Acronis True Image for MS SBS Server  - User Guide Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Acronis True Image for MS SBS Server  - User Guide. Acronis True Image for MS SBS Server  - User Guide User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 157
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Business Server

User's GuideAcronis®True Imagefor Microsoft Small Business ServerCompute with confidencewww.acronis.com

Strany 2

Chapter 1. Introduction 1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users Acronis True Image fo

Strany 3 - ACRONIS, INC

Chapter 8. Scheduling tasks Acronis True Image for Microsoft Small Business Server allows you to schedule periodic backup and archive validation tas

Strany 4

Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tasks

Strany 5

In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to

Strany 6 - Table of Contents

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st

Strany 7

8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: Day – on the specified

Strany 8

If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta

Strany 9

Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is

Strany 10 - Chapter 1. Introduction

3. Select the partitions from which space will be used to create the zone. 4. In the next window, enter the Acronis Secure Zone size or drag the sli

Strany 11

5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup

Strany 12

9.3 Changing the password for Acronis Secure Zone 1. When prompted by the wizard, select Manage Acronis Secure Zone. 2. Select Change password. 3.

Strany 13

you to limit the amount of CPU usage for the application to maximize the CPU’s availability for mission critical applications. Additionally, users ca

Strany 14

Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image for Microsoft Small Business Server on a bare

Strany 15 - 1.6 Technical support

Acronis Bootable Agent full version The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from

Strany 16 - 2.2 Security parameters

4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to

Strany 17 - 4.4.1 Group status

2. Insert your Win PE distribution CD into the media drive of the computer. If you have a distribution copy on the hard disk, copy the path to it. Th

Strany 18

Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is no

Strany 19

Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives

Strany 20

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Strany 21 - 3.5 Acronis Backup

If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T

Strany 22

5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected

Strany 23 - User or administrator?

security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consoli

Strany 24

1.2 Acronis True Image for Microsoft Small Business Server components Acronis True Image for Microsoft Small Business Server includes the following

Strany 25 - Server components

The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full

Strany 26

6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window

Strany 27

Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image for Microsof

Strany 28 - 6.3.12 Dual

12.2 WinPopup notification To set up WinPopup notification: 1. Enable the Messenger service on both the computer executing the task and the computer

Strany 29 - Acronis Secure Zone

The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.

Strany 30 - 4.5 Managing backup server

An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image for Micr

Strany 31

If you run Acronis True Image for Microsoft Small Business Server regularly, this feature in your operating system is redundant. You can turn it off,

Strany 32 - 3.6 Acronis Active restore

Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, dep

Strany 33 - 3.6.3 How to use

If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable m

Strany 34

4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: the fa

Strany 35

Backup server Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library f

Strany 36

Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and click Convert to Virtual disk.

Strany 37 - 6.3.14 Additional settings

Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too sma

Strany 38

14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete

Strany 39

You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system

Strany 40 - Management Console

14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No

Strany 41 - Business

Keep data – leave the old disk partitions and data intact Destroy data – destroy all data on the old disk. If you are going to sell or give away you

Strany 42

The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,

Strany 43

If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system an

Strany 44 - Restoring the backup data

Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including

Strany 45

Along with the hard disk number, you will see disk capacity, label, partition and file system information. Different partition types, including prima

Strany 46

Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create

Strany 47

Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacit

Strany 48 - Secure Zone

If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce

Strany 49 - Chapter 6. Creating

Chapter 16. Command-line mode and scripting Acronis True Image for Microsoft Small Business Server (local version) supports the command-line mode an

Strany 50 - 8.2 Managing scheduled tasks

partitions, except for the MBR, from an image /net_user:[username] /net_password:[password] /ftp_user /ftp_password /oss_numbers /reboot /log:[file

Strany 51

virtual machine /log:[file name] /log_net_user:[remote user] /log_net_password:[password] list Lists available drives and partitions. With the filena

Strany 52 - 4.5.1 Default settings

asz_delete Deletes the Acronis Secure Zone /password:[password] /oss_numbers /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[

Strany 53

specified or there is no basic full backup, a full backup will be created /compression:[0…9] Specify the data compression level. It ranges from 0 to

Strany 54

/partition:DYN1,DYN2 /file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This opt

Strany 55

/target_harddisk:DYN you will select unallocated space on all dynamic disks that present in the system. /target_partition:[partition number] Specif

Strany 56

driver to be installed. filerestore /target_folder:[target folder] Specifies a folder where folders/files will be restored (a target folder). If not

Strany 57

* - an FTP-server must allow passive mode for file transfers. Data recovery directly from FTP-server requires the archive to consist of files no more

Strany 58 - 4.5.6 Managing Archives

/harddisk:[disk number] Specifies the hard disks to convert by numbers. For each disk, a separate virtual disk will be created. By specifying /hardd

Strany 59

/harddisk:X Specifies the hard disk number where the Acronis Secure Zone will be created. /partition:[partition number] Specifies partitions from whi

Strany 60

trueimagecmd /create /filename:"C:\Test\1.tib" /password:qwerty /harddisk:2 /reboot /raw /incremental /compression:5 /split:640 /progress:o

Strany 61 - Chapter 16. Command-line

trueimagecmd /deploy_mbr /harddisk:1 /target_harddisk:2 /filename:ftp://server/folder/arc.tib /ftp_user:fuser /ftp_password:fpswd This will restore M

Strany 62

7. List trueimagecmd /list This will list available partitions. trueimagecmd /list /asz This will list contents of the latest image located in Acroni

Strany 63

Copyright © Acronis, Inc., 2000-2008 155 - full (base) image backup c

Strany 64

16.2 Scripting 16.2.1 Script execution parameters Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True Image for M

Strany 65 - 12.5 Managing System Restore

Copyright © Acronis, Inc., 2000-2008 157 Options. This tag can be use

Strany 66

Chapter 2. Acronis True Image for Microsoft Small Business Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirem

Strany 67 - 3.2 Full, incremental and

The Acronis Group Server uses administrator’s credentials to perform data backup tasks on the computers. You will be asked for the credentials during

Strany 68 - 1.4.2 Supported storage

18 Copyright © Acronis, Inc., 2000-2008 The earlier versions of Acro

Strany 69 - 6.3 Setting backup options

Encryption Options Server Requires Encryption This option defines the server behavior in case the client does not support encryption. When enabled,

Strany 70 - 6.3.6 Backup performance

Copyright © Acronis, Inc., 2000-2008. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron

Strany 71

Acronis True Image for Microsoft Small Business Server Install Window It is recommended that you install Acronis True Image Management Console first

Strany 72

connecting image backups as virtual disks (see 11.2.2 Mounting an image). 2.3.2 Installation of Acronis Group Server The Acronis Group Server only

Strany 73 - 6.3.1 Archive protection

4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can creat

Strany 74 - 6.3.4 Database support

Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator

Strany 75 - 6.3.5 Compression level

10. Define the computers which administrators will back up using Acronis True Image Agents. Add the computers as follows. Click Set up Administrato

Strany 76

2.3.4 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image for Microsoft Small Business Server. It i

Strany 77 - 6.3.8 Archive splitting

If your operating system fails to load, you can run Acronis Startup Recovery Manager. However, this must be activated prior to use; see 3.4 Acronis

Strany 78 - 7.4.5 File-level security

Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc

Strany 79 - 6.3.11 Error handling

incremental backup, as it does not have to process through a long chain of previous backups. A standalone, full backup could be an optimal solution i

Strany 80 - 6.3.13 Wake On LAN

In that case, you will have to either re-create the full backup or increase the size of the Acronis Secure Zone. You can back up data automatically o

Strany 81 - Archives cataloguing

ACRONIS, INC. End User License Agreement (EULA) BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE DOWNLOADED OR IS CONTAINED O

Strany 82 - 6.3.10 Media components

Recovery Manager. Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you s

Strany 83

of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup lo

Strany 84

The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Gen

Strany 85 - 7.4 Setting

Copyright © Acronis, Inc., 2000-2008 33 2. Next, the application writ

Strany 86

will usually produce the same unbootable result because the new hardware is incompatible with the most critical drivers included in the image. Using

Strany 87 - 7.3.2 Archive selection

recovered system, you can prepare the system with Sysprep, image it and restore, if need be, using Acronis Universal Restore. 3.7.4 Limitations in u

Strany 88 - Active restore

following diagram illustrates ways of access to tape devices for networks with (I) and without (II) backup server. The devices must be locally attac

Strany 89 - Universal Restore

metadata saved on the tape and the database will be recreated on the new host using the new host RSM. This operation is performed at first access to

Strany 90

3.8.2 Backing up to a tape device through Acronis Backup Server To enable backup to a tape device in the local network: 1. Install Acronis Backup Se

Strany 91

4. If the tape contains data, its contents will be overwritten on prompt. You have an option to disable prompts, see 6.3.14 Additional settings. 5.

Strany 92

• One (1) instance of the Hardware installed Software in one physical operating system environment; and • Up to four (4) instances of the Hardware

Strany 93 - 7.4 Setting restore options

Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managi

Strany 94 - 7.4.3 Pre/post commands

To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main w

Strany 95 - 6.3.9 File-level security

5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account cr

Strany 96 - 7.4.8 Error handling

7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed.

Strany 97

The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery

Strany 98

Copyright © Acronis, Inc., 2000-2008 45 Browse logs of Acronis True I

Strany 99

46 Copyright © Acronis, Inc., 2000-2008 Other Tools Create bootable

Strany 100 - Creating backup archives

Cancelled – the task has been cancelled on the remote computer Offline - the remote computer is not connected to the network or is switched off Inacc

Strany 101

6. Hide computers that you do not wish to browse or make a hidden computer visible. To hide a computer, select it, then select on the sidebar Compute

Strany 102

backing up to a backup server, choose Personal Backup Location or tape drive and enter backup server administrator’s credentials. For more informatio

Strany 103

BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY. Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY

Strany 104

When distribution is complete, the group task appears in Group Tasks Management window. If you connect to any computer included into the group, you w

Strany 105

When managing a group task, enter the same username and password you entered when created the task. 4.4.4 Acronis Group Server options Acronis Group

Strany 106 - 3.3 Acronis Secure Zone

When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entere

Strany 107

The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (th

Strany 108

Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas

Strany 109

To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy

Strany 110

If you opted for picking the user name out of the domain user list, you will skip the above window and proceed to the other windows where you will s

Strany 111

backup location, quotas and time limits like common users are and uses the administrator profile for both remotely and locally controlled backups. 4.

Strany 112 - Small Business Server

To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window

Strany 113

You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the li

Strany 114

Table of Contents Chapter 1. Introduction ...10 1.1 Acronis® T

Strany 115 - 11.2.1 Exploring an archive

If maximum number of connections is set, then some agents or local Acronis True Image for Microsoft Small Business Server versions may be unable to a

Strany 116 - 11.2.2 Mounting an image

Chapter 5. Using Acronis True Image for Microsoft Small Business Server (local version) Acronis True Image for Microsoft Small Business Server (loca

Strany 117

Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity checking

Strany 118 - 11.3 Consolidating backups

Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.

Strany 119

64 Copyright © Acronis, Inc., 2000-2008 Run, stop, edit, clone, renam

Strany 120

Other Tools Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Turn on/off Windows System Restore to

Strany 121

Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a

Strany 122 - 12.1 Email notification

You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex

Strany 123 - 12.3 Viewing logs

The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot

Strany 124 - 12.4 Event tracing

7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may select

Strany 125 - 12.4.2 SNMP notifications

3.7.5 Getting Acronis Universal Restore...35 3.8 Backing up to tape lib

Strany 126

You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from th

Strany 127

4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file

Strany 128 - Chapter 7. Restoring

See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select wh

Strany 129 - Chapter

6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being a

Strany 130

You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex

Strany 131 - 14.1 General information

net start “Microsoft Exchange Event” net start “Microsoft Exchange IMAP4” net start “Microsoft Exchange MTA Stacks” net start “Microsoft Exchange POP

Strany 132 - 14.3 Executing transfers

6.3.6 Backup performance The three options below might have a more or less noticeable effect on the backup process speed. This depends on overall sy

Strany 133

6.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup. Incremental/differential backup captures only cha

Strany 134 - 14.3.6 Old disk data

You can disable preserving the files’ security settings in archives to completely eliminate this kind of problem. Then the restored files/folders wil

Strany 135

6.3.11 Error handling 1. Ignore bad sectors The preset is disabled. With the default setting, the program will display a pop-up window each time i

Strany 136

7.3 Restoring disks/partitions or files from images ...86 7.3.1 Starting the Restor

Strany 137

Even if a password is set for the Acronis Secure Zone, the copy archive will not be protected with the password. 6.3.13 Wake On LAN This option is

Strany 138 - 14.3.11 Cloning summary

To check archive data integrity, you must have all incremental and differential backups belonging to the archive and the initial full backup. If any

Strany 139

Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1

Strany 140 - 15.1 Selecting a hard disk

7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). Fo

Strany 141 - 15.3 Disk add summary

7.2 Restoring files and folders from file archives Here we describe how to restore files/folders from a file backup archive. You can restore the des

Strany 142 - 16.1.1 Supported commands

4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locat

Strany 143

7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as

Strany 144

start over. If you can not determine which applications use the partition (disk), close them all. 7.3.1 Starting the Restore Data Wizard Start the R

Strany 145 - Backup options

7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offer

Strany 146 - General options

Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecti

Strany 147 - /partition:DYN1

12.4.1 Windows event log...124 12.4.2 SNMP notificatio

Strany 148

If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination dis

Strany 149

Selecting Active for a partition without an installed operating system could prevent your server from booting. 7.3.7 Changing the restored partitio

Strany 150

7.3.9 Assigning a letter to the restored partition Acronis True Image for Microsoft Small Business Server will assign an unused letter to a restored

Strany 151

Acronis Universal Restore uses three sources for drivers: - the driver repository - a folder or folders on a network drive or CD specified in restor

Strany 152

You can edit the default (or set the temporary) restore options while creating a restore task as well. 7.4.1 Files to exclude from restoration The

Strany 153

The program does not support interactive commands, i.e. commands that require user input (for example, “pause”.) The backup process will run concurre

Strany 154

96 Copyright © Acronis, Inc., 2000-2008 Here you can specify a path t

Strany 155

Copyright © Acronis, Inc., 2000-2008 97 cannot continue without user

Strany 156 - 16.2 Scripting

4. Select the type of dynamic volume that will be created: simple/spanned, striped, mirrored or RAID 5. 5. Specify amount of space that the dynamic

Strany 157

On completion of operations, the dynamic volumes are unformatted and have no letters assigned. You will be able to assign the letters using Windows D

Komentáře k této Příručce

Žádné komentáře