam.d/Acronis_trusted_users onerr=fail account required pam_unix.so Copyright © Acronis, Inc., 2000-2010...
  • Page 79: Acronis Security Groups

    When Acronis Backup & Recovery 10 Agent for Windows is being installed on a machine, the Acronis Remote Users group is created (or updated). A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery 10 Management Console, according to the management rights described in Users' privileges on a managed machine (p.
  • Page 80: Management Server Administrator Rights

    Tip: To ensure proper group names, you should install Acronis components in a domain controller after you have set up the domain controller itself. If the components were installed before you set up the domain controller, create the groups DCNAME $ Acronis Remote Users and DCNAME $ Acronis Centralized Admins manually, and then include the members of Acronis Remote Users and Acronis Centralized Admins in the newly created groups.
  • Page 81: Rights For Acronis Services

     All three accounts are assigned the Log on as a service user right.  The Acronis Agent User user account is assigned the Adjust memory quotas for a process and Replace a process level token user rights.  The Acronis Agent User and ASN User user accounts are included in the Backup Operators group.
  • Page 82: Communication Between Acronis Backup & Recovery 10 Components

    For instructions on how to manage SSL certificates used for secure authentication, see SSL certificates (p. 86). Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family, cannot connect to the Acronis Backup & Recovery 10 components, regardless of the secure authentication and data encryption settings.
  • Page 83: Client And Server Applications

    For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup & Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. An Acronis component can act as a client application, a server application, or both, as shown in the following table.
  • Page 84 Windows. If restart is not possible, make sure you do the following:  If Acronis Backup & Recovery 10 Management Console is running, close it and start it again.  If other Acronis components, such as Acronis Backup & Recovery 10 Agent for Windows or Acronis Backup &...
  • Page 85 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 86). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 86: Network Port Configuration

    Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent. The choice is available between: ...
  • Page 87 Thawte™—or by your organization's CA. Certificate path All Acronis components installed on a machine, when acting as a server application, use an SSL certificate called the server certificate. In Windows, the certificate path and the server certificate's file name are specified in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Encryption\Server.
  • Page 88 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the option to use trusted third-party certificates or certificates created by your organization's CA as an alternative to self-signed certificates, by using Acronis Certificate Command- line Utility. To install a third-party certificate 1.
  • Page 89: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 90: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 91: Management Server Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 92: Event Tracing

    This option defines whether the management server has to send its own log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 50)". The preset is: Disabled.
  • Page 93: Domain Access Credentials

    The preset is: Disabled. To bring this option into use: 1. Install Acronis WOL Proxy on any server in the subnet where the machines to be woken are located. The server has to provide continuous services availability. With multiple subnets, install Acronis WOL Proxy in every subnet where you need to use the Wake-On-LAN functionality.
  • Page 94: Online Backup Proxy

    ESX/ESXi is deployed (p. 322) to the virtual machine's host. Such machines appear as not manageable (grayed out). Once the agent is deployed to an ESX/ESXi host (this requires a license for Acronis Backup & Recovery 10 Advanced Server Virtual Edition), the virtual machines from this host are ready for applying a backup policy or individual backup.
  • Page 95: Machine Options

    3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
  • Page 96: Event Tracing

    The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 97 The settings you obtain in this case will be plan-specific or task- specific. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 50)". The preset is: Disabled.
  • Page 98: Log Cleanup Rules

    This parameter can also be set by using Acronis Administrative Template (p. 348). 3.3.4 Online backup proxy This option is effective only for backup to and recovery from Acronis Online Backup Storage over the Internet. This option defines whether the Acronis agent will connect to the Internet through a proxy server.
  • Page 99: Default Backup And Recovery Options

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 100 Additional settings (p. 119): Copyright © Acronis, Inc., 2000-2010...
  • Page 101: Archive Protection

    AES 192 – the archive will be encrypted using the AES algorithm with a 192-bit key  AES 256 – the archive will be encrypted using the AES algorithm with a 256-bit key. 5. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 102: Source Files Exclusion

    Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt To exclude a folder specified by a path containing the drive letter, add a backslash (\) to the folder name in the criterion; for example: C:\Finance\ Exclusion examples Criterion Example Description Copyright © Acronis, Inc., 2000-2010...
  • Page 103 The program does not support interactive commands, i.e. commands that require user input (for example, "pause"). To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  Execute before the backup  Execute after the backup Copyright © Acronis, Inc., 2000-2010...
  • Page 104 When the check box is not selected, the command execution result does not affect the task execution failure or success. You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard. Copyright © Acronis, Inc., 2000-2010...
  • Page 105 This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 106 TIB file and temporary files and fail the task if the command execution fails. 3.4.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. Copyright © Acronis, Inc., 2000-2010...
  • Page 107: Volume Shadow Copy Service

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 108: Compression Level

    Acronis Backup & Recovery 10 will select the VSS provider automatically based on the operating system running on the machine and whether the machine is a member of an Active Directory domain. Create snapshots without using VSS Choose this option if your database is incompatible with VSS. The data snapshot will be taken by Acronis Backup &...
  • Page 109: Backup Performance

    This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk.
  • Page 110: Network Connection Speed

    3.4.1.10 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 111 The When user interaction is required check box – to send notification during the operation when user interaction is required – is always selected. Click Send test WinPopup message to check if the settings are correct. Copyright © Acronis, Inc., 2000-2010...
  • Page 112: Windows Event Log

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 50)".
  • Page 113: Backup Splitting

    The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size.
  • Page 114: Media Components

    The result will be the same - the files will inherit the permissions from the parent folder. To access file or folder NTFS permissions, select Properties > Security. 3.4.1.15 Media components This option is effective for both Windows and Linux operating systems, when the backup destination is removable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 115: Error Handling

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 116: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 117: Task Failure Handling

    This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media. This option determines the program behavior when any of the backup plan's tasks fails. The preset is not to restart a failed task. Copyright © Acronis, Inc., 2000-2010...
  • Page 118 When this option is enabled, the backups, belonging to the policy or plan being created, will be located on a separate tape set. Other backups will not be written to this tape set. Copyright © Acronis, Inc., 2000-2010...
  • Page 119: Additional Settings

    When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To disable this warning, select this check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 120 When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 121: Default Recovery Options

    The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 122 Set current date and time for recovered files Validate backup archive before recovery Check file system after recovery Reboot machine automatically if it is required for recovery Windows Windows Windows Change SID after recovery recovery recovery recovery Notifications: Copyright © Acronis, Inc., 2000-2010...
  • Page 123 5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not recover until the command execution is Copyright © Acronis, Inc., 2000-2010...
  • Page 124: Recovery Priority

    Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine  Normal – to run the recovery process with normal speed, allocating resources on a par with other processes Copyright © Acronis, Inc., 2000-2010...
  • Page 125 NTFS permissions from the folder to which they are recovered. 3.4.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 126 Application Event Log of Windows; or send the events to the specified SNMP managers. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 127 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 50)".
  • Page 128 When operating under bootable media, this option is not effective for the NTFS file system. The preset is Disabled. This option defines whether to check the integrity of the file system after a disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 129 Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 130: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 131: Centralized Vaults

    Members of the Administrators group can view and manage any archive stored on the storage node. A user who is a member of the Administrators group on a managed machine can view and manage archives created by any user of this machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 132: Working With The "Centralized Vault" View

    All the archives are grouped by type on the following tabs:  The Disk archives tab lists all the archives that contain disk or volume backups (images).  The File archives tab lists all the archives that contain file backups. Related sections: Copyright © Acronis, Inc., 2000-2010...
  • Page 133: Actions On Centralized Vaults

    1. Select the vault. 2. Click Validate. You will be taken to the Validation (p. 243) page with an already pre-selected vault as a source. The vault validation checks all the archives in this vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 134: Creating A Managed Centralized Vault

    Specify a unique name for the vault. Creation of two centralized vaults with the same name is prohibited. Comments [Optional] Enter the distinctive description of the vault being created. Type Select the Managed type. Storage node Copyright © Acronis, Inc., 2000-2010...
  • Page 135 Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p. 135) Specify where the vault will be created. Managed centralized vaults can reside on a network share, SAN, NAS, or on a hard drive local to the storage node.
  • Page 136: Vault Encryption

    The password itself is not stored anywhere on the disk; the password hash is used for verification purposes. With this two-level security, the archives are protected from any unauthorized access, but recovering a lost password is not possible. Copyright © Acronis, Inc., 2000-2010...
  • Page 137: Creating An Unmanaged Centralized Vault

    When deleting a managed vault, you have the option to retain archives contained in the vault. The location resulting from such deletion can also be attached to the same or another storage node. Personal or centralized unmanaged vaults cannot be attached. Copyright © Acronis, Inc., 2000-2010...
  • Page 138: Tape Libraries

    4.1.3.1 Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acronis Backup & Recovery 10 Storage Node. The storage node should be installed on the machine a tape library is attached to. Storage node can simultaneously use more than one tape library for keeping archives.
  • Page 139 Tape compatibility table (p. 49) section. Acronis Backup & Recovery 10 enables you to set up distribution of backups by media. For example, a separate tape set can be used to back up some specific data, and the backups of all other data will be written onto any currently mounted tape, which does not belong to the tape set.
  • Page 140: Rsm Media Pools

    So the tape data will be lost. If all the backups are deleted from a tape, it will not return to the Free pool. It remains in the Acronis pool as a free tape to be reused. So if a storage node needs a new tape, it finds a free tape first in the Acronis pool, then in the Free pool.
  • Page 141: Getting Started With A Tape Library

    Getting started with a tape library If you have a tape library device attached to a machine with Acronis Backup & Recovery 10 Storage Node installed, all you need to do to back up onto the tape library is to create an archive vault on the device under storage node management.
  • Page 142: Actions On A Tape Library Vault

    To view and change the tape options, select Options > Default backup and recovery options > Default backup options > Tape support from the top menu. Copyright © Acronis, Inc., 2000-2010...
  • Page 143: Recovering From Tape Library

    (loaded or not). 4.1.3.6 Managing a tape library To manage a tape library the following tasks/procedures are in the product:  Inventory (p. 144)  Rescan (p. 144)  Labeling (p. 145) Copyright © Acronis, Inc., 2000-2010...
  • Page 144 At rescanning a tape label should be saved in the storage node database. If a slot, selected for the procedure, contains a tape that still does not have a label, the Rescan task for the tape is paused to perform the Labeling (p. 145) procedure. Copyright © Acronis, Inc., 2000-2010...
  • Page 145 Manage tapes on the toolbar. Then the Tape Management window will show a list of the library slots that contain tapes. For every tape belonging to the Free pool or to the Acronis pool, the slot data field indicates the tape label. Labels are also displayed for tapes that are in the Imported pool and contain backups written by Acronis (such might be the case when you bring a tape from another tape library).
  • Page 146: Tape Rotation

    If all backups are deleted from a tape, i.e. if information about the last backup on the tape is deleted from the storage node database, the tape is considered as empty and can be reused during a backup Copyright © Acronis, Inc., 2000-2010...
  • Page 147: Choosing A Backup Scheme

    The same tape rotation enables you to get by with the minimum number of cartridges and not to be buried in used tapes. Acronis Backup & Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries.
  • Page 148: Case To Analyze

    Keep in mind that a monthly backup is full, a weekly backup is differential, and a daily backup is incremental in this implementation of the GFS scheme. The first backup is always full. So if the Copyright © Acronis, Inc., 2000-2010...
  • Page 149 Further, a free tape is loaded into the same drive and mounted, and then the backup (last 24 Gb) is continued onto the beginning of the new tape. Copyright © Acronis, Inc., 2000-2010...
  • Page 150 This task deletes all the outdated backups. The next figure shows dark-gray rectangles instead of the backups deleted up to the current time. Physically the deleted backups are still on the tapes; however information about the backups is deleted from the storage node database. Copyright © Acronis, Inc., 2000-2010...
  • Page 151 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. Copyright © Acronis, Inc., 2000-2010...
  • Page 152 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Copyright © Acronis, Inc., 2000-2010...
  • Page 153 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 154 To recover the data only one tape is required for a full backup, two tapes for a differential backup, and two or three tapes for an incremental backup. This scheme has the following advantages:  access to any full backup requires only one tape Copyright © Acronis, Inc., 2000-2010...
  • Page 155 It requires 7 tapes in rotation. ToH Example 2 requires 4 tapes, which is the minimum for the case. So its tape options settings are the best in comparison with options for other examples. Copyright © Acronis, Inc., 2000-2010...
  • Page 156 (one tape - 16%, two tapes - 72%, three tapes - 12%) as well as rewinding and reading of one (6%), two (50%) or three (44%) backups Copyright © Acronis, Inc., 2000-2010...
  • Page 157 So in this specific case the selection of the Always use a free tape: For each full backup option considerably increases the usage efficiency of the tapes in the library. Copyright © Acronis, Inc., 2000-2010...
  • Page 158: Tape Planning

    (incremental backups, 50%) tapes. So on average the operation takes more time than in the previous examples. Tape planning Once you have specified the backup scheme and tape options, you should determine the minimal number of tapes necessary to achieve full automation of tape rotation. Copyright © Acronis, Inc., 2000-2010...
  • Page 159 Its backup line was the following: E (full), A, B, A, C, A, B, A, D, A, B, A, C, A, B, A, E, A, B, A, C, A, B, A, D. Copyright © Acronis, Inc., 2000-2010...
  • Page 160 What if I have to move tapes with backups from one tape library to another? 1. If both tape libraries are attached to the same machine with Acronis Backup & Recovery 10 Storage Node installed (i.e. the libraries are managed by the same storage node), the storage...
  • Page 161: Personal Vaults

    What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis agents create backups on tapes in a format that differs from the format used by the storage node. It is the reason why it is impossible to interchange tapes between tape devices attached to a storage node and attached to a managed machine: a tape written by a storage node cannot be read by an agent in a locally attached tape device.
  • Page 162: Working With The "Personal Vault" View

    Filtering and sorting archives (p. 167) Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates actions of the vault's toolbar. Copyright © Acronis, Inc., 2000-2010...
  • Page 163: Actions On Personal Vaults

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Click Create Acronis Secure Zone. Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 257) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 164: Common Operations

    These operations can be also accessed from the [Archive name] actions bar (on the Actions and tools pane) and from the [Archive name] actions item of the main menu respectively. The following is a guideline for you to perform operations with archives stored in a vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 165: Operations With Backups

    The Recover data (p. 222) page will be opened with the pre-selected backup as a source. Select the location and the type of new virtual machine and then proceed as with regular disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 166: Deleting Archives And Backups

    The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. There should be enough space in the vault for temporary files created during consolidation. Backups resulting from consolidation always have maximum compression. Copyright © Acronis, Inc., 2000-2010...
  • Page 167: Filtering And Sorting Archives

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 168: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 169: Daily Schedule

    Advanced scheduling settings (p. 177) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 170 As you can see, the time interval between the first and the second task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule Copyright © Acronis, Inc., 2000-2010...
  • Page 171: Weekly Schedule

    Advanced scheduling settings (p. 177) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 172 Wednesday: every 3 hours from 9 AM till 9 PM  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)  Saturday: once at 9 PM Copyright © Acronis, Inc., 2000-2010...
  • Page 173: Monthly Schedule

    For example, setting the task frequency to Every 1 hour From 10:00:00 AM From: <...> Until: <...> until 10:00:00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day. In the Effective... area, set the following settings: Copyright © Acronis, Inc., 2000-2010...
  • Page 174 Advanced scheduling settings (p. 177) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 175: At Windows Event Log Event

    For example, you may want to set up a backup plan that will automatically perform an emergency full backup of your data as soon as Windows discovers that your hard disk drive is about to fail. Copyright © Acronis, Inc., 2000-2010...
  • Page 176 Vista operating system records an event with the event source Microsoft-Windows- WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When creating the plan, type or select the following in the Schedule area: Copyright © Acronis, Inc., 2000-2010...
  • Page 177: Advanced Scheduling Settings

    Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the Wake- On-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start. If the backup task on each machine starts with a delay (see the next setting), the management server will wake up the machines according to those delays.
  • Page 178 5. To enable the use of the Wake-On-LAN functionality, select the Use Wake-on-LAN check box. 6. To distribute the centralized backup tasks' start times, select the Distribute start time within the time window check box and then specify the maximum delay value and the distribution method. Copyright © Acronis, Inc., 2000-2010...
  • Page 179: When An Adrm Alert Is Received

    This schedule is effective in Windows operating systems when Acronis® Drive Monitor™ (ADRM) is installed. Acronis Drive Monitor reports on hard disk health by using the hard disk’s internal monitoring system (S.M.A.R.T.). Based on alerts from Acronis Drive Monitor, you can set up emergency backups of your data in addition to regular backups.
  • Page 180: User Is Idle

    (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available. (3) If the location's host will never be available on workdays at 9:00 PM, the task never starts. Copyright © Acronis, Inc., 2000-2010...
  • Page 181: Fits Time Interval

    3:00 PM) will start at 4:00 PM—the time when the waiting period ends. 5.7.4 User logged off Applies to: Windows Enables to put a backup task run on hold until all users log off from Windows on the managed machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 182: Time Since Last Backup

    (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 183: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 184 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 185: Backup Plans And Tasks

    You can also hide the unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 192) section for details.  In the backup table, select the backup plan (task). Copyright © Acronis, Inc., 2000-2010...
  • Page 186: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 187: Task States

    A task may also change to the Waiting state when the event specified by the schedule occurs but the condition set in the backup plan is not met. See Task start conditions (p. 116) for details. Need interaction Copyright © Acronis, Inc., 2000-2010...
  • Page 188: Task Statuses

    Edit the failed task to prevent its future failure  Edit the local plan to prevent its future failure in case a local plan has failed  Edit the backup policy on the management server in case a centralized plan has failed Copyright © Acronis, Inc., 2000-2010...
  • Page 189: Working With Backup Plans And Tasks

    You will be taken to the Log (p. 196) view containing the list of the plan-related log entries. Task Click View log. You will be taken to the Log (p. 196) view containing the list of the task-related log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 190 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 191 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 192: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 193: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 194 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 195: Backup Plan Details

    Archive name - name of the archive.  Archive comments - comments on the archive (if provided). Settings The Settings tab displays the following information:  Backup scheme - the selected backup scheme and all its settings with schedules. Copyright © Acronis, Inc., 2000-2010...
  • Page 196: Log

    Backup options - backup options changed against the default values. 6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log.
  • Page 197: Filtering And Sorting Log Entries

    As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 198: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 199 Archive(N) where N is the sequence number of the archive in the location you have selected. Name backup files using the archive name, as in Acronis True Image Echo, rather than auto- generated names (p. 206) Not available when backing up to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage.
  • Page 200: Archive Validation

    Specify the conversion schedule if required. Host (p. 221) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 221)
  • Page 201: Why Is The Program Asking For The Password

    (p. 31) section. 6.2.3 Source type Select the type of data you want to be backed up on the managed machine. The list of available data types depends on the agents running on the machine: Files Copyright © Acronis, Inc., 2000-2010...
  • Page 202: Items To Back Up

    Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 203: Access Credentials For Source

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 204: Exclusions

    Excludes all files and folders with names starting with "F" (such as folders F, F1 and files F.log, F1.log) By mask (?) F???.log Excludes all .log files with names consisting of four symbols and starting with "F" Windows Copyright © Acronis, Inc., 2000-2010...
  • Page 205: Archive

     To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 390) to the online backup service and activate (p.
  • Page 206: Simplified Naming Of Backup Files

    This behavior is useful when you rotate USB hard drives and want each drive to keep a single full backup (p. 208) or all backups created during a week (p. 208). But you might end up with no backups if a full backup to your only drive fails. Copyright © Acronis, Inc., 2000-2010...
  • Page 207: Usage Examples

    Setting up full, incremental and differential backups within a single backup plan. You need to create separate backup plans for each type of backup  Backup to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage  Setting up retention rules ...
  • Page 208 You want to back up to the archive MyMachine on an external hard disk drive.  You have two such drives. Either of them has drive letter D in the operating system when attached to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 209 ServerFiles(1.31.2011)3.tib, and so on up to ServerFiles(1.31.2011)11.tib.  The following day, February 1, the backups will start with the full backup ServerFiles(2.1.2011).tib. The differential backups will start with ServerFiles(2.1.2011)2.tib. See also “The [Date] variable” (p. 210). Copyright © Acronis, Inc., 2000-2010...
  • Page 210: Access Credentials For Archive Location

    Specify credentials required for access to the location where the backup archive will be stored. The user whose name is specified will be considered as the archive owner. To specify credentials 1. Select one of the following:  Use the plan's credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 211: Backup Schemes

     Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 6.2.10.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 212: Simple Scheme

    (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Copyright © Acronis, Inc., 2000-2010...
  • Page 213 Let us consider a GFS backup scheme that many may find useful.  Back up files every day, including weekends  Be able to recover files as of any date over the past seven days  Have access to weekly backups of the past month Copyright © Acronis, Inc., 2000-2010...
  • Page 214 On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to:  Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). Copyright © Acronis, Inc., 2000-2010...
  • Page 215: Tower Of Hanoi Scheme

    Up to 16 levels of full, differential, and incremental backups  Next-level backups are twice as rare as previous-level backups  One backup of each level is stored at a time  Higher density of more recent backups Copyright © Acronis, Inc., 2000-2010...
  • Page 216 The following table shows full backup and roll-back periods for schemes of various levels. Number of Full backup On different Roll-back levels every days, can go period back Copyright © Acronis, Inc., 2000-2010...
  • Page 217: Custom Backup Scheme

    Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Copyright © Acronis, Inc., 2000-2010...
  • Page 218 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 219 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup location becomes available. Likewise, backup tasks for incremental and differential backups will wait until all users are logged off and users are idle, respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 220 If you back up a large amount of data, initial seeding ensures faster delivery of the backed-up data and lower traffic costs. Please refer to the "Initial Seeding FAQ (p. 381)" section for more details. Copyright © Acronis, Inc., 2000-2010...
  • Page 221: Archive Validation

    6.2.12.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 222: Recovering Data

    6.3 Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running the operating system and create the recovery task. Copyright © Acronis, Inc., 2000-2010...
  • Page 223 (p. 400) or using Acronis Startup Recovery Manager (p. 52). Then, create a recovery task. Acronis Universal Restore (p. 53) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 224: When To Recover

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 235) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 225: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 226: Data Type

    Disks - to recover disks  Volumes - to recover volumes  Files - to recover specific files and folders 6.3.4 Content selection The representation of this window depends on the type of data stored in the archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 227: Access Credentials For Location

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 228: Destination Selection

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 229: Disk Destination

    Recovering the disk signature may be desirable due to the following reasons:  Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. If you recover the same disk signature, you don't need to re-create or edit the tasks created previously ...
  • Page 230 Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected volumes will be recovered to the physical disks of the machine the console is connected to.
  • Page 231: Mbr Destination

     Logical. Information about logical volumes is located not in the MBR, but in the extended partition table. The number of logical volumes on a disk is unlimited. A logical volume cannot be Copyright © Acronis, Inc., 2000-2010...
  • Page 232: Virtual Machine Settings

    Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 233: File Destination

    New location - files will be recovered to the location that you specify in the tree. The files and folders will be recovered without recreating a full path, unless you clear the Recover without full path check box. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 234: Recovery Exclusions

    Overwrite existing file - this will give the file in the backup priority over the file on the hard disk.  Overwrite existing file if it is older - this will give priority to the most recent file modification, whether it be in the backup or on the disk. Copyright © Acronis, Inc., 2000-2010...
  • Page 235: Access Credentials For Destination

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 236 The drivers defined here will have priority. They will be installed, with appropriate warnings, even if the program finds a better driver. Use this option only if the automatic drivers search does not help to boot the system. Copyright © Acronis, Inc., 2000-2010...
  • Page 237: How To Convert A Disk Backup To A Virtual Machine

    (volume) backup to a new virtual machine on the respective virtualization server. Tip. Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to create a Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper-V virtual machine.
  • Page 238: Bootability Troubleshooting

    Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
  • Page 239 OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 240 Generally, you should refer to the boot loader manual pages for the appropriate procedure. There is also the corresponding Knowledge Base article on the Acronis Web site. The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to identical hardware.
  • Page 241: Assembling Md Devices For Recovery (Linux)

    Example 1. The following command assembles the device /dev/md0 combined of the volumes /dev/sdb1 and /dev/sdc1: mdadm --assemble /dev/md0 -ayes /dev/sdb1 /sdc1 Example 2. The following command assembles the device /dev/md0 combined of the disks /dev/sdb and /dev/sdc: mdadm --assemble /dev/md0 -ayes /dev/sdb /dev/sdc Copyright © Acronis, Inc., 2000-2010...
  • Page 242: Recovering A Vast Number Of Files From A File Backup

    Tip: In general, if a volume contains many files, consider using a disk-level backup instead of a file-level one. In this case, you will be able to recover the entire volume as well as particular files stored on it. Copyright © Acronis, Inc., 2000-2010...
  • Page 243: Recovering The Storage Node

    6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed.
  • Page 244: Task Credentials

    If the task has to run on schedule, you will be asked for the current user's password on completing the task creation.  Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: Copyright © Acronis, Inc., 2000-2010...
  • Page 245: Archive Selection

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 246: Backup Selection

    Refresh button to refresh the list of archives. 6.4.5 Access credentials for source Specify the credentials required for access to the location where the backup archive is stored. To specify credentials 1. Select one of the following: Copyright © Acronis, Inc., 2000-2010...
  • Page 247: When To Validate

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: ...
  • Page 248: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 249: Backup Selection

    The program will access the location using the credentials you specify. Use this option if the current user account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: Copyright © Acronis, Inc., 2000-2010...
  • Page 250: Volume Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 251: Exporting Archives And Backups

     an entire vault that can be exported by using the command line interface. For more information, please refer to Acronis Backup & Recovery 10 Command Line Reference. Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, writing onto removable or detachable media or other purposes.
  • Page 252 To export an archive or a backup perform the following steps. General Task name [Optional] Enter a unique name for the task. A conscious name lets you quickly identify the task among the others. Task credentials (p. 253) Copyright © Acronis, Inc., 2000-2010...
  • Page 253: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 32) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 254: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 255: Backup Selection

    To export data to a personal vault, expand the Personal vaults group and click the vault.  To export data to a local folder on the machine, expand the Local folders group and click the required folder. Copyright © Acronis, Inc., 2000-2010...
  • Page 256 In any of the above cases, provide an archive name that is unique to the destination folder or vault. If you need to redo the export using the same archive name, first delete the archive that resulted from the previous export operation. Copyright © Acronis, Inc., 2000-2010...
  • Page 257: Access Credentials For Destination

    To create Acronis Secure Zone, perform the following steps. Space Disk (p. 258) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 258) Specify the exact size of the zone.
  • Page 258: Acronis Secure Zone Disk

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 259: Managing Acronis Secure Zone

    Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
  • Page 260: Acronis Startup Recovery Manager

    1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from the zone and then click OK.
  • Page 261: Bootable Media

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 262: How To Create Bootable Media

    Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more functionality than using Linux-based bootable media. Having booted PC-compatible hardware into WinPE, you can use not only Acronis Backup & Recovery 10 Agent, but also PE commands and scripts and other plug-ins you've added to the PE.
  • Page 263 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 269) for details. 6.10.1.1...
  • Page 264: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 267). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 265 SATA module, specify: sata_sis=off pci=bios Forces the use of PCI BIOS instead of accessing the hardware device directly. You may want to use this parameter if the machine has a non-standard PCI host bridge. pci=nobios Copyright © Acronis, Inc., 2000-2010...
  • Page 266: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 267: Network Port

    Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 268 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 269 You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 6. Choose whether you want to create ISO or WIM image or upload the media on Acronis PXE Server.
  • Page 270: Connecting To A Machine Booted From Media

    8. Start the Bart PE builder. 9. Specify the path to the Windows installation files or Windows distribution CD. 10. Click Plugins and check whether the Acronis Backup & Recovery 10 plug-in is enabled. Enable if disabled. 11. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create.
  • Page 271: Setting Up A Display Mode

    4. If the host requires authentication, specify the user name and password for it. 5. Click OK. 6. Select the iSCSI device from the list, and then click Connect. 7. If prompted, specify the user name and password to access the iSCSI device. Copyright © Acronis, Inc., 2000-2010...
  • Page 272: List Of Commands And Utilities Available In Linux-Based Bootable Media

    Linux commands and utilities busybox ifconfig init rmmod cdrecord insmod route chmod iscsiadm chown kill scsi_id chroot kpartx sg_map26 lspci sleep dmesg dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon Copyright © Acronis, Inc., 2000-2010...
  • Page 273: Recovering Md Devices And Logical Volumes

    6.10.5.1 Creating the volume structure automatically Let's assume that you saved (p. 47) the volume structure to the /etc/Acronis directory and that the volume with this directory is included in the archive. To recreate the volume structure in Linux-based bootable media, use either of the methods described below.
  • Page 274: Creating The Volume Structure Manually

    6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 275 8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 276 For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 272). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 277: Acronis Pxe Server

    3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation. Later on it will automatically launch at each system restart. You can stop and start Acronis PXE Server in the same way as other Windows services.
  • Page 278: Setting Up A Machine To Boot From Pxe

    PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh...
  • Page 279: Disk Management

    HDD replacement or hardware loss. In such case with the help of Acronis Disk Director Lite, the user has the possibility to recreate the necessary disk configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the disk or volume structure the user might consider necessary.
  • Page 280: Choosing The Operating System For Disk Management

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 400) created with the Acronis Bootable Media Builder;...
  • Page 281: Disk Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with disks. Acronis Disk Director Lite must obtain exclusive access to the target disk. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the disk cannot be blocked, close the disk management applications that use this disk and start again.
  • Page 282: Basic Disk Cloning

    If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools. 6.11.5.2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It can be a case of expanding the system volume, starting a new system layout or disk evacuation due to a hardware fault.
  • Page 283 2. Click to clear the Turn off the machine after the cloning operation check box, if necessary. 3. Click Finish to add the pending operation. 4. Click Commit on the toolbar and then click Proceed in the Pending Operations window. Copyright © Acronis, Inc., 2000-2010...
  • Page 284 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 285) using the Convert to basic operation.
  • Page 285 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 286 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 287: Volume Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 288: Create Volume Wizard

    Create volume in the appearing context menu. Select the type of volume being created At the first step you have to specify the type of volume you want to create. The following types of volume are available:  Basic  Simple/Spanned Copyright © Acronis, Inc., 2000-2010...
  • Page 289: Select Destination Disks

    On the third wizard page, you will be able to define the size of the future volume, according to the previously made selections. In order to choose the necessary size between the minimum and the maximum values, use the slider or enter the necessary values into the special windows between the Copyright © Acronis, Inc., 2000-2010...
  • Page 290: Set The Volume Options

    Operations window. If you set a 64K cluster size for FAT16/FAT32 or on 8KB-64KB cluster size for NTFS, Windows can mount the volume, but some programs (e.g. Setup programs) might calculate its disk space incorrectly. Copyright © Acronis, Inc., 2000-2010...
  • Page 291: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 292: Change Volume Letter

    The new label will be graphically represented in the Disk Management view of the console immediately. 6.11.6.6 Format volume You might want to format a volume if you want to change its file system: Copyright © Acronis, Inc., 2000-2010...
  • Page 293: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 294: Collecting System Information

    Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so if you try to exit Disk management without committing the pending operations, you will receive the appropriate warning. 6.12 Collecting system information The system information collection tool gathers information about the machine to which the management console is connected, and saves it to a file.
  • Page 295: Centralized Management

    Use the Dashboard to estimate at a glance the health of data protection on the registered machines. The Dashboard displays the summary of Acronis Backup & Recovery 10 agents' activities, lets you check for free space available in managed vaults, and rapidly identify and resolve any issues.
  • Page 296 Options > Console options > Time-based alerts. Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server.
  • Page 297: Backup Policies

    To be able to manage and protect multiple machines as a whole, you can create a backup plan template called a "backup policy". By applying this template to a group of machines, you will deploy multiple backup plans with a single action. Backup policies exist only on the Acronis Backup & Recovery 10 Management Server.
  • Page 298: Backup Policy Deployment States

    In the Tasks view, apply the Last result -> Failed filter if there are too many tasks. You can also sort the failed tasks by backup plans or by machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 299: Actions On Backup Policies

    In the Machines selection (p. 300) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Copyright © Acronis, Inc., 2000-2010...
  • Page 300: Machines Selection

    In the group tree, select the required group. Then, in the right part of the window, select the machines to apply the backup policy to. 2. Click OK. The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies.
  • Page 301: Policy Details

    The tab displays information about the backup scheme used by the policy and backup options that were modified against the default settings. Applied to The tab displays a list of machines and groups the selected policy is applied to. Actions Copyright © Acronis, Inc., 2000-2010...
  • Page 302: Physical Machines

    7.1.3 Physical machines Acronis Backup & Recovery 10 lets the administrator protect data and perform management operations on multiple machines. The administrator adds a machine to the management server using the machine's name or IP address, imports machines from Active Directory, or from text files. Once a machine is registered (p.
  • Page 303: Actions On Machines

    All physical machines group in the navigation tree. Add a new machine to the Click Add a machine to AMS. management server In the Add machine (p. 306) window, select the machine that needs to be Copyright © Acronis, Inc., 2000-2010...
  • Page 304: Applying Policies

    All the backup policies applied to the group the machine was in will be revoked. The backup policies applied to the group the machine is now a member of will be deployed to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 305 Though the list of machines is refreshed automatically based on events, the data may not be retrieved immediately from the management server due to some latency. Manual refresh guarantees that the most recent data is displayed. Copyright © Acronis, Inc., 2000-2010...
  • Page 306: Importing Machines From Active Directory

    Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & Recovery 10 Management Server to a managed machine and perform other centralized management operations, you need to register the machine on the management server.
  • Page 307: Synchronizing Machines With A Text File

    4. Under Logon settings, specify the user name and password of a user who is a member of the Administrators group on all machines listed in the file. 5. Click OK to start synchronizing the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 308: Importing Machines From A Text File

    To synchronize machines with a text file using command line 1. Log on as a member of the Acronis Centralized Admins security group. 2. In the command prompt, change the directory to the folder where Acronis Backup & Recovery 10 Management Server has been installed—by default: C:\Program Files\Acronis\AMS.
  • Page 309: Moving A Machine To Another Group

    Connection is established every 2 minutes.  Offline - the machine is unavailable for the management server: it is turned off, or its network cable is unplugged. Copyright © Acronis, Inc., 2000-2010...
  • Page 310 Expired - the trial period of the machine's agent has expired. To specify a full license key, use the Change License functionality, or run the setup program and follow its instructions.  Installed agents - full name of Acronis agents, installed on the machine.  Operating system - the operating system the machine's agent runs.
  • Page 311 Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task again. Copyright © Acronis, Inc., 2000-2010...
  • Page 312 When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 313 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. View log related to a group Click View log. Copyright © Acronis, Inc., 2000-2010...
  • Page 314: Filtering And Sorting Machines

    Configuring the machines table By default, the table has five columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. Copyright © Acronis, Inc., 2000-2010...
  • Page 315: Actions On Groups

    Deletion of a parent group will delete its child groups as well. Backup policies applied to the parent group and inherited by its child groups will be revoked from all members of the deleted groups. The the policies that are directly applied to the members will remain. Copyright © Acronis, Inc., 2000-2010...
  • Page 316: Creating A Custom Static Or Dynamic Group

    Windows 2000 OR Windows 2003. b) Entries of different criteria are combined by logical multiplication (AND) For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windows Server 2003 Organizational unit: SERVERS Copyright © Acronis, Inc., 2000-2010...
  • Page 317: Organizational Unit Criterion

    192.168.1.14 192.168.1.15 A registered machine has to be specified by its registration address, that is, you need to provide exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified Copyright © Acronis, Inc., 2000-2010...
  • Page 318: Move One Group To Another

     Criteria (for dynamic groups only) - grouping criteria  Comments - the group description (if specified) Backup policies Displays a list of backup policies related to the group and allows performing the following operations: Copyright © Acronis, Inc., 2000-2010...
  • Page 319: Virtual Machines

    Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 306) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
  • Page 320: Virtual Machines On A Management Server

    4. The virtual machines hosted on the Hyper-V server appear in the All virtual machines group. Adding ESX/ESXi virtual machines 1. VMware Tools have to be installed in the guest systems. 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of the following: ...
  • Page 321 1. In the Navigation tree, right click Virtual machines and select VMware vCenter Integration 2. Click Configure integration 3. Select the Enable VMware vCenter integration check box 4. Specify the vCenter Server's IP address or name and provide access credentials for the server Copyright © Acronis, Inc., 2000-2010...
  • Page 322 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
  • Page 323 When installing the product for online backup only, select Online backup only (license key is not required). This option presumes that you have or will obtain a subscription to the Acronis Backup & Recovery 10 Online service by the time of the first backup.
  • Page 324: Storage Nodes

    7.1.5 Storage nodes Acronis Backup & Recovery 10 Storage Node helps you to optimize usage of various resources required for the enterprise data protection. This goal is achieved through organizing managed vaults (p. 406) that serve as dedicated storages of the enterprise backup archives.
  • Page 325: Actions On Storage Nodes

    (p. 405). To learn more about Acronis Backup & Recovery 10 Storage Node, see the Acronis Backup & Recovery 10 Storage Node (p. 21) section.
  • Page 326: Adding A Storage Node

    To add a storage node 1. In the IP/Name field, enter the name or the IP address of the machine the storage node resides on, or click Browse... and browse the network for the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 327: Storage Node Details

    7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on the selected Acronis Backup & Recovery 10 Storage Node. This information is also duplicated on the Information pane. Storage node properties The tab displays the following information about the selected storage node: ...
  • Page 328: Tasks

    View log. The Log (p. 330) view will display a list of the log entries related to the selected task. Run a task Click Run. The task will be executed immediately in spite of its schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 329 Though the list of tasks is refreshed automatically based on events, the data may not be retrieved immediately from the managed machine due to some latency. Manual refresh guarantees that the most recent data is displayed. Copyright © Acronis, Inc., 2000-2010...
  • Page 330: Log

    7.1.7 The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log.
  • Page 331 Acronis Backup & Recovery 10 Storage Node has its own local event log. This log's events are accessible through the centralized log only. Centralized event log Way of working with log entries  The maximum number of entries stored in the centralized log is 50000. The maximum number of entries that can be displayed is 10000.
  • Page 332 As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 333: Centralized Log Entry Details

     Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem.  Owner - User name of the policy/backup plan owner (p. 32) ...
  • Page 334: Reporting

    Reports are generated based on report templates. The templates define the information to be included in the report and the way the information is represented. Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines ...
  • Page 335: Report About The Backup Policies

    Select whether to show all items in a single table or to group them by a particular column.  Specify which table columns to show, and in which order.  Specify how to sort the table. Copyright © Acronis, Inc., 2000-2010...
  • Page 336: Report About The Backup Plans

    Last result: The last results of the tasks—Succeeded, Succeeded with warnings, and/or Failed.  Schedule: The types of the tasks' schedules—Manual or Scheduled. Manual schedule means that a task runs only when you start it manually. Copyright © Acronis, Inc., 2000-2010...
  • Page 337: Report About The Archives And Backups

    Under Report coverage, choose the time interval for which you want to generate the report. The report will show the state of the selected vaults at the specified time on each day in the report period. Copyright © Acronis, Inc., 2000-2010...
  • Page 338: Report About The Task Activities

    The tables in the report will contain columns, from left to right, as listed in Display in report. The topmost column in the list will be the leftmost column in the report. Copyright © Acronis, Inc., 2000-2010...
  • Page 339: Configuring Acronis Backup & Recovery 10 Components

    2. Make sure, that the Enable JavaScript check box is selected. 3. Click OK. 7.2 Configuring Acronis Backup & Recovery 10 components There are three ways to configure various parameters of Acronis Backup & Recovery 10 components in Windows:  By using Acronis Administrative Template ...
  • Page 340: Parameters Set Through Administrative Template

    7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup & Recovery 10 components that can be set by using Acronis Administrative Template. For information on how to apply the administrative template, see How to load Acronis Administrative Template (p. 340).
  • Page 341 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
  • Page 342 In this case, the component's connection to the storage node will fail. If the component is an Acronis Backup & Recovery 10 Agent, the corresponding backup or recovery task will stop with the Failed status. Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as a percentage) below which a warning or error is recorded in the log.
  • Page 343 Database path when creating the vault. 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Backup & Recovery 10 Management Server that can be set by using Acronis Administrative Template. Collecting Logs Specifies when to collect log entries from machines managed by Acronis Backup & Recovery 10 Management Server.
  • Page 344 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 91). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Management Server's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record Acronis Backup &...
  • Page 345 (Note: Connections to machines with high synchronization priority—see Period-High Priority later in this topic—are likely to be always kept.) Synchronization connections are unrelated to connections such as those between Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console. Maximum Workers Description: Specifies the maximum number of threads to use for synchronization.
  • Page 346 Possible values: Any integer number between 120 and 2147483647 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously).
  • Page 347 When connecting to a registered machine, Acronis Backup & Recovery 10 Management Server first uses the machine's network name—provided that the machine was added to the management server by name. If Second Connection Attempt is set to True and a connection to the machine by using its network name has failed, the management server performs a second connection attempt, this time using the latest IP address which was associated with that network name.
  • Page 348 The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template. Licensing Specifies how often the agent checks its license on the license server, and how long it can work without a license server.
  • Page 349 Possible values: any integer number between 0 and 24 Default value: 1 If, during a check for the license key (see License Check Interval earlier in this topic), Acronis Backup & Recovery 10 Agent could not connect to the license server, it will try to reconnect once in the number of hours given by License Server Connection Retry Interval.
  • Page 350 Description: Specifies the folder in which to create the snapshot storage. Possible values: Any string 0 to 32765 characters long Default value: Empty string An empty string means a temporary files folder, which is typically given by the TMP or TEMP environment variable. Copyright © Acronis, Inc., 2000-2010...
  • Page 351: Connection Parameters

    The size of the snapshot storage does not affect the size of the backup. 7.2.1.5 Acronis Backup & Recovery 10 This section of the administrative template specifies the connection parameters and event tracing parameters for the following Acronis Backup & Recovery 10 components:  Acronis Backup & Recovery 10 Management Server ...
  • Page 352 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 86). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 353 The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both. Each event has a level from zero to five based on the event's severity, as shown in the following...
  • Page 354: Parameters Set Through Gui

    Information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 355: Parameters Set Through Windows Registry

    7.2.3 Parameters set through Windows registry The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set only by editing the registry. Parameter related to deduplication CompactingTriggerThreshold Description: Specifies the percentage of used items in the data stores below which compacting occurs.
  • Page 356: Creating A Backup Policy

    Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its tape vaults database. This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libraries, and approximately equals 10 MB per hundred archives.
  • Page 357 To reset all the settings to the default values, click Reset to default. During the backup operation, the registered machines' default backup options are ignored. Convert to VM Applies to: Disk/volume backup Not effective for machines running Linux Copyright © Acronis, Inc., 2000-2010...
  • Page 358: Policy Credentials

    Folder on VMware vCenter If the management server is integrated with vCenter Server, the resultant virtual machines will appear in the Acronis Backups folder on the vCenter. You can specify a subfolder for the machines resulting from execution of the policy.
  • Page 359: Items To Back Up

    2. Click OK. To learn more about Acronis service credentials, see the Rights for Acronis services (p. 81) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 31) section.
  • Page 360 GPT volumes is not backed up. A disk backup stores all volumes of the selected disk (including hidden volumes such as the vendor's maintenance partitions) and the zero track with the master boot record. Copyright © Acronis, Inc., 2000-2010...
  • Page 361 Since backup policies are commonly applied to multiple machines with various operating systems, Acronis recommends that you always select both the system and the boot volumes for backup, to ensure the integrity of every operating system. Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized backup policy.
  • Page 362: Files To Back Up Selection Rules

    Tip: To be able to automatically create the volume structure information during recovery, make sure that the volume with the /etc/Acronis directory of each machine is selected for backup. For more details, see “Saving the volume structure information” (p. 47).
  • Page 363 Settings\All Users in Windows XP and C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment variables and text. For example, to refer to the Acronis folder in the machines' Program Files folder, type: %PROGRAMFILES%\Acronis Templates Templates are similar to environment variables, but are already pre-customized.
  • Page 364: Access Credentials For Source

    This option is effective only for file systems that are supported by Windows. Select this check box to skip files and folders with the System attribute. If a folder is System, all of its contents — including files that are not System — will be excluded. Copyright © Acronis, Inc., 2000-2010...
  • Page 365: Archive

    Archive Specify where to store the archives and define names for the new backup archives. 1. Selecting the archives destination Choose where to store machines' archives:  Store all machines' archives in a single location Copyright © Acronis, Inc., 2000-2010...
  • Page 366  To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 390) to the online backup service and activate (p.
  • Page 367: Access Credentials For Location

    – the guaranteed number of sessions that you can go back at any time. The automatic cleanup mechanism maintains the required rollback period by deleting the expired backups and keeping the most recent backups of each level. Copyright © Acronis, Inc., 2000-2010...
  • Page 368  Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 7.3.7.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 369 Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day. The default value is Friday. Copyright © Acronis, Inc., 2000-2010...
  • Page 370 For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted. Copyright © Acronis, Inc., 2000-2010...
  • Page 371 The following GFS scheme suits such purposes:  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Friday  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Copyright © Acronis, Inc., 2000-2010...
  • Page 372 The guaranteed number of sessions that one can go back in the archive at any time. Calculated automatically, depending on the schedule parameters and the numbers of levels you select. See the example below for details. Example Schedule parameters are set as follows Copyright © Acronis, Inc., 2000-2010...
  • Page 373 Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups). Copyright © Acronis, Inc., 2000-2010...
  • Page 374 Using retention rules Specify the retention rules and when to apply them. This setting is recommended for backup destinations such as shared folders or centralized vaults. When there is insufficient space while backing up Copyright © Acronis, Inc., 2000-2010...
  • Page 375 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 376 Manual (if the schedule has not been set up). You can manually run any backup task or cleanup task at any time, regardless of whether it has a schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 377: Archive Validation

    For more information see the Scheduling (p. 168) section. 8 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online service. This service enables you to do online backups to Acronis Online Backup Storage.
  • Page 378: Introduction To Acronis Backup & Recovery 10 Online

    What is Acronis Backup & Recovery 10 Online? Acronis Backup & Recovery 10 Online is a service that enables you to back up data to Acronis Online Backup Storage. To use this service, you need to buy a subscription that determines the amount of storage space reserved for your backups (storage quota) and how long the online service will be available to you.
  • Page 379: How Long Will My Backups Be Kept In The Online Storage

    File-level backup and recovery is not possible for virtual machines, but is possible for a Windows host. Installing the software, backing up, and recovery are described in the Quick Start Guide for Acronis Backup & Recovery 10 Virtual Edition. When installing Acronis Backup & Recovery 10 for online backup only, you do not need to enter a license key during installation.
  • Page 380: Backup And Recovery Faq

    This way, you will obtain either a new full backup, or an incremental one. Since full backups take more storage space, Acronis recommends that you choose incremental backup if you want to run backups manually.
  • Page 381: Initial Seeding Faq

    Initial Seeding is an extra service that lets you save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 382: What Types Of Hard Drive Can I Use For Initial Seeding

    For example, you may want to upload a volume backup and a number of file backups. Do as many "initial seeding" backups as you wish and then send them to Acronis on the same disk. The Initial Seeding license gets used when uploading to the online storage starts. You will receive an e-mail notification informing you about this.
  • Page 383: How To Package A Hard Drive For Shipment

    6. Package (p. 383) the media along with a prepaid return shipping label and send it to Acronis by physical mail. The address is available on your account management Web page > Initial Seeding / Recovery tab >...
  • Page 384 1. Shipping label for sending your hard drive. This label is placed on the top of the box. You should send your package to one of the Acronis data centers. The data center address can be obtained on the Initial seeding/Recovery tab of your account management page by clicking Show data center address.
  • Page 385: How Do I Track An Initial Seeding Order Status

    How do I track an Initial Seeding order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about the most important events.
  • Page 386: Large Scale Recovery Faq

    You can then recover data from this copy. Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with all of the backups made from this machine. You can recover data directly from the disk or copy the backups to a local or network folder.
  • Page 387: Is Large Scale Recovery A Paid Service

    How do I track a Large Scale Recovery order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about most important events.
  • Page 388: Subscription Lifecycle Faq

    The time count will begin as soon as the subscription is activated. The first activation occurs when you assign a subscription to a certain machine. To do so, you need to have Acronis software installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 389: What Happens When My Subscription Expires

    What is the “Group”column for? So you can apply actions, such as Renew all or Auto-renew all, to your selection of the subscriptions. Specify the desired group name, for example, SalesDept, near each of the subscriptions you want to Copyright © Acronis, Inc., 2000-2010...
  • Page 390: Where Do I Start

    8.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not registered yet) and navigate to Online backup > For Business. This is your account management Web page. Here you can get a trial subscription, locate an Acronis partner or buy subscriptions online.
  • Page 391: Activating Online Backup Subscriptions

    To be able to back up a machine to the online storage, you need to purchase and activate a subscription to the Acronis Backup & Recovery 10 Online service. You can purchase subscriptions on the Acronis Web site or from an Acronis reseller.
  • Page 392: Reassigning An Activated Subscription

    You no longer need to back up one of your machines and you want to reuse that machine’s subscription for another machine.  You reinstalled Acronis Backup & Recovery 10 on a machine and want to resume its online backups. ...
  • Page 393: Configuring Proxy Settings

    The management server connects to the Internet to retrieve information about online backup subscriptions. The proxy settings for the management server also need to be configured. Proxy settings for the agent and the management server are configured separately, even if both are installed on the same machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 394: Limitations Of The Online Storage

    4. Enter the proxy server settings. For detailed information (p. 98) about the settings please refer to the context-sensitive help. 8.6 Limitations of the online storage Unlike other types of storage available in Acronis Backup & Recovery 10, the online storage has the following limitations. Operations The following operations are not possible.
  • Page 395: Terminology Reference

    A service that you can use in addition to online backup subscriptions. Initial Seeding An extra service that enables you to save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 396 Assign a subscription that is already activated, to a different machine. Registration code A character string for registering a subscription or license that was bought from an Acronis partner. When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the registration codes for each of them.
  • Page 397: Glossary

    Limitations: Acronis Secure Zone cannot be organized on a dynamic disk (p. 404) or a disk using the GPT partitioning style. Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recovery Manager.
  • Page 398: Backup Operation

    (p. 406), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 399 The workflow when using policies is as follows. 1. The administrator creates a backup policy. 2. The administrator applies the policy to a group of machines or a single machine (p. 406). 3. The management server deploys the policy to the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 400: Bootable Agent

    (p. 400) or Windows Preinstallation Environment (WinPE) (p. 411) with the Acronis Plug-in for WinPE (p. 397). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 401: Centralized Backup Plan

    (p. 399) from the management server (p. 407). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 407). The centralized management operations include: ...
  • Page 402: Deduplicating Vault

    For more information please refer to Retention rules (p. 41). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 398) and Acronis Backup & Recovery 10 Management Server (p. 407).
  • Page 403: Disk Group

    A backup (p. 398) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 404: Dynamic Disk

    Dynamic group A group of machines (p. 406) which is populated automatically by the management server (p. 407) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 405: Dynamic Volume

    The export operation can be applied to a single archive, a single backup (p. 398) or to your choice of backups belonging to the same archive. An entire vault (p. 410) can be exported by using the command line interface. Copyright © Acronis, Inc., 2000-2010...
  • Page 406: Full Backup

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 406), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 398) is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 407: Managed Vault

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 408). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 408: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 409 CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 406) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 410: Unmanaged Vault

    Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 411 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 406) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 398) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...

This manual is also suitable for:

Backup & recovery 10 advanced server

Table of Contents