ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Instalační příručka

Procházejte online nebo si stáhněte Instalační příručka pro Software pro obnovení zálohy ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE. ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1

Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data

Strany 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2012. Custom backup scheme > Retention rules > Advanced Settings There is no option to conso

Strany 3 - Table of contents

11 Copyright © Acronis International GmbH, 2002-2012. Destination: A custom folder on a file system Yes Mailbox recovery (mailboxes, public fol

Strany 4

12 Copyright © Acronis International GmbH, 2002-2012. 4 Getting started with Agent for Exchange This section lets you quickly implement the most c

Strany 5 - 1 Important notices

13 Copyright © Acronis International GmbH, 2002-2012. 1. Make sure that circular logging is disabled for all databases or storage groups of the Ex

Strany 6 - 3 General information

14 Copyright © Acronis International GmbH, 2002-2012. full backup method and data deduplication require the "Express backup and deduplication&

Strany 7

15 Copyright © Acronis International GmbH, 2002-2012. Details. The console will also be installed so that you can control the management server loc

Strany 8

16 Copyright © Acronis International GmbH, 2002-2012. 5. In Deduplication, select On. 6. Click Path and then specify the path to the network shar

Strany 9

17 Copyright © Acronis International GmbH, 2002-2012. 2. In the Navigation tree, expand Vaults > Centralized and then select the vault where yo

Strany 10

18 Copyright © Acronis International GmbH, 2002-2012. 5 Backup This section describes only the steps and settings that are specific for backing up

Strany 11

19 Copyright © Acronis International GmbH, 2002-2012. Tracks how far Exchange has progressed in writing logged information to the database file. St

Strany 12 - Backup

2 Copyright © Acronis International GmbH, 2002-2012. Copyright Statement Copyright © Acronis International GmbH, 2002-2012. All rights reserved. “A

Strany 13 - Recovery

20 Copyright © Acronis International GmbH, 2002-2012. Information store structure diagram The following diagram illustrates the information store s

Strany 14 - 4.2.2 Installation

21 Copyright © Acronis International GmbH, 2002-2012. 5.2 What data items can be backed up and what backup types are used? While creating a backup

Strany 15

22 Copyright © Acronis International GmbH, 2002-2012. Note: To back up transaction log files, disable circular logging in Exchange. When circular l

Strany 16 - 4.2.6 Recovery

23 Copyright © Acronis International GmbH, 2002-2012. 5.3.1 Simple scheme With the simple backup scheme, you just schedule when to create full bac

Strany 17

24 Copyright © Acronis International GmbH, 2002-2012. Create full backups using the Express full backup method check box. For more information on e

Strany 18 - 5 Backup

25 Copyright © Acronis International GmbH, 2002-2012.  Microsoft Exchange Mailboxes: For this data type choose one of the following backup types:

Strany 19 - Storage group

26 Copyright © Acronis International GmbH, 2002-2012. backups to the next location, the backup will be copied there without delay. Only its deletio

Strany 20

27 Copyright © Acronis International GmbH, 2002-2012. What happens in case of an unexpected system shutdown? An unexpected system shutdown between

Strany 21

28 Copyright © Acronis International GmbH, 2002-2012. 7. Click OK to save the created backup plan. Example 2. Backing up to a remote location thr

Strany 22 - 5.3 Backup schemes

29 Copyright © Acronis International GmbH, 2002-2012. 6. Click OK to export the backup. Scheduling the express full backups 1. Connect the consol

Strany 23 - 5.3.1 Simple scheme

3 Copyright © Acronis International GmbH, 2002-2012. Table of contents 1 Important notices ...

Strany 24 - 5.3.3 Manual start scheme

30 Copyright © Acronis International GmbH, 2002-2012. 5.4.2 Copy-only backup The copy-only backup method allows creating full database backups wit

Strany 25 - 5.3.4 Custom scheme

31 Copyright © Acronis International GmbH, 2002-2012. 6 Recovery This section describes only the steps and settings that are specific for recoveri

Strany 26 - 5.4 Backup modes

32 Copyright © Acronis International GmbH, 2002-2012. 2. Selecting the data The backed up data can be selected using the Data view tab, or the Arch

Strany 27 - 5.4.1.2 Usage examples

33 Copyright © Acronis International GmbH, 2002-2012.  Select the recovery point by the date and time of backup creation. The data will be recove

Strany 28 - Steps to perform

34 Copyright © Acronis International GmbH, 2002-2012. 5. Click OK. 6.2.3 Searching for specific items in mailboxes and public folders The search

Strany 29

35 Copyright © Acronis International GmbH, 2002-2012. 6.3 Selecting target destinations for databases or storage groups When creating a recovery t

Strany 30 - 5.4.2 Copy-only backup

36 Copyright © Acronis International GmbH, 2002-2012. To recover the selected databases (storage groups) over the existing ones 1. To the right of

Strany 31 - 6 Recovery

37 Copyright © Acronis International GmbH, 2002-2012. To recover the databases or storage groups to a folder In Path, specify the destination folde

Strany 32 - 2. Selecting the data

38 Copyright © Acronis International GmbH, 2002-2012. To set up the mailbox recovery, specify the appropriate settings as follows. Overwriting Choo

Strany 33

39 Copyright © Acronis International GmbH, 2002-2012. Note: This format is incompatible with Microsoft Outlook 2002 and earlier versions. Since Exc

Strany 34

4 Copyright © Acronis International GmbH, 2002-2012. 6.4 Selecting target destinations for mailboxes, public folders, or their contents ...

Strany 35

40 Copyright © Acronis International GmbH, 2002-2012. Access credentials Provide credentials for the destination if the task credentials do not ena

Strany 36

41 Copyright © Acronis International GmbH, 2002-2012. Counsel. The General Counsel simply opens this file by using Microsoft Outlook and sees all o

Strany 37

42 Copyright © Acronis International GmbH, 2002-2012. retention policies have already been wiped from the mailbox and the employee's user acco

Strany 38 - .pst file

43 Copyright © Acronis International GmbH, 2002-2012. 7 Exchange servers on a management server All administrative operations with Exchange server

Strany 39 - Host machine credentials

44 Copyright © Acronis International GmbH, 2002-2012. Add multiple Exchange servers Click Add multiple machines. In the Add multiple machines win

Strany 40 - 6.6 Usage examples

45 Copyright © Acronis International GmbH, 2002-2012. Delete the selected Exchange server from the management server Click Delete machine from AMS

Strany 41 - Useful links

46 Copyright © Acronis International GmbH, 2002-2012. Progress The Progress tab lists all of the selected machine's activities and tasks that

Strany 42

47 Copyright © Acronis International GmbH, 2002-2012. 8 Backing up and recovering data of Exchange clusters This feature is used only in advanced

Strany 43 - To access the actions

48 Copyright © Acronis International GmbH, 2002-2012. Exchange 2003 Cluster and Single Copy Cluster (SCC) for Exchange 2007 Both configurations are

Strany 44 - Other operations

49 Copyright © Acronis International GmbH, 2002-2012. Database Availability Group (DAG) for Exchange Server 2010 DAG is a failover cluster solution

Strany 45 - Backup plans and tasks

5 Copyright © Acronis International GmbH, 2002-2012. 1 Important notices This document describes backup and recovery of Microsoft Exchange Server

Strany 46 - Progress

50 Copyright © Acronis International GmbH, 2002-2012. Availability of the management server The management server's availability is mandatory

Strany 47

51 Copyright © Acronis International GmbH, 2002-2012. This mode is available for selection if Agent for Exchange is installed on each node of the c

Strany 48

52 Copyright © Acronis International GmbH, 2002-2012. and the number of available database copies). If the same storage group or database exists in

Strany 49

53 Copyright © Acronis International GmbH, 2002-2012.  Password. The password for the account. If the credentials are detected as missing or inva

Strany 50 -  Active

54 Copyright © Acronis International GmbH, 2002-2012. 9 Exchange-specific backup options 9.1 Metadata collection This option applies to database

Strany 51 -  Original location

55 Copyright © Acronis International GmbH, 2002-2012. Select this check box and specify the age of backed up items. The items older than the specif

Strany 52 - 8.6 Cluster credentials

56 Copyright © Acronis International GmbH, 2002-2012. 10 Glossary C Checkpoint file A file that accompanies an Exchange transaction log (p. 58) str

Strany 53

57 Copyright © Acronis International GmbH, 2002-2012. E Exchange database There are two types of Exchange databases.  A mailbox database stores

Strany 54 - 9.1 Metadata collection

58 Copyright © Acronis International GmbH, 2002-2012. P Point of failure The point in time when the most recent transaction log file (p. 58) existi

Strany 55

59 Copyright © Acronis International GmbH, 2002-2012. In either case, Exchange deletes only those files that are older than the checkpoint. This me

Strany 56 - 10 Glossary

6 Copyright © Acronis International GmbH, 2002-2012. 2 Overview Acronis Backup & Recovery 11.5 enables you to back up the Mailbox server role

Strany 57 - Mailbox-level backup

7 Copyright © Acronis International GmbH, 2002-2012. Acronis Backup & Recovery 11.5 Agent for Microsoft Exchange Server is referred to as Agent

Strany 58 - Point of failure

8 Copyright © Acronis International GmbH, 2002-2012. 3.4 Supported backup locations The table below shows which of Acronis Backup & Recovery 1

Strany 59

9 Copyright © Acronis International GmbH, 2002-2012. Server version Database backup (with the Metadata collection (p. 54) option set to Include lis

Komentáře k této Příručce

Žádné komentáře