ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3 User Manual

Hide thumbs Also See for BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3:
Table of Contents

Advertisement

Acronis® Backup & Recovery 10™
Advanced Server Virtual Edition
Update 3
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3 and is the answer not in the manual?

Questions and answers

Summary of Contents for ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3

  • Page 1 Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition Update 3 User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    Using a single tape drive ..........................53 2.13 Support for SNMP ........................54 2.14 Proprietary Acronis technologies ....................55 2.14.1 Acronis Secure Zone ...........................55 2.14.2 Acronis Startup Recovery Manager ......................56 2.14.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............57 2.14.4 Acronis Active Restore ..........................58...
  • Page 4 2.15.5 Backup policy's state and statuses ......................72 2.15.6 Deduplication .............................75 2.15.7 Privileges for centralized management .....................79 2.15.8 Communication between Acronis Backup & Recovery 10 components ..........86 Options ..........................93 Console options ........................93 3.1.1 Startup page ...............................93 3.1.2 Pop-up messages ............................93 3.1.3...
  • Page 5 At Windows Event Log event ....................180 Advanced scheduling settings ....................182 When an ADRM alert is received ..................184 Conditions ..........................184 5.7.1 User is idle ..............................185 5.7.2 Location's host is available ........................185 5.7.3 Fits time interval ............................186 5.7.4 User logged off ............................
  • Page 6 6.11.6 Volume operations ..........................295 6.11.7 Pending operations ..........................301 6.12 Collecting system information ....................302 Centralized management ..................... 303 Administering Acronis Backup & Recovery 10 Management Server ........303 7.1.1 Dashboard ............................... 303 7.1.2 Backup policies ............................305 7.1.3 Physical machines ............................
  • Page 7 Backup scheme selection ........................378 7.3.8 Archive validation ............................ 388 Online backup ........................388 Introduction to Acronis Backup & Recovery 10 Online ............389 8.1.1 What is Acronis Backup & Recovery 10 Online? ..................389 8.1.2 What data can I back up and recover? ....................389 8.1.3...
  • Page 8: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Advanced Server Virtual Edition inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 9: Getting Started

    1. Install Acronis Backup & Recovery 10 Management Server (p. 20). 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installing the agents, register each of the machines on the management server. To do so, enter the server's IP or name and the centralized administrator's credentials in one of the installation wizard's windows.
  • Page 10 Recovery 10, you can opt for:  Using deduplication 1. Install Acronis Backup & Recovery 10 Storage Node (p. 21) and add it to the management server. 2. Create the deduplicating managed vault on the storage node. Copyright © Acronis, Inc., 2000-2010...
  • Page 11: Using The Management Console

    3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplicating vault. 4. Ensure that the backup plans you create use the managed vault as destination for the backup archives.  Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the All machines group.
  • Page 12 Disk management. Use this view to perform operations on the machine's hard disk drives. Views for a management server When the console is connected to a management server, the following views are available in the navigation tree. Copyright © Acronis, Inc., 2000-2010...
  • Page 13 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 14 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar...
  • Page 15: Operations With Panes

    Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace.
  • Page 16: Action Pages

    An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Copyright © Acronis, Inc., 2000-2010...
  • Page 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu.
  • Page 18: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes the following main types of components.
  • Page 19: Agent For Linux

    Universal Restore handles differences in devices that are critical for Windows start-up, such as storage controllers, motherboard or chipset. 1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.1.3 Agent for Hyper-V Acronis Backup &...
  • Page 20: Agent For Esx/Esxi

    It is possible to recover all files and directories that were backed up or select which of them to recover. 1.3.2.1 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.3 Agent for ESX/ESXi Acronis Backup &...
  • Page 21: Storage Node

    1.3.4.2 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various resources (such as the corporate storage capacity, the network bandwidth, or the managed machines' CPU load) required for the enterprise data protection. This goal is achieved through organizing and managing the locations that serve as dedicated storages of the enterprise backup archives (managed vaults).
  • Page 22: License Server

    During group operations, reduces the time required for booting multiple machines as compared to using physical bootable media. 1.3.4.4 License Server The server enables you to manage licenses of Acronis products and install the components that require licenses. Copyright © Acronis, Inc., 2000-2010...
  • Page 23: Management Console

    Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 24: Supported Operating Systems

    XFS - volume recovery without the volume resize capability; particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node  JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node ...
  • Page 25  Microsoft Hyper-V Server 2008/2008 R2 This agent installs on a Hyper-V host as an add-on to Acronis Backup & Recovery 10 Agent for Windows. On Hyper-V Server 2008/2008 R2, only remote installation is available. Acronis Backup & Recovery 10 Agent for Windows ...
  • Page 26: System Requirements

    450 MB Screen resolution 1024*768 pixels or higher Management Server 40 MB 250 MB 250 MB 400 MB for SQL 400 MB for SQL Express Server Express Server Wake-on-LAN Proxy Negligible 30 MB 5 MB Copyright © Acronis, Inc., 2000-2010...
  • Page 27: Technical Support

    If you need assistance with your Acronis product, please go to http://www.acronis.eu/support/ Product Updates You can download the latest updates for all your registered Acronis software products from our website at any time after logging into your Account (https://www.acronis.eu/my) and registering the product.
  • Page 28: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 409) on the machine which becomes a managed machine (p. 417) from this point on.
  • Page 29 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 30 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 31 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 32: User Privileges On A Managed Machine

    A user who has administrative privileges on the machine, such as a member of the Administrators or Backup Operators group, additionally has the following management rights:  Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot. Copyright © Acronis, Inc., 2000-2010...
  • Page 33: Owners And Credentials

    When managing a machine running Linux, the user has or obtains the root privileges, and so can:  Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine.
  • Page 34: Full, Incremental And Differential Backups

    It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one.
  • Page 35 Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Maximal Medium Minimal Storage space Maximal Medium Minimal Creation time Minimal Medium Maximal Recovery time Copyright © Acronis, Inc., 2000-2010...
  • Page 36: Gfs Backup Scheme

    You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 37 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 38 The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. Copyright © Acronis, Inc., 2000-2010...
  • Page 39: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 40 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 41 Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 42: Retention Rules

    This is the maximum size of the archive. Every time a retention rule is applied, the program compares the actual archive size with the value you set and deletes the oldest backups to keep the archive size within this value. The diagram below shows the archive content before and after the deletion. Copyright © Acronis, Inc., 2000-2010...
  • Page 43 You cannot, say, delete an outdated full backup and keep its incremental “children”. When deletion of a backup affects other backups, one of the following rules is applied:  Retain the backup until all dependent backups become subject to deletion Copyright © Acronis, Inc., 2000-2010...
  • Page 44: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 416) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 45: Recovering Dynamic Volumes

    This will back up DYN1 and DYN2 volumes to the Acronis Secure Zone. trueimagecmd /create /harddisk:DYN /asz This will back up all dynamic volumes in the system to the Acronis Secure Zone. The boot code on basic GPT volumes is not backed up or recovered.
  • Page 46: Backing Up Lvm Volumes And Md Devices (Linux)

    Manager (LVM), called logical volumes; and multiple-disk (MD) devices, called Linux Software RAID. 2.9.1 Backing up logical volumes Acronis Backup & Recovery 10 Agent for Linux can access, back up and recover such volumes when running in Linux with 2.6.x kernel or a Linux-based bootable media. Backup (GUI) In Acronis Backup &...
  • Page 47: Backing Up Md Devices

    When recovering MD devices under bootable media, the structure of MD devices can be automatically created if it has been saved in the backup (p. 48). For detailed information about recovering MD devices under bootable media, see Recovering MD devices and logical volumes (p. 281). Copyright © Acronis, Inc., 2000-2010...
  • Page 48: Saving The Volume Structure Information

    Before performing the first disk backup on a source machine, run the following command: trueimagecmd --dumpraidinfo Either operation saves the machine’s logical volume structure to the /etc/Acronis directory. Make sure that the volume with this directory is selected for backup.
  • Page 49: Backing Up Hardware Raid Arrays (Linux)

    Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a bad partition table or no partition table at all. Backing up such disks does not make sense as it won’t be possible to recover them. Copyright © Acronis, Inc., 2000-2010...
  • Page 50: Backing Up Virtual Machines

    2.11 Backing up virtual machines Acronis Backup & Recovery 10 Advanced Server Virtual Edition allows for backing up virtual machines from the host. Preparation On Windows 2008 Server x64 (any edition) or Microsoft Hyper-V Server 2008:  Install the Agent for Hyper-V on the Hyper-V host.
  • Page 51: Troubleshooting

    LDM/LVM. To do so, you will have to boot the target virtual machine using bootable media (p. 411) or its ISO image and use Acronis Disk Director Lite for LDM reconstruction or Linux command line tools for LVM reconstruction. Another option is to recover dynamic volumes as basic.
  • Page 52: How To Install Hyper-V Integration Services

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 21). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p.
  • Page 53: Tape Compatibility Table

    The following table summarizes the readability of tapes written by Acronis True Image Echo and Acronis True Image 9.1 product families in Acronis Backup & Recovery 10. The table also illustrates the compatibility of tapes written by various components of Acronis Backup & Recovery 10.
  • Page 54: Support For Snmp

    1.3.6.1.4.1.24769.100.200.2.0:I0064000B Supported operations Acronis Backup & Recovery 10 supports only TRAP operations. It is not possible to manage Acronis Backup & Recovery 10 using GET- and SET- requests. This means that you need to use an SNMP Trap receiver to receive TRAP-messages.
  • Page 55: Proprietary Acronis Technologies

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 56: Acronis Startup Recovery Manager

    Managing the Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 421). Once created on a managed machine, the zone is always present in the list of Personal vaults. Centralized backup plans (p. 412) can use Acronis Secure Zone as well as local plans (p.
  • Page 57: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    Acronis Startup Recovery Manager requires re-activation of third-party loaders after activation. Upgrade from Acronis True Image Echo After upgrade from Acronis True Image Echo to Acronis Backup & Recovery 10, Acronis Startup Recovery Manager appears as deactivated regardless of its status before the upgrade. You can activate Acronis Startup Recovery Manager again at any time.
  • Page 58: Acronis Active Restore

    Universal Restore is not available when recovering Linux. Getting Universal Restore Universal Restore comes free with Acronis Backup & Recovery 10 Advanced Server SBS Edition and Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Universal Restore for the other product editions is purchased separately, has its own license, and is installed as a separate feature from the setup file.
  • Page 59: How It Works

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup.
  • Page 60: Understanding Centralized Management

    When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Restore icon appears in the system tray. The machine becomes operational and ready to provide necessary services.
  • Page 61: Setting Up Centralized Data Protection In A Heterogeneous Network

    To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p. 419) and configure it to manage a centralized vault or multiple centralized vaults.
  • Page 62 2. Install Acronis Backup & Recovery 10 Management Server [AMS] on one of the Windows servers (2). The management server is your single entry point to the Acronis infrastructure. 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's disks, volumes or files.
  • Page 63: Protecting The Servers

    There can be multiple storage nodes on the network. Each of the nodes can manage up to 20 local or remote vaults.  Multiple Acronis Backup & Recovery 10 components can be installed on a machine with a single installation procedure. ...
  • Page 64: Protecting The Workstations

    To protect data on a daily basis, you can also use the GFS or Tower of Hanoi backup schemes. 2.15.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibility to protect virtual machines in multiple ways: ...
  • Page 65: Grouping The Registered Machines

    Advanced product editions other than Virtual Edition (Acronis Backup & Recovery 10 Advanced Server, Advanced Server SBS Edition and Advanced Workstation) allow using only the last of the above methods.
  • Page 66 G1 dynamic group that contains machines with the server operating systems, and applies a backup policy to the group. Any server, that is added to the network and registered on the management server, will appear in this group and the policy will be applied to it automatically. Copyright © Acronis, Inc., 2000-2010...
  • Page 67: Policies On Machines And Groups

    Copyright © Acronis, Inc., 2000-2010...
  • Page 68: A Policy On A Machine Or A Group

    Please familiarize yourself with this section to be sure that your actions yield the desired result and to understand the result of the automated Acronis Backup & Recovery 10 Management Server operations.
  • Page 69: Operations With A Machine

    The "blue" policy is applied, but the "orange" policy remains on the machine. 4. Remove from the group: Machine #3 is removed from the group. The "orange" policy is revoked from the machine. The machine remains in the All machines group. Copyright © Acronis, Inc., 2000-2010...
  • Page 70: Inheritance Of Policies

    In the diagram below, the container stands for a group; the two-color circle stands for a machine with two applied policies; the three-color circle stands for a machine with three applied policies and so on. Copyright © Acronis, Inc., 2000-2010...
  • Page 71 All machines -> #1 or #2 or #3 "orange" Inherited G1 -> #1 or #2 or #3 "green" Inherited All machines -> #4 "orange" Inherited G1 -> G2 -> #4 "blue" Inherited G2 -> #4 "violet" Applied directly Copyright © Acronis, Inc., 2000-2010...
  • Page 72: Backup Policy's State And Statuses

    In this case, the first policy's state on the machine will be Revoking and the second policy's state will be Deploying. The policies can appear in the GUI simultaneously or one after another. Copyright © Acronis, Inc., 2000-2010...
  • Page 73: Policy Status On A Machine

    Error status on the Linux machines and on the Windows machines that do not have such volumes. The policy gets the Warning status on Windows machines that have either a D: or F: volume, unless an event that will result in an error occurs. Copyright © Acronis, Inc., 2000-2010...
  • Page 74: Policy Deployment State On A Group

    The status of the corresponding backup plan is Warning The status of the corresponding backup plan is OK Updating Error The updating log has errors: cannot delete the locked task, the Acronis service is stopped… Warning The updating log has warnings...
  • Page 75: Deduplication

    In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node to determine what data can be deduplicated, and does not transfer the data whose duplicates are already present in the vault.
  • Page 76: How Deduplication Works

    How deduplication works Deduplication at source When performing a backup to a deduplicating vault, Acronis Backup & Recovery 10 Agent reads items being backed up—disk blocks for disk backup or files for file backup—and calculates a fingerprint of each block. Such a fingerprint, often called a hash value, uniquely represents the item's content within the vault.
  • Page 77: When Deduplication Is Most Effective

    The deduplicated items that have not changed are not included in the incremental backup.  The deduplicated items that have changed are not identical anymore and therefore will not be deduplicated. 2.15.6.4 Deduplication best practices Follow these recommendations when using deduplication: Copyright © Acronis, Inc., 2000-2010...
  • Page 78: Deduplication Ratio

    When backing up multiple systems with similar content, back up one of the similar systems first, so that Acronis Backup & Recovery 10 Storage Node indexes all the system's files as potential deduplication items. This will lead to faster backup processes and less network traffic (because of effective deduplication at source), regardless of whether the backups are performed simultaneously or not.
  • Page 79: Privileges For Centralized Management

    This section describes the users' privileges that are required to manage a machine locally and remotely, to manage a machine registered on Acronis Backup & Recovery 10 Management Server, and to access and manage Acronis Backup & Recovery 10 Storage Node.
  • Page 80: Remote Connection

    Local connection The local connection is established between Acronis Backup & Recovery 10 Management Console on a machine and Acronis Backup & Recovery 10 Agent on the same machine. To establish a local connection  On the toolbar, click Connect, then point to New connection, and then click This machine.
  • Page 81: Privileges For Remote Connection In Linux

    Remote connections by the root user are established according to the Acronisagent authentication policy, which is automatically set up during the installation of Acronis Backup & Recovery 10 Agent for Linux, by creating the file /etc/pam.d/Acronisagent with the following content: #%PAM-1.0...
  • Page 82: Acronis Security Groups

    Acronis Backup & Recovery 10 Management Server administrator. These groups are created when Acronis Backup & Recovery 10 Agents or Acronis Backup & Recovery 10 Management Server are being installed. During installation, you can specify what users to include in each group.
  • Page 83 When Acronis Backup & Recovery 10 Agent for Windows is being installed on a machine, the Acronis Remote Users group is created (or updated). A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery 10 Management Console, according to the management rights described in Users' privileges on a managed machine (p.
  • Page 84: Management Server Administrator Rights

    2.15.7.7 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10 Storage Node depends on the user's rights on the machine where the storage node is installed. A regular user, such as a member of the Users group on the storage node, can: ...
  • Page 85: Rights For Acronis Services

     All three accounts are assigned the Log on as a service user right.  The Acronis Agent User user account is assigned the Adjust memory quotas for a process and Replace a process level token user rights.  The Acronis Agent User and ASN User user accounts are included in the Backup Operators group.
  • Page 86: Communication Between Acronis Backup & Recovery 10 Components

    For instructions on how to manage SSL certificates used for secure authentication, see SSL certificates (p. 90). Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family, cannot connect to the Acronis Backup & Recovery 10 components, regardless of the secure authentication and data encryption settings.
  • Page 87: Client And Server Applications

    For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup & Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. An Acronis component can act as a client application, a server application, or both, as shown in the following table.
  • Page 88 Windows. If restart is not possible, make sure you do the following:  If Acronis Backup & Recovery 10 Management Console is running, close it and start it again.  If other Acronis components, such as Acronis Backup & Recovery 10 Agent for Windows or Acronis Backup &...
  • Page 89 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 90). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 90: Network Port Configuration

    Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent. The choice is available between: ...
  • Page 91 Thawte™—or by your organization's CA. Certificate path All Acronis components installed on a machine, when acting as a server application, use an SSL certificate called the server certificate. In Windows, the certificate path and the server certificate's file name are specified in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Encryption\Server.
  • Page 92 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the option to use trusted third-party certificates or certificates created by your organization's CA as an alternative to self-signed certificates, by using Acronis Certificate Command- line Utility. To install a third-party certificate 1.
  • Page 93: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 94: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 95: Management Server Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 96: Event Tracing

    This option defines whether the management server has to send its own log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 54)". The preset is: Disabled.
  • Page 97: Domain Access Credentials

    The preset is: Disabled. To bring this option into use: 1. Install Acronis WOL Proxy on any server in the subnet where the machines to be woken are located. The server has to provide continuous services availability. With multiple subnets, install Acronis WOL Proxy in every subnet where you need to use the Wake-On-LAN functionality.
  • Page 98: Online Backup Proxy

    ESX/ESXi is deployed (p. 330) to the virtual machine's host. Such machines appear as not manageable (grayed out). Once the agent is deployed to an ESX/ESXi host (this requires a license for Acronis Backup & Recovery 10 Advanced Server Virtual Edition), the virtual machines from this host are ready for applying a backup policy or individual backup.
  • Page 99: Machine Options

    3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
  • Page 100: Event Tracing

    The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 101 The settings you obtain in this case will be plan-specific or task- specific. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 54)". The preset is: Disabled.
  • Page 102: Log Cleanup Rules

    This parameter can also be set by using Acronis Administrative Template (p. 359). 3.3.4 Online backup proxy This option is effective only for backup to and recovery from Acronis Online Backup Storage over the Internet. This option defines whether the Acronis agent will connect to the Internet through a proxy server.
  • Page 103: Default Backup And Recovery Options

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 104 Additional settings (p. 123): Copyright © Acronis, Inc., 2000-2010...
  • Page 105: Archive Protection

    AES 192 – the archive will be encrypted using the AES algorithm with a 192-bit key  AES 256 – the archive will be encrypted using the AES algorithm with a 256-bit key. 5. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 106: Source Files Exclusion

    Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt To exclude a folder specified by a path containing the drive letter, add a backslash (\) to the folder name in the criterion; for example: C:\Finance\ Exclusion examples Criterion Example Description Copyright © Acronis, Inc., 2000-2010...
  • Page 107 The program does not support interactive commands, i.e. commands that require user input (for example, "pause"). To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  Execute before the backup  Execute after the backup Copyright © Acronis, Inc., 2000-2010...
  • Page 108 When the check box is not selected, the command execution result does not affect the task execution failure or success. You can track the command execution result by exploring the log or the errors and warnings displayed on the Dashboard. Copyright © Acronis, Inc., 2000-2010...
  • Page 109 This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 110 TIB file and temporary files and fail the task if the command execution fails. 3.4.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. Copyright © Acronis, Inc., 2000-2010...
  • Page 111: Volume Shadow Copy Service

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 112: Compression Level

    Acronis Backup & Recovery 10 will select the VSS provider automatically based on the operating system running on the machine and whether the machine is a member of an Active Directory domain. Create snapshots without using VSS Choose this option if your database is incompatible with VSS. The data snapshot will be taken by Acronis Backup &...
  • Page 113: Backup Performance

    This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk.
  • Page 114: Network Connection Speed

    3.4.1.10 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 115 The When user interaction is required check box – to send notification during the operation when user interaction is required – is always selected. Click Send test WinPopup message to check if the settings are correct. Copyright © Acronis, Inc., 2000-2010...
  • Page 116: Windows Event Log

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 54)".
  • Page 117: Backup Splitting

    The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size.
  • Page 118: Media Components

    The result will be the same - the files will inherit the permissions from the parent folder. To access file or folder NTFS permissions, select Properties > Security. 3.4.1.15 Media components This option is effective for both Windows and Linux operating systems, when the backup destination is removable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 119: Error Handling

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 120: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 121: Task Failure Handling

    This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media. This option determines the program behavior when any of the backup plan's tasks fails. The preset is not to restart a failed task. Copyright © Acronis, Inc., 2000-2010...
  • Page 122 When this option is enabled, the backups, belonging to the policy or plan being created, will be located on a separate tape set. Other backups will not be written to this tape set. Copyright © Acronis, Inc., 2000-2010...
  • Page 123: Additional Settings

    When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To disable this warning, select this check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 124 When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 125: Default Recovery Options

    The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 126 Set current date and time for recovered files Validate backup archive before recovery Check file system after recovery Reboot machine automatically if it is required for recovery Windows Windows Windows Change SID after recovery recovery recovery recovery Notifications: Copyright © Acronis, Inc., 2000-2010...
  • Page 127 5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not recover until the command execution is Copyright © Acronis, Inc., 2000-2010...
  • Page 128: Recovery Priority

    Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine  Normal – to run the recovery process with normal speed, allocating resources on a par with other processes Copyright © Acronis, Inc., 2000-2010...
  • Page 129 NTFS permissions from the folder to which they are recovered. 3.4.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 130 Application Event Log of Windows; or send the events to the specified SNMP managers. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media. Copyright © Acronis, Inc., 2000-2010...
  • Page 131 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support for SNMP (p. 54)".
  • Page 132 When operating under bootable media, this option is not effective for the NTFS file system. The preset is Disabled. This option defines whether to check the integrity of the file system after a disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 133: Vm Power Management

    Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 134 To be on the safe side, power on the recovered virtual machine manually, after you take the necessary precautions. Select the check box for this option if automatic powering on of the virtual machine is required. Copyright © Acronis, Inc., 2000-2010...
  • Page 135: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 136: Centralized Vaults

    Members of the Administrators group can view and manage any archive stored on the storage node. A user who is a member of the Administrators group on a managed machine can view and manage archives created by any user of this machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 137: Working With The "Centralized Vault" View

    All the archives are grouped by type on the following tabs:  The Disk archives tab lists all the archives that contain disk or volume backups (images).  The File archives tab lists all the archives that contain file backups. Related sections: Copyright © Acronis, Inc., 2000-2010...
  • Page 138: Actions On Centralized Vaults

    1. Select the vault. 2. Click Validate. You will be taken to the Validation (p. 251) page with an already pre-selected vault as a source. The vault validation checks all the archives in this vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 139: Creating A Managed Centralized Vault

    Specify a unique name for the vault. Creation of two centralized vaults with the same name is prohibited. Comments [Optional] Enter the distinctive description of the vault being created. Type Select the Managed type. Storage node Copyright © Acronis, Inc., 2000-2010...
  • Page 140 Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p. 140) Specify where the vault will be created. Managed centralized vaults can reside on a network share, SAN, NAS, or on a hard drive local to the storage node.
  • Page 141: Vault Encryption

    The password itself is not stored anywhere on the disk; the password hash is used for verification purposes. With this two-level security, the archives are protected from any unauthorized access, but recovering a lost password is not possible. Copyright © Acronis, Inc., 2000-2010...
  • Page 142: Creating An Unmanaged Centralized Vault

    When deleting a managed vault, you have the option to retain archives contained in the vault. The location resulting from such deletion can also be attached to the same or another storage node. Personal or centralized unmanaged vaults cannot be attached. Copyright © Acronis, Inc., 2000-2010...
  • Page 143: Tape Libraries

    4.1.3.1 Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acronis Backup & Recovery 10 Storage Node. The storage node should be installed on the machine a tape library is attached to. Storage node can simultaneously use more than one tape library for keeping archives.
  • Page 144 Tape compatibility table (p. 53) section. Acronis Backup & Recovery 10 enables you to set up distribution of backups by media. For example, a separate tape set can be used to back up some specific data, and the backups of all other data will be written onto any currently mounted tape, which does not belong to the tape set.
  • Page 145: Rsm Media Pools

    So the tape data will be lost. If all the backups are deleted from a tape, it will not return to the Free pool. It remains in the Acronis pool as a free tape to be reused. So if a storage node needs a new tape, it finds a free tape first in the Acronis pool, then in the Free pool.
  • Page 146: Getting Started With A Tape Library

    Getting started with a tape library If you have a tape library device attached to a machine with Acronis Backup & Recovery 10 Storage Node installed, all you need to do to back up onto the tape library is to create an archive vault on the device under storage node management.
  • Page 147: Actions On A Tape Library Vault

    To view and change the tape options, select Options > Default backup and recovery options > Default backup options > Tape support from the top menu. Copyright © Acronis, Inc., 2000-2010...
  • Page 148: Recovering From Tape Library

    (loaded or not). 4.1.3.6 Managing a tape library To manage a tape library the following tasks/procedures are in the product:  Inventory (p. 149)  Rescan (p. 149)  Labeling (p. 150) Copyright © Acronis, Inc., 2000-2010...
  • Page 149 At rescanning a tape label should be saved in the storage node database. If a slot, selected for the procedure, contains a tape that still does not have a label, the Rescan task for the tape is paused to perform the Labeling (p. 150) procedure. Copyright © Acronis, Inc., 2000-2010...
  • Page 150 Manage tapes on the toolbar. Then the Tape Management window will show a list of the library slots that contain tapes. For every tape belonging to the Free pool or to the Acronis pool, the slot data field indicates the tape label. Labels are also displayed for tapes that are in the Imported pool and contain backups written by Acronis (such might be the case when you bring a tape from another tape library).
  • Page 151: Tape Rotation

    If all backups are deleted from a tape, i.e. if information about the last backup on the tape is deleted from the storage node database, the tape is considered as empty and can be reused during a backup Copyright © Acronis, Inc., 2000-2010...
  • Page 152: Choosing A Backup Scheme

    The same tape rotation enables you to get by with the minimum number of cartridges and not to be buried in used tapes. Acronis Backup & Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries.
  • Page 153: Case To Analyze

    Keep in mind that a monthly backup is full, a weekly backup is differential, and a daily backup is incremental in this implementation of the GFS scheme. The first backup is always full. So if the Copyright © Acronis, Inc., 2000-2010...
  • Page 154 Further, a free tape is loaded into the same drive and mounted, and then the backup (last 24 Gb) is continued onto the beginning of the new tape. Copyright © Acronis, Inc., 2000-2010...
  • Page 155 This task deletes all the outdated backups. The next figure shows dark-gray rectangles instead of the backups deleted up to the current time. Physically the deleted backups are still on the tapes; however information about the backups is deleted from the storage node database. Copyright © Acronis, Inc., 2000-2010...
  • Page 156 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. Copyright © Acronis, Inc., 2000-2010...
  • Page 157 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Copyright © Acronis, Inc., 2000-2010...
  • Page 158 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 159 To recover the data only one tape is required for a full backup, two tapes for a differential backup, and two or three tapes for an incremental backup. This scheme has the following advantages:  access to any full backup requires only one tape Copyright © Acronis, Inc., 2000-2010...
  • Page 160 It requires 7 tapes in rotation. ToH Example 2 requires 4 tapes, which is the minimum for the case. So its tape options settings are the best in comparison with options for other examples. Copyright © Acronis, Inc., 2000-2010...
  • Page 161 (one tape - 16%, two tapes - 72%, three tapes - 12%) as well as rewinding and reading of one (6%), two (50%) or three (44%) backups Copyright © Acronis, Inc., 2000-2010...
  • Page 162 So in this specific case the selection of the Always use a free tape: For each full backup option considerably increases the usage efficiency of the tapes in the library. Copyright © Acronis, Inc., 2000-2010...
  • Page 163: Tape Planning

    (incremental backups, 50%) tapes. So on average the operation takes more time than in the previous examples. Tape planning Once you have specified the backup scheme and tape options, you should determine the minimal number of tapes necessary to achieve full automation of tape rotation. Copyright © Acronis, Inc., 2000-2010...
  • Page 164 Its backup line was the following: E (full), A, B, A, C, A, B, A, D, A, B, A, C, A, B, A, E, A, B, A, C, A, B, A, D. Copyright © Acronis, Inc., 2000-2010...
  • Page 165 What if I have to move tapes with backups from one tape library to another? 1. If both tape libraries are attached to the same machine with Acronis Backup & Recovery 10 Storage Node installed (i.e. the libraries are managed by the same storage node), the storage...
  • Page 166: Personal Vaults

    What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis agents create backups on tapes in a format that differs from the format used by the storage node. It is the reason why it is impossible to interchange tapes between tape devices attached to a storage node and attached to a managed machine: a tape written by a storage node cannot be read by an agent in a locally attached tape device.
  • Page 167: Working With The "Personal Vault" View

    Filtering and sorting archives (p. 172) Bars of the "Actions and tools" pane  [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates actions of the vault's toolbar. Copyright © Acronis, Inc., 2000-2010...
  • Page 168: Actions On Personal Vaults

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Click Create Acronis Secure Zone. Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 265) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 169: Common Operations

    These operations can be also accessed from the [Archive name] actions bar (on the Actions and tools pane) and from the [Archive name] actions item of the main menu respectively. The following is a guideline for you to perform operations with archives stored in a vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 170: Operations With Backups

    The Recover data (p. 230) page will be opened with the pre-selected backup as a source. Select the location and the type of new virtual machine and then proceed as with regular disk or volume recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 171: Deleting Archives And Backups

    The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. There should be enough space in the vault for temporary files created during consolidation. Backups resulting from consolidation always have maximum compression. Copyright © Acronis, Inc., 2000-2010...
  • Page 172: Filtering And Sorting Archives

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 173: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 174: Daily Schedule

    Advanced scheduling settings (p. 182) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 175 As you can see, the time interval between the first and the second task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule Copyright © Acronis, Inc., 2000-2010...
  • Page 176: Weekly Schedule

    Advanced scheduling settings (p. 182) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 177 Wednesday: every 3 hours from 9 AM till 9 PM  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)  Saturday: once at 9 PM Copyright © Acronis, Inc., 2000-2010...
  • Page 178: Monthly Schedule

    For example, setting the task frequency to Every 1 hour From 10:00:00 AM From: <...> Until: <...> until 10:00:00 PM allows the task to be run 12 times from 10 AM to 10 PM during one day. In the Effective... area, set the following settings: Copyright © Acronis, Inc., 2000-2010...
  • Page 179 Advanced scheduling settings (p. 182) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 180: At Windows Event Log Event

    For example, you may want to set up a backup plan that will automatically perform an emergency full backup of your data as soon as Windows discovers that your hard disk drive is about to fail. Copyright © Acronis, Inc., 2000-2010...
  • Page 181 Vista operating system records an event with the event source Microsoft-Windows- WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When creating the plan, type or select the following in the Schedule area: Copyright © Acronis, Inc., 2000-2010...
  • Page 182: Advanced Scheduling Settings

    Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the Wake- On-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start. If the backup task on each machine starts with a delay (see the next setting), the management server will wake up the machines according to those delays.
  • Page 183 5. To enable the use of the Wake-On-LAN functionality, select the Use Wake-on-LAN check box. 6. To distribute the centralized backup tasks' start times, select the Distribute start time within the time window check box and then specify the maximum delay value and the distribution method. Copyright © Acronis, Inc., 2000-2010...
  • Page 184: When An Adrm Alert Is Received

    This schedule is effective in Windows operating systems when Acronis® Drive Monitor™ (ADRM) is installed. Acronis Drive Monitor reports on hard disk health by using the hard disk’s internal monitoring system (S.M.A.R.T.). Based on alerts from Acronis Drive Monitor, you can set up emergency backups of your data in addition to regular backups.
  • Page 185: User Is Idle

    (2) If 9:00 PM comes but the host is unavailable at the moment, the backup task will start on the next workday if the location's host is available. (3) If the location's host will never be available on workdays at 9:00 PM, the task never starts. Copyright © Acronis, Inc., 2000-2010...
  • Page 186: Fits Time Interval

    3:00 PM) will start at 4:00 PM—the time when the waiting period ends. 5.7.4 User logged off Applies to: Windows Enables to put a backup task run on hold until all users log off from Windows on the managed machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 187: Time Since Last Backup

    (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 188: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 189 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 190: Backup Plans And Tasks

    You can also hide the unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 197) section for details.  In the backup table, select the backup plan (task). Copyright © Acronis, Inc., 2000-2010...
  • Page 191: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 192: Task States

    A task may also change to the Waiting state when the event specified by the schedule occurs but the condition set in the backup plan is not met. See Task start conditions (p. 120) for details. Need interaction Copyright © Acronis, Inc., 2000-2010...
  • Page 193: Task Statuses

    Edit the failed task to prevent its future failure  Edit the local plan to prevent its future failure in case a local plan has failed  Edit the backup policy on the management server in case a centralized plan has failed Copyright © Acronis, Inc., 2000-2010...
  • Page 194: Working With Backup Plans And Tasks

    You will be taken to the Log (p. 201) view containing the list of the plan-related log entries. Task Click View log. You will be taken to the Log (p. 201) view containing the list of the task-related log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 195 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 196 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 197: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 198: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 199 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 200: Backup Plan Details

    Archive name - name of the archive.  Archive comments - comments on the archive (if provided). Settings The Settings tab displays the following information:  Backup scheme - the selected backup scheme and all its settings with schedules. Copyright © Acronis, Inc., 2000-2010...
  • Page 201: Log

    Backup options - backup options changed against the default values. 6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log.
  • Page 202: Filtering And Sorting Log Entries

    As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date Click the column's header to sort the log entries in ascending order. Click it once again to and time sort the log entries in descending order. Copyright © Acronis, Inc., 2000-2010...
  • Page 203: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 204 Archive(N) where N is the sequence number of the archive in the location you have selected. Name backup files using the archive name, as in Acronis True Image Echo, rather than auto- generated names (p. 214) Not available when backing up to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage.
  • Page 205: Archive Validation

    Specify the conversion schedule if required. Host (p. 229) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 229)
  • Page 206: Why Is The Program Asking For The Password

    Windows service pack and security identifier (SID) is added to the backup, along with the user- defined text label. The label may include the department or machine owner's name or similar information that can be used as a tag or a key. Copyright © Acronis, Inc., 2000-2010...
  • Page 207 Windows XP All Editions (64 bit) winXPPro64Guest Windows Server 2003, All Editions winNetStandardGuest Windows Server 2003, All Editions (64 bit) winNetStandard64Guest Windows 2008 winLonghornGuest Windows 2008 (64 bit) winLonghorn64Guest Windows Vista winVistaGuest Windows Vista (64 bit) winVista64Guest Copyright © Acronis, Inc., 2000-2010...
  • Page 208: Source Type

    Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 209: Items To Back Up

    A separate archive will be created for each machine. Volumes of a virtual machine Available if Acronis Backup & Recovery 10 Agent for Hyper-V (or for ESX/ESXi) is installed. Select this option to back up individual disks or volumes within a virtual machine residing on a virtualization server.
  • Page 210: Selecting Files And Folders

    2. Click OK. Backing up an entire virtual machine yields a standard disk backup (p. 414). Having Acronis Backup & Recovery 10 Agent for Windows or for Linux, you can mount its volumes, recover individual files from this backup, and recover disks and volumes from the backup to a physical machine. The virtual machine configuration, stored in a virtual machine backup, will be suggested by default at recovering the backup content to a new virtual machine.
  • Page 211: Access Credentials For Source

    The virtual machine configuration will be also backed up. Backing up a virtual machine's volumes yields a standard disk backup (p. 414). Having Acronis Backup & Recovery 10 Agent for Windows or for Linux, you can mount its volumes, recover individual files from this backup, and recover disks and volumes from the backup to a physical machine.
  • Page 212 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance By folder path C:\Finance\F\ Excludes the folder C:\Finance\F (be sure to specify the full path starting from the disk letter) Linux Copyright © Acronis, Inc., 2000-2010...
  • Page 213: Archive

     To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account. Prior to backing up to the online storage, you need to buy a subscription (p. 401) to the online backup service and activate (p.
  • Page 214: Simplified Naming Of Backup Files

    (p. 216) or all backups created during a week (p. 216). But you might end up with no backups if a full backup to your only drive fails. This behavior can be suppressed by adding the [Date] variable (p. 217) to the archive name. Copyright © Acronis, Inc., 2000-2010...
  • Page 215: Usage Examples

    Setting up full, incremental and differential backups within a single backup plan. You need to create separate backup plans for each type of backup  Backup to a managed vault, tape, Acronis Secure Zone or Acronis Online Backup Storage  Setting up retention rules ...
  • Page 216  You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday through Sunday), and the other drive those of the previous week. Copyright © Acronis, Inc., 2000-2010...
  • Page 217 ServerFiles(2.1.2011).tib. The differential backups will start with ServerFiles(2.1.2011)2.tib. See also “The [Date] variable” (p. 217). 6.2.9.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each backup will include that backup’s creation date. Copyright © Acronis, Inc., 2000-2010...
  • Page 218: Access Credentials For Archive Location

    1. Select one of the following:  Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section.  Use the following credentials Copyright © Acronis, Inc., 2000-2010...
  • Page 219: Backup Schemes

     Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 6.2.11.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 220: Simple Scheme

    (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Feb 5—Feb 11 Feb 12—Feb 18 Copyright © Acronis, Inc., 2000-2010...
  • Page 221 Be able to recover files as of any date over the past seven days  Have access to weekly backups of the past month  Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Copyright © Acronis, Inc., 2000-2010...
  • Page 222 Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup).  Have a weekly summary of file changes since last month (Friday weekly differential backup).  Have a monthly full backup of your files. Copyright © Acronis, Inc., 2000-2010...
  • Page 223: Tower Of Hanoi Scheme

    Higher density of more recent backups Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 174), weekly (p. 176), or monthly (p. 178) schedule. Setting up Copyright © Acronis, Inc., 2000-2010...
  • Page 224 The following table shows full backup and roll-back periods for schemes of various levels. Number of Full backup On different Roll-back levels every days, can go period back 2 days 1 to 2 days 1 day 4 days 2 to 5 days 2 days Copyright © Acronis, Inc., 2000-2010...
  • Page 225: Custom Backup Scheme

    Specifies on what schedule and under which conditions to perform an incremental backup. If the archive contains no backups at the time of the task run, a full backup is created instead of the incremental backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 226 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 227 Retention rules: Delete backups older than 6 months Apply the rules: After backing up, On schedule Copyright © Acronis, Inc., 2000-2010...
  • Page 228: Archive Validation

    To set up validation, specify the following parameters 1. When to validate – select when to perform the validation. As the validation is a resource- intensive operation, it makes sense to schedule the validation to the managed machine's off- Copyright © Acronis, Inc., 2000-2010...
  • Page 229: Setting Up Regular Conversion To A Virtual Machine

    6.2.13.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 230: Recovering Data

    (p. 411) or using Acronis Startup Recovery Manager (p. 56). Then, create a recovery task. Acronis Universal Restore (p. 57) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 231 Microsoft LDM (Dynamic volumes) (p. 44) section. Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Virtual Appliance (OVA).
  • Page 232: When To Recover

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 243) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 233: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 33) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 234: Data Type

    Specify the items to recover. By default, all items of the selected backup will be selected. If you do not want to recover certain items, just uncheck them. To obtain information on a disk/volume, right-click it and then click Information. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 235: Access Credentials For Location

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 236: Destination Selection

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 237: Disk Destination

    The program will leave the existing NT signature of the target hard disk as is. 6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 238: Mbr Destination

    Then you proceed to the regular volume mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed to the regular volume mapping procedure described below.
  • Page 239: Volume Destination

    If you recover a system volume to another hard disk with its own volumes and operating system, you will most likely need only the data. In this case, you can recover the volume as logical to access the data only. Copyright © Acronis, Inc., 2000-2010...
  • Page 240: Virtual Machine Settings

    Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 241: File Destination

    Set up exclusions for the specific files you do not wish to recover. Use the Add, Edit, Remove and Remove All buttons to create the list of file masks. Files whose names match any of the masks will be skipped during recovery. Copyright © Acronis, Inc., 2000-2010...
  • Page 242 Do not overwrite existing file - this will give the file on the hard disk priority over the file in the backup. If you allow files to be overwritten, you still have an option to prevent overwriting of specific files by excluding (p. 241) them from the recovery operation. Copyright © Acronis, Inc., 2000-2010...
  • Page 243: Access Credentials For Destination

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 244 When recovering the system to an existing virtual machine that uses SCSI hard drive controller, be sure to specify SCSI drivers for the virtual environment, in the Mass storage drivers to install anyway Copyright © Acronis, Inc., 2000-2010...
  • Page 245: How To Convert A Disk Backup To A Virtual Machine

    (volume) backup to a new virtual machine on the respective virtualization server. Tip. Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to create a Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper-V virtual machine.
  • Page 246: Bootability Troubleshooting

    Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
  • Page 247 OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 248 9. Specify the disk on which GRUB is located—typically, the boot or root partition: root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first disk, run the following command: setup (hd0) 11. Exit the GRUB shell: quit Copyright © Acronis, Inc., 2000-2010...
  • Page 249: Assembling Md Devices For Recovery (Linux)

    0xFD. This will guarantee that the device will be automatically assembled following the reboot. To view or change the partition type, use a disk partitioning utility such as fdisk. Copyright © Acronis, Inc., 2000-2010...
  • Page 250: Recovering A Vast Number Of Files From A File Backup

    6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed.
  • Page 251: Validating Vaults, Archives And Backups

    (archive, backup or vault) and select Validate from the context menu. The Validation page will be opened with the pre-selected object as a source. All you need to do is to select when to validate and (optionally) provide a name for the task. Copyright © Acronis, Inc., 2000-2010...
  • Page 252: Task Credentials

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 253: Archive Selection

    To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 33) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 32) section.
  • Page 254: Backup Selection

    Specify the credentials required for access to the location where the backup archive is stored. To specify credentials 1. Select one of the following:  Use the task credentials The program will access the location using the credentials of the task account specified in the General section. Copyright © Acronis, Inc., 2000-2010...
  • Page 255: When To Validate

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: ...
  • Page 256: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 257: Backup Selection

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. Copyright © Acronis, Inc., 2000-2010...
  • Page 258: Volume Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 259: Exporting Archives And Backups

     an entire vault that can be exported by using the command line interface. For more information, please refer to Acronis Backup & Recovery 10 Command Line Reference. Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, writing onto removable or detachable media or other purposes.
  • Page 260 To export an archive or a backup perform the following steps. General Task name [Optional] Enter a unique name for the task. A conscious name lets you quickly identify the task among the others. Task credentials (p. 261) Copyright © Acronis, Inc., 2000-2010...
  • Page 261: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 33) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 262: Archive Selection

    1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then expand the Online backup storage group and select the account.
  • Page 263: Backup Selection

    To export data to a personal vault, expand the Personal vaults group and click the vault.  To export data to a local folder on the machine, expand the Local folders group and click the required folder. Copyright © Acronis, Inc., 2000-2010...
  • Page 264 In any of the above cases, provide an archive name that is unique to the destination folder or vault. If you need to redo the export using the same archive name, first delete the archive that resulted from the previous export operation. Copyright © Acronis, Inc., 2000-2010...
  • Page 265: Access Credentials For Destination

    To create Acronis Secure Zone, perform the following steps. Space Disk (p. 266) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 266) Specify the exact size of the zone.
  • Page 266: Acronis Secure Zone Disk

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 267: Managing Acronis Secure Zone

    Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
  • Page 268: Acronis Startup Recovery Manager

    1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from the zone and then click OK.
  • Page 269: Bootable Media

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 270: How To Create Bootable Media

    Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more functionality than using Linux-based bootable media. Having booted PC-compatible hardware into WinPE, you can use not only Acronis Backup & Recovery 10 Agent, but also PE commands and scripts and other plug-ins you've added to the PE.
  • Page 271 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 277) for details. 6.10.1.1...
  • Page 272: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 275). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 273 SATA module, specify: sata_sis=off pci=bios Forces the use of PCI BIOS instead of accessing the hardware device directly. You may want to use this parameter if the machine has a non-standard PCI host bridge. pci=nobios Copyright © Acronis, Inc., 2000-2010...
  • Page 274: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 275: Network Port

    Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 276 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 277 You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 6. Choose whether you want to create ISO or WIM image or upload the media on Acronis PXE Server.
  • Page 278: Connecting To A Machine Booted From Media

    8. Start the Bart PE builder. 9. Specify the path to the Windows installation files or Windows distribution CD. 10. Click Plugins and check whether the Acronis Backup & Recovery 10 plug-in is enabled. Enable if disabled. 11. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create.
  • Page 279: Setting Up A Display Mode

    4. If the host requires authentication, specify the user name and password for it. 5. Click OK. 6. Select the iSCSI device from the list, and then click Connect. 7. If prompted, specify the user name and password to access the iSCSI device. Copyright © Acronis, Inc., 2000-2010...
  • Page 280: List Of Commands And Utilities Available In Linux-Based Bootable Media

    Linux commands and utilities busybox ifconfig init rmmod cdrecord insmod route chmod iscsiadm chown kill scsi_id chroot kpartx sg_map26 lspci sleep dmesg dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon Copyright © Acronis, Inc., 2000-2010...
  • Page 281: Recovering Md Devices And Logical Volumes

    6.10.5.1 Creating the volume structure automatically Let's assume that you saved (p. 48) the volume structure to the /etc/Acronis directory and that the volume with this directory is included in the archive. To recreate the volume structure in Linux-based bootable media, use either of the methods described below.
  • Page 282: Creating The Volume Structure Manually

    6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 283 8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. Note: This procedure does not work when connected to Acronis Backup & Recovery 10 Bootable Agent remotely, because the command shell is not available in this case.
  • Page 284 For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 280). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 285: Acronis Pxe Server

    3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation. Later on it will automatically launch at each system restart. You can stop and start Acronis PXE Server in the same way as other Windows services.
  • Page 286: Setting Up A Machine To Boot From Pxe

    PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh...
  • Page 287: Disk Management

    HDD replacement or hardware loss. In such case with the help of Acronis Disk Director Lite, the user has the possibility to recreate the necessary disk configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the disk or volume structure the user might consider necessary.
  • Page 288: Choosing The Operating System For Disk Management

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 411) created with the Acronis Bootable Media Builder;...
  • Page 289: Disk Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with disks. Acronis Disk Director Lite must obtain exclusive access to the target disk. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the disk cannot be blocked, close the disk management applications that use this disk and start again.
  • Page 290: Basic Disk Cloning

    If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools. 6.11.5.2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It can be a case of expanding the system volume, starting a new system layout or disk evacuation due to a hardware fault.
  • Page 291 2. Click to clear the Turn off the machine after the cloning operation check box, if necessary. 3. Click Finish to add the pending operation. 4. Click Commit on the toolbar and then click Proceed in the Pending Operations window. Copyright © Acronis, Inc., 2000-2010...
  • Page 292 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 293) using the Convert to basic operation.
  • Page 293 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 294 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 295: Volume Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 296: Create Volume Wizard

    Create volume in the appearing context menu. Select the type of volume being created At the first step you have to specify the type of volume you want to create. The following types of volume are available:  Basic  Simple/Spanned Copyright © Acronis, Inc., 2000-2010...
  • Page 297: Select Destination Disks

    On the third wizard page, you will be able to define the size of the future volume, according to the previously made selections. In order to choose the necessary size between the minimum and the maximum values, use the slider or enter the necessary values into the special windows between the Copyright © Acronis, Inc., 2000-2010...
  • Page 298: Set The Volume Options

    Operations window. If you set a 64K cluster size for FAT16/FAT32 or on 8KB-64KB cluster size for NTFS, Windows can mount the volume, but some programs (e.g. Setup programs) might calculate its disk space incorrectly. Copyright © Acronis, Inc., 2000-2010...
  • Page 299: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 300: Change Volume Letter

    The new label will be graphically represented in the Disk Management view of the console immediately. 6.11.6.6 Format volume You might want to format a volume if you want to change its file system: Copyright © Acronis, Inc., 2000-2010...
  • Page 301: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 302: Collecting System Information

    Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so if you try to exit Disk management without committing the pending operations, you will receive the appropriate warning. 6.12 Collecting system information The system information collection tool gathers information about the machine to which the management console is connected, and saves it to a file.
  • Page 303: Centralized Management

    Use the Dashboard to estimate at a glance the health of data protection on the registered machines. The Dashboard displays the summary of Acronis Backup & Recovery 10 agents' activities, lets you check for free space available in managed vaults, and rapidly identify and resolve any issues.
  • Page 304 Options > Console options > Time-based alerts. Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server.
  • Page 305: Backup Policies

    To be able to manage and protect multiple machines as a whole, you can create a backup plan template called a "backup policy". By applying this template to a group of machines, you will deploy multiple backup plans with a single action. Backup policies exist only on the Acronis Backup & Recovery 10 Management Server.
  • Page 306: Backup Policy Deployment States

    In the Tasks view, apply the Last result -> Failed filter if there are too many tasks. You can also sort the failed tasks by backup plans or by machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 307: Actions On Backup Policies

    In the Machines selection (p. 308) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Copyright © Acronis, Inc., 2000-2010...
  • Page 308: Machines Selection

    In the group tree, select the required group. Then, in the right part of the window, select the machines to apply the backup policy to. 2. Click OK. The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies.
  • Page 309: Policy Details

    The tab displays information about the backup scheme used by the policy and backup options that were modified against the default settings. Applied to The tab displays a list of machines and groups the selected policy is applied to. Actions Copyright © Acronis, Inc., 2000-2010...
  • Page 310: Physical Machines

    7.1.3 Physical machines Acronis Backup & Recovery 10 lets the administrator protect data and perform management operations on multiple machines. The administrator adds a machine to the management server using the machine's name or IP address, imports machines from Active Directory, or from text files. Once a machine is registered (p.
  • Page 311: Actions On Machines

    All physical machines group in the navigation tree. Add a new machine to the Click Add a machine to AMS. management server In the Add machine (p. 314) window, select the machine that needs to be Copyright © Acronis, Inc., 2000-2010...
  • Page 312: Applying Policies

    All the backup policies applied to the group the machine was in will be revoked. The backup policies applied to the group the machine is now a member of will be deployed to the machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 313 Though the list of machines is refreshed automatically based on events, the data may not be retrieved immediately from the management server due to some latency. Manual refresh guarantees that the most recent data is displayed. Copyright © Acronis, Inc., 2000-2010...
  • Page 314: Importing Machines From Active Directory

    Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & Recovery 10 Management Server to a managed machine and perform other centralized management operations, you need to register the machine on the management server.
  • Page 315: Synchronizing Machines With A Text File

    4. Under Logon settings, specify the user name and password of a user who is a member of the Administrators group on all machines listed in the file. 5. Click OK to start synchronizing the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 316: Importing Machines From A Text File

    To synchronize machines with a text file using command line 1. Log on as a member of the Acronis Centralized Admins security group. 2. In the command prompt, change the directory to the folder where Acronis Backup & Recovery 10 Management Server has been installed—by default: C:\Program Files\Acronis\AMS.
  • Page 317: Moving A Machine To Another Group

    Connection is established every 2 minutes.  Offline - the machine is unavailable for the management server: it is turned off, or its network cable is unplugged. Copyright © Acronis, Inc., 2000-2010...
  • Page 318 Expired - the trial period of the machine's agent has expired. To specify a full license key, use the Change License functionality, or run the setup program and follow its instructions.  Installed agents - full name of Acronis agents, installed on the machine.  Operating system - the operating system the machine's agent runs.
  • Page 319 Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task again. Copyright © Acronis, Inc., 2000-2010...
  • Page 320 When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 321 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. View log related to a group Click View log. Copyright © Acronis, Inc., 2000-2010...
  • Page 322: Filtering And Sorting Machines

    Configuring the machines table By default, the table has five columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones. Copyright © Acronis, Inc., 2000-2010...
  • Page 323: Actions On Groups

    Deletion of a parent group will delete its child groups as well. Backup policies applied to the parent group and inherited by its child groups will be revoked from all members of the deleted groups. The the policies that are directly applied to the members will remain. Copyright © Acronis, Inc., 2000-2010...
  • Page 324: Creating A Custom Static Or Dynamic Group

    Windows 2000 OR Windows 2003. b) Entries of different criteria are combined by logical multiplication (AND) For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windows Server 2003 Organizational unit: SERVERS Copyright © Acronis, Inc., 2000-2010...
  • Page 325: Organizational Unit Criterion

    192.168.1.14 192.168.1.15 A registered machine has to be specified by its registration address, that is, you need to provide exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified Copyright © Acronis, Inc., 2000-2010...
  • Page 326: Move One Group To Another

     Criteria (for dynamic groups only) - grouping criteria  Comments - the group description (if specified) Backup policies Displays a list of backup policies related to the group and allows performing the following operations: Copyright © Acronis, Inc., 2000-2010...
  • Page 327: Virtual Machines

    Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 314) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
  • Page 328: Virtual Machines On A Management Server

    4. The virtual machines hosted on the Hyper-V server appear in the All virtual machines group. Adding ESX/ESXi virtual machines 1. VMware Tools (p. 52) have to be installed in the guest systems. 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of the following: ...
  • Page 329 1. In the Navigation tree, right click Virtual machines and select VMware vCenter Integration 2. Click Configure integration 3. Select the Enable VMware vCenter integration check box 4. Specify the vCenter Server's IP address or name and provide access credentials for the server Copyright © Acronis, Inc., 2000-2010...
  • Page 330 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
  • Page 331 When installing the product for online backup only, select Online backup only (license key is not required). This option presumes that you have or will obtain a subscription to the Acronis Backup & Recovery 10 Online service by the time of the first backup.
  • Page 332: Support For Vcenter Clusters

    VA resides on the shared storage. Restart the VA so that it becomes aware of the cluster. 7.1.4.5 Support for VM migration This section informs what you can expect when migrating virtual machines within a datacenter using vCenter Server migration options. Performance considerations apply to both "hot" and "cold" migration. Copyright © Acronis, Inc., 2000-2010...
  • Page 333: Performance Considerations

    To enable a user to operate on a specific ESX host only, assign the user the same privileges on the host. In addition, the Global > Licenses privilege is required to be able to back up virtual machines of a specific ESX host. Copyright © Acronis, Inc., 2000-2010...
  • Page 334 Virtual machine > Add existing disk Configuration Add new disk Add or remove device Change CPU count Memory Remove disk Rename Settings Virtual machine > Configure CD Interaction media Console interaction Power off Power on Copyright © Acronis, Inc., 2000-2010...
  • Page 335 Assign VM to resource pool Virtual machine > Add existing disk Configuration Add new disk Remove disk Settings Virtual machine > Power off Interaction Power on Virtual machine > Create from Inventory existing Create new Copyright © Acronis, Inc., 2000-2010...
  • Page 336: Storage Nodes

    (p. 416). To learn more about Acronis Backup & Recovery 10 Storage Node, see the Acronis Backup & Recovery 10 Storage Node (p. 21) section.
  • Page 337: Actions On Storage Nodes

    (p. 84). 3. Add (p. 338) the storage node to the Acronis Backup & Recovery 10 Management Server. 4. Create a managed vault (p. 139): specify the path to the vault, select the storage node that will manage the vault and select the management operations such as deduplication or encryption.
  • Page 338: Adding A Storage Node

    Password. The password for the account. Select the Save password check box to store the password for the account. 3. Click OK. Because registration requires the storage node's participation, it cannot take place when the machine is offline. Copyright © Acronis, Inc., 2000-2010...
  • Page 339: Tasks

    7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on the selected Acronis Backup & Recovery 10 Storage Node. This information is also duplicated on the Information pane. Storage node properties The tab displays the following information about the selected storage node: ...
  • Page 340: Actions On Tasks

    Some files may be recovered, but some not, depending on the period when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 341: Filtering And Sorting Tasks

    Type the task's name (owner name, or the backup plan name) in the field below or backup plan. the corresponding column header. As a result you will see the list of tasks, whose names (owner names, or backup Copyright © Acronis, Inc., 2000-2010...
  • Page 342: Log

    7.1.7 The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log.
  • Page 343 3. In the opened window, specify a path and a name for the file. Save all the log entries 1. Make sure, that the filters are not set. to a file 2. Click Save All to File. Copyright © Acronis, Inc., 2000-2010...
  • Page 344 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 345: Reporting

     Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem.  Owner - User name of the policy/backup plan owner (p. 33) ...
  • Page 346: Generating Reports

    Reports are generated based on report templates. The templates define the information to be included in the report and the way the information is represented. Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines ...
  • Page 347: Report About The Backup Policies

    Filters Under Filters, choose which backup plans to include in the report. Only the backup plans that meet all filter criteria are included.  Origin: The types of origin of the backup plans—Local and/or Centralized. Copyright © Acronis, Inc., 2000-2010...
  • Page 348: Report About The Tasks

    Under Report view, choose how the report will look:  Select whether to show all items in a single table or to group them by a particular column.  Specify which table columns to show, and in which order. Copyright © Acronis, Inc., 2000-2010...
  • Page 349: Report About The Archives And Backups

    A combined total is the total free and occupied space, total amount of backed up data, total number of archives and backups, and average ratios across the selected vaults. With the default filter settings, the report includes information about all centralized managed vaults plus the combined total. Copyright © Acronis, Inc., 2000-2010...
  • Page 350: Report About The Task Activities

    In order for your web browser to correctly display dates and other information in generated reports, enable active content (JavaScript). You can allow active content to run temporarily for the currently displayed webpage, or enable it permanently. To allow active content to run temporarily in Internet Copyright © Acronis, Inc., 2000-2010...
  • Page 351: Configuring Acronis Backup & Recovery 10 Components

    7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup & Recovery 10 components that can be set by using Acronis Administrative Template. For information on how to apply the administrative template, see How to load Acronis Administrative Template (p. 351).
  • Page 352 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
  • Page 353 Default value: 10 Acronis Backup & Recovery 10 agents connect to the storage node to access its managed vaults during backup or recovery. The Client Connection Limit parameter determines the maximum number of such connections that the storage node can handle simultaneously.
  • Page 354 You can view storage node errors in the Dashboard. The database is stored on the storage node in a local folder whose name is specified in Database path when creating the vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 355 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Backup & Recovery 10 Management Server that can be set by using Acronis Administrative Template. Collecting Logs Specifies when to collect log entries from machines managed by Acronis Backup & Recovery 10 Management Server.
  • Page 356 Possible values: Any string 0 to 32765 characters long Default value: public Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered machines for deployment of centralized policies, retrieval of logs and backup plan states, and similar actions—collectively called synchronization.
  • Page 357 (Note: Connections to machines with high synchronization priority—see Period-High Priority later in this topic—are likely to be always kept.) Synchronization connections are unrelated to connections such as those between Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console. Maximum Workers Description: Specifies the maximum number of threads to use for synchronization.
  • Page 358 IP address after an attempt to connect to it by using its host name has failed. Possible values: True or False Default value: False When connecting to a registered machine, Acronis Backup & Recovery 10 Management Server first uses the machine's network name—provided that the machine was added to the management server by name.
  • Page 359 The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template. Licensing Specifies how often the agent checks its license on the license server, and how long it can work without a license server.
  • Page 360 When the agent cannot connect to the license server, a warning is recorded into the agent's log. You can view this warning in the Dashboard. If the value is 0, no license check will be performed; without a license, Acronis Backup & Recovery 10's functionality will be disabled after the number of days given by Maximum Time Without License Server (see the next parameter).
  • Page 361 For details on how the agent log is cleaned up, see Log cleanup rules (p. 102). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Agent's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log.
  • Page 362: Connection Parameters

    The size of the snapshot storage does not affect the size of the backup. 7.2.1.5 Acronis Backup & Recovery 10 This section of the administrative template specifies the connection parameters and event tracing parameters for the following Acronis Backup & Recovery 10 components:  Acronis Backup & Recovery 10 Management Server ...
  • Page 363 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 90). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 364 The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both. Each event has a level from zero to five based on the event's severity, as shown in the following...
  • Page 365 Information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 366: Parameters Set Through Gui

    You will find the description of these parameters in the correspondent topic about configuration through the administrative template. 7.2.3 Parameters set through Windows registry The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set only by editing the registry. Parameter related to deduplication CompactingTriggerThreshold Description: Specifies the percentage of used items in the data stores below which compacting occurs.
  • Page 367: Creating A Backup Policy

    DatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its non-tape vaults database. This database contains a list of vaults that are managed by the storage node, other than tape vaults (see the next parameter).
  • Page 368 Backup options Settings [Optional] Configure parameters of the backup operation, such as pre/post backup commands, maximum network bandwidth allocated for the backup stream or the backup Copyright © Acronis, Inc., 2000-2010...
  • Page 369 Folder on VMware vCenter If the management server is integrated with vCenter Server, the resultant virtual machines will appear in the Acronis Backups folder on the vCenter. You can specify a subfolder for the machines resulting from execution of the policy.
  • Page 370: Policy Credentials

    Password. The password for the account. 2. Click OK. To learn more about Acronis service credentials, see the Rights for Acronis services (p. 85) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 371 What does a disk or volume backup store? For supported file systems, a disk or volume backup stores only those sectors that contain data. This reduces the resulting backup size and speeds up the backup and recovery operations. Windows Copyright © Acronis, Inc., 2000-2010...
  • Page 372 Since backup policies are commonly applied to multiple machines with various operating systems, Acronis recommends that you always select both the system and the boot volumes for backup, to ensure the integrity of every operating system. Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized backup policy.
  • Page 373 Tip: To be able to automatically create the volume structure information during recovery, make sure that the volume with the /etc/Acronis directory of each machine is selected for backup. For more details, see “Saving the volume structure information” (p. 48).
  • Page 374: Files To Back Up Selection Rules

    Settings\All Users in Windows XP and C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment variables and text. For example, to refer to the Acronis folder in the machines' Program Files folder, type: %PROGRAMFILES%\Acronis Templates Templates are similar to environment variables, but are already pre-customized.
  • Page 375: Access Credentials For Source

    Set up exclusions for the specific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folders, as well as files with specific extensions, to be stored in the archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 376 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance By folder path C:\Finance\F\ Excludes the folder C:\Finance\F (be sure to specify the full path starting from the disk letter) Linux Copyright © Acronis, Inc., 2000-2010...
  • Page 377: Archive

    Store all machines' archives in a single location  To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to the online storage. Then, expand the Online backup storage group and select the account.
  • Page 378: Access Credentials For Location

    Back up later – to create a backup task for manual start OR schedule one-time task execution in the future.  Simple – to schedule when and how often to backup data and specify retention rules. Copyright © Acronis, Inc., 2000-2010...
  • Page 379  Initial seeding - to save locally a full backup whose final destination is Acronis Online Backup Storage. 7.3.7.1 Back up now scheme With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page.
  • Page 380 Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day. The default value is Friday. Copyright © Acronis, Inc., 2000-2010...
  • Page 381 For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted. Copyright © Acronis, Inc., 2000-2010...
  • Page 382 The following GFS scheme suits such purposes:  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Friday  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Copyright © Acronis, Inc., 2000-2010...
  • Page 383 The guaranteed number of sessions that one can go back in the archive at any time. Calculated automatically, depending on the schedule parameters and the numbers of levels you select. See the example below for details. Example Schedule parameters are set as follows Copyright © Acronis, Inc., 2000-2010...
  • Page 384 Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups). Copyright © Acronis, Inc., 2000-2010...
  • Page 385 Using retention rules Specify the retention rules and when to apply them. This setting is recommended for backup destinations such as shared folders or centralized vaults. When there is insufficient space while backing up Copyright © Acronis, Inc., 2000-2010...
  • Page 386 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 387 Manual (if the schedule has not been set up). You can manually run any backup task or cleanup task at any time, regardless of whether it has a schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 388: Archive Validation

    For more information see the Scheduling (p. 173) section. 8 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online service. This service enables you to do online backups to Acronis Online Backup Storage.
  • Page 389: Introduction To Acronis Backup & Recovery 10 Online

    What is Acronis Backup & Recovery 10 Online? Acronis Backup & Recovery 10 Online is a service that enables you to back up data to Acronis Online Backup Storage. To use this service, you need to buy a subscription that determines the amount of storage space reserved for your backups (storage quota) and how long the online service will be available to you.
  • Page 390: How Long Will My Backups Be Kept In The Online Storage

    File-level backup and recovery is not possible for virtual machines, but is possible for a Windows host. Installing the software, backing up, and recovery are described in the Quick Start Guide for Acronis Backup & Recovery 10 Virtual Edition. When installing Acronis Backup & Recovery 10 for online backup only, you do not need to enter a license key during installation.
  • Page 391: Backup And Recovery Faq

    This way, you will obtain either a new full backup, or an incremental one. Since full backups take more storage space, Acronis recommends that you choose incremental backup if you want to run backups manually.
  • Page 392: Initial Seeding Faq

    Initial Seeding is an extra service that lets you save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 393: What Types Of Hard Drive Can I Use For Initial Seeding

    For example, you may want to upload a volume backup and a number of file backups. Do as many "initial seeding" backups as you wish and then send them to Acronis on the same disk. The Initial Seeding license gets used when uploading to the online storage starts. You will receive an e-mail notification informing you about this.
  • Page 394: How To Package A Hard Drive For Shipment

    6. Package (p. 394) the media along with a prepaid return shipping label and send it to Acronis by physical mail. The address is available on your account management Web page > Initial Seeding / Recovery tab >...
  • Page 395 1. Shipping label for sending your hard drive. This label is placed on the top of the box. You should send your package to one of the Acronis data centers. The data center address can be obtained on the Initial seeding/Recovery tab of your account management page by clicking Show data center address.
  • Page 396: How Do I Track An Initial Seeding Order Status

    How do I track an Initial Seeding order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about the most important events.
  • Page 397: Large Scale Recovery Faq

    You can then recover data from this copy. Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with all of the backups made from this machine. You can recover data directly from the disk or copy the backups to a local or network folder.
  • Page 398: Is Large Scale Recovery A Paid Service

    How do I track a Large Scale Recovery order status? On the Acronis Web site, the Initial Seeding / Recovery tab shows you the status of all your orders. In addition, you will receive e-mail notifications about most important events.
  • Page 399: Subscription Lifecycle Faq

    The time count will begin as soon as the subscription is activated. The first activation occurs when you assign a subscription to a certain machine. To do so, you need to have Acronis software installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 400: What Happens When My Subscription Expires

    What is the “Group”column for? So you can apply actions, such as Renew all or Auto-renew all, to your selection of the subscriptions. Specify the desired group name, for example, SalesDept, near each of the subscriptions you want to Copyright © Acronis, Inc., 2000-2010...
  • Page 401: Where Do I Start

    8.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not registered yet) and navigate to Online backup > For Business. This is your account management Web page. Here you can get a trial subscription, locate an Acronis partner or buy subscriptions online.
  • Page 402: Activating Online Backup Subscriptions

    To be able to back up a machine to the online storage, you need to purchase and activate a subscription to the Acronis Backup & Recovery 10 Online service. You can purchase subscriptions on the Acronis Web site or from an Acronis reseller.
  • Page 403: Reassigning An Activated Subscription

    You no longer need to back up one of your machines and you want to reuse that machine’s subscription for another machine.  You reinstalled Acronis Backup & Recovery 10 on a machine and want to resume its online backups. ...
  • Page 404: Configuring Proxy Settings

    The management server connects to the Internet to retrieve information about online backup subscriptions. The proxy settings for the management server also need to be configured. Proxy settings for the agent and the management server are configured separately, even if both are installed on the same machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 405: Limitations Of The Online Storage

    4. Enter the proxy server settings. For detailed information (p. 102) about the settings please refer to the context-sensitive help. 8.6 Limitations of the online storage Unlike other types of storage available in Acronis Backup & Recovery 10, the online storage has the following limitations. Operations The following operations are not possible.
  • Page 406: Terminology Reference

    A service that you can use in addition to online backup subscriptions. Initial Seeding An extra service that enables you to save an initial full backup locally and then send it to Acronis on a hard disk drive. Acronis uploads the backup to the online storage. After that, you can add incremental backups to this full backup, either manually or on a schedule.
  • Page 407 Assign a subscription that is already activated, to a different machine. Registration code A character string for registering a subscription or license that was bought from an Acronis partner. When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the registration codes for each of them.
  • Page 408: Glossary

    Limitations: Acronis Secure Zone cannot be organized on a dynamic disk (p. 415) or a disk using the GPT partitioning style. Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recovery Manager.
  • Page 409: Backup Operation

    (p. 417), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 410 The workflow when using policies is as follows. 1. The administrator creates a backup policy. 2. The administrator applies the policy to a group of machines or a single machine (p. 417). 3. The management server deploys the policy to the machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 411: Bootable Agent

    (p. 411) or Windows Preinstallation Environment (WinPE) (p. 422) with the Acronis Plug-in for WinPE (p. 408). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 412: Centralized Backup Plan

    (p. 410) from the management server (p. 418). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 418). The centralized management operations include: ...
  • Page 413: Deduplicating Vault

    For more information please refer to Retention rules (p. 42). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 409) and Acronis Backup & Recovery 10 Management Server (p. 418).
  • Page 414: Disk Group

    A backup (p. 409) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 415: Dynamic Disk

    Dynamic group A group of machines (p. 417) which is populated automatically by the management server (p. 418) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 416: Dynamic Volume

    The export operation can be applied to a single archive, a single backup (p. 409) or to your choice of backups belonging to the same archive. An entire vault (p. 421) can be exported by using the command line interface. Copyright © Acronis, Inc., 2000-2010...
  • Page 417: Full Backup

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 417), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 409) is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 418: Managed Vault

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 419). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 419: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 420 CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 417) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 421: Unmanaged Vault

    Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 422 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 417) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 409) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...

This manual is also suitable for:

Backup & recovery 10 advanced server virtual edition

Table of Contents