ACRONIS Backup & Recovery 10 Advanced Server User Manual

Hide thumbs Also See for Backup & Recovery 10 Advanced Server:
Table of Contents

Advertisement

Acronis® Backup & Recovery™ 10
Advanced Server
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Backup & Recovery 10 Advanced Server and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ACRONIS Backup & Recovery 10 Advanced Server

  • Page 1 Acronis® Backup & Recovery™ 10 Advanced Server User's Guide...
  • Page 2 Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds.
  • Page 3: Table Of Contents

    2.12 Proprietary Acronis technologies ....................49 2.12.1 Acronis Secure Zone ...........................49 2.12.2 Acronis Startup Recovery Manager ......................50 2.12.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) ............51 2.12.4 Acronis Active Restore ..........................52 2.13 Understanding centralized management ................54 2.13.1 Basic concepts ............................54 2.13.2...
  • Page 4 3.2.1 Logging level ...............................88 3.2.2 Log cleanup rules ............................88 3.2.3 Event tracing ...............................89 3.2.4 Domain access credentials .........................90 3.2.5 Acronis WOL Proxy .............................90 3.2.6 VM protection options ..........................90 Machine options ........................91 3.3.1 Machine management ..........................92 3.3.2 Event tracing ...............................92 3.3.3 Log cleanup rules ............................94...
  • Page 5 Exporting archives and backups ................... 237 6.7.1 Task credentials ............................239 6.7.2 Archive selection ............................. 240 6.7.3 Backup selection ............................241 6.7.4 Access credentials for source ........................241 6.7.5 Location selection ............................ 241 6.7.6 Access credentials for destination ......................243 Acronis Secure Zone ......................243...
  • Page 6 6.11.6 Volume operations ..........................272 6.11.7 Pending operations ..........................278 6.12 Collecting system information ....................279 Centralized management ..................... 280 Administering Acronis Backup & Recovery 10 Management Server ........280 7.1.1 Dashboard ............................... 280 7.1.2 Backup policies ............................282 7.1.3 Physical machines ............................
  • Page 7: Introducing Acronis® Backup & Recovery™ 10

    Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution. Acronis Backup & Recovery 10 Advanced Server inherits the benefits of the Acronis True Image Echo product family: ...
  • Page 8: Getting Started

    1. Install Acronis Backup & Recovery 10 Management Server (p. 18). 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installing the agents, register each of the machines on the management server. To do so, enter the server's IP or name and the centralized administrator's credentials in one of the installation wizard's windows.
  • Page 9 2. Create the deduplicating managed vault on the storage node. 3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplicating vault. 4. Ensure that the backup plans you create use the managed vault as destination for the backup archives.
  • Page 10: Using The Management Console

    (in the menu, in the main area with the Welcome screen, the Navigation pane, the Actions and tools pane) enabling you to perform agent- specific or server-specific operations. Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace Name...
  • Page 11 Dashboard. Use this view to estimate at a glance whether the data is successfully protected on the machines registered on the management server.  Backup policies. Use this view to manage backup policies existing on the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 12 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
  • Page 13 All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. Copyright © Acronis, Inc., 2000-2010...
  • Page 14: Operations With Panes

    Navigation tree, or on the Actions and Tools pane. Views A view appears on the main area when clicking any item in the Navigation tree in the Navigation pane (p. 11). "Tasks" view Copyright © Acronis, Inc., 2000-2010...
  • Page 15: Action Pages

    Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc. When the advanced representation is enabled, all Copyright © Acronis, Inc., 2000-2010...
  • Page 16: Acronis Backup & Recovery 10 Components

    Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of Acronis Backup & Recovery 10 components with a brief description of their functionality. Acronis Backup & Recovery 10 includes the following main types of components.
  • Page 17: Agent For Windows

    Disk management Agent for Windows includes Acronis Disk Director Lite - a handy disk management utility. Disk management operations, such as cloning disks; converting disks; creating, formatting and deleting volumes;...
  • Page 18: Agent For Linux

    1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.2 Agent for Linux This agent enables disk-level and file-level data protection under Linux. Disk backup Disk-level data protection is based on backing up either a disk or a volume file system as a whole, along with all information necessary for the operating system to boot;...
  • Page 19: Storage Node

    1.3.3.2 Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of various resources (such as the corporate storage capacity, the network bandwidth, or the managed machines' CPU load) required for the enterprise data protection. This goal is achieved through organizing and managing the locations that serve as dedicated storages of the enterprise backup archives (managed vaults).
  • Page 20: License Server

    1.3.3.4 License Server The server enables you to manage licenses of Acronis products and install the components that require licenses. For more information about Acronis License Server please see "Using Acronis License Server". Copyright © Acronis, Inc., 2000-2010...
  • Page 21: Management Console

    Acronis Wake-On-LAN Proxy installs on any server in the subnet where the machines to be backed up are located. 1.4 Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file systems with the following limitations: ...
  • Page 22: Supported Operating Systems

     JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node  Linux SWAP Acronis Backup & Recovery 10 can back up and recover corrupted or non-supported file systems using the sector-by-sector approach.
  • Page 23: System Requirements

    Acronis Backup & Recovery 10 Agent for Linux  Linux with kernel 2.4.20 or later (including 2.6.x kernels) and glibc 2.3.2 or later  Various Linux distributions, including:  Red Hat Enterprise Linux 4 and 5  CentOS 4 and 5 ...
  • Page 24: Technical Support

    Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support.
  • Page 25 More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.eu/enterprise/support/ Copyright © Acronis, Inc., 2000-2010...
  • Page 26: Understanding Acronis Backup & Recovery 10

    The details can be found in the context help. Backup under operating system 1. To protect data on a machine, install Acronis Backup & Recovery 10 agent (p. 360) on the machine which becomes a managed machine (p. 369) from this point on.
  • Page 27 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-2010...
  • Page 28 You also specify the destination where to recover the data. You can customize the recovery operation using recovery options, such as pre/post recovery commands, error handling or notification options. Copyright © Acronis, Inc., 2000-2010...
  • Page 29 If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
  • Page 30: User Privileges On A Managed Machine

    Backup Operators group, additionally has the following management rights:  Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot. Members of the Administrators group also can: Copyright © Acronis, Inc., 2000-2010...
  • Page 31: Owners And Credentials

    When managing a machine running Linux, the user has or obtains the root privileges, and so can:  Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine.
  • Page 32: Full, Incremental And Differential Backups

    It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one.
  • Page 33 Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Maximal Medium Minimal Storage space Maximal Medium Minimal Creation time Minimal Medium Maximal Recovery time Copyright © Acronis, Inc., 2000-2010...
  • Page 34: Gfs Backup Scheme

    You are free to use any of the varieties when backing up to a locally attached tape device. GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regularly back up data and clean up the resulting archive according to the GFS scheme.
  • Page 35 Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so that consolidation is not needed. In terms of backup methods, weekly backup is differential (Dif), monthly backup is full (F) and daily backup is incremental (I). The first backup is always full.
  • Page 36 The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. Copyright © Acronis, Inc., 2000-2010...
  • Page 37: Tower Of Hanoi Backup Scheme

    An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday...
  • Page 38 The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
  • Page 39: Retention Rules

    Differential backup (D) created at session 9 will be deleted at session 25 after creation of a new differential backup is completed. This way, a backup archive created in accordance with the Tower of Hanoi scheme by Acronis sometimes includes up to two additional backups over the classical implementation of the scheme.
  • Page 40 (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Copyright © Acronis, Inc., 2000-2010...
  • Page 41 The consolidation, however, may take a lot of time and system resources. And you still need some extra space in the vault for temporary files created during consolidation. What you need to know about consolidation Copyright © Acronis, Inc., 2000-2010...
  • Page 42: Backing Up Dynamic Volumes (Windows)

    2.8 Backing up dynamic volumes (Windows) This section explains in brief how to back up and recover dynamic volumes (p. 368) using Acronis Backup & Recovery 10. Basic disks that use the GUID Partition Table (GPT) are also discussed.
  • Page 43: Recovering Dynamic Volumes

    Basic MBR volume Basic MBR volume Basic MBR volume Basic GPT volume Basic GPT volume Basic GPT volume Basic GPT volume Basic MBR volume Basic MBR volume Basic MBR volume Unallocated space (basic MBR disk) Copyright © Acronis, Inc., 2000-2010...
  • Page 44: Backing Up Lvm Volumes (Linux)

    This section explains in brief how you would back up and recover volumes managed by Linux Logical Volume Manager (LVM)—called logical volumes—using Acronis Backup & Recovery 10. Acronis Backup & Recovery 10 Agent for Linux can access, back up and recover such volumes when running in Linux with 2.6.x kernel or a Linux-based bootable media.
  • Page 45 Linux Swap The system has three physical disks (Disk 1, Disk 2, and Disk 3). Two logical volumes, DYN1 and DYN2, are arranged across basic volumes 1-2 and 2-1. Disk 3 includes Acronis Secure Zone which is not normally backed up.
  • Page 46: Backing Up Raid Arrays (Linux)

    2.10 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recover Linux Software RAID devices (known as multiple-disk devices or MD devices) and hardware RAID arrays. Software RAID arrays Software RAID arrays, or MD devices, combine several volumes and make solid block devices (/dev/md0, /dev/md1, ..., /dev/md31), information of which is stored in /etc/raidtab or in dedicated...
  • Page 47: Tape Support

    A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node (p. 19). Storage nodes ensure fully automatic operation of tape libraries and autoloaders (p.
  • Page 48: Using A Single Tape Drive

    Retention rules and backup schemes that use automatic cleanup (GFS, Tower of Hanoi) are disabled in the GUI when backing up to a locally attached tape. 4. Personal vaults cannot be created on tape devices. Copyright © Acronis, Inc., 2000-2010...
  • Page 49: Proprietary Acronis Technologies

    Should the disk experience a physical failure, the zone and the archives located there will be lost. That's why Acronis Secure Zone should not be the only location where a backup is stored. In enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for backup when an ordinary location is temporarily unavailable or connected through a slow or busy channel.
  • Page 50: Acronis Startup Recovery Manager

    This feature has the trade name "Acronis Startup Recovery Manager". Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.
  • Page 51: Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

    2.12.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
  • Page 52: Acronis Active Restore

    Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup.
  • Page 53: Usage Scenarios

    If you opt for Acronis Active Restore, the system will be operational in a short time. Users will be able to open the necessary files from the storage and use them while the rest of the files, which are not immediately necessary, are being recovered in the background.
  • Page 54: Understanding Centralized Management

    Acronis Active Restore icon disappears from the system tray. 2.13 Understanding centralized management This section contains an overview of centralized data protection with Acronis Backup & Recovery 10. Please be sure you have an understanding of how data is protected on a single machine (p. 26) before reading this section.
  • Page 55: Setting Up Centralized Data Protection In A Heterogeneous Network

    To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p. 371) and configure it to manage a centralized vault or multiple centralized vaults.
  • Page 56 2. Install Acronis Backup & Recovery 10 Management Server [AMS] on one of the Windows servers (2). The management server is your single entry point to the Acronis infrastructure. 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's disks, volumes or files.
  • Page 57: Protecting The Servers

    There can be multiple storage nodes on the network. Each of the nodes can manage up to 20 local or remote vaults.  Multiple Acronis Backup & Recovery 10 components can be installed on a machine with a single installation procedure. ...
  • Page 58: Protecting The Workstations

    To protect data on a daily basis, you can also use the GFS or Tower of Hanoi backup schemes. 2.13.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibility to protect virtual machines in multiple ways: ...
  • Page 59: Grouping The Registered Machines

    Advanced product editions other than Virtual Edition (Acronis Backup & Recovery 10 Advanced Server, Advanced Server SBS Edition and Advanced Workstation) allow using only the last of the above methods. 2.13.3 Grouping the registered machines As soon as a machine is registered (p. 371) on the management server, the machine appears in the All machines built-in group (p.
  • Page 60 To back up this data, the administrator has to add the laptop to G2 "by force". This can be done by creating a static group (G3) and moving the static group into the dynamic one. Copyright © Acronis, Inc., 2000-2010...
  • Page 61: Policies On Machines And Groups

    Please familiarize yourself with this section to be sure that your actions yield the desired result and to understand the result of the automated Acronis Backup & Recovery 10 Management Server operations.
  • Page 62: A Policy On A Machine Or A Group

    3. A policy applied to a group cannot be revoked from a machine. 4. To revoke the policy from the machine, remove the machine from the group. The same policy on a group and on a machine Copyright © Acronis, Inc., 2000-2010...
  • Page 63: Operations With A Machine

    The "blue" policy is applied, but the "orange" policy remains on the machine. 4. Remove from the group: Machine #3 is removed from the group. The "orange" policy is revoked from the machine. The machine remains in the All machines group. Copyright © Acronis, Inc., 2000-2010...
  • Page 64: Inheritance Of Policies

    In the diagram below, the container stands for a group; the two-color circle stands for a machine with two applied policies; the three-color circle stands for a machine with three applied policies and so on. Copyright © Acronis, Inc., 2000-2010...
  • Page 65 All machines -> #1 or #2 or #3 "orange" Inherited G1 -> #1 or #2 or #3 "green" Inherited All machines -> #4 "orange" Inherited G1 -> G2 -> #4 "blue" Inherited G2 -> #4 "violet" Applied directly Copyright © Acronis, Inc., 2000-2010...
  • Page 66: Backup Policy's State And Statuses

    In this case, the first policy's state on the machine will be Revoking and the second policy's state will be Deploying. The policies can appear in the GUI simultaneously or one after another. Copyright © Acronis, Inc., 2000-2010...
  • Page 67: Policy Status On A Machine

    The policy that has to back up the [System] and the /dev/sda1 volumes, will get the Warning status on the Windows machines (since /dev/sda is not found) and on the Linux machines that have the Copyright © Acronis, Inc., 2000-2010...
  • Page 68: Policy Deployment State On A Group

    The status of the corresponding backup plan is Warning The status of the corresponding backup plan is OK Updating Error The updating log has errors: cannot delete the locked task, the Acronis service is stopped… Warning The updating log has warnings...
  • Page 69: Deduplication

    In Acronis Backup & Recovery 10, deduplication consists of two steps: Deduplication at source Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node to determine what data can be deduplicated, and does not transfer the data whose duplicates are already present in the vault.
  • Page 70: How Deduplication Works

    How deduplication works Deduplication at source When performing a backup to a deduplicating vault, Acronis Backup & Recovery 10 Agent reads items being backed up—disk blocks for disk backup or files for file backup—and calculates a fingerprint of each block. Such a fingerprint, often called a hash value, uniquely represents the item's content within the vault.
  • Page 71: When Deduplication Is Most Effective

    Follow these recommendations when using deduplication:  When creating a deduplicating vault, place the vault and its deduplication database on different disks. This will make deduplication faster, because deduplication involves extensive simultaneous use of both the vault and the database. Copyright © Acronis, Inc., 2000-2010...
  • Page 72: Deduplication Ratio

    When backing up multiple systems with similar content, back up one of the similar systems first, so that Acronis Backup & Recovery 10 Storage Node indexes all the system's files as potential deduplication items. This will lead to faster backup processes and less network traffic (because of effective deduplication at source), regardless of whether the backups are performed simultaneously or not.
  • Page 73: Privileges For Centralized Management

    This section describes the users' privileges that are required to manage a machine locally and remotely, to manage a machine registered on Acronis Backup & Recovery 10 Management Server, and to access and manage Acronis Backup & Recovery 10 Storage Node.
  • Page 74: Remote Connection

    Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Console on one machine and Acronis Backup & Recovery 10 Agent on another machine. You might need to specify logon credentials to establish a remote connection.
  • Page 75: Privileges For Remote Connection In Linux

    Remote connections by the root user are established according to the Acronisagent authentication policy, which is automatically set up during the installation of Acronis Backup & Recovery 10 Agent for Linux, by creating the file /etc/pam.d/Acronisagent with the following content: #%PAM-1.0...
  • Page 76: Acronis Security Groups

    When Acronis Backup & Recovery 10 Agent for Windows is being installed on a machine, the Acronis Remote Users group is created (or updated). A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery 10 Management Console, according to the management rights described in Users' privileges on a managed machine (p.
  • Page 77: Management Server Administrator Rights

    Administrators group itself is included. Tip: To ensure proper group names, you should install Acronis components in a domain controller after you have set up the domain controller itself. If the components were installed before you set up the domain controller, create the groups DCNAME $ Acronis Remote Users and DCNAME $ Acronis Centralized Admins manually, and then include the members of Acronis Remote Users and Acronis Centralized Admins in the newly created groups.
  • Page 78: User Privileges On A Storage Node

    2.13.7.7 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10 Storage Node depends on the user's rights on the machine where the storage node is installed. A regular user, such as a member of the Users group on the storage node, can: ...
  • Page 79: Communication Between Acronis Backup & Recovery 10 Components

     All three accounts are assigned the Log on as a service user right.  The Acronis Agent User user account is assigned the Adjust memory quotas for a process and Replace a process level token user rights.  The Acronis Agent User and ASN User user accounts are included in the Backup Operators group.
  • Page 80: Secure Communication

    For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup & Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. An Acronis component can act as a client application, a server application, or both, as shown in the following table.
  • Page 81: Configuring Communication Settings

    2. In the Group Policy console, expand Computer Configuration, then expand Administrative Templates, and then click Acronis. 3. In the Acronis pane to the right, double-click a communication option that you want to configure. The Administrative Template contains the following options (each option is explained later in this topic): ...
  • Page 82 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 84). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 83: Network Port Configuration

    The server listens to this port for incoming connection. This port is also used as default by the Acronis client. During component installation you might be asked to confirm the port opening or to open the port manually, in case you are using a firewall other than Windows Firewall.
  • Page 84: Ssl Certificates

    Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent. The choice is available between: ...
  • Page 85 Self-signed certificates On machines running Windows, if the certificate location contains no server certificate, a self-signed server certificate is automatically generated and installed during the installation of any Acronis component except Acronis Backup & Recovery 10 Management Console. If the machine is renamed after its self-signed certificate was generated, the certificate cannot be used and you will need to generate a new one.
  • Page 86: Options

    3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup &...
  • Page 87: Time-Based Alerts

    To make a selection, choose the desired value from the Number of tasks drop-down menu. 3.1.5 Fonts This option is effective when the console is connected to a managed machine or to the management server. Copyright © Acronis, Inc., 2000-2010...
  • Page 88: Management Server Options

    The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
  • Page 89: Event Tracing

    Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical...
  • Page 90: Domain Access Credentials

    The preset is: Disabled. To bring this option into use: 1. Install Acronis WOL Proxy on any server in the subnet where the machines to be woken are located. The server has to provide continuous services availability. With multiple subnets, install Acronis WOL Proxy in every subnet where you need to use the Wake-On-LAN functionality.
  • Page 91: Machine Options

    ESX/ESXi is deployed (p. 307) to the virtual machine's host. Such machines appear as not manageable (grayed out). Once the agent is deployed to an ESX/ESXi host (this requires a license for Acronis Backup & Recovery 10 Advanced Server Virtual Edition), the virtual machines from this host are ready for applying a backup policy or individual backup.
  • Page 92: Machine Management

    3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
  • Page 93: Snmp Notifications

    The settings you obtain in this case will be plan-specific or task- specific. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical...
  • Page 94: Log Cleanup Rules

    /etc/snmp/snmptrapd.conf - configuration file for the Net-SNMP trap daemon. 3.3.3 Log cleanup rules This option specifies how to clean up the Acronis Backup & Recovery 10 agent log. This option defines the maximum size of the agent log folder (in Windows XP/2003 Server, %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery\MMS\LogEvents).
  • Page 95: Customer Experience Program

    Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 96 Additional settings (p. 115): Copyright © Acronis, Inc., 2000-2010...
  • Page 97: Archive Protection

    The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the disk or in the backup file; the password hash is Copyright © Acronis, Inc., 2000-2010...
  • Page 98: Source Files Exclusion

    MyFolder and the file MyFile.tmp outside that folder, and selected to skip all .tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skipped. Copyright © Acronis, Inc., 2000-2010...
  • Page 99 Selected Cleared Cleared Do not back up until the command execution is complete Result Preset Perform the Perform the backup backup after the concurrently with Perform the backup command is the command only after the Copyright © Acronis, Inc., 2000-2010...
  • Page 100: Post-Backup Command

    This option is effective for both Windows and Linux operating systems. The option enables you to define the commands to be automatically executed before and after data capture (that is, taking the data snapshot) performed by Acronis Backup & Recovery 10 at the beginning of the backup procedure.
  • Page 101: Pre-Data Capture Command

    5. Click Test command to check if the command is correct. Check box Selection Selected Cleared Selected Cleared Fail the task if the command execution fails Selected Selected Cleared Cleared Do not back up until the command execution is Copyright © Acronis, Inc., 2000-2010...
  • Page 102: File-Level Backup Snapshot

    (The File-level backup snapshot (p. 102) option determines whether a snapshot will be taken during file-level backup). The option determines whether to take snapshots of multiple volumes at the same time or one by one. The preset is: Enable. Copyright © Acronis, Inc., 2000-2010...
  • Page 103: Compression Level

    Acronis Backup & Recovery 10. Data consistency, in turn, ensures that the application will be recovered in the correct state and become operational immediately after recovery.
  • Page 104: Backup Performance

    This option is effective for Windows and Linux operating systems and bootable media. This option is available when an internal (fixed) hard disk of the machine being backed up is selected as the backup destination Copyright © Acronis, Inc., 2000-2010...
  • Page 105: Network Connection Speed

    Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk. You can limit the hard disk usage by the backup process to the desired level.
  • Page 106 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. Copyright © Acronis, Inc., 2000-2010...
  • Page 107: Windows Event Log

    The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Copyright © Acronis, Inc., 2000-2010...
  • Page 108: Fast Incremental/Differential Backup

    Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup &...
  • Page 109 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size.
  • Page 110: Media Components

    One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup. If you boot a machine from the media and click Run Acronis One-click Restore, the disk will be immediately recovered from the backup contained on the same media.
  • Page 111: Dual Destination

    If you select the password-protected Acronis Secure Zone as the primary destination, keep in mind that the archive in the secondary destination will not be protected with a password.
  • Page 112: Task Start Conditions

    Select the Run the task anyway after check box and specify the time interval. The task will start as soon as the conditions are met OR the maximum time delay lapses, depending on which comes first. Time diagram: Wait until conditions are met Copyright © Acronis, Inc., 2000-2010...
  • Page 113: Task Failure Handling

    An archive can occupy several tapes. In such cases a so-called tape set is used for keeping the data backups. Tape set is a logical group of one or more tapes which contain backups of the specific protected data. A tape set can contain backups of other data as well. Copyright © Acronis, Inc., 2000-2010...
  • Page 114 The preset is: Disabled. When this option is enabled, each incremental backup will be written onto a free tape. This option is available only when using free tape for each full and differential backup is selected. Copyright © Acronis, Inc., 2000-2010...
  • Page 115: Additional Settings

    When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
  • Page 116 The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target).
  • Page 117: Default Recovery Options

    3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a recovery task, you can either use a default option, or override the default option with the custom value that will be specific for this task only.
  • Page 118: Pre-Recovery Command

    (for example, "pause".) 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3. In the Arguments field specify the command’s execution arguments, if required. Copyright © Acronis, Inc., 2000-2010...
  • Page 119: Post-Recovery Command

    However, the resulting effect will depend on the overall CPU usage and other factors like disk I/O speed or network traffic. The preset is: Normal. Copyright © Acronis, Inc., 2000-2010...
  • Page 120 NTFS permissions from the folder to which they are recovered. 3.4.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems.
  • Page 121 3.4.2.5 Event tracing It is possible to duplicate log events of the recovery operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers. Copyright © Acronis, Inc., 2000-2010...
  • Page 122 Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error)
  • Page 123: Error Handling

    The preset is Enabled. This option defines whether to recover the files’ date and time from the archive or assign the files the current date and time. Validate backup before recovery The preset is Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 124 Change SID after the recovery is finished This option is not effective when recovery to a virtual machine is performed by Acronis Backup & Recovery 10 Agent for ESX/ESXi or Acronis Backup & Recovery 10 Agent for Hyper-V. The preset is Disabled.
  • Page 125: Vaults

    A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.
  • Page 126: Centralized Vaults

    Members of the Administrators group can view and manage any archive stored on the storage node. A user who is a member of the Administrators group on a managed machine can view and manage archives created by any user of this machine. Copyright © Acronis, Inc., 2000-2010...
  • Page 127: Working With The "Centralized Vault" View

    The Disk archives tab lists all the archives that contain disk or volume backups (images).  The File archives tab lists all the archives that contain file backups. Related sections: Operations with archives stored in a vault (p. 158) Copyright © Acronis, Inc., 2000-2010...
  • Page 128: Actions On Centralized Vaults

    The plans and tasks that use this vault will fail. If you choose to keep the archives for a managed vault, the vault will be detached from the storage node. Later on, you'll be able to attach this vault to the same or to Copyright © Acronis, Inc., 2000-2010...
  • Page 129: Creating A Managed Centralized Vault

    Type Select the Managed type. Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter access credentials for the storage node. Path (p. 130) Specify where the vault will be created. Managed centralized vaults can reside on a network share, SAN, NAS, or on a hard drive local to the storage node.
  • Page 130 1. In the Local folders of the storage node, select the desired folder or enter the full path to the folder in the Path field. To create a new folder for the database, click Create folder. 2. Click OK. When choosing a folder for the vault's database, follow these considerations: Copyright © Acronis, Inc., 2000-2010...
  • Page 131: Vault Encryption

    Specify a unique name for the vault. The creation of two centralized vaults with the same name is prohibited. Comments Enter the distinctive description of the vault. Type Select the Unmanaged type. Path (p. 132) Copyright © Acronis, Inc., 2000-2010...
  • Page 132: Attaching A Managed Vault

    To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. Path Specify the path to the location where the archives are stored.
  • Page 133: Tape Libraries

    Tape compatibility table (p. 47) section. Acronis Backup & Recovery 10 enables you to set up distribution of backups by media. For example, a separate tape set can be used to back up some specific data, and the backups of all other data will be written onto any currently mounted tape, which does not belong to the tape set.
  • Page 134: Rsm Media Pools

    To get information about the readability of the archives on tapes, written by different components of other versions of the product by means of Acronis Backup & Recovery 10, see the Tape compatibility table (p. 47) section.
  • Page 135: Getting Started With A Tape Library

    So the tape data will be lost. If all the backups are deleted from a tape, it will not return to the Free pool. It remains in the Acronis pool as a free tape to be reused. So if a storage node needs a new tape, it finds a free tape first in the Acronis pool, then in the Free pool.
  • Page 136: Tape Library As A Managed Vault

    You should have Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console installed on local or remote machines, as well as Acronis Backup &...
  • Page 137: Actions With Archives On Tapes In A Library

    The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction window comes up if a required tape is not found. Copyright © Acronis, Inc., 2000-2010...
  • Page 138: Managing A Tape Library

    Manage tapes and then click Start inventory on the Tape Management window. When inventorying is completed a user has the list of tapes currently loaded into the library. Perform the procedure every time you load new tapes into tape library slots. Copyright © Acronis, Inc., 2000-2010...
  • Page 139 Manage tapes on the toolbar. Then the Tape Management window will show a list of the library slots that contain tapes. For every tape belonging to the Free pool or to the Acronis pool, the slot data field indicates the tape label. Labels are also displayed for tapes that are in the Imported pool and contain backups written by Acronis (such might be the case when you bring a tape from another tape library).
  • Page 140 Use a separate tape set option. With some of the options below enabled, the program will add new tapes to the tape set every time when a full, incremental or differential backup is created.  For each full backup The preset is: Disabled. Copyright © Acronis, Inc., 2000-2010...
  • Page 141: Tape Rotation

    The same tape rotation enables you to get by with the minimum number of cartridges and not to be buried in used tapes. Acronis Backup & Recovery 10 enables you to achieve full automation of tape rotation while backing up onto tape libraries.
  • Page 142: Criteria Of The Choice

    Any daily/incremental backup (16 GB) is shown in the figures as a green rectangle: Weekly/differential backups (40 GB) are displayed as a blue rectangle: Any full monthly backup (320 GB) is drawn in orange: A whole tape (400 GB) is drawn as a gray rectangle: Copyright © Acronis, Inc., 2000-2010...
  • Page 143 (11:00 PM) on Monday 4th of January. This backup is an incremental one (16 Gb) that is written onto the same tape 01, because the Always use a free tape: Copyright © Acronis, Inc., 2000-2010...
  • Page 144 This task deletes all the outdated backups. The next figure shows dark-gray rectangles instead of the backups deleted up to the current time. Physically the deleted backups are still on the tapes; however information about the backups is deleted from the storage node database. Copyright © Acronis, Inc., 2000-2010...
  • Page 145 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the time the differential backup (blue rectangle) is written onto tape 24. Copyright © Acronis, Inc., 2000-2010...
  • Page 146 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Copyright © Acronis, Inc., 2000-2010...
  • Page 147 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc., 2000-2010...
  • Page 148 This scheme has the following advantages:  access to any full backup requires only one tape  backup deletion frees a tape so it can be reused. Copyright © Acronis, Inc., 2000-2010...
  • Page 149 ToH Example 2 requires 4 tapes, which is the minimum for the case. So its tape options settings are the best in comparison with options for other examples. ToH Example 1 Suppose, the backup plan has the following tape options: Copyright © Acronis, Inc., 2000-2010...
  • Page 150 (one tape - 16%, two tapes - 72%, three tapes - 12%) as well as rewinding and reading of one (6%), two (50%) or three (44%) backups  five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has the following tape options: Copyright © Acronis, Inc., 2000-2010...
  • Page 151 So in this specific case the selection of the Always use a free tape: For each full backup option considerably increases the usage efficiency of the tapes in the library. ToH Example 3 Imagine the backup plan has the following tape options:  the Use a separate tape set option is selected Copyright © Acronis, Inc., 2000-2010...
  • Page 152: Tape Planning

    It is implied that the Use a separate tape set option is enabled. To calculate the number of tapes you should take into account the following considerations:  full backup size  average size of incremental backups  average size of differential backups Copyright © Acronis, Inc., 2000-2010...
  • Page 153 ( (2*320 + 12*16 + 11*40) * 1 / 400 ) + 1 = round up ( 3.18 ) + 1 = 5 (tapes). Tape planning: Example 2 Imagine the case with the following features:  full backup size is F_GB  average size of incremental backups is I_GB  average size of differential backups is D_GB Copyright © Acronis, Inc., 2000-2010...
  • Page 154 What if I have to move tapes with backups from one tape library to another? 1. If both tape libraries are attached to the same machine with Acronis Backup & Recovery 10 Storage Node installed (i.e. the libraries are managed by the same storage node), the storage node database has all the required information about the content of the moved tapes.
  • Page 155: Personal Vaults

     What if I need to recover data from an Echo tape? Use the table from the Tape compatibility table (p. 47) section to find out which Acronis Backup & Recovery 10 components can read data from your tape. 4.2 Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine.
  • Page 156: Actions On Personal Vaults

    All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the [Vault name] actions bar (on the Actions and Tools pane) and from the [Vault name] actions item of the main menu respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 157: Creating A Personal Vault

    In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Click Create Acronis Secure Zone. Zone The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 243) section. Explore a vault's Click Explore. content In the appearing Explorer window, examine the selected vault's content.
  • Page 158: Common Operations

    The export of an archive creates a duplicate of the archive with all its backups in the location you specify. Delete a single archive 1. Select the archive or one of the archives you want to delete. Copyright © Acronis, Inc., 2000-2010...
  • Page 159: Operations With Backups

    Select one of the backups you want to delete, then click Delete. multiple backups The program duplicates your selection in the Backups deletion (p. 160) window that has check boxes for each archive and each backup. Review the selection and correct Copyright © Acronis, Inc., 2000-2010...
  • Page 160: Deleting Archives And Backups

    Configuring the archives table By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. Copyright © Acronis, Inc., 2000-2010...
  • Page 161 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 162: Scheduling

    5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct.
  • Page 163: Daily Schedule

    Advanced scheduling settings (p. 171) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 164 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: Copyright © Acronis, Inc., 2000-2010...
  • Page 165: Weekly Schedule

    Advanced scheduling settings (p. 171) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area.
  • Page 166 Saturday: once at 9 PM  Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the task: First schedule 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours Copyright © Acronis, Inc., 2000-2010...
  • Page 167: Monthly Schedule

    To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of months. Copyright © Acronis, Inc., 2000-2010...
  • Page 168 Advanced scheduling settings (p. 171) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area. All the settings you made are displayed in the Result field at the bottom of the window.
  • Page 169: At Windows Event Log Event

    System) from the list, or type a log name—for example: Microsoft Office Sessions Event source Specifies the event source, which typically indicates the program or the system component that caused the event—for example: disk Event type Copyright © Acronis, Inc., 2000-2010...
  • Page 170 Windows Update Agent and leave the remaining fields the same. How to view events in Event viewer To open a log in Event Viewer 1. On the Desktop or in the Start menu, right-click My Computer, and then click Manage. Copyright © Acronis, Inc., 2000-2010...
  • Page 171: Advanced Scheduling Settings

    Use Wake-On-LAN When this setting is enabled, Acronis Backup & Recovery 10 Management Server will use the Wake- On-LAN (WOL) functionality to wake up turned-off registered machines when a backup, cleanup or validation is scheduled to start. If the backup task on each machine starts with a delay (see the next setting), the management server will wake up the machines according to those delays.
  • Page 172: Conditions

    - put the task on hold for the specified time interval. If the time interval lapses and the conditions are still not met, run the Copyright © Acronis, Inc., 2000-2010...
  • Page 173: User Is Idle

    (3) If the user is still active at 11PM, the backup task starts anyway. 5.6.2 Location's host is available Applies to: Windows, Linux "Location's host is available" means that the machine hosting the destination for storing archives on a networked drive is available. Copyright © Acronis, Inc., 2000-2010...
  • Page 174: Fits Time Interval

    What if a task is scheduled to be executed at a certain time and this time is outside the specified time interval? For example:  Event: Daily, Every 1 day(s); Once at 03:00:00 PM.  Condition: Fits time interval, from 06:00:00 PM until 11:59:59 PM. Copyright © Acronis, Inc., 2000-2010...
  • Page 175: User Logged Off

    As a result, (1) if the machine is restarted before 12 hours pass since the completion of the latest successful backup, the scheduler will wait until 12 hours pass, and then will start the task. Copyright © Acronis, Inc., 2000-2010...
  • Page 176 (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. Copyright © Acronis, Inc., 2000-2010...
  • Page 177: Direct Management

    Use the Dashboard to estimate at a glance whether the data is successfully protected on the machine. The dashboard shows the summary of Acronis Backup & Recovery 10 agent's activities and enables you to rapidly identify and resolve any issues.
  • Page 178 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's activities on the machine. Right-click on any highlighted date and select View log to see the list of log entries filtered by date.
  • Page 179: Backup Plans And Tasks

    Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 183) section for details. You can run, edit, stop and delete the created plans and tasks. Copyright © Acronis, Inc., 2000-2010...
  • Page 180: Understanding States And Statuses

    -> Stop the tasks or enable the tasks to run (change media; provide additional space on Otherwise, see 2. the vault; ignore the read error; create the missing Acronis Secure Zone). Running At least one task is No action is required.
  • Page 181: Task States

    The next state may be Stopping (if the user chooses to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that can put the task to the Running state.) Stopping Copyright © Acronis, Inc., 2000-2010...
  • Page 182: Task Statuses

    No action is required. "Succeeded", "-", or The "-" state means that the task has never been started or has "Stopped" been started, but has not finished yet and so its result is not available. Copyright © Acronis, Inc., 2000-2010...
  • Page 183: Working With Backup Plans And Tasks

    Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot run plans owned by other users. Task Click Run. The task will be executed immediately in spite of its schedule and conditions. Copyright © Acronis, Inc., 2000-2010...
  • Page 184 Some files may be recovered, but some not, depending on the moment when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 185 Only the management server administrator can do so.  Do not have the appropriate privilege Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users. Copyright © Acronis, Inc., 2000-2010...
  • Page 186: Filtering And Sorting Backup Plans And Tasks

    As a result you will see the list of tasks, whose names/owners' names fully or just partly coincide with the entered value. Filter plans and tasks by state, In the field below the corresponding header, select the required value from the status, type, origin, last result, list. schedule. Copyright © Acronis, Inc., 2000-2010...
  • Page 187: Run Backup Plan

    Types of tasks The following table summarizes all types of tasks that exist in Acronis Backup & Recovery 10. The actual types of tasks you might observe depend on the product edition and the product component the console is connected to.
  • Page 188 Deleting backups from a backup archive in accordance with retention rules ASZ creation Creating Acronis Secure Zone ASZ management Resizing, changing password, deleting Acronis Secure Zone Disk management Disk management operations Compacting Service task performed on a storage node Indexing...
  • Page 189: Backup Plan Details

    Backup scheme - the selected backup scheme and all its settings with schedules.  Validation (if selected) - events before or after which the validation is performed, and validation schedule.  Backup options - backup options changed against the default values. Copyright © Acronis, Inc., 2000-2010...
  • Page 190: Log

    6.1.3 The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log. When the program executes a task, it adds multiple entries.
  • Page 191: Filtering And Sorting Log Entries

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 192: Creating A Backup Plan

     Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem.  Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
  • Page 193: Archive Validation

    [Optional] Configure parameters of the backup operation, such as pre/post backup commands, maximum network bandwidth allocated for the backup stream or the backup archive compression level. If you do nothing in this section, the default values (p. 95) will be used. Copyright © Acronis, Inc., 2000-2010...
  • Page 194: Why Is The Program Asking For The Password

    Specify the conversion schedule if required. Host (p. 210) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 210) Here you select the resulting virtual machine type and location.
  • Page 195: Source Type

    Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up specific files and folders. If you are not concerned about recovery of the operating system along with all the settings and applications, but plan to keep safe only certain data (the current project, for example), choose file backup.
  • Page 196: Selecting Disks And Volumes

    Use the table in the right part of the window to browse and select the nested items. Selecting the check box beside the Name column’s header automatically selects all items in the table. Clearing this check box automatically deselects all items. 3. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 197: Access Credentials For Source

    Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Copyright © Acronis, Inc., 2000-2010...
  • Page 198: Archive

    While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. Copyright © Acronis, Inc., 2000-2010...
  • Page 199: Access Credentials For Archive Location

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 200: Backup Schemes

    Specify when to start the backup. The task will be Select this check box, if you do not need to put the backup task on a schedule and started manually wish to start it manually afterwards. Copyright © Acronis, Inc., 2000-2010...
  • Page 201: Simple Scheme

    Weekly ("Father") backups are differential;  Daily ("Son") backups are incremental. Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Copyright © Acronis, Inc., 2000-2010...
  • Page 202 For instance, a daily backup of Sunday, January 1, will be available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Monthly backups will never be deleted. Copyright © Acronis, Inc., 2000-2010...
  • Page 203 The following GFS scheme suits such purposes:  Start backup at: 11:30 PM  Back up on: Tuesday, Thursday, Friday  Weekly/monthly: Friday  Keep backups:  Daily: 6 months  Weekly: 6 months  Monthly: 5 years Copyright © Acronis, Inc., 2000-2010...
  • Page 204: Tower Of Hanoi Scheme

    The guaranteed number of sessions that one can go back in the archive at any time. Calculated automatically, depending on the schedule parameters and the numbers of levels you select. See the example below for details. Example Schedule parameters are set as follows Copyright © Acronis, Inc., 2000-2010...
  • Page 205 Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups). Copyright © Acronis, Inc., 2000-2010...
  • Page 206: Custom Backup Scheme

    Using retention rules Specify the retention rules and when to apply them. This setting is recommended for backup destinations such as shared folders or centralized vaults. When there is insufficient space while backing up Copyright © Acronis, Inc., 2000-2010...
  • Page 207 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 208 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme will still result in three backup tasks, enabling you to manually start a backup of any type:  Full backup, runs every Friday at 10:00 PM Copyright © Acronis, Inc., 2000-2010...
  • Page 209: Archive Validation

    If this happens, you can restart the conversion task manually after powering off the machine. Any changes made to the machine while it was powered on, will be overwritten. Copyright © Acronis, Inc., 2000-2010...
  • Page 210 6.2.11.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations.
  • Page 211: Recovering Data

    (p. 363) or using Acronis Startup Recovery Manager (p. 50). Then, create a recovery task. Acronis Universal Restore (p. 51) lets you recover and boot up Windows on dissimilar hardware or a virtual machine.
  • Page 212: When To Recover

    [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 223) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers.
  • Page 213: Task Credentials

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 214: Data Type

    Specify the items to recover. By default, all items of the selected backup will be selected. If you do not want to recover certain items, just uncheck them. To obtain information on a disk/volume, right-click it and then click Information. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 215: Access Credentials For Location

    There are probably other times when you may need to recover the MBR, but the above are the most common. When recovering the MBR of one disk to another Acronis Backup & Recovery 10 recovers Track 0, which does not affect the target disk’s partition table and partition layout. Acronis Backup &...
  • Page 216: Destination Selection

    Available disk destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. The selected disks will be recovered to the physical disks of the machine the console is connected to.
  • Page 217: Disk Destination

    The program will leave the existing NT signature of the target hard disk as is. 6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux is installed. Copyright © Acronis, Inc., 2000-2010...
  • Page 218: Mbr Destination

    Then you proceed to the regular volume mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed to the regular volume mapping procedure described below.
  • Page 219: Volume Properties

    Change the volume file system, if required. By default, the program selects the original volume's file system. Acronis Backup & Recovery 10 can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3. For volumes with other native file systems, this option is not available.
  • Page 220: Virtual Machine Settings

    Virtual machine type / virtualization server selection The new virtual machine can be created either on a virtualization server (this requires Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi to be installed) or in any accessible local or networked folder.
  • Page 221: File Destination

    Doc*.txt yields files such as Doc.txt and Document.txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt Copyright © Acronis, Inc., 2000-2010...
  • Page 222: Access Credentials For Destination

    User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the recovery task: Copyright © Acronis, Inc., 2000-2010...
  • Page 223: Universal Restore

    6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Universal Restore handles differences in devices that are critical for the operating system startup, such as storage controllers, motherboard or chipset.
  • Page 224: How To Convert A Disk Backup To A Virtual Machine

    Rather than converting a TIB file to a virtual disk file, which requires additional operations to bring the virtual disk into use, Acronis Backup & Recovery 10 performs the conversion by recovery of a disk backup to a fully configured and operational new virtual machine. You have the ability to adapt the virtual machine configuration to your needs when configuring the recovery operation.
  • Page 225: Bootability Troubleshooting

    Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
  • Page 226 OS Selector, which uses the MBR, might become inoperable. If this happens, reactivate Acronis OS Selector as follows. Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Tools -> Activate OS Selector. ...
  • Page 227 Generally, you should refer to the boot loader manual pages for the appropriate procedure. There is also the corresponding Knowledge Base article on the Acronis Web site. The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to identical hardware.
  • Page 228: About Windows Loaders

    Example 2. The following command assembles the device /dev/md0 combined of the disks /dev/sdb and /dev/sdc: mdadm --assemble /dev/md0 -ayes /dev/sdb /dev/sdc If recovering an MD device requires the machine to be rebooted (usually, when the device contains the boot volume), follow these guidelines: Copyright © Acronis, Inc., 2000-2010...
  • Page 229: Recovering A Vast Number Of Files From A File Backup

    Tip: In general, if a volume contains many files, consider using a disk-level backup instead of a file-level one. In this case, you will be able to recover the entire volume as well as particular files stored on it. Copyright © Acronis, Inc., 2000-2010...
  • Page 230: Recovering The Storage Node

    6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed.
  • Page 231: Task Credentials

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. Copyright © Acronis, Inc., 2000-2010...
  • Page 232: Archive Selection

    2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 30) section.
  • Page 233: Backup Selection

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Copyright © Acronis, Inc., 2000-2010...
  • Page 234: When To Validate

    Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, create, delete files or folders, and run executables consisting of one file. Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. Usage scenarios: ...
  • Page 235: Archive Selection

    If the archive is stored on a locally attached tape device, expand the Tape drives group, then click the required device. 2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. Copyright © Acronis, Inc., 2000-2010...
  • Page 236: Backup Selection

     Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mounted volume. If required, select another letter to assign from the drop-down list.
  • Page 237: Managing Mounted Images

     an entire vault that can be exported by using the command line interface. For more information, please refer to Acronis Backup & Recovery 10 Command Line Reference. Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, writing onto removable or detachable media or other purposes.
  • Page 238 Otherwise the task will fail. You cannot edit an export task to specify another name for the destination archive (this is a limitation). Tip. You can implement the staging scenario manually, by regularly running the archive deletion task followed by the export task. Copyright © Acronis, Inc., 2000-2010...
  • Page 239: Task Credentials

    The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. Copyright © Acronis, Inc., 2000-2010...
  • Page 240: Archive Selection

    Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p.
  • Page 241: Backup Selection

    Specify a destination where the exported object will be stored. Exporting backups to the same archive is not allowed. 1. Selecting the export destination Enter the full path to the destination in the Path field, or select the desired destination in the folders tree. Copyright © Acronis, Inc., 2000-2010...
  • Page 242  exporting an archive or part of an archive to a location where an archive of the same name exists  exporting an archive or part of an archive to the same location twice Copyright © Acronis, Inc., 2000-2010...
  • Page 243: Access Credentials For Destination

    To create Acronis Secure Zone, perform the following steps. Space Disk (p. 244) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 244) Specify the exact size of the zone.
  • Page 244: Acronis Secure Zone Disk

    Secure Zone is created using unallocated space, if available, or at the expense of the volumes' free space. The Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. To allocate space for Acronis Secure Zone 1.
  • Page 245: Managing Acronis Secure Zone

    Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
  • Page 246: Deleting Acronis Secure Zone

    1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from the zone and then click OK.
  • Page 247: Acronis Startup Recovery Manager

    (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pressing F11 or by selecting it from the menu, respectively. The system disk (or, the /boot partition in Linux) should have at least 70 MB of free space to activate Acronis Startup Recovery Manager.
  • Page 248: How To Create Bootable Media

    Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more functionality than using Linux-based bootable media. Having booted PC-compatible hardware into WinPE, you can use not only Acronis Backup & Recovery 10 Agent, but also PE commands and scripts and other plug-ins you've added to the PE.
  • Page 249 AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu. Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer to Building Bart PE with Acronis Plug-in from Windows distribution (p. 255) for details. 6.10.1.1...
  • Page 250: Kernel Parameters

    WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 253). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected.
  • Page 251 Disables the use of PCI BIOS; only direct hardware access methods will be allowed. You may want to use this parameter when the bootable media fails to start, which may be caused by the BIOS. pci=biosirq Copyright © Acronis, Inc., 2000-2010...
  • Page 252: Network Settings

    These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent. The following parameters can be pre-configured: ...
  • Page 253: Network Port

    Universal Restore operation. Adding drivers to bootable media is available on the condition that: 1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are creating a removable media or its ISO or detachable media, such as a flash drive. Drivers cannot be uploaded on a PXE server or WDS/RIS.
  • Page 254 Bootable Media Builder provides three methods of integrating Acronis Backup & Recovery 10 with WinPE 2.x or 3.0:  Adding the Acronis Plug-in to the existing PE ISO. This comes in handy when you have to add the plug-in to the previously configured PE ISO that is already in use. ...
  • Page 255 You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 5. Choose whether you want to create ISO or WIM image or upload the media on Acronis PXE Server.
  • Page 256: Connecting To A Machine Booted From Media

    Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable media. Anyone who has physical access to the machine terminal can run the console and connect. Just click Run management console in the bootable agent startup window.
  • Page 257: List Of Commands And Utilities Available In Linux-Based Bootable Media

    Linux-based bootable media contains the following commands and command line utilities, which you can use when running a command shell. To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console. Copyright © Acronis, Inc., 2000-2010...
  • Page 258 Copyright © Acronis, Inc., 2000-2010...
  • Page 259: Recovering Md Devices And Logical Volumes

    2. Click Acronis Bootable Agent. Then, click Run management console. 3. In the management console, click Recover. Under the archive contents, Acronis Backup & Recovery 10 will display a message saying that it detected information about the volume structure. 4. Click Details in the area with that message.
  • Page 260: Creating The Volume Structure Manually

    6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually.
  • Page 261 -a y my_volgroup 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the management console, click Recover. 2. In Archive, click Change and then specify the name of the archive. Copyright © Acronis, Inc., 2000-2010...
  • Page 262: Acronis Pxe Server

    For a complete list of commands and utilities that you can use in the bootable media environment, see List of commands and utilities available in Linux-based bootable media (p. 257). For detailed descriptions of the trueimagecmd and trueimagemnt utilities, see the Acronis Backup & Recovery 10 command line reference.
  • Page 263: Acronis Pxe Server Installation

    3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation. Later on it will automatically launch at each system restart. You can stop and start Acronis PXE Server in the same way as other Windows services.
  • Page 264: Disk Management

    PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh...
  • Page 265: Running Acronis Disk Director Lite

    Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare metal, on a machine that cannot boot or on a non- Windows machine. To do so, boot the machine from a bootable media (p. 363) created with the Acronis Bootable Media Builder;...
  • Page 266: Disk Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with disks. Acronis Disk Director Lite must obtain exclusive access to the target disk. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the disk cannot be blocked, close the disk management applications that use this disk and start again.
  • Page 267: Basic Disk Cloning

    To be able to use it, proceed normally to the Create volume operation. If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk tools.
  • Page 268: Cloning Method And Advanced Options

    1. Select the Copy NT signature check box. You receive the warning: “If there is an operating system on the hard disk, uninstall either the source or the target hard disk drive from your machine prior to starting the machine again. Otherwise, the OS will start from the first of the Copyright © Acronis, Inc., 2000-2010...
  • Page 269 Convert to MBR. Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR to GPT conversion for dynamic disks. However you can perform the following conversions to reach the goal using the program: 1. MBR disk conversion: dynamic to basic (p. 271) using the Convert to basic operation.
  • Page 270 Convert to basic. System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic to dynamic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 271 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk.
  • Page 272: Volume Operations

    The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time. If you receive a message stating that the volume cannot be blocked, close the disk management applications that use this volume and start again.
  • Page 273: Types Of Dynamic Volumes

    Create volume wizard The Create volume wizard lets you create any type of volume (including system and active), select a file system, label, assign a letter, and also provides other disk management functions. Copyright © Acronis, Inc., 2000-2010...
  • Page 274: Select The Type Of Volume Being Created

    After you choose the disks, the wizard will calculate the maximum size of the resulting volume, depending on the size of the unallocated space on the disks you chose and the requirements of the volume type you have previously decided upon. Copyright © Acronis, Inc., 2000-2010...
  • Page 275: Set The Volume Size

    If the Primary button is not selected, the Active option will be inactive. If the volume is intended for data storage, select Logical. Copyright © Acronis, Inc., 2000-2010...
  • Page 276: Delete Volume

    6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images. The features of resizing the existing volumes and creating the new volumes, using free space from the existing ones, exist on the full version of the software, so with this version deleting an existing volume sometimes might be the only way to free the necessary disk space without changing the existing disk configuration.
  • Page 277: Change Volume Letter

    1. Right-click on the selected volume, and then click Change label. 2. Enter a new label in the Change label window text field. 3. By clicking OK in the Change label window, you'll add the pending operation of changing the volume label . Copyright © Acronis, Inc., 2000-2010...
  • Page 278: Pending Operations

    Until then, Acronis Disk Director Lite will only demonstrate the new volume structure that will result from the operations that have been planned to be performed on disks and volumes.
  • Page 279: Collecting System Information

    Cancel. Then no changes will be done to the pending operation list. Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so if you try to exit Disk management without committing the pending operations, you will receive the appropriate warning.
  • Page 280: Centralized Management

    Use the Dashboard to estimate at a glance the health of data protection on the registered machines. The Dashboard displays the summary of Acronis Backup & Recovery 10 agents' activities, lets you check for free space available in managed vaults, and rapidly identify and resolve any issues.
  • Page 281 Options > Console options > Time-based alerts. Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history is based on the log entries, collected from the registered machines and from the management server.
  • Page 282: Backup Policies

    To be able to manage and protect multiple machines as a whole, you can create a backup plan template called a "backup policy". By applying this template to a group of machines, you will deploy multiple backup plans with a single action. Backup policies exist only on the Acronis Backup & Recovery 10 Management Server.
  • Page 283: Backup Policy Deployment States

    In the Tasks view, apply the Last result -> Failed filter if there are too many tasks. You can also sort the failed tasks by backup plans or by machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 284: Actions On Backup Policies

    In the Machines selection (p. 285) window, specify the machines (groups) the selected backup policy will be applied to. If the machine is currently offline, the policy will be deployed when the machine comes online again. Copyright © Acronis, Inc., 2000-2010...
  • Page 285: Machines Selection

    In the group tree, select the required group. Then, in the right part of the window, select the machines to apply the backup policy to. 2. Click OK. The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and machines belonging to the selected groups. Filtering and sorting backup policies The following is a guideline for you to filter and sort backup policies.
  • Page 286: Policy Details

    In the Machine details (p. 294)/Group details (p. 303) window, examine all information on the selected machine (or the selected group). View tasks of the machine Click View tasks. (group). The Tasks (p. 312) view will display a list of the tasks, pre-filtered by the selected Copyright © Acronis, Inc., 2000-2010...
  • Page 287: Physical Machines

    7.1.3 Physical machines Acronis Backup & Recovery 10 lets the administrator protect data and perform management operations on multiple machines. The administrator adds a machine to the management server using the machine's name or IP address, imports machines from Active Directory, or from text files. Once a machine is registered (p.
  • Page 288: Actions On Machines

    In the Import machines from Active Directory (p. 291) window, specify the machines or organizational units whose machines you need to import to the management server. Import machines from a text Click Import machines from file. file Copyright © Acronis, Inc., 2000-2010...
  • Page 289: Applying Policies

    Delete a machine from the Click Delete machine from AMS. management server As a result, backup policies are revoked and shortcuts to centralized vaults are deleted from the machine. If the machine is not available at the moment, these Copyright © Acronis, Inc., 2000-2010...
  • Page 290 Manual refresh guarantees that the most recent data is displayed. Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & Recovery 10 Management Server to a managed machine and perform other centralized management operations, you need to register the machine on the management server.
  • Page 291: Importing Machines From Active Directory

    The registration procedure can be initiated on the machine side. 1. Connect the console to the machine where Acronis Backup & Recovery 10 agent is installed. If prompted for credentials, specify credentials of a member of the Administrators group on the machine.
  • Page 292 To synchronize machines with a text file using command line 1. Log on as a member of the Acronis Centralized Admins security group. 2. In the command prompt, change the directory to the folder where Acronis Backup & Recovery 10 Management Server has been installed—by default: C:\Program Files\Acronis\AMS.
  • Page 293: Importing Machines From A Text File

    1. In the groups tree, select the group whose machines you need to add. 2. In the right part of the window, select the machines. 3. To add more machines from other groups, repeat the steps 1 and 2 for each group. 4. Click OK to add machines. Copyright © Acronis, Inc., 2000-2010...
  • Page 294: Machine Details

    Expired - the trial period of the machine's agent has expired. To specify a full license key, use the Change License functionality, or run the setup program and follow its instructions.  Installed agents - full name of Acronis agents, installed on the machine.  Operating system - the operating system the machine's agent runs.
  • Page 295 View details of a plan/task Backup plan Click View details. In the Plan Details (p. 189) window, review the plan details. Task Click View details. In the Task Details (p. 187) window, review the task details. Copyright © Acronis, Inc., 2000-2010...
  • Page 296 (from the file backup): The aborted operation may cause changes in the destination folder. Some files may be recovered, but some not, depending when you stopped the task. To recover all the files, you will have to run the task once again. Copyright © Acronis, Inc., 2000-2010...
  • Page 297 When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Copyright © Acronis, Inc., 2000-2010...
  • Page 298 You will be taken to the Tasks view with pre-filtered tasks related to the selected backup group. View log related to a group Click View log. This opens Log view with pre-filtered log entries of the selected group. Copyright © Acronis, Inc., 2000-2010...
  • Page 299: Filtering And Sorting Machines

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 300: Actions On Groups

    Manual Refresh guarantees that the most recent data is displayed. Creating a custom static or dynamic group To create a group 1. In the Group name field, enter a name for the group being created. Copyright © Acronis, Inc., 2000-2010...
  • Page 301  the member changes so that it no longer meets the criteria  the administrator changes the criteria so that the member no longer meets the criteria Copyright © Acronis, Inc., 2000-2010...
  • Page 302: Organizational Unit Criterion

    1. In the groups tree, click the group to move the selected group to. You can move any type of custom group (either static, or dynamic) to another custom group of any type, or to the root folder. Copyright © Acronis, Inc., 2000-2010...
  • Page 303: Editing Custom Groups

    View log of a policy Click View log. The Log (p. 315) view will display a list of the log entries related to the selected backup policy. Revoke a policy from the Click Revoke. Copyright © Acronis, Inc., 2000-2010...
  • Page 304: Virtual Machines

    Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows or Agent for Linux on the virtual machine and register (p. 290) it on the management server. The machine will be treated as a physical one. You will be able to apply any backup policy to the machine, including policies that back up files.
  • Page 305: Virtual Machines On A Management Server

    4. The virtual machines hosted on the Hyper-V server appear in the All virtual machines group. Adding ESX/ESXi virtual machines 1. VMware Tools have to be installed in the guest systems. 2. Acronis Backup & Recovery 10 Agent for ESX/ESXi is delivered as a virtual appliance. Do either of the following: ...
  • Page 306 Virtual machines remain in the All virtual machines group and in other groups if their host is managed by Agent for ESX/ESXi. Policies applied to these groups or directly to the machines continue Copyright © Acronis, Inc., 2000-2010...
  • Page 307 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
  • Page 308: Support For Vcenter Clusters

    When installing the purchased product, select Use a license from the following Acronis License Server and specify the license server that has the appropriate number of licenses for Acronis Backup & Recovery 10 Advanced Server Virtual Edition. You need one license for every host you selected.
  • Page 309: Storage Nodes

    (p. 368). To learn more about Acronis Backup & Recovery 10 Storage Node, see the Acronis Backup & Recovery 10 Storage Node (p. 19) section.
  • Page 310: Actions On Storage Nodes

    (p. 78). 3. Add (p. 311) the storage node to the Acronis Backup & Recovery 10 Management Server. 4. Create a managed vault (p. 129): specify the path to the vault, select the storage node that will manage the vault and select the management operations such as deduplication or encryption.
  • Page 311: Adding A Storage Node

    7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on the selected Acronis Backup & Recovery 10 Storage Node. This information is also duplicated on the Information pane. Copyright © Acronis, Inc., 2000-2010...
  • Page 312: Tasks

    To learn more about task states and statuses, see the Task states (p. 181) and Task statuses (p. 182) sections. Way of working with tasks  Use the filtering and sorting (p. 314) capabilities to display the desired tasks in the table.  Select a task to take an action on it. Copyright © Acronis, Inc., 2000-2010...
  • Page 313: Actions On Tasks

    Only the management server administrator can do this.  Do not have the appropriate privilege Without Administrator privileges on the machine, a user cannot modify tasks owned by other users Copyright © Acronis, Inc., 2000-2010...
  • Page 314: Filtering And Sorting Tasks

    1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc., 2000-2010...
  • Page 315: Log

    7.1.7 The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log.
  • Page 316 Filtering and sorting log entries The following is a guideline for you to filter and sort log entries. Display log entries for a 1. In the From field, select the date starting from which to display the log entries. Copyright © Acronis, Inc., 2000-2010...
  • Page 317: Centralized Log Entry Details

     Module - Blank or the number of program module where an error was occurred. It is an integer number that may be used by Acronis support service to solve the problem.  Owner - User name of the policy/backup plan owner (p. 31)
  • Page 318: Reporting

    Reports are generated based on report templates. The templates define the information to be included in the report and the way the information is represented. Acronis Backup & Recovery 10 Management Server offers report templates for:  Registered machines ...
  • Page 319: Report About The Machines

    Source type: The type of data backed up under the backup policies—Disks/volumes and/or Files.  Deployment state: The deployment states of the backup policies—for example, Deployed.  Status: The statuses of the backup policies—OK, Warning, and/or Error. Copyright © Acronis, Inc., 2000-2010...
  • Page 320: Report About The Backup Plans

    Specify how to sort the table. 7.1.8.4 Report about the tasks In this view, you can generate a report about the tasks that run on registered machines. This report consists of one or more tables. Copyright © Acronis, Inc., 2000-2010...
  • Page 321: Report About The Archives And Backups

     Number of backups: The limits for the number of backups that each of the archives contains. With the default filter settings, the report includes all archives that are stored in the centralized managed vaults. Copyright © Acronis, Inc., 2000-2010...
  • Page 322: Report About The Vaults' Statistics

    Origin: The types of origin of the tasks—Centralized, Local, and/or Local without backup plan. A centralized task belongs to a centralized backup plan. A local task might not belong to a backup plan (for example, a recovery task). Copyright © Acronis, Inc., 2000-2010...
  • Page 323: Configuring Acronis Backup & Recovery 10 Components

    2. Make sure, that the Enable JavaScript check box is selected. 3. Click OK. 7.2 Configuring Acronis Backup & Recovery 10 components There are three ways to configure various parameters of Acronis Backup & Recovery 10 components in Windows:  By using Acronis Administrative Template ...
  • Page 324: Parameters Set Through Administrative Template

    7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup & Recovery 10 components that can be set by using Acronis Administrative Template. For information on how to apply the administrative template, see How to load Acronis Administrative Template (p. 324).
  • Page 325 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
  • Page 326 Vault Free Space Error Limit or less, an error is recorded in the storage node's log. Backups performed to the vault will keep failing until the vault's free space is above the limit. Vault Database Free Space Warning Limit Copyright © Acronis, Inc., 2000-2010...
  • Page 327 Database path when creating the vault. 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Backup & Recovery 10 Management Server that can be set by using Acronis Administrative Template. Collecting Logs Specifies when to collect log entries from machines managed by Acronis Backup & Recovery 10 Management Server.
  • Page 328 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 88). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Management Server's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record Acronis Backup &...
  • Page 329 (Note: Connections to machines with high synchronization priority—see Period-High Priority later in this topic—are likely to be always kept.) Synchronization connections are unrelated to connections such as those between Acronis Backup & Recovery 10 Management Server and Acronis Backup & Recovery 10 Management Console. Maximum Workers Description: Specifies the maximum number of threads to use for synchronization.
  • Page 330 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously). If there are fewer worker threads than normal-priority machines, the actual interval between synchronizations may be longer than the value of this parameter.
  • Page 331 Description: Specifies the initial size of the snapshot storage as a percentage of the disk space that is available at the time of starting the backup. Possible values: Any integer number between 0 and 100 Default value: 50 Copyright © Acronis, Inc., 2000-2010...
  • Page 332 The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template. Licensing Specifies how often the agent checks its license on the license server, and how long it can work without a license server.
  • Page 333 For details on how the agent log is cleaned up, see Log cleanup rules (p. 94). Windows Event Log Specifies when to record Acronis Backup & Recovery 10 Agent's events into the Application event log in Windows. This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log.
  • Page 334 This setting is effective only when the Snapshot Storage Absolute Size setting is 0. Description: Specifies the initial size of the snapshot storage as a percentage of the disk space that is available at the time of starting the backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 335: Connection Parameters

    The size of the snapshot storage does not affect the size of the backup. 7.2.1.5 Acronis Backup & Recovery 10 This section of the administrative template specifies the connection parameters and event tracing parameters for the following Acronis Backup & Recovery 10 components:  Acronis Backup & Recovery 10 Management Server ...
  • Page 336 SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 84). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
  • Page 337 The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both. Each event has a level from zero to five based on the event's severity, as shown in the following...
  • Page 338: Parameters Set Through Gui

    Information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis. The end results are intended to provide software improvements and enhanced functionality to better meet the needs of Acronis customers.
  • Page 339: Creating A Backup Policy

    Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its tape vaults database. This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libraries, and approximately equals 10 MB per hundred archives.
  • Page 340 The conversion can be performed by any machine that is registered on the management server and has Acronis Backup & Recovery 10 Agent with the corresponding functionality. The archive has to be stored in a shared location, such as a network folder or a managed vault, so that the selected machine can access the archive.
  • Page 341: Policy Credentials

    Folder on VMware vCenter If the management server is integrated with vCenter Server, the resultant virtual machines will appear in the Acronis Backups folder on the vCenter. You can specify a subfolder for the machines resulting from execution of the policy.
  • Page 342: Items To Back Up

    If multiple operating systems are installed on the computer, this is the boot volume of the operating system in which the agent is working. For more details, see "Note on Windows machines" below. Copyright © Acronis, Inc., 2000-2010...
  • Page 343 The names of templates are case-sensitive. Note: When backing up virtual machines by using Acronis Backup & Recovery 10 Agent for ESX/ESXi, [All Volumes] is the only template that can be used. What does a disk or volume backup store? For supported file systems, a disk or volume backup stores only those sectors that contain data.
  • Page 344 Since backup policies are commonly applied to multiple machines with various operating systems, Acronis recommends that you always select both the system and the boot volumes for backup, to ensure the integrity of every operating system. Note on Linux machines You can include both Windows and Linux volumes (partitions) in one centralized backup policy.
  • Page 345: Files To Back Up Selection Rules

    Settings\All Users in Windows XP and C:\ProgramData in Windows Vista) You can use other environment variables or a combination of environment variables and text. For example, to refer to the Acronis folder in the machines' Program Files folder, type: %PROGRAMFILES%\Acronis Copyright © Acronis, Inc., 2000-2010...
  • Page 346: Access Credentials For Source

    Specify:  User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain)  Password. The password for the account. 2. Click OK. Copyright © Acronis, Inc., 2000-2010...
  • Page 347: Exclusions

    1. Selecting the archives destination Choose where to store machines' archives:  Store all machines' archives in a single location  To store archives in a centralized vault, expand the Centralized group and click the vault. Copyright © Acronis, Inc., 2000-2010...
  • Page 348: Access Credentials For Location

    Store each machine's archive in the machine's Acronis Secure Zone Acronis Secure Zone has to be created on each machine the policy will be applied to. For information on how to create Acronis Secure Zone, see the Creating Acronis Secure Zone (p. 243) section.
  • Page 349: Backup Scheme Selection

    With the Back up now scheme, the backup will be performed immediately, right after you click the OK button at the bottom of the page. In the Backup type field, select whether you want to create a full, incremental or differential backup (p. 32). Copyright © Acronis, Inc., 2000-2010...
  • Page 350 (W), and monthly (M) backups. Here is a natural way to do this: the following table shows a sample two-month period for such a plan. Jan 1—Jan 7 Jan 8—Jan 14 Jan 15—Jan 21 Jan 22—Jan 28 Jan 29—Feb 4 Feb 5—Feb 11 Feb 12—Feb 18 Feb 19—Feb 25 Copyright © Acronis, Inc., 2000-2010...
  • Page 351 If the schedule starts with a daily or a weekly backup, a full backup is created instead. Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that many may find useful.  Back up files every day, including weekends Copyright © Acronis, Inc., 2000-2010...
  • Page 352 Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thursdays. On these days, you often make changes to your financial documents, statements, and update the spreadsheets etc. on your laptop. To back up this data, you may want to: Copyright © Acronis, Inc., 2000-2010...
  • Page 353 Up to 16 levels of full, differential, and incremental backups  Next-level backups are twice as rare as previous-level backups  One backup of each level is stored at a time  Higher density of more recent backups Copyright © Acronis, Inc., 2000-2010...
  • Page 354 The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to have is called the roll-back period. The following table shows full backup and roll-back periods for schemes of various levels. Copyright © Acronis, Inc., 2000-2010...
  • Page 355 Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Copyright © Acronis, Inc., 2000-2010...
  • Page 356 If there is only one full backup left, and an incremental or differential backup is in progress, an error occurs saying there is a lack of available space This setting is recommended when backing up to a USB drive or Acronis Secure Zone. This setting is not applicable to managed vaults.
  • Page 357 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup location becomes available. Likewise, backup tasks for incremental and differential backups will wait until all users are logged off and users are idle, respectively. Copyright © Acronis, Inc., 2000-2010...
  • Page 358: Archive Validation

    Validation of a volume backup calculates a checksum for every data block saved in the backup. Validation of the archive will validate all the archive’s backups and may take a long time and a lot of system resources. Copyright © Acronis, Inc., 2000-2010...
  • Page 359 3. Validation schedule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. For more information see the Scheduling (p. 162) section. Copyright © Acronis, Inc., 2000-2010...
  • Page 360: Glossary

     can serve as the primary location for dual destination backup. Limitation: Acronis Secure Zone cannot be organized on a dynamic disk (p. 366) or a disk using the GPT partitioning style. Acronis Secure Zone is considered as a personal vault (p. 370).
  • Page 361: Agent-Side Cleanup

    (p. 369), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.
  • Page 362: Backup Plan (Plan)

    4. On each machine, the agent (p. 360) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. Copyright © Acronis, Inc., 2000-2010...
  • Page 363: Backup Scheme

    (p. 363) or Windows Preinstallation Environment (WinPE) (p. 373) with the Acronis Plug-in for WinPE (p. 360). A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS).
  • Page 364: Centralized Backup Plan

    (p. 362) from the management server (p. 370). Such plan can be modified only by editing the backup policy. Centralized management Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 370). The centralized management operations include: ...
  • Page 365: Deduplicating Vault

    For more information please refer to Retention rules (p. 39). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p. 360) and Acronis Backup & Recovery 10 Management Server (p. 370).
  • Page 366: Disk Group

    A backup (p. 361) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
  • Page 367: Dynamic Disk

    Dynamic group A group of machines (p. 369) which is populated automatically by the management server (p. 370) according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:  Operating system ...
  • Page 368: Dynamic Volume

    Full backup A self-sufficient backup (p. 361) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. Copyright © Acronis, Inc., 2000-2010...
  • Page 369: Gfs (Grandfather-Father-Son)

    A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines. Managed machine A machine (p. 369), either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent (p. 360) is installed. Managed vault A centralized vault (p.
  • Page 370: Media Builder

    Physical machine On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine (p. 371). A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.
  • Page 371: Recovery Point

    A machine remains in a static group until the administrator removes it from the group or from the management server. Storage node (Acronis Backup & Recovery 10 Storage Node) A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults (p.
  • Page 372: Storage Node-Side Validation

    CPU load. Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 369) when a certain time comes or a certain event occurs. The actions are described in an xml script file.
  • Page 373: Unmanaged Vault

    Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 369) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 360) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup &...
  • Page 374 A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. The Acronis Plug-in for WinPE (p. 360) enables running the Acronis Backup & Recovery 10 Agent (p. 360) in the preinstallation environment.
  • Page 375: Index

    Access credentials for source • 193, 197, 231, 233, 239, 241, 339, 346 Actions with archives on tapes in a library • Acronis Active Restore • 49, 52, 211, 212, 223, 360, 373 Adding a machine to another group • 289, Acronis Backup &...
  • Page 376 Backing up to tape library • 137 Bootable Media Builder • 21 Backup • 26, 32, 361, 364, 365, 366, 368, Building Bart PE with Acronis Plug-in from 369, 373 Windows distribution • 249, 255 Backup archive (Archive) • 18, 26, 361, Built-in group •...
  • Page 377 Creating a personal vault • 157 369, 370 Creating a volume • 272 Disk backup (Image) • 209, 360, 366, 369 Creating Acronis Secure Zone • 157, 243, Disk conversion basic to dynamic • 266, 269, 270 Creating an unmanaged centralized vault •...
  • Page 378 File-level security • 96, 109, 110, 117, 120 How to create bootable media • 248, 254 Files selection • 215 How to load Acronis Administrative Files to back up selection rules • 342, 345 Template • 81, 324 Filtering and sorting archives • 128, 156, How to reactivate GRUB and change its configuration •...
  • Page 379 Importing machines from Active Directory • Main area, views and action pages • 11, 288, 291 Increasing Acronis Secure Zone • 246 Managed machine • 10, 26, 87, 360, 362, 364, 365, 369, 371, 372 Incremental backup • 361, 363, 365, 369 Managed vault •...
  • Page 380 Protecting the virtual machines • 58 Parameters set through Windows registry • Protecting the workstations • 58 Password for Acronis Secure Zone • 244 PXE and DHCP on the same server • 264 Pending operations • 265, 267, 268, 269, PXE Server •...
  • Page 381 Static and dynamic groups • 59 350, 356, 357, 358, 365 Static group • 59, 364, 371 Rights for Acronis services • 79, 341 Storage Node • 9, 19, 47, 55, 309 RSM Media Pools • 133, 134 Storage node (Acronis Backup &...
  • Page 382 Understanding states and statuses • 180 Volume destination • 216, 218 Universal Restore • 17, 21, 212, 223, 253 Volume operations • 272 Universal Restore (Acronis Backup & Volume properties • 218, 219 Recovery 10 Universal Restore) • 49, Volume selection • 235, 236 51, 211, 223, 372 Volume Shadow Copy Service •...
  • Page 383 Windows event log • 89, 92, 97, 107, 118, WinPE (Windows Preinstallation Environment) • 360, 363, 373 Work across subnets • 264 Working under bootable media • 256 Working with backup plans and tasks • Working with the • 126, 127, 155, 280 Copyright © Acronis, Inc., 2000-2010...

Table of Contents