
Contents
Copyright © Acronis, Inc., 2000-2006
5
6.5.1 Files to restore exclusion ................................................................................................................. 46
6.5.2 Files overwriting mode.................................................................................................................... 47
6.5.3 Pre/post commands.......................................................................................................................... 47
6.5.4 Restoration priority.......................................................................................................................... 47
6.5.5 File-level security settings............................................................................................................... 47
6.5.6 Additional settings........................................................................................................................... 48
CHAPTER 7. SCHEDULING TASKS ................................................................................................. 49
7.1 CREATING SCHEDULED TASKS .................................................................................................................................... 49
7.1.1 Setting up daily execution ............................................................................................................... 51
7.1.2 Setting up weekly execution............................................................................................................ 51
7.1.3 Setting up monthly execution.......................................................................................................... 52
7.1.4 Setting up one-time execution ......................................................................................................... 53
7.2 MANAGING SCHEDULED TASKS .................................................................................................................................. 53
CHAPTER 8. MANAGING ACRONIS SECURE ZONE........................................................................ 54
8.1 CREATING ACRONIS SECURE ZONE ............................................................................................................................ 54
8.1.1 Activating and deactivating Acronis Startup Recovery Manager.................................................... 56
8.2 RESIZING ACRONIS SECURE ZONE.............................................................................................................................. 56
8.3 DELETING ACRONIS SECURE ZONE ............................................................................................................................ 57
CHAPTER 9. MOUNTING PARTITION IMAGES .............................................................................. 58
9.1 MOUNTING AN IMAGE ................................................................................................................................................ 58
9.2 UNMOUNTING AN IMAGE............................................................................................................................................ 60
CHAPTER 10. CREATING BOOTABLE MEDIA................................................................................... 61
CHAPTER 11. CONSOLE MODE........................................................................................................ 63
11.1 CREATING AND RESTORING IMAGES IN THE CONSOLE MODE (TRUEIMAGECMD)........................................................ 63
11.1.1 Supported commands................................................................................................................... 63
11.1.2 Trueimagecmd usage examples ................................................................................................... 65
11.2 AUTOMATIC IMAGE CREATION USING CRON SERVICE .............................................................................................. 65
11.3 RESTORING FILES WITH TRUEIMAGEMNT ................................................................................................................ 66
11.3.1 Supported commands................................................................................................................... 66
11.3.2 Trueimagemnt usage examples.................................................................................................... 68
CHAPTER 12. OTHER OPERATIONS ................................................................................................ 69
12.1 VALIDATING BACKUP ARCHIVES............................................................................................................................. 69
12.2 OPERATION RESULTS NOTIFICATION ....................................................................................................................... 70
12.2.1 Email notification......................................................................................................................... 70
12.2.2 WinPopup notification ................................................................................................................. 71
12.3 VIEWING LOGS....................................................................................................................................................... 71
CHAPTER 13. TRANSFERRING THE SYSTEM TO A NEW DISK......................................................... 73
13.1 GENERAL INFORMATION ........................................................................................................................................ 73
13.2 SECURITY .............................................................................................................................................................. 74
13.3 EXECUTING TRANSFERS ......................................................................................................................................... 74
13.3.1 Selecting transfer mode................................................................................................................ 74
13.3.2 Selecting the source disk.............................................................................................................. 74
13.3.3 Selecting the destination disk....................................................................................................... 75
13.3.4 Partitioned destination disk.......................................................................................................... 76
13.3.5 Old and new disk partition layout................................................................................................ 76
13.3.6 Old disk data ................................................................................................................................ 77
13.3.7 Destroying the old disk data......................................................................................................... 77
13.3.8 Selecting partition transfer method.............................................................................................. 78
13.3.9 Partitioning the old disk............................................................................................................... 79
13.3.10 Old and new disk partition layouts............................................................................................... 79
13.3.11 Cloning script............................................................................................................................... 79
13.4 CLONING WITH MANUAL PARTITIONING.................................................................................................................. 80
13.4.1 Old and new disk partition layouts............................................................................................... 80
Komentáře k této Příručce