Acronis Backup for Windows Server - User Guide Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Acronis Backup for Windows Server - User Guide. Acronis Backup for Windows Server - User Guide User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 269
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Version 11.5 Update 5

Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For Windows Server

Strany 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 and Windows Server 2012 (p. 32)  Install Acronis Backup & Rec

Strany 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014 will suspend the database and flush all caches to ensure that all transactions are completed;

Strany 4

101 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect

Strany 5

102 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da

Strany 6

103 Copyright © Acronis International GmbH, 2002-2014 2. Selecting data The backed-up data can be selected using the Data view tab, or the Archive v

Strany 7

104 Copyright © Acronis International GmbH, 2002-2014 Location Details Machine name Local machine Local folders If the archive is stored in

Strany 8

105 Copyright © Acronis International GmbH, 2002-2014 4. Do any of the following:  Select the data to recover in the catalog tree, or in the ta

Strany 9 - OS support

106 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following:  Use the task credentials The softwa

Strany 10

107 Copyright © Acronis International GmbH, 2002-2014 The selected disks will be recovered to the physical disks of the machine the console is conne

Strany 11 - 1.7.2 Management Console

108 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. All the data stored on the target disk will be replaced by the backed-up data, s

Strany 12 - 1.9 Supported file systems

109 Copyright © Acronis International GmbH, 2002-2014 1. If the disk or volume is recovered to its original location, the mapping process reproduce

Strany 13 - 1.10 Technical Support

11 Copyright © Acronis International GmbH, 2002-2014 Console The console provides Graphical User Interface to the agents. Usage of the console is no

Strany 14 - 2 Getting started

110 Copyright © Acronis International GmbH, 2002-2014 Existing virtual machine Available when the Acronis Backup Agent for Hyper-V or Agent for VMwa

Strany 15 - Step 6. Management

111 Copyright © Acronis International GmbH, 2002-2014 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. T

Strany 16 - Operations with pane

112 Copyright © Acronis International GmbH, 2002-2014 Volume (partition) alignment Acronis Backup automatically eliminates volume misalignment – a s

Strany 17 - 2.1.2.1 Views

113 Copyright © Acronis International GmbH, 2002-2014 Files and folders will be recovered to the same path(s) as they are in the backup. For example

Strany 18 - 2.1.2.2 Action pages

114 Copyright © Acronis International GmbH, 2002-2014 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders

Strany 19 - 2.1.3 Console options

115 Copyright © Acronis International GmbH, 2002-2014 In addition, the operating system itself is sensitive to the type of firmware. When performing

Strany 20 - 2.1.3.4 Pop-up messages

116 Copyright © Acronis International GmbH, 2002-2014 If the initialization may result in bootability loss, the software takes the partitioning styl

Strany 21

117 Copyright © Acronis International GmbH, 2002-2014 The ability of the recovered system to boot up in different modes depends on the operating sys

Strany 22 - 3.1 Owners

118 Copyright © Acronis International GmbH, 2002-2014 Original system Target hardware BIOS UEFI UEFI OS: non- convertible The target disk will be in

Strany 23 - Task credentials

119 Copyright © Acronis International GmbH, 2002-2014 Usage scenarios 1. The system uptime is one of the efficiency criteria. Examples: Client-orie

Strany 24 - Services of Acronis Backup

12 Copyright © Acronis International GmbH, 2002-2014 1.8 About using the product in the trial mode Before buying an Acronis Backup license, you may

Strany 25

120 Copyright © Acronis International GmbH, 2002-2014 5.4 Bootability troubleshooting If a system was bootable at the time of backup, you expect th

Strany 26 - Incremental backup

121 Copyright © Acronis International GmbH, 2002-2014 Solution: Reactivate the boot loader. You might also need to fix the loader configuration file

Strany 27

122 Copyright © Acronis International GmbH, 2002-2014  The device on which the Linux kernel is located—typically, this is the boot partition or th

Strany 28 - (Windows)

123 Copyright © Acronis International GmbH, 2002-2014 5.5 Reverting a Windows system to its factory settings If your Windows operating system was d

Strany 29

124 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also

Strany 30 - By disk specification

125 Copyright © Acronis International GmbH, 2002-2014 Set current date and time for recovered files This option is effective only when recovering fi

Strany 31 - 3.10 Support for SNMP

126 Copyright © Acronis International GmbH, 2002-2014  When recovery completes successfully.  When recovery fails.  When user interaction is r

Strany 32 - About the test message

127 Copyright © Acronis International GmbH, 2002-2014 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With

Strany 33 - Data Deduplication

128 Copyright © Acronis International GmbH, 2002-2014  Community – type the name of SNMP community to which both the host running SNMP management

Strany 34

129 Copyright © Acronis International GmbH, 2002-2014 This option is effective only when you select for backup a folder that is higher in the folder

Strany 35 - 4 Backup

13 Copyright © Acronis International GmbH, 2002-2014 1.10 Technical Support Maintenance and Support Program If you need assistance with your Acroni

Strany 36 - Plan parameters

130 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the recovery only after the command is successfully executed. Fail the task if

Strany 37

131 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk

Strany 38

132 Copyright © Acronis International GmbH, 2002-2014  During conversion which is part of a backup plan (p. 133), the software creates the virtual

Strany 39 - Exclusion examples

133 Copyright © Acronis International GmbH, 2002-2014  Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo

Strany 40 - 1. Selecting the destination

134 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac

Strany 41

135 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker

Strany 42 - 4.2.6 Backup schemes

136 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr

Strany 43 - 4.2.6.1 Simple scheme

137 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso

Strany 44 - Parameters

138 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak

Strany 45 - Examples

139 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A

Strany 46

14 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to

Strany 47 - At a glance

140 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio

Strany 48

141 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F

Strany 49

142 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte

Strany 50 - Roll-back period

143 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created

Strany 51 - 4.2.6.5 Manual start

144 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut

Strany 52 - 4.2.7 Archive validation

145 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup

Strany 53 - Parameters specification

146 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S

Strany 54

147 Copyright © Acronis International GmbH, 2002-2014  Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin

Strany 55

148 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro

Strany 56 - 4.3.1 The [DATE] variable

149 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i

Strany 57 - 4.3.3 Usage examples

15 Copyright © Acronis International GmbH, 2002-2014 Step 5. Recovery Recover (p. 101) To recover data, you need to select the backed-up data

Strany 58

150 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Strany 59

151 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 152) [Optional] Provide credentials for accessing the source if the task accou

Strany 60 - 4.4 Scheduling

152 Copyright © Acronis International GmbH, 2002-2014  To select a network share, expand the Network folders group, select the required networked

Strany 61 - 4.4.1 Daily schedule

153 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows:  Date and time - the date and time when to st

Strany 62

154 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ

Strany 63 - 4.4.2 Weekly schedule

155 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select

Strany 64

156 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of

Strany 65 - 4.4.3 Monthly schedule

157 Copyright © Acronis International GmbH, 2002-2014  To export data to a network share, expand the Network folders group, select the required ne

Strany 66

158 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if

Strany 67

159 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or

Strany 68

16 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name

Strany 69 - 4.4.5 Conditions

160 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. According to the original FTP specification, credentials required for access to

Strany 70 - Example:

161 Copyright © Acronis International GmbH, 2002-2014 To perform operations with archives and backups 1. In the Navigation pane, select the vault w

Strany 71 - 4.4.5.4 Users logged off

162 Copyright © Acronis International GmbH, 2002-2014 2. On the Archive view tab of the vault, select the archive. Then, expand the archive and cli

Strany 72

163 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes

Strany 73 - 4.5.1 Supported locations

164 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele

Strany 74 - Simple scheme

165 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or

Strany 75 - Custom scheme

166 Copyright © Acronis International GmbH, 2002-2014  When a machine is booted with a PE-based bootable media, you cannot select optical media su

Strany 76 -  Consolidate these backups

167 Copyright © Acronis International GmbH, 2002-2014  User name and password to be entered on the console side at the connection to the agent. If

Strany 77 - 4.5.5 Usage examples

168 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The

Strany 78

169 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con

Strany 79 - 4.7 Default backup options

17 Copyright © Acronis International GmbH, 2002-2014 How to change the panes' borders 1. Point to the pane's border. 2. When the pointer

Strany 80

170 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p

Strany 81 - 4.7.1 Additional settings

171 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI

Strany 82 - 4.7.3 Backup cataloging

172 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from

Strany 83 - 4.7.4 Backup performance

173 Copyright © Acronis International GmbH, 2002-2014 Adding VLANs In the Network Settings window, you can add virtual local area networks (VLANs).

Strany 84 - 4.7.5 Backup splitting

174 Copyright © Acronis International GmbH, 2002-2014 9.3.1 Setting up a display mode For a machine booted from media, a display video mode is dete

Strany 85 - 4.7.6 Compression level

175 Copyright © Acronis International GmbH, 2002-2014 9.4 List of commands and utilities available in Linux-based bootable media Linux-based bootab

Strany 86

176 Copyright © Acronis International GmbH, 2002-2014 grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 9.5

Strany 87 - 4.7.8 E-mail notifications

177 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co

Strany 88 - 4.7.9 Error handling

178 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d

Strany 89 - 4.7.10 Event tracing

179 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di

Strany 90

18 Copyright © Acronis International GmbH, 2002-2014 Sorting, filtering and configuring table items The following is a guideline to sort, filter and

Strany 91 - 4.7.14 Media components

180 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit

Strany 92 - 4.7.15 Mount points

181 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a

Strany 93 - 4.7.17 Pre/Post commands

182 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume

Strany 94 - 4.7.17.1 Pre-backup command

183 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t

Strany 95

184 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot

Strany 96

185 Copyright © Acronis International GmbH, 2002-2014  safe conversion of a dynamic disk to basic when it contains volumes with data for simple an

Strany 97

186 Copyright © Acronis International GmbH, 2002-2014  Store backups (images) of other volumes/disks on a special volume;  Install a new operati

Strany 98

187 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to

Strany 99 - Skip the task execution

188 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume:  Select three destination disks to create the volume on. After yo

Strany 100 - Enabling VSS Full backup

189 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be

Strany 101 - 5 Recovery

19 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery

Strany 102 - 5.1.1 What to recover

190 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the

Strany 103 - 2. Selecting data

191 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of

Strany 104 - 5.1.1.2 Data catalog

192 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit

Strany 105

193 Copyright © Acronis International GmbH, 2002-2014 11 Protecting applications with disk-level backup This section describes how to use a disk-lev

Strany 106 - 5.1.4 Where to recover

194 Copyright © Acronis International GmbH, 2002-2014 If the application databases are located on a number of machines, back up all of the machines

Strany 107 - Disk destination

195 Copyright © Acronis International GmbH, 2002-2014 option is effective on a physical machine and on a virtual machine where Agent for Windows is

Strany 108 - NT signature

196 Copyright © Acronis International GmbH, 2002-2014 Create Table ##temp ( DatabaseName sysname, Name sysname, physical_name nvarchar(5

Strany 109 - Recover to:

197 Copyright © Acronis International GmbH, 2002-2014 Tracks how far Exchange has progressed in writing logged information to the database file. To

Strany 110 - Volume destination

198 Copyright © Acronis International GmbH, 2002-2014 11.1.1.4 SharePoint database files SharePoint stores content, auxiliary SharePoint services&a

Strany 111 - File system

199 Copyright © Acronis International GmbH, 2002-2014  Log file shrinking. Log file shrinking reduces the physical size of a log file by removing

Strany 112 - Volume (partition) alignment

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Strany 113 - Recovery exclusions

20 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console

Strany 114 - 5.1.6 Task credentials

200 Copyright © Acronis International GmbH, 2002-2014 Where:  myServer - name of the server  instanceName - name of the instance  C:\myScrip

Strany 115 - 5.2.1 Recovering volumes

201 Copyright © Acronis International GmbH, 2002-2014 1. Dismount the database (in Exchange 2010) or all databases of the storage group (in Exchang

Strany 116 - 5.2.2 Recovering disks

202 Copyright © Acronis International GmbH, 2002-2014 2. In the mounted volumes, determine which logs have been committed to the database by using

Strany 117

203 Copyright © Acronis International GmbH, 2002-2014  The volumes where the Active Directory database and the transaction logs (p. 197) are locat

Strany 118 - 5.3 Acronis Active Restore

204 Copyright © Acronis International GmbH, 2002-2014 To bring a backed-up database back to production, recover the database files from a disk backu

Strany 119 - How to use

205 Copyright © Acronis International GmbH, 2002-2014 b. Select the volume(s) containing the SQL Server database files. For the instructions on how

Strany 120

206 Copyright © Acronis International GmbH, 2002-2014 By using Acronis Backup, you can recover Exchange database files from a disk backup. To bring

Strany 121

207 Copyright © Acronis International GmbH, 2002-2014 11.3.3 Granular recovery of mailboxes RDB (RSG) is a special administrative database (storage

Strany 122 - 5.4.2 About Windows loaders

208 Copyright © Acronis International GmbH, 2002-2014 Steps to perform If the domain has other domain controllers, you can perform nonauthoritative

Strany 123

209 Copyright © Acronis International GmbH, 2002-2014  Changes to Active Directory that occurred after the backup had been made will be lost. 

Strany 124 - 5.6.1 Additional settings

21 Copyright © Acronis International GmbH, 2002-2014 The preset is: Enabled. To make a selection, select or clear the Notify when the management con

Strany 125 - 5.6.2 E-mail notifications

210 Copyright © Acronis International GmbH, 2002-2014 d. On the General tab, click Start. After the service starts, click OK. Details. This change

Strany 126 - 5.6.3 Error handling

211 Copyright © Acronis International GmbH, 2002-2014 A USN rollback is unlikely to occur when you recover an entire domain controller from a VSS-ba

Strany 127 - 5.6.4 Event tracing

212 Copyright © Acronis International GmbH, 2002-2014  Value name: Database restored from backup  Value data: 1 6. Restart the domain controlle

Strany 128 - 5.6.6 Mount points

213 Copyright © Acronis International GmbH, 2002-2014 3. If you have recovered the database to a non-original SQL server of the original SharePoint

Strany 129 - 5.6.7 Pre/Post commands

214 Copyright © Acronis International GmbH, 2002-2014 stsadm.exe -o addcontentdb -url <site url> -databasename <database> -databaseserve

Strany 130 - 5.6.8 Recovery priority

215 Copyright © Acronis International GmbH, 2002-2014 c. To change the server on which you want to stop the service, in the Server list, click Chan

Strany 131 - 6.1 Conversion methods

216 Copyright © Acronis International GmbH, 2002-2014 To recover SharePoint items from an unattached database 1. Attach the content database to an

Strany 132 - Custom loader reactivation

217 Copyright © Acronis International GmbH, 2002-2014 12 Administering a managed machine This section describes the views that are available through

Strany 133 - 6.2.2.1 Conversion settings

218 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 226) or

Strany 134

219 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea

Strany 135 - Storage space

22 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding

Strany 136

220 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At

Strany 137 - 6.2.3.1 Steps to perform

221 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th

Strany 138

222 Copyright © Acronis International GmbH, 2002-2014  Deploying of a backup plan to multiple machines You want to use the same backup plan on mul

Strany 139 - Choosing the disk interface

223 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr

Strany 140 - 6.3.2 Steps to perform

224 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin

Strany 141 - 7.1 Vaults

225 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi

Strany 142 - 7.1.2 Personal vaults

226 Copyright © Acronis International GmbH, 2002-2014 12.1.5 Backup plan details The Backup plan details window (also duplicated on the Information

Strany 143 - Metadata

227 Copyright © Acronis International GmbH, 2002-2014  Name - name of the archive.  Location - name of the vault or path to the folder, where th

Strany 144 - Creating a personal vault

228 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries  non-contiguous: hold down CTRL and click the log entries one by

Strany 145 - 7.2 Acronis Secure Zone

229 Copyright © Acronis International GmbH, 2002-2014  Code - It can be blank or the program error code if the event type is error. Error code is

Strany 146 - 7.2.1.4 Result confirmation

23 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I

Strany 147

230 Copyright © Acronis International GmbH, 2002-2014 12.4 Changing a license By changing the license, you switch a product from trial mode to full

Strany 148 - 7.3 Removable devices

231 Copyright © Acronis International GmbH, 2002-2014 12.6 Adjusting machine options The machine options define the general behavior of all Acronis

Strany 149

232 Copyright © Acronis International GmbH, 2002-2014 When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts

Strany 150 - What to validate

233 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr

Strany 151 - 8.1.3 Vault selection

234 Copyright © Acronis International GmbH, 2002-2014 This option is not available when operating under the bootable media. The option defines wheth

Strany 152 - 8.1.5 When to validate

235 Copyright © Acronis International GmbH, 2002-2014 Linux To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or

Strany 153 - 8.1.6 Task credentials

236 Copyright © Acronis International GmbH, 2002-2014 When the option is enabled, the program compares the actual log size with the maximum size aft

Strany 154

237 Copyright © Acronis International GmbH, 2002-2014 13 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th

Strany 155 - 8.2.1 Archive selection

238 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c

Strany 156 - 8.2.4 Destination selection

239 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win

Strany 157 - 3. Naming the new archive

24 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Windows, the scope of

Strany 158 - 8.3 Mounting an image

240 Copyright © Acronis International GmbH, 2002-2014 13.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w

Strany 159 - 8.3.3 Access credentials

241 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t

Strany 160 - 8.3.4 Volume selection

242 Copyright © Acronis International GmbH, 2002-2014 13.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac

Strany 161

243 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Strany 162

244 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa

Strany 163 - Limitations

245 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo

Strany 164

246 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis

Strany 165 - 9 Bootable media

247 Copyright © Acronis International GmbH, 2002-2014 13.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens

Strany 166

248 Copyright © Acronis International GmbH, 2002-2014 13.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud

Strany 167 - 9.1.1.1 Kernel parameters

249 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli

Strany 168

25 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr

Strany 169 - 9.1.1.3 Network port

250 Copyright © Acronis International GmbH, 2002-2014 13.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are

Strany 170

251 Copyright © Acronis International GmbH, 2002-2014  Install Acronis Backup on the machine you want to back up, start the product, click Back up

Strany 171

252 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac

Strany 172 - Configuring network settings

253 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr

Strany 173 - Adding VLANs

254 Copyright © Acronis International GmbH, 2002-2014 13.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back

Strany 174 - To add an NDAS device

255 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to

Strany 175 - Linux-based bootable media

256 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor

Strany 176 - Do not activate

257 Copyright © Acronis International GmbH, 2002-2014 14 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o

Strany 177 - 10 Disk management

258 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b

Strany 178

259 Copyright © Acronis International GmbH, 2002-2014  the backup archive (p. 258) name and location  the backup scheme (p. 259). This includes

Strany 179 - 10.6 Disk operations

26 Copyright © Acronis International GmbH, 2002-2014 3.5 Full, incremental and differential backups Acronis Backup provides the capability to use p

Strany 180 - 10.6.2 Basic disk cloning

260 Copyright © Acronis International GmbH, 2002-2014  access and back up the data that has survived in a corrupted system  deploy an operating

Strany 181 - Using advanced options

261 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 266) administrato

Strany 182

262 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 266) contains all data stored o

Strany 183

263 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 258) that contains a sector-based copy of a disk or a volume

Strany 184 - System disk conversion

264 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di

Strany 185 - 10.7 Volume operations

265 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil

Strany 186

266 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli

Strany 187 - Select destination disks

267 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect

Strany 188 - Set the volume options

268 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req

Strany 189 - 10.7.2 Delete volume

269 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 259) aimed to maintain the optimal balance between

Strany 190 - 10.7.5 Change volume label

27 Copyright © Acronis International GmbH, 2002-2014 Differential backup A differential backup stores changes to the data against the latest full ba

Strany 191 - 10.7.6 Format volume

28 Copyright © Acronis International GmbH, 2002-2014 Linux A volume backup stores all files and directories of the selected volume independent of th

Strany 192 - 10.8 Pending operations

29 Copyright © Acronis International GmbH, 2002-2014 simple/spanned, striped, mirrored, RAID 0+1, RAID-5) will not change. The target volume size ha

Strany 193 - Back up entire machines

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...

Strany 194 - Truncating transaction logs

30 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup includes a handy disk management utility which enables you to perform the above

Strany 195

31 Copyright © Acronis International GmbH, 2002-2014  Microsoft BitLocker Drive Encryption  McAfee Endpoint Encryption  PGP Whole Disk Encrypt

Strany 196 -  Checkpoint file (.chk)

32 Copyright © Acronis International GmbH, 2002-2014 The value may be "Information", "Warning", 'Error" and "Unkn

Strany 197 - Exchange 2003

33 Copyright © Acronis International GmbH, 2002-2014 WinPE 4.0 and WinPE 5.0 Acronis Media Builder can create bootable media based on these versions

Strany 198

34 Copyright © Acronis International GmbH, 2002-2014 3.12 Support for UEFI-based machines Acronis Backup can back up and recover machines that use

Strany 199

35 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i

Strany 200

36 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 148) If the specified location is an R

Strany 201

37 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan

Strany 202 - Volumes to back up

38 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup

Strany 203 - Considerations for backup

39 Copyright © Acronis International GmbH, 2002-2014 Exclude all hidden files and folders Select this check box to skip files and folders that have

Strany 204

4 Copyright © Acronis International GmbH, 2002-2014 4.2.6 Backup schemes ...

Strany 205 - To attach a database

40 Copyright © Acronis International GmbH, 2002-2014 By name F.log F Excludes all files named "F.log" Excludes all folders named "F&q

Strany 206

41 Copyright © Acronis International GmbH, 2002-2014 By selecting the existing archive, you are meddling in the area of another backup plan that use

Strany 207

42 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address

Strany 208 - Recovery vs. re-creation

43 Copyright © Acronis International GmbH, 2002-2014 backup will be performed and select from these days the day of weekly/monthly backup. Then you

Strany 209

44 Copyright © Acronis International GmbH, 2002-2014  Custom retention periods for backups of each type Description Let us suppose that we want to

Strany 210 - Ntdsutil

45 Copyright © Acronis International GmbH, 2002-2014 Backup type Specifies the types of daily, weekly and monthly backups.  Always full - all the

Strany 211 - USN rollback

46 Copyright © Acronis International GmbH, 2002-2014  Back up on: Workdays  Weekly/monthly: Friday  Keep backups:  Daily: 1 week  Weekly:

Strany 212

47 Copyright © Acronis International GmbH, 2002-2014  Monthly: indefinitely Backup is thus performed only on Fridays. This makes Friday the only c

Strany 213

48 Copyright © Acronis International GmbH, 2002-2014 Zone. This setting is not applicable to FTP and SFTP servers. This setting enables deletion of

Strany 214

49 Copyright © Acronis International GmbH, 2002-2014 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demo

Strany 215

5 Copyright © Acronis International GmbH, 2002-2014 5.1.5 When to recover ...

Strany 216

50 Copyright © Acronis International GmbH, 2002-2014 schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (ex

Strany 217 - 12.1 Backup plans and tasks

51 Copyright © Acronis International GmbH, 2002-2014 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 t

Strany 218

52 Copyright © Acronis International GmbH, 2002-2014 4.2.6.6 Initial seeding This backup scheme is available when Acronis Cloud Storage is selected

Strany 219

53 Copyright © Acronis International GmbH, 2002-2014 2. Specify:  User name. When entering the name of an Active Directory user account, be sure

Strany 220 - 12.1.2.3 Task states

54 Copyright © Acronis International GmbH, 2002-2014 Windows 2000 Professional win2000ProGuest Windows 2000 Server win2000ServGuest Windows 2000 Adv

Strany 221 - 12.1.2.4 Task statuses

55 Copyright © Acronis International GmbH, 2002-2014 Backup cataloging can be a time-consuming process. It is performed in parallel with the followi

Strany 222 - How to modify credentials

56 Copyright © Acronis International GmbH, 2002-2014 Restrictions When using simplified file naming, the following functionality is not available: 

Strany 223

57 Copyright © Acronis International GmbH, 2002-2014 This is because the full backups created at midnight were replaced by new full backups of the s

Strany 224 - How it works

58 Copyright © Acronis International GmbH, 2002-2014 4.3.3.3 Example 3. Hourly backups within a day Consider the following scenario:  You want to

Strany 225 - Editing the export file

59 Copyright © Acronis International GmbH, 2002-2014  You have two such drives. Either of them has drive letter D in the operating system when att

Strany 226 - 12.1.5 Backup plan details

6 Copyright © Acronis International GmbH, 2002-2014 8.2.5 Access credentials for destination ...

Strany 227 - 12.2 Log

60 Copyright © Acronis International GmbH, 2002-2014  The full backup of January 31, 2012, will be stored as ServerFiles[2012-01-31].tib.  The 1

Strany 228 - 12.2.2 Log entry details

61 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if User is idle (a screen saver is running or the machine is locke

Strany 229 - 12.3 Alerts

62 Copyright © Acronis International GmbH, 2002-2014 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's p

Strany 230 - 12.4 Changing a license

63 Copyright © Acronis International GmbH, 2002-2014 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00

Strany 231 - 12.6.3 Alerts

64 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The ta

Strany 232 - 12.6.4 E-mail settings

65 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3.

Strany 233 - 12.6.5 Event tracing

66 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da

Strany 234 - Windows

67 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2

Strany 235 - 12.6.6 Log cleanup rules

68 Copyright © Acronis International GmbH, 2002-2014 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers

Strany 236 - 12.6.7 Cloud backup proxy

69 Copyright © Acronis International GmbH, 2002-2014 To view properties of an event, including the event source and event number 1. In Event Viewer

Strany 237 - 13 Cloud backup

7 Copyright © Acronis International GmbH, 2002-2014 11.1.2 Truncating transaction logs ...

Strany 238 - Server operating systems

70 Copyright © Acronis International GmbH, 2002-2014 (1) If the user becomes idle before 9PM, the backup task will start at 9PM. (2) If the user bec

Strany 239

71 Copyright © Acronis International GmbH, 2002-2014 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immedi

Strany 240 - 13.1.7 Initial Seeding FAQ

72 Copyright © Acronis International GmbH, 2002-2014 Example: Run the backup task at system startup, but only if more than 12 hours have passed sinc

Strany 241

73 Copyright © Acronis International GmbH, 2002-2014  Using Acronis Cloud Backup to protect data from a natural disaster (p. 77) Replicate the arc

Strany 242 - Creating subsequent backups

74 Copyright © Acronis International GmbH, 2002-2014 Restrictions  Copying or moving backups to and from optical discs (CD, DVD, Blu-ray discs) is

Strany 243 - Packaging

75 Copyright © Acronis International GmbH, 2002-2014 The retention rules are applied after creating a backup. They are applied sequentially in the p

Strany 244

76 Copyright © Acronis International GmbH, 2002-2014 You will be able to specify the location where to move the backups and set up retention rules f

Strany 245

77 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set u

Strany 246

78 Copyright © Acronis International GmbH, 2002-2014  You want to occasionally back up your machine to a local folder.  You want to keep a copy

Strany 247

79 Copyright © Acronis International GmbH, 2002-2014 4.7 Default backup options Each Acronis agent has its own default backup options. Once an agen

Strany 248

8 Copyright © Acronis International GmbH, 2002-2014 13.1.7 Initial Seeding FAQ ...

Strany 249 - Machine subscriptions

80 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Strany 250 - 13.2 Where do I start?

81 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Strany 251

82 Copyright © Acronis International GmbH, 2002-2014 For example, if the machine boots from a hard disk drive by default and you select this check b

Strany 252 - Example

83 Copyright © Acronis International GmbH, 2002-2014 The preset is: Full cataloging. If you select Full cataloging, the backup contents are cataloge

Strany 253

84 Copyright © Acronis International GmbH, 2002-2014 This option is available when an internal (fixed) hard disk of the machine being backed up is s

Strany 254 - 13.8 Terminology reference

85 Copyright © Acronis International GmbH, 2002-2014  When backing up to a hard disk or a network share: A single backup file will be created if t

Strany 255

86 Copyright © Acronis International GmbH, 2002-2014  None – the data will be copied as is, without any compression. The resulting backup size wil

Strany 256 - Unassign a subscription

87 Copyright © Acronis International GmbH, 2002-2014 2. Click Browse to specify a location for the DRP files. 4.7.8 E-mail notifications This opt

Strany 257 - 14 Glossary

88 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encry

Strany 258 -  what data to back up

89 Copyright © Acronis International GmbH, 2002-2014 4.7.10 Event tracing It is possible to duplicate log events of the backup operations, performe

Strany 259 - Bootable media

9 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5  The most recent operating syst

Strany 260 - Centralized task

90 Copyright © Acronis International GmbH, 2002-2014  Use the setting set in the Machine options – to use the setting specified for the machine. F

Strany 261 - Data catalog

91 Copyright © Acronis International GmbH, 2002-2014 4.7.13 File-level security These options are effective only for file-level backup in Windows o

Strany 262 - Disaster recovery plan (DRP)

92 Copyright © Acronis International GmbH, 2002-2014  Acronis Bootable Agent and One-Click Restore. The One-Click Restore is the minimal addition

Strany 263 - Dynamic disk

93 Copyright © Acronis International GmbH, 2002-2014 This option applies to disk-level backup. This option also applies to file-level backup when th

Strany 264 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2014 4.7.17.1 Pre-backup command To specify a command/batch file to be executed before the backup p

Strany 265

95 Copyright © Acronis International GmbH, 2002-2014 The option enables you to define the commands to be automatically executed before and after dat

Strany 266

96 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the data capture only after the command is successfully executed. Fail the task

Strany 267

97 Copyright © Acronis International GmbH, 2002-2014 moment. The operations that had started before the inactivity time began continue without inter

Strany 268

98 Copyright © Acronis International GmbH, 2002-2014 If the task fails because of a mistake in the backup plan, you can edit the plan while the task

Strany 269

99 Copyright © Acronis International GmbH, 2002-2014 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to

Komentáře k této Příručce

Žádné komentáře