ACRONIS TIS91DB Datový list

Procházejte online nebo si stáhněte Datový list pro Software pro obnovení zálohy ACRONIS TIS91DB. Acronis True Image 9.1 Server Bundle Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 150
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Enterprise Server

User's GuideAcronis®True Image EchoEnterprise ServerCompute with confidencewww.acronis.com

Strany 2

1.2 Acronis True Image Echo Enterprise Server components Acronis True Image Echo Enterprise Server includes the following components. 1. Acronis Tru

Strany 3

Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is

Strany 4 - Table of Contents

4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum s

Strany 5

5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup

Strany 6

2. Select Change password. 3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question

Strany 7

Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Echo Enterprise Server on a bare metal or on

Strany 8 - Chapter 1. Introduction

The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from remote locations. To find more abo

Strany 9

4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to

Strany 10

Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is no

Strany 11

Mounting images as virtual drives lets you access them as though they were physical drives. This means that: • a new disk with its own letter will a

Strany 12

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Strany 13 - 1.6 Technical support

Set how often to check the computers state (status refresh rate) Wake on LAN for backup Backup server Import/export archives from external locations

Strany 14 - 2.1 System requirements

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Strany 15 - 2.2 Security parameters

5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected

Strany 16

security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consoli

Strany 17

The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full

Strany 18

6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window

Strany 19

Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Enterpr

Strany 20

1. Enable the Messenger service on both the computer executing the task and the computer that will receive messages. The Messenger service is disab

Strany 21 - User or administrator?

The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.

Strany 22

An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image Echo Ent

Strany 23

This feature is available in Acronis True Image Echo Enterprise Server local version only. Managing System Restore using Acronis True Image Manageme

Strany 24

Operations with hard disks Convert basic disk to dynamic Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share

Strany 25

Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, dep

Strany 26

If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable m

Strany 27 - 3.4.2 How to use

4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: • the

Strany 28 - 3.5 Acronis Backup Server

1. Do one of the following: Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and cl

Strany 29

Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too sma

Strany 30 - 3.6 Acronis Snap Restore

14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete

Strany 31 - 3.6.3 How to use

You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system

Strany 32

14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No

Strany 33

• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give aw

Strany 34

The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,

Strany 35

• USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices • ZIP®, Jaz® and other removable media * - an FTP-server must allow passive mode

Strany 36 - Management Console

If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system an

Strany 37 - Server components

Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including

Strany 38

To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Cli

Strany 39

Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacit

Strany 40

If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce

Strany 41

Chapter 16. Command-line mode and scripting Acronis True Image Echo Enterprise Server (local version) supports the command-line mode and enables bac

Strany 42 - 4.4.1 Group status display

deploy Restores disks and partitions, except for the MBR, from an image /filename:[file name] /password:[password] /asz /index:N /net_user:[username

Strany 43

convert Converts an image to virtual disk format for using with a virtual machine /filename:[file name] /password:[password] /asz /index:N /net_user

Strany 44 - Creating new group tasks

asz_delete_files Deletes the most recent backup in the archive located in the Acronis Secure Zone /filename:[file name] /password:[password] /log:[fi

Strany 45

/ftp_password:[password] Specify a password for access to an FTP server FTP server Backup options /incremental Set the backup type to incremental. If

Strany 46 - 8.2 Managing scheduled tasks

Chapter 2. Acronis True Image Echo Enterprise Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis

Strany 47 - 4.5 Managing backup server

By specifying /harddisk:DYN you will back up all dynamic volumes present in the system. /partition:[partition number] Specifies the partitions to in

Strany 48 - 4.5.1 Default settings

Dynamic volumes are specified with prefix DYN, e.g.: /file_partition:DYN1 /filename:”\1.tib” /harddisk:[disk number] Specifies the basic hard disks

Strany 49

partition’s entry will occupy the same position as in the source disk MBR saved in the image. If the position is not empty, the existing entry will b

Strany 50

/harddisk:[disk number] Specifies the hard disks to convert by numbers. For each disk, a separate virtual disk will be created. By specifying /hardd

Strany 51

/partition:[partition number] Specifies partitions from which free space will be taken for Acronis Secure Zone. /size:[ASZ size in sectors | unalloca

Strany 52

• This will append an incremental image to the image named 1.tib of hard disk 2. The image will be saved to C:\Test\ folder, protected with password

Strany 53 - 4.5.6 Managing Archives

• This will restore MBR from the image of hard disk 1 to the hard disk 2. The image is contained in the arc.tib file located on the FTP server. 3. B

Strany 54

• This will list available partitions. trueimagecmd /list /asz • This will list contents of the latest image located in Acronis Secure Zone. 8. Acr

Strany 55

The archive FAAA (F means that this is a file-level archive) contains one base file-level backup. The archive FAAB2 (B means that this is the second

Strany 56 - 5.1 Main program window

Files\Acronis\TrueImageEchoEnterpriseServer). This utility is also used to monitor backup progress. TrueImageTerminal execution parameters: TrueImage

Strany 57

• Windows Server 2000 /Advanced Server 2000 /Server 2003 • Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions • Windows Vista a

Strany 58

the program will create a complete image file. The default value for this parameter is “true”. Description: adds a description to an image file. The

Strany 59

2.2.3 Encrypted communication Acronis True Image Echo Enterprise Server provides capability to secure all data transferred between Acronis component

Strany 60

For detailed information about Windows GPO Editor please see: http://msdn2.microsoft.com/en-us/library/aa374163.aspxFor detailed information about

Strany 61

Acronis True Image Echo Enterprise Server Install Window It is recommended that you install Acronis True Image Management Console first. After that

Strany 62 - 3.2 Full, incremental and

2.3.2 Installation of Acronis True Image Agent for Linux To install the Acronis True Image Agent for Linux, extract its setup file to a shared netwo

Strany 63 - 1.4.2 Supported storage

Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron

Strany 64 - 6.3 Setting backup options

4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can creat

Strany 65 - 6.3.6 Backup performance

Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator

Strany 66

Click Set up Administrator profiles -> Add. Choose the computer or enter its name. Choose Use default settings. Click Proceed. Adding a computer

Strany 67

2.3.5 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image Echo Enterprise Server. It is purchased s

Strany 68 - 6.3.1 Archive protection

to learn more about this procedure. To run the program, press F11 during the server bootup when you see a corresponding message that tells you to pre

Strany 69 - 6.3.4 Database support

Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc

Strany 70 - 6.3.5 Compression level

A standalone, full backup could be an optimal solution if you often roll back the system to the initial state (for example, systems in a gaming club

Strany 71

You can back up data automatically on a schedule (see Chapter 8. Scheduling tasks), and not worry about zone overflow issues. However, if you keep l

Strany 72 - 6.3.8 Archive splitting

Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you see the "Press

Strany 73 - 6.3.11 Error handling

of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup lo

Strany 74 - 6.3.13 Wake On LAN

END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT U

Strany 75 - 6.3.14 Additional settings

The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Gen

Strany 76

drivers receive the system queries and restore the sectors that are necessary for the requested operation. 3. At the same time, Acronis True Image Ec

Strany 77 - Recovery Manager

Using Microsoft System Preparation Tool (Sysprep) does not solve this problem, because Sysprep permits replacing drivers only for Plug-and-Play devic

Strany 78

3.7.4 Limitations in using Acronis Universal Restore 1. The system recovered by Acronis Universal Restore might not start if the partition structur

Strany 79

3.8 Backing up to tape libraries and tape drives Acronis True Image Echo Enterprise Server supports tape libraries, autoloaders and SCSI tape drives

Strany 80 - 7.4 Setting

Low-quality or old tape, as well as dirt on the magnetic head, might lead to pauses that can last up to several minutes. 3.8.3 Setting up backup to

Strany 81

Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managi

Strany 82 - 7.3.2 Archive selection

To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main w

Strany 83 - 3.6 Acronis Snap

5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account cr

Strany 84 - Universal Restore

7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed.

Strany 85

Table of Contents Chapter 1. Introduction ...8 1.1 Acronis® True

Strany 86

The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery

Strany 87

Set up default backup or restore options, such as system/network resources usage, before/after backup commands, etc. Click Remote Computer Options,

Strany 88 - 7.4 Setting restore options

Other Tools Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Update the remote agent Click Update

Strany 89 - 7.4.3 Pre/post commands

Failed – the task could not be completed because of an error Finished – the task has been completed successfully Cancelled – the task has been cancel

Strany 90 - 7.4.4 Restoration priority

5. Set (or change) the MAC address for each computer. To do so, select the computer, then select on the sidebar Computer details -> MAC address: S

Strany 91 - 7.4.7 Additional settings

5. Specify the paths for the backup archives. To place every archive on its local computer, specify Local path or select Acronis Secure Zone, if ther

Strany 92 - Chapter 15. Adding a

12. After you click Proceed, Acronis True Image Management Console connects to every computer of the group in turn to distribute the task. If a remot

Strany 93

Check – the group server will connect in turn to all computers involved in the group task and check if the child tasks are intact on the computers so

Strany 94 - Chapter 8. Scheduling tasks

When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entere

Strany 95

The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (th

Strany 96

3.7.5 Getting Acronis Universal Restore...33 3.8 Backing up to tape lib

Strany 97

Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas

Strany 98

To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy

Strany 99

To add another administrator, first add this person’s local or domain account to the AcronisBackupServerUsers group. Then click Set up User profiles

Strany 100 - 3.3 Acronis Secure Zone

To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window

Strany 101

You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the li

Strany 102

starting their task. They will be trying to connect to the server every 5 seconds until the connection is allowed. Therefore, the real backup start t

Strany 103

Chapter 5. Using Acronis True Image Echo Enterprise Server (local version) Acronis True Image Echo Enterprise Server (local version) supports the GU

Strany 104

• Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity check

Strany 105

Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.

Strany 106

Run, stop, edit, clone, rename, delete backup and archive validation tasks Click Tasks in the Manage Tasks group or select the Task Scheduling categ

Strany 107

7.3.2 Archive selection...82 7.3.3 Restoration

Strany 108 - 11.2.1 Exploring an archive

Transfer the system to a new hard disk See Chapter 14. Transferring the system to a new disk. Format partitions on a new hard disk See Chapter 15.

Strany 109 - 11.2.2 Mounting an image

Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a

Strany 110

You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex

Strany 111 - 11.3 Consolidating backups

The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot

Strany 112

7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may selec

Strany 113

You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from t

Strany 114

4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file

Strany 115 - 12.2 WinPopup notification

See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select wh

Strany 116 - 12.3 Viewing logs

6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being a

Strany 117 - 12.4 Event tracing

This option is effective for file/folders backup only. When creating a disk/partition image, you cannot filter out any files. 6.3.3 Pre/post command

Strany 118 - 12.4.2 SNMP notifications

12.5 Managing System Restore ...118 Chapter 13. Working wi

Strany 119

net start “Microsoft Exchange POP3” net start “Microsoft Exchange Routing Engine” Create batch files in any text editor (for example, name it pause_s

Strany 120

The preset is Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process.

Strany 121 - Chapter 7. Restoring

6.3.8 Archive splitting Sizeable backups can be split into several files that together make the original backup. A backup file can be split for burn

Strany 122 - 13.3.4 Converting workloads

Properties -> General -> Advanced Attributes -> Encrypt contents to secure data). Check the option if there are encrypted files in the backu

Strany 123

Corporate administrators need an option to continue a back up despite any errors that might occur without the system popping up an error box. Details

Strany 124 - 14.1 General information

2. Set the NIC properties on the computer as follows. Control Panel -> System -> Device Manager -> Network adapters -> select the NIC -&g

Strany 125 - 14.3 Executing transfers

4. Reset archive bit The preset is disabled. The option relates only to file-level backup. In Windows operating systems, each file has an attribute F

Strany 126

Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1

Strany 127 - 14.3.6 Old disk data

7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). For

Strany 128

If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard pro

Strany 129

Chapter 1. Introduction 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users Acronis True Image Echo Enterprise

Strany 130

4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locat

Strany 131 - 14.3.11 Cloning summary

7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as

Strany 132

(disk) can not be blocked, close applications that use this partition (disk) and start over. If you can not determine which applications use the part

Strany 133 - 15.1 Selecting a hard disk

7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offer

Strany 134 - 15.3 Disk add summary

Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecti

Strany 135 - 16.1.1 Supported commands

If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination dis

Strany 136

Selecting Active for a partition without an installed operating system could prevent your server from booting. 7.3.7 Changing the restored partitio

Strany 137

7.3.9 Assigning a letter to the restored partition Acronis True Image Echo Enterprise Server will assign an unused letter to a restored partition. Y

Strany 138 - Access to archives

- the driver repository - a folder or folders on a network drive or CD specified in restore options. If you have not specified the driver repository

Strany 139 - General options

7.4.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are n

Strany 140

availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used dur

Strany 141 - /partition:DYN1

The backup process will run concurrently with your commands if you uncheck the Do not perform operations until the commands execution is complete box

Strany 142

7.4.7 Additional settings 1. You can choose whether to restore files’ date and time from the archive or assign the files the current date and time.

Strany 143

1. Close all applications that use the basic disk(s) that will be converted. 2. If there are partitions on the basic disk(s), define whether you want

Strany 144

4. Select the type of dynamic volume that will be created: simple/spanned, striped, mirrored or RAID 5. 5. Specify amount of space that the dynamic

Strany 145

Chapter 8. Scheduling tasks Acronis True Image Echo Enterprise Server allows you to schedule periodic backup and archive validation tasks. Doing so

Strany 146

• Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tas

Strany 147

In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to

Strany 148 - 16.2 Scripting

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st

Strany 149 - 16.2.2 Script structure

8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specif

Strany 150

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta

Komentáře k této Příručce

Žádné komentáře