Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For Windows Server
10 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 and Windows Server 2012 (p. 32) Install Acronis Backup & Rec
100 Copyright © Acronis International GmbH, 2002-2014 will suspend the database and flush all caches to ensure that all transactions are completed;
101 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect
102 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da
103 Copyright © Acronis International GmbH, 2002-2014 2. Selecting data The backed-up data can be selected using the Data view tab, or the Archive v
104 Copyright © Acronis International GmbH, 2002-2014 Location Details Machine name Local machine Local folders If the archive is stored in
105 Copyright © Acronis International GmbH, 2002-2014 4. Do any of the following: Select the data to recover in the catalog tree, or in the ta
106 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following: Use the task credentials The softwa
107 Copyright © Acronis International GmbH, 2002-2014 The selected disks will be recovered to the physical disks of the machine the console is conne
108 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. All the data stored on the target disk will be replaced by the backed-up data, s
109 Copyright © Acronis International GmbH, 2002-2014 1. If the disk or volume is recovered to its original location, the mapping process reproduce
11 Copyright © Acronis International GmbH, 2002-2014 Console The console provides Graphical User Interface to the agents. Usage of the console is no
110 Copyright © Acronis International GmbH, 2002-2014 Existing virtual machine Available when the Acronis Backup Agent for Hyper-V or Agent for VMwa
111 Copyright © Acronis International GmbH, 2002-2014 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. T
112 Copyright © Acronis International GmbH, 2002-2014 Volume (partition) alignment Acronis Backup automatically eliminates volume misalignment – a s
113 Copyright © Acronis International GmbH, 2002-2014 Files and folders will be recovered to the same path(s) as they are in the backup. For example
114 Copyright © Acronis International GmbH, 2002-2014 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders
115 Copyright © Acronis International GmbH, 2002-2014 In addition, the operating system itself is sensitive to the type of firmware. When performing
116 Copyright © Acronis International GmbH, 2002-2014 If the initialization may result in bootability loss, the software takes the partitioning styl
117 Copyright © Acronis International GmbH, 2002-2014 The ability of the recovered system to boot up in different modes depends on the operating sys
118 Copyright © Acronis International GmbH, 2002-2014 Original system Target hardware BIOS UEFI UEFI OS: non- convertible The target disk will be in
119 Copyright © Acronis International GmbH, 2002-2014 Usage scenarios 1. The system uptime is one of the efficiency criteria. Examples: Client-orie
12 Copyright © Acronis International GmbH, 2002-2014 1.8 About using the product in the trial mode Before buying an Acronis Backup license, you may
120 Copyright © Acronis International GmbH, 2002-2014 5.4 Bootability troubleshooting If a system was bootable at the time of backup, you expect th
121 Copyright © Acronis International GmbH, 2002-2014 Solution: Reactivate the boot loader. You might also need to fix the loader configuration file
122 Copyright © Acronis International GmbH, 2002-2014 The device on which the Linux kernel is located—typically, this is the boot partition or th
123 Copyright © Acronis International GmbH, 2002-2014 5.5 Reverting a Windows system to its factory settings If your Windows operating system was d
124 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also
125 Copyright © Acronis International GmbH, 2002-2014 Set current date and time for recovered files This option is effective only when recovering fi
126 Copyright © Acronis International GmbH, 2002-2014 When recovery completes successfully. When recovery fails. When user interaction is r
127 Copyright © Acronis International GmbH, 2002-2014 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With
128 Copyright © Acronis International GmbH, 2002-2014 Community – type the name of SNMP community to which both the host running SNMP management
129 Copyright © Acronis International GmbH, 2002-2014 This option is effective only when you select for backup a folder that is higher in the folder
13 Copyright © Acronis International GmbH, 2002-2014 1.10 Technical Support Maintenance and Support Program If you need assistance with your Acroni
130 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the recovery only after the command is successfully executed. Fail the task if
131 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk
132 Copyright © Acronis International GmbH, 2002-2014 During conversion which is part of a backup plan (p. 133), the software creates the virtual
133 Copyright © Acronis International GmbH, 2002-2014 Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo
134 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac
135 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker
136 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr
137 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso
138 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak
139 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A
14 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to
140 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio
141 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F
142 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte
143 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created
144 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut
145 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup
146 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S
147 Copyright © Acronis International GmbH, 2002-2014 Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin
148 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro
149 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i
15 Copyright © Acronis International GmbH, 2002-2014 Step 5. Recovery Recover (p. 101) To recover data, you need to select the backed-up data
150 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an
151 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 152) [Optional] Provide credentials for accessing the source if the task accou
152 Copyright © Acronis International GmbH, 2002-2014 To select a network share, expand the Network folders group, select the required networked
153 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows: Date and time - the date and time when to st
154 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ
155 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select
156 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of
157 Copyright © Acronis International GmbH, 2002-2014 To export data to a network share, expand the Network folders group, select the required ne
158 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if
159 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or
16 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name
160 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. According to the original FTP specification, credentials required for access to
161 Copyright © Acronis International GmbH, 2002-2014 To perform operations with archives and backups 1. In the Navigation pane, select the vault w
162 Copyright © Acronis International GmbH, 2002-2014 2. On the Archive view tab of the vault, select the archive. Then, expand the archive and cli
163 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes
164 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele
165 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or
166 Copyright © Acronis International GmbH, 2002-2014 When a machine is booted with a PE-based bootable media, you cannot select optical media su
167 Copyright © Acronis International GmbH, 2002-2014 User name and password to be entered on the console side at the connection to the agent. If
168 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The
169 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con
17 Copyright © Acronis International GmbH, 2002-2014 How to change the panes' borders 1. Point to the pane's border. 2. When the pointer
170 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p
171 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI
172 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from
173 Copyright © Acronis International GmbH, 2002-2014 Adding VLANs In the Network Settings window, you can add virtual local area networks (VLANs).
174 Copyright © Acronis International GmbH, 2002-2014 9.3.1 Setting up a display mode For a machine booted from media, a display video mode is dete
175 Copyright © Acronis International GmbH, 2002-2014 9.4 List of commands and utilities available in Linux-based bootable media Linux-based bootab
176 Copyright © Acronis International GmbH, 2002-2014 grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 9.5
177 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co
178 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d
179 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di
18 Copyright © Acronis International GmbH, 2002-2014 Sorting, filtering and configuring table items The following is a guideline to sort, filter and
180 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit
181 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a
182 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume
183 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t
184 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot
185 Copyright © Acronis International GmbH, 2002-2014 safe conversion of a dynamic disk to basic when it contains volumes with data for simple an
186 Copyright © Acronis International GmbH, 2002-2014 Store backups (images) of other volumes/disks on a special volume; Install a new operati
187 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to
188 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume: Select three destination disks to create the volume on. After yo
189 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be
19 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery
190 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the
191 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of
192 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit
193 Copyright © Acronis International GmbH, 2002-2014 11 Protecting applications with disk-level backup This section describes how to use a disk-lev
194 Copyright © Acronis International GmbH, 2002-2014 If the application databases are located on a number of machines, back up all of the machines
195 Copyright © Acronis International GmbH, 2002-2014 option is effective on a physical machine and on a virtual machine where Agent for Windows is
196 Copyright © Acronis International GmbH, 2002-2014 Create Table ##temp ( DatabaseName sysname, Name sysname, physical_name nvarchar(5
197 Copyright © Acronis International GmbH, 2002-2014 Tracks how far Exchange has progressed in writing logged information to the database file. To
198 Copyright © Acronis International GmbH, 2002-2014 11.1.1.4 SharePoint database files SharePoint stores content, auxiliary SharePoint services&a
199 Copyright © Acronis International GmbH, 2002-2014 Log file shrinking. Log file shrinking reduces the physical size of a log file by removing
2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr
20 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console
200 Copyright © Acronis International GmbH, 2002-2014 Where: myServer - name of the server instanceName - name of the instance C:\myScrip
201 Copyright © Acronis International GmbH, 2002-2014 1. Dismount the database (in Exchange 2010) or all databases of the storage group (in Exchang
202 Copyright © Acronis International GmbH, 2002-2014 2. In the mounted volumes, determine which logs have been committed to the database by using
203 Copyright © Acronis International GmbH, 2002-2014 The volumes where the Active Directory database and the transaction logs (p. 197) are locat
204 Copyright © Acronis International GmbH, 2002-2014 To bring a backed-up database back to production, recover the database files from a disk backu
205 Copyright © Acronis International GmbH, 2002-2014 b. Select the volume(s) containing the SQL Server database files. For the instructions on how
206 Copyright © Acronis International GmbH, 2002-2014 By using Acronis Backup, you can recover Exchange database files from a disk backup. To bring
207 Copyright © Acronis International GmbH, 2002-2014 11.3.3 Granular recovery of mailboxes RDB (RSG) is a special administrative database (storage
208 Copyright © Acronis International GmbH, 2002-2014 Steps to perform If the domain has other domain controllers, you can perform nonauthoritative
209 Copyright © Acronis International GmbH, 2002-2014 Changes to Active Directory that occurred after the backup had been made will be lost.
21 Copyright © Acronis International GmbH, 2002-2014 The preset is: Enabled. To make a selection, select or clear the Notify when the management con
210 Copyright © Acronis International GmbH, 2002-2014 d. On the General tab, click Start. After the service starts, click OK. Details. This change
211 Copyright © Acronis International GmbH, 2002-2014 A USN rollback is unlikely to occur when you recover an entire domain controller from a VSS-ba
212 Copyright © Acronis International GmbH, 2002-2014 Value name: Database restored from backup Value data: 1 6. Restart the domain controlle
213 Copyright © Acronis International GmbH, 2002-2014 3. If you have recovered the database to a non-original SQL server of the original SharePoint
214 Copyright © Acronis International GmbH, 2002-2014 stsadm.exe -o addcontentdb -url <site url> -databasename <database> -databaseserve
215 Copyright © Acronis International GmbH, 2002-2014 c. To change the server on which you want to stop the service, in the Server list, click Chan
216 Copyright © Acronis International GmbH, 2002-2014 To recover SharePoint items from an unattached database 1. Attach the content database to an
217 Copyright © Acronis International GmbH, 2002-2014 12 Administering a managed machine This section describes the views that are available through
218 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 226) or
219 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea
22 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding
220 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At
221 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th
222 Copyright © Acronis International GmbH, 2002-2014 Deploying of a backup plan to multiple machines You want to use the same backup plan on mul
223 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr
224 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin
225 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi
226 Copyright © Acronis International GmbH, 2002-2014 12.1.5 Backup plan details The Backup plan details window (also duplicated on the Information
227 Copyright © Acronis International GmbH, 2002-2014 Name - name of the archive. Location - name of the vault or path to the folder, where th
228 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries non-contiguous: hold down CTRL and click the log entries one by
229 Copyright © Acronis International GmbH, 2002-2014 Code - It can be blank or the program error code if the event type is error. Error code is
23 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I
230 Copyright © Acronis International GmbH, 2002-2014 12.4 Changing a license By changing the license, you switch a product from trial mode to full
231 Copyright © Acronis International GmbH, 2002-2014 12.6 Adjusting machine options The machine options define the general behavior of all Acronis
232 Copyright © Acronis International GmbH, 2002-2014 When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts
233 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr
234 Copyright © Acronis International GmbH, 2002-2014 This option is not available when operating under the bootable media. The option defines wheth
235 Copyright © Acronis International GmbH, 2002-2014 Linux To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or
236 Copyright © Acronis International GmbH, 2002-2014 When the option is enabled, the program compares the actual log size with the maximum size aft
237 Copyright © Acronis International GmbH, 2002-2014 13 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th
238 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c
239 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win
24 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Windows, the scope of
240 Copyright © Acronis International GmbH, 2002-2014 13.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w
241 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t
242 Copyright © Acronis International GmbH, 2002-2014 13.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac
243 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,
244 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa
245 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo
246 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis
247 Copyright © Acronis International GmbH, 2002-2014 13.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens
248 Copyright © Acronis International GmbH, 2002-2014 13.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud
249 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli
25 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr
250 Copyright © Acronis International GmbH, 2002-2014 13.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are
251 Copyright © Acronis International GmbH, 2002-2014 Install Acronis Backup on the machine you want to back up, start the product, click Back up
252 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac
253 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr
254 Copyright © Acronis International GmbH, 2002-2014 13.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back
255 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to
256 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor
257 Copyright © Acronis International GmbH, 2002-2014 14 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o
258 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b
259 Copyright © Acronis International GmbH, 2002-2014 the backup archive (p. 258) name and location the backup scheme (p. 259). This includes
26 Copyright © Acronis International GmbH, 2002-2014 3.5 Full, incremental and differential backups Acronis Backup provides the capability to use p
260 Copyright © Acronis International GmbH, 2002-2014 access and back up the data that has survived in a corrupted system deploy an operating
261 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 266) administrato
262 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 266) contains all data stored o
263 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 258) that contains a sector-based copy of a disk or a volume
264 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di
265 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil
266 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli
267 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect
268 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req
269 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 259) aimed to maintain the optimal balance between
27 Copyright © Acronis International GmbH, 2002-2014 Differential backup A differential backup stores changes to the data against the latest full ba
28 Copyright © Acronis International GmbH, 2002-2014 Linux A volume backup stores all files and directories of the selected volume independent of th
29 Copyright © Acronis International GmbH, 2002-2014 simple/spanned, striped, mirrored, RAID 0+1, RAID-5) will not change. The target volume size ha
3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...
30 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup includes a handy disk management utility which enables you to perform the above
31 Copyright © Acronis International GmbH, 2002-2014 Microsoft BitLocker Drive Encryption McAfee Endpoint Encryption PGP Whole Disk Encrypt
32 Copyright © Acronis International GmbH, 2002-2014 The value may be "Information", "Warning", 'Error" and "Unkn
33 Copyright © Acronis International GmbH, 2002-2014 WinPE 4.0 and WinPE 5.0 Acronis Media Builder can create bootable media based on these versions
34 Copyright © Acronis International GmbH, 2002-2014 3.12 Support for UEFI-based machines Acronis Backup can back up and recover machines that use
35 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i
36 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 148) If the specified location is an R
37 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan
38 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup
39 Copyright © Acronis International GmbH, 2002-2014 Exclude all hidden files and folders Select this check box to skip files and folders that have
4 Copyright © Acronis International GmbH, 2002-2014 4.2.6 Backup schemes ...
40 Copyright © Acronis International GmbH, 2002-2014 By name F.log F Excludes all files named "F.log" Excludes all folders named "F&q
41 Copyright © Acronis International GmbH, 2002-2014 By selecting the existing archive, you are meddling in the area of another backup plan that use
42 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address
43 Copyright © Acronis International GmbH, 2002-2014 backup will be performed and select from these days the day of weekly/monthly backup. Then you
44 Copyright © Acronis International GmbH, 2002-2014 Custom retention periods for backups of each type Description Let us suppose that we want to
45 Copyright © Acronis International GmbH, 2002-2014 Backup type Specifies the types of daily, weekly and monthly backups. Always full - all the
46 Copyright © Acronis International GmbH, 2002-2014 Back up on: Workdays Weekly/monthly: Friday Keep backups: Daily: 1 week Weekly:
47 Copyright © Acronis International GmbH, 2002-2014 Monthly: indefinitely Backup is thus performed only on Fridays. This makes Friday the only c
48 Copyright © Acronis International GmbH, 2002-2014 Zone. This setting is not applicable to FTP and SFTP servers. This setting enables deletion of
49 Copyright © Acronis International GmbH, 2002-2014 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demo
5 Copyright © Acronis International GmbH, 2002-2014 5.1.5 When to recover ...
50 Copyright © Acronis International GmbH, 2002-2014 schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (ex
51 Copyright © Acronis International GmbH, 2002-2014 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 t
52 Copyright © Acronis International GmbH, 2002-2014 4.2.6.6 Initial seeding This backup scheme is available when Acronis Cloud Storage is selected
53 Copyright © Acronis International GmbH, 2002-2014 2. Specify: User name. When entering the name of an Active Directory user account, be sure
54 Copyright © Acronis International GmbH, 2002-2014 Windows 2000 Professional win2000ProGuest Windows 2000 Server win2000ServGuest Windows 2000 Adv
55 Copyright © Acronis International GmbH, 2002-2014 Backup cataloging can be a time-consuming process. It is performed in parallel with the followi
56 Copyright © Acronis International GmbH, 2002-2014 Restrictions When using simplified file naming, the following functionality is not available:
57 Copyright © Acronis International GmbH, 2002-2014 This is because the full backups created at midnight were replaced by new full backups of the s
58 Copyright © Acronis International GmbH, 2002-2014 4.3.3.3 Example 3. Hourly backups within a day Consider the following scenario: You want to
59 Copyright © Acronis International GmbH, 2002-2014 You have two such drives. Either of them has drive letter D in the operating system when att
6 Copyright © Acronis International GmbH, 2002-2014 8.2.5 Access credentials for destination ...
60 Copyright © Acronis International GmbH, 2002-2014 The full backup of January 31, 2012, will be stored as ServerFiles[2012-01-31].tib. The 1
61 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if User is idle (a screen saver is running or the machine is locke
62 Copyright © Acronis International GmbH, 2002-2014 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's p
63 Copyright © Acronis International GmbH, 2002-2014 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00
64 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The ta
65 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3.
66 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da
67 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2
68 Copyright © Acronis International GmbH, 2002-2014 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers
69 Copyright © Acronis International GmbH, 2002-2014 To view properties of an event, including the event source and event number 1. In Event Viewer
7 Copyright © Acronis International GmbH, 2002-2014 11.1.2 Truncating transaction logs ...
70 Copyright © Acronis International GmbH, 2002-2014 (1) If the user becomes idle before 9PM, the backup task will start at 9PM. (2) If the user bec
71 Copyright © Acronis International GmbH, 2002-2014 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immedi
72 Copyright © Acronis International GmbH, 2002-2014 Example: Run the backup task at system startup, but only if more than 12 hours have passed sinc
73 Copyright © Acronis International GmbH, 2002-2014 Using Acronis Cloud Backup to protect data from a natural disaster (p. 77) Replicate the arc
74 Copyright © Acronis International GmbH, 2002-2014 Restrictions Copying or moving backups to and from optical discs (CD, DVD, Blu-ray discs) is
75 Copyright © Acronis International GmbH, 2002-2014 The retention rules are applied after creating a backup. They are applied sequentially in the p
76 Copyright © Acronis International GmbH, 2002-2014 You will be able to specify the location where to move the backups and set up retention rules f
77 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set u
78 Copyright © Acronis International GmbH, 2002-2014 You want to occasionally back up your machine to a local folder. You want to keep a copy
79 Copyright © Acronis International GmbH, 2002-2014 4.7 Default backup options Each Acronis agent has its own default backup options. Once an agen
8 Copyright © Acronis International GmbH, 2002-2014 13.1.7 Initial Seeding FAQ ...
80 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu
81 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu
82 Copyright © Acronis International GmbH, 2002-2014 For example, if the machine boots from a hard disk drive by default and you select this check b
83 Copyright © Acronis International GmbH, 2002-2014 The preset is: Full cataloging. If you select Full cataloging, the backup contents are cataloge
84 Copyright © Acronis International GmbH, 2002-2014 This option is available when an internal (fixed) hard disk of the machine being backed up is s
85 Copyright © Acronis International GmbH, 2002-2014 When backing up to a hard disk or a network share: A single backup file will be created if t
86 Copyright © Acronis International GmbH, 2002-2014 None – the data will be copied as is, without any compression. The resulting backup size wil
87 Copyright © Acronis International GmbH, 2002-2014 2. Click Browse to specify a location for the DRP files. 4.7.8 E-mail notifications This opt
88 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encry
89 Copyright © Acronis International GmbH, 2002-2014 4.7.10 Event tracing It is possible to duplicate log events of the backup operations, performe
9 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5 The most recent operating syst
90 Copyright © Acronis International GmbH, 2002-2014 Use the setting set in the Machine options – to use the setting specified for the machine. F
91 Copyright © Acronis International GmbH, 2002-2014 4.7.13 File-level security These options are effective only for file-level backup in Windows o
92 Copyright © Acronis International GmbH, 2002-2014 Acronis Bootable Agent and One-Click Restore. The One-Click Restore is the minimal addition
93 Copyright © Acronis International GmbH, 2002-2014 This option applies to disk-level backup. This option also applies to file-level backup when th
94 Copyright © Acronis International GmbH, 2002-2014 4.7.17.1 Pre-backup command To specify a command/batch file to be executed before the backup p
95 Copyright © Acronis International GmbH, 2002-2014 The option enables you to define the commands to be automatically executed before and after dat
96 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the data capture only after the command is successfully executed. Fail the task
97 Copyright © Acronis International GmbH, 2002-2014 moment. The operations that had started before the inactivity time began continue without inter
98 Copyright © Acronis International GmbH, 2002-2014 If the task fails because of a mistake in the backup plan, you can edit the plan while the task
99 Copyright © Acronis International GmbH, 2002-2014 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to
Komentáře k této Příručce