ACRONIS TRUE IMAGE ECHO - FOR LINUX User Manual

Hide thumbs Also See for TRUE IMAGE ECHO - FOR LINUX:
Table of Contents

Advertisement

Quick Links

User's Guide
Acronis
®
True Image Echo
Server for Linux

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the TRUE IMAGE ECHO - FOR LINUX and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ACRONIS TRUE IMAGE ECHO - FOR LINUX

  • Page 1 User’s Guide Acronis ® True Image Echo Server for Linux...
  • Page 2 Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis”, "Acronis Compute with Confidence" and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1. Introduction ..................6 1.1 Acronis® True Image Echo Server – a complete solution for corporate users ......6 1.2 Acronis True Image Echo Server key features ............... 7 1.3 New in Acronis True Image Echo Server ................8 1.4 Supported file systems and storage media ................
  • Page 4 Chapter 8. Managing Acronis Secure Zone ............53 8.1 Creating Acronis Secure Zone .................... 53 8.2 Resizing Acronis Secure Zone ..................... 54 8.3 Changing the password for Acronis Secure Zone ..............55 8.4 Deleting Acronis Secure Zone ..................... 55 Chapter 9. Creating bootable media ..............57 Chapter 10.
  • Page 5 12.2 Automatic image creation using cron service ..............75 12.3 Restoring files with trueimagemnt ..................76 12.3.1 Supported commands ....................76 12.3.2 Trueimagemnt usage examples ................. 77 Chapter 13. Transferring the system to a new disk ......... 78 13.1 General information ......................78 13.2 Security ..........................
  • Page 6: Chapter 1. Introduction

    Acronis True Image Echo Server provides comprehensive, reliable, and cost- effective system protection and recovery for corporate servers, running Linux. With Acronis True Image Echo Server you have peace of mind knowing you are protected and can recover from any situation.
  • Page 7: Acronis True Image Echo Server Key Features

    Disk cloning and new disk deployment Acronis True Image Echo Server can be used to clone an image onto multiple servers. For example, a company purchased several servers and needs similar environments on each of them. Traditionally, an IT manager should install the operating system and programs on every server.
  • Page 8: New In Acronis True Image Echo Server

    Notifications (e-mail, Winpopup) Viewing logs Comprehensive wizards in X Window environment simplify complex operations Context Help 1.3 New in Acronis True Image Echo Server Backup Encrypting backups with industry-standard AES cryptographic algorithm (key size 128, 192, 256 bit) Control network bandwidth usage when backing up to FTP...
  • Page 9: Supported File Systems And Storage Media

    • • • If a file system is not supported or is corrupted, Acronis True Image Echo Server can copy data using a sector-by-sector approach. For XFS and Reiser4 file systems the partition resizing feature is not supported. 1.4.2 Supported storage media Hard disk drives •...
  • Page 10 Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support.
  • Page 11: Chapter 2. Acronis True Image Echo Server Installation And Startup

    Chapter 12. Console mode . See also man trueimagecmd or man trueimagemnt. If your disk data is totally corrupted, load the bootable Acronis True Image Echo Server version from removable media (created by you using Rescue Media Builder). Then you...
  • Page 12: Removing Acronis True Image Echo Server

    2.4 Removing Acronis True Image Echo Server To remove Acronis True Image Echo Server, do the following: 1. Execute the following commands: # cd /usr/lib/Acronis/TrueImageServer/uninstall/ # ./uninstall 2. Remove the sources of the SnapAPI module: # rm -rf /usr/src/snapapi* Copyright © Acronis, Inc., 2000-2009...
  • Page 13: Chapter 3. General Information And Proprietary Acronis Technologies

    When you back up files and folders, only the data, along with the folder tree, is compressed and stored. Backing up disks and partitions is performed in a different way: Acronis True Image Echo Server saves a sector-based snapshot of the disk, which includes the operating system, registry, drivers, software applications and data files, as well as system areas hidden from the user.
  • Page 14: Acronis Secure Zone

    In the Acronis True Image Echo Server Wizards’ windows the zone is listed along with all partitions available for storing archives. Acronis Secure Zone is always available for archive creation as long as there is space for the backup file. If there is not enough space, older archives will be deleted to create space.
  • Page 15: Working From A Rescue Cd

    In case you remove Acronis True Image Echo Server from the system, there is an option to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone.
  • Page 16: Support For Lvm Volumes

    3.7 Support for LVM volumes When running in Linux environment with 2.6.x kernel, Acronis True Image Echo Server supports disks, managed by Logical Volume Manager (LVM). You can back up data of one or more LVM volumes and restore it to a previously created LVM volume or MBR disk (partition), likewise it is also possible to restore MBR volume data to an LVM volume.
  • Page 17: Backing Up To Tape Drive

    3.8 Backing up to tape drive Acronis True Image Echo Server supports SCSI tape drives. It can store backups on the tape and restore data from the tape, store large backups to multiple tapes, and append incremental/differential changes to a tape with the existing archives.
  • Page 18: Chapter 4. The Program Interface Under X Window System

    Chapter 4. The program interface under X Window System Acronis True Image Echo Server features both the console mode and a user-friendly interface under X Window System. The GUI mode, described in this chapter, provides the Chapter 12. Console mode widest functionality.
  • Page 19: The Menu

    Operations or Tools menu. 4.1.3 Status bar At the bottom of the main window, there is a status bar indicating the Acronis True Image Echo Server operation progress and results. Double-clicking the operation results will open the Log Viewer window.
  • Page 20: Viewing Disk And Partition Information

    (connection type, device type, size, etc.); partition information includes both physical (sectors, location, etc.), and logical (file system, free space etc.) parameters. You can change the width of a column by dragging its borders with the mouse. Copyright © Acronis, Inc., 2000-2009...
  • Page 21: Chapter 5. Creating Backup Archives

    3.1 The difference between file archives and disk/partition images (see details in This chapter describes creating backup archives using Acronis True Image Echo Server Chapter 12. Console mode GUI under X Window System. See for using console or Cron service.
  • Page 22 If you are going to create a differential backup, select the full backup which will be a base, or any of the existing differential backups. Either way, the program will create a new differential backup. Copyright © Acronis, Inc., 2000-2009...
  • Page 23 Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. In addition to NFS, Acronis True Image Echo Server supports the SMBFS network file system.
  • Page 24 In the latter case, the program will continue working in the background and will automatically close once the backup archive is ready. If you prepare some more backup operations, they will be queued after the current one. Copyright © Acronis, Inc., 2000-2009...
  • Page 25: Backing Up Disks And Partitions (Image Backup)

    11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar. If you burn an archive to several removable media, be sure to number them, since you will have to insert them in order during the restoration.
  • Page 26 Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. In addition to NFS, Acronis True Image Echo Server supports the SMBFS network file system.
  • Page 27: Setting Backup Options

    Acronis True Image Echo Server will ask for the password in a special window, allowing access only to authorized users. Passwords cannot be set for archives created in the Acronis Secure Zone. To protect such archives, set a password for the zone itself.
  • Page 28: Source Files Exclusion

    Create scripts in any text editor (for example, name it ‘pause_services.bat’ and ‘resume_services.bat’. Use Edit buttons to the right of Before data capture command and After data capture command fields, to open the Edit Command window where Copyright © Acronis, Inc., 2000-2009...
  • Page 29: Compression Level

    Zone) may slow other programs’ performance because of the large amounts of data transferred to the disk. You can limit the hard disk usage by Acronis True Image Echo Server to a desired level. To set the desired HDD writing speed for data being backed up, drag the slider or enter the writing speed in kilobytes per second.
  • Page 30: Fast Incremental/Differential Backup

    If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Echo Server. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second.
  • Page 31: Media Components

    True Image Echo Server to the rescue disk. Then you will be able to configure the restore task using Restore Data Wizard. Under Advanced tab you can select full, safe or both Acronis True Image Echo Server loader version. The safe version does not have USB, PC card or SCSI drivers and is useful only in case the full version does not load.
  • Page 32: Dual Destination Backup

    If saving a backup copy to ASZ please note: even when a password is set for the Acronis Secure Zone, the copy archive will not be protected with the password.
  • Page 33 A full backup, when created on a tape drive, overwrites all data stored on the tape (see 3.8 Backing up to tape drive for more information). In this situation, Acronis True Image Echo Server will warn that you are about to lose data on the tape. To disable this warning, check the middle box.
  • Page 34: Chapter 6. Restoring The Backup Data Under X Window System

    Acronis True Image Echo Server is loaded entirely into RAM, so you can remove the bootable CD to insert the archive disk. If a backup image is located on bootable media, you might have a choice of using Acronis One-Click Restore. This operation always restores the entire physical disk. Therefore, if your disk consists of several partitions, the partitions which are missing from the image will be lost.
  • Page 35: Restoring Files And Folders From File Archives

    1. Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 2. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive on the next step.
  • Page 36 You can also apply custom filters, using the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask. My???.tib mask will reject all .tib files with names consisting of five symbols and starting with “my”. Copyright © Acronis, Inc., 2000-2009...
  • Page 37 All of these settings will take effect for the current task. How to set the default filters that 6.5.1 Files to exclude from restoration will be called each time you restore data, see 8. The next selection allows you to keep useful data changes made since the selected backup was created.
  • Page 38: Restoring Disks/Partitions Or Files From Images

    Start the Restore Data Wizard by clicking on the restore operation icon in the main program window. 6.3.2 Archive selection 1. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step. Copyright © Acronis, Inc., 2000-2009...
  • Page 39: Restoration Type Selection

    If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Server will ask for it. The partitions layout, the comment and the Next button will be unavailable until you enter the correct password.
  • Page 40: Selecting A Disk/Partition To Restore

    1. Select a target disk or partition where you want to deploy the selected image. You can restore data to its initial location, to another disk/partition or to an unallocated space. The target partition should be at least the same size as the uncompressed image data. Copyright © Acronis, Inc., 2000-2009...
  • Page 41: Changing The Restored Partition Type

    All the data stored on the target partition will be replaced by the image data, so be careful and watch for non-backed-up data that you might need. 2. When restoring an entire disk, the program will analyze the target disk structure to see if the disk is free.
  • Page 42: Changing The Restored Partition File System

    Though seldom required, you can change the partition file system during its restoration. Acronis True Image Echo Server can make the following file system conversions: FAT 16 -> FAT 32, Ext2 -> Ext3. For partitions with other native file systems this option is not available.
  • Page 43: Setting Restore Options

    6.3.10 Setting restore options Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current restore task.
  • Page 44: Restoring Data With A Rescue Cd

    #/sbin/grub-install /device_name (/device_name is hd: hda, hdal, hda2, sdal, sda2 etc) 6.4 Restoring data with a rescue CD To restore data from an archive, using a rescue CD of Acronis True Image Echo Server, Chapter 9. Creating bootable media you initially have to create such disk as described in Insert the rescue CD and reboot (you might have to enable the CD bootup option in BIOS).
  • Page 45: Files To Exclude From Restoration

    6.5.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are not to be restored. Use the common masking rules. For example, to exclude all files with extension .tib, add *.tib mask.
  • Page 46: Restoration Priority

    1. You can choose whether to restore files’ date and time from the archive or assign the files the current date and time. 2. Before data is restored from the archive, Acronis True Image Echo Server can check its integrity. If you suspect that the archive might have been corrupted, select Validate backup archive before restoration.
  • Page 47: Error Handling

    6.5.7 Error handling 1. Do not show messages and dialogs while processing (“silent” mode) The preset is disabled. With the silent mode enabled, the program will not display interactive windows. Instead, it will automatically handle situations requiring user intervention. No prompts will be displayed, including those for inserting removable media or the next tape.
  • Page 48: Chapter 7. Scheduling Tasks

    Chapter 7. Scheduling tasks Acronis True Image Echo Server allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week.
  • Page 49: Setting Up Daily Execution

    Manually later – the task will be saved, but not launched automatically. You will be • able to launch it later by clicking Run in the Scheduled Tasks window Daily – the task will be executed once a day or once in several days •...
  • Page 50: Setting Up Weekly Execution

    If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. Copyright © Acronis, Inc., 2000-2009...
  • Page 51: Setting Up Monthly Execution

    7.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: Day – on the specified date • The <specify a day> – on the specified day (e.g. on second Tuesday or fourth •...
  • Page 52: Managing Scheduled Tasks

    To rename a task, select it, click Rename on the toolbar, enter the new task name and press Enter. In Acronis True Image Echo Server local version there is an option to clone a task. Select the task and click Clone on the toolbar. Pass through the same wizard as when editing a task and make changes if necessary.
  • Page 53: Chapter 8. Managing Acronis Secure Zone

    2. If there are several disks installed, select one on which to create Acronis Secure Zone. 3. Select the partitions from which space will be used to create the zone. 4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones.
  • Page 54: Resizing Acronis Secure Zone

    F11 key, resizing and deleting the zone. Acronis True Image Echo Server repair or update will not affect the password. However, if the program is removed and then installed again while keeping the Acronis Secure Zone on the disk, the password for the zone will be reset.
  • Page 55: Changing The Password For Acronis Secure Zone

    3. Select partitions from which free space will be used to increase Acronis Secure Zone or that will receive free space after the zone is reduced. 4. Enter the new size of the zone or drag the slider to select the size.
  • Page 56 Zone deletion might take several minutes or more. Please wait until the whole procedure is finished. Copyright © Acronis, Inc., 2000-2009...
  • Page 57: Chapter 9. Creating Bootable Media

    Chapter 9. Creating bootable media You can run Acronis True Image Echo Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Linux computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Echo Server version.
  • Page 58 When using 3.5” diskettes, you will be able to write on a diskette (or a set of the diskettes) only one component at a time (for example, Acronis True Image Echo Server). To write another component, start Bootable Media Builder once again.
  • Page 59: Chapter 10. Operations With Archives

    1. To start the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools menu. 2. Select the archive to validate. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step.
  • Page 60 If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password.
  • Page 61: Unmounting An Image

    2. Select the archive from the drives tree. The file name-based consolidation does not support Acronis Secure Zone, so it is not displayed in the tree. An archive MyBackup consisting of one full and four incremental backups is selected...
  • Page 62 4. Choose location and name for the archive copy. By default, the program suggests the same location and the source archive name with (1) added. New archive will be created in the same folder and named MyBackup(1) Copyright © Acronis, Inc., 2000-2009...
  • Page 63 5. The program displays the summary window. Click Proceed to start consolidation. In our example, when consolidation is completed, the folder Backups will contain two archives MyBackup and MyBackup(1). The first is the source archive, the second is the copy consisting of MyBackup(1) and MyBackup(1)2. MyBackup(1) is a full backup containing data as of Tuesday, July 17, 2007, 5:35:09 PM.
  • Page 64: Chapter 11. Notifications And Event Tracing

    Chapter 11. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Server can notify you when it is finished using the WinPopup service (if you address the notification to a computer, running Windows) or via e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion.
  • Page 65: Winpopup Notification

    - during the operation when user interaction is required. 11.3 Viewing logs Acronis True Image Echo Server allows users to view its working logs. They can provide information about scheduled backup results, including reasons for failure, if any. To invoke the log window, select Show log on the toolbar or from the Tools menu.
  • Page 66 To sort messages by a particular parameter, click its header (click again to reverse order) or the Arrange Icons by button (the second from the right) and select the desired parameter. You can also change column width by dragging the borders with a mouse. Copyright © Acronis, Inc., 2000-2009...
  • Page 67: Chapter 12. Console Mode

    Chapter 12. Console mode Console is a natural part of Linux OS. Acronis True Image Echo Server supports it through the trueimagecmd command line tool. It provides a way to initiate data backup and cron’ recovery operations. Trueimagecmd also enables you to automate backup with ‘...
  • Page 68 /password:[password] asz_content Displays the Acronis Secure Zone size, free space contents /password:[password] /partition:[partition number] asz_delete /oss_numbers /log:[filename] Deletes the Acronis Secure Zone /harddisk:[disk number] clone /target_harddisk:[disk number] Clones a hard disk help Shows usage Copyright © Acronis, Inc., 2000-2009...
  • Page 69: Common Options (Options Common For Most Trueimagecmd Commands)

    Specify the password for the archive (if Other than ASZ password:[password] required) Specify the password for the ASZ (if required) Addresses to Acronis Secure Zone and asz:[number of archive] selects the archive (a full backup with or without increments). To get the archive number, use /asz_content...
  • Page 70: Specific Options (Options Specific For Individual Trueimagecmd Commands)

    To access an NFS network drive, specify the backup file name as follows: nfs://hostname/share name:/remote filename For example: trueimagecmd --list --filename:nfs://dhcp6- 223.acronis.com/sdb3/nfs_root:/mike/md1.tib shows contents of /mike/md1.tib archive. /mike/md1.tib is located on dhcp6-223.acronis.com node in /sdb3/nfs_root directory exported by NFS. 12.1.3 Specific options (options specific for individual trueimagecmd commands) Option...
  • Page 71 filebackup Files and folders to be included in the backup (comma include:[names] separated). For example: --include:'/home/bot/ATIESsafe.iso,/home/bot/ATIW.iso' Files and folders to be excluded from the backup (comma exclude_names:[names] separated). See the above example. Applies masks to select files to be excluded from the backup. Use exclude_masks:[masks] the common masking rules.
  • Page 72 If there are two or more backups (pits) in the copy, numbers will be added to their names. Specifies the backups (pits) to be included in the archive copy. To include_pits:[pits numbers] get the numbers of pits, use Separate pit numbers /pit_info. with comma, for example: /include_pits:2,4,5 Copyright © Acronis, Inc., 2000-2009...
  • Page 73: Trueimagecmd Usage Examples

    For the above example, to restore target partition> partition 2-5 to its original place use: --partition:2-2 --target partition:2-5. asz_create Specifies the hard disk number where the Acronis Secure Zone harddisk:X will be created. Specifies partitions from which free space will be taken for partition:[partition Acronis Secure Zone.
  • Page 74 This will create an incremental image of the partition above: • trueimagecmd --partition:1-1 --filename:backup.tib \ --create --incremental This will create an image of partition 1-1 in the Acronis Secure Zone: • trueimagecmd --partition:1-1 --asz --create This will restore a partition from backup.tib: •...
  • Page 75: Automatic Image Creation Using Cron Service

    trueimagecmd --deploy_mbr --filename:/usr/backups/D1.tib \ --harddisk:1 12.2 Automatic image creation using cron service As a rule, disk/partition images are created regularly, often daily. To automate this operation, you can use the cron service familiar to many UNIX users. As an example, let’s consider a situation where you (the system administrator) need to back up one or more disk partitions regularly.
  • Page 76: Restoring Files With Trueimagemnt

    A test command. Mounts a file, specified in -f|--filename option, containing valid Linux filesystem, as if it is Acronis True Image archive. The command may be used, for example, to estimate an image compression level, by comparing the time, necessary for copying a file from the image, with the time for copying the mounted (non-compressed) file.
  • Page 77: Trueimagemnt Usage Examples

    For example: trueimagemnt -m /mnt/md1 -f smb://dhcp6- 223.acronis.com/sdb3/mike/md1.tib -i 2 mounts /mike/md1.tib archive, located on dhcp6-223.acronis.com node in /sdb3 directory exported by Samba. -p|--password password Specifies the password to explore password protected images. -t|--fstype filesystem type Specifies explicit filesytem type to be passed to the standard "mount" command. This option is useful if the standard "mount"...
  • Page 78: Chapter 13. Transferring The System To A New Disk

    Note that you can not clone, add or replace mounted disks, so you will have to run Acronis True Image Echo Server from a rescue CD in such cases. How to create a rescue Chapter 9. Creating bootable media.
  • Page 79: Security

    13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
  • Page 80: Selecting Destination Disk

    After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step. Copyright © Acronis, Inc., 2000-2009...
  • Page 81: Partitioned Destination Disk

    13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: Delete partitions on the destination hard disk –...
  • Page 82: Destroying The Old Disk Data

    14.3.7 Destroying the old disk data If you elected to destroy the old disk data in the previous step, you will have to select the destruction method now: Quick – quick one-pass destruction • Normal – multipass destruction • Copyright © Acronis, Inc., 2000-2009...
  • Page 83: Selecting Partition Transfer Method

    The unused space will become unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite.
  • Page 84: Old And New Disk Partition Layouts

    In the next window, you will see a list of briefly described operations to be performed on the disks. After you click Proceed, Acronis True Image Echo Server will start cloning the old disk to the new disk, indicating the progress in a special window. You can stop this procedure by clicking Cancel.
  • Page 85 If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition’s size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there's unallocated space near it).
  • Page 86: Chapter 14. Adding A New Hard Disk

    Note that you can not clone, add or replace mounted disks, so you will have to run Acronis True Image Echo Server from a rescue CD in such cases. How to create a rescue Chapter 9. Creating bootable media.
  • Page 87: Add Disk Summary

    The add disk summary contains a list of operations to be performed on disks. After you click Proceed, Acronis True Image Echo Server will start creating and formatting new partitions, indicating the progress in a special window. You can stop this procedure by clicking Cancel.

Table of Contents