Acronis® Backup & Recovery™ 10 Advanced Server User's Guide
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ......................................................................... 7 1.1 Acronis Backup & Recovery 10 overview .................................................................................. 7 1.2 Getting started ........................................................................................................................... 8 1.2.1 1.3 Acronis Backup & Recovery 10 components ...........................................
3 Options.................................................................................................................................. 86 3.1 Console options .......................................................................................................................86 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.2 Management server options ...................................................................................................88 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.
6 Direct management ............................................................................................................. 177 6.1 Administering a managed machine ...................................................................................... 177 6.1.1 6.1.2 6.1.3 6.2 Creating a backup plan ......................................................................................................... 192 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 6.2.7 6.2.8 6.2.9 6.2.10 6.2.11 6.
.8.1 6.8.2 6.9 Creating Acronis Secure Zone ................................................................................................................. 243 Managing Acronis Secure Zone............................................................................................................... 245 Acronis Startup Recovery Manager ...................................................................................... 247 6.10 Bootable media..........................................................
1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
Controlling user rights to perform operations and access backups Running services with minimal user rights Restricted remote access to a backup agent Secure communication between the product components Using third-party certificates for authentication of the components Data encryption options for both data transmission and storage Backup of remote machines to a centralized storage node behind firewalls. 1.2 Getting started Direct management 1.
5. Connect the console to the management server. The simplified way of centralized management Backup Using the Back up control, select the machine which you want to back up and then create a backup plan (p. 362) on the machine. You can create backup plans on multiple machines in turn. Recovery Using the Recover control, select the machine where the data recovery is required and create a recovery task on the machine. You can create recovery tasks on multiple machines in turn.
Set up a centralized backup policy and apply it to the All machines group. This way you will deploy backup plans on each machine with a single action. Select Actions > Create backup policy from the top menu and then refer to the context help. Grouping the machines registered on the management server Group the registered machines by appropriate parameters, create several policies and apply each policy to the appropriate group of machines.
Actions and Tools pane (p. 12) section). Main area The main place of working, where you create, edit and manage backup plans, policies, tasks and perform other operations. Displays the different views and action pages (p. 14) depending on items selected in the menu, Navigation tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you perform all the operations, available on both panes. Menu items change dynamically.
Physical machines. Use this view to manage machines registered on the management server. Virtual machines. Use this view to manage virtual machines from the registered physical machines and from the registered machines with the agent for ESX/ESXi. Vaults. Use this view to manage centralized vaults and archives stored in there: create new managed and unmanaged vaults, rename and delete the existing ones. Storage nodes. Use this view to manage storage nodes.
Examples of "'Item name' actions" bars Actions Contains a list of common operations that can be performed on a managed machine or on a management server. Always the same for all views. Clicking the operation opens the respective action page (see the Action pages (p. 15) section.) All the actions can also be accessed in the Actions menu. "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views.
1.2.1.3 Operations with panes How to expand/minimize panes By default, the Navigation pane appears expanded and the Actions and Tools - minimized. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( - for the Navigation pane; - for the Actions and tools pane). The pane will be minimized and the chevron changes its direction. Click the chevron once again to expand the pane. How to change the panes' borders 1. Point to the pane's border. 2.
Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Information panel. Use filtering and sorting capabilities to search the table for the item in question In the table, select the desired item In the Information panel (collapsed by default), view the item's details Perform actions on the selected item.
the available fields are displayed. You can switch between the views by selecting the Advanced view check box at the top of the action page. Most settings are configured by clicking the respective Change… links to the right. Others are selected from the drop-down list, or typed manually in the page's fields. Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages.
Console The console provides Graphical User Interface and remote connection to the agents and other Acronis Backup & Recovery 10 components. Usage of the console is not licensed. Bootable media builder With bootable media builder, you can create bootable media in order to use the agents and other rescue utilities in a rescue environment. Availability of the agent add-ons in a rescue environment depends on whether an add-on is installed on the machine where the media builder is working. 1.3.
1.3.1.2 Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Acronis Backup & Recovery 10 Storage Node. 1.3.2 Agent for Linux This agent enables disk-level and file-level data protection under Linux. Disk backup Disk-level data protection is based on backing up either a disk or a volume file system as a whole, along with all information necessary for the operating system to boot; or all the disk sectors using the sector-by-sector approach (raw mode.
The configuration database that stores the list of registered machines and other configuration information, including backup policies created by the administrator. The synchronization database used for synchronization of the management server with registered machines and storage nodes. This is a database with rapidly changing operational data. The reporting database that stores the centralized log. This database may grow large. Its size depends on the logging level you set.
on a network share on a Storage Area Network (SAN) on a Network Attached Storage (NAS) on a tape library locally attached to the storage node. The management operations are as follows. Storage node-side cleanup and validation Archives, stored in unmanaged vaults, are maintained by the agents (p. 360) that create the archives.
1.3.4 Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for remote or local access to Acronis Backup & Recovery 10 agents, and in the product editions that include the centralized management capability, to the Acronis Backup & Recovery 10 Management Server. The console has two distributions for installation on Windows and installation on Linux.
JFS - particular files cannot be recovered from disk backups located on Acronis Backup & Recovery 10 Storage Node Linux SWAP Acronis Backup & Recovery 10 can back up and recover corrupted or non-supported file systems using the sector-by-sector approach. 1.
Acronis Backup & Recovery 10 Agent for Linux Linux with kernel 2.4.20 or later (including 2.6.x kernels) and glibc 2.3.2 or later Various Linux distributions, including: Red Hat Enterprise Linux 4 and 5 CentOS 4 and 5 Fedora 9 and 10 Ubuntu 8.10 (Intrepid Ibex) and 9.04 (Jaunty Jackalope) Debian 4 (Lenny) and 5 (Etch) SUSE Linux Enterprise Server 10 openSUSE Asianux x64 versions of the above Linux distributions and other Linux distributions are also supported.
Storage Node 100 MB 150 MB 150 MB When using a tape library, space required for tapes database: approx.
More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.eu/enterprise/support/ Copyright © Acronis, Inc.
2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1 Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-bysector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2 User privileges on a managed machine Windows When managing a machine running Windows, the scope of a user's management rights depends on the user's privileges on the machine.
View and manage backup plans and tasks owned by any user on the machine. Linux When managing a machine running Linux, the user has or obtains the root privileges, and so can: Back up and recover any data or the entire machine, having full control over all Acronis Backup & Recovery 10 agent operations and log files on the machine. Manage local backup plans and tasks owned by any user registered in the operating system.
You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run under the credentials with which you are currently logged on. Any person that has administrative privileges on the machine can also start the task. The task will run under this person's credentials. The task will always run under the same credentials, regardless of the user who actually starts the task, if you specify the task credentials explicitly. To do so, on the plan (task) creation page: 1.
Example: An Internet cafe, school or university lab where the administrator often undoes changes made by the students or guests but rarely updates the reference backup (in fact, after installing software updates only). The backup time is not crucial in this case and the recovery time will be minimal when recovering the systems from the full backup. The administrator can have several copies of the full backup for additional reliability.
2.5 GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme in Acronis Backup & Recovery 10. With this backup scheme you are not allowed to back up more often than once a day. The scheme enables you to mark out the daily, weekly and monthly cycles in your daily backup schedule and set the retention periods for the daily, monthly and weekly backups.
created on this day of the week will be considered as a monthly backup. Backups created on the other days will be considered as daily backups. Assume you select Friday for Weekly/Monthly backup. Here is the total schedule marked out according to the selection. “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M” stands for the backup that is considered Monthly. The schedule marked out according to the GFS scheme.
The resulting archive: ideal Assume you select to keep daily backups for 7 days, weekly backups for 2 weeks and monthly backups for 6 months. Here is how your archive would appear after the backup plan is launched if all the backups were full and so could be deleted as soon as the scheme requires. The left column shows days of the week. For each day of the week, the content of the archive after the regular backup and the subsequent cleanup is shown. “D” stands for the backup that is considered Daily.
When using the incremental and differential backup methods, you cannot delete a backup as soon as the scheme requires if later backups are based on this backup. Regular consolidation is unacceptable because it takes too much system resources. The program has to wait until the scheme requires the deletion of all the dependent backups and then deletes the entire chain. Here is how the first month of your backup plan will appear in real life. “F” stands for full backup. “Dif” stands for differential backup.
Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In the puzzle a series of rings are stacked in size order, the largest on the bottom, on one of three pegs. The goal is to move the ring series to the third peg. You are only allowed to move one ring at a time, and are prohibited from placing a larger ring above a smaller ring. The solution is to shift the first ring every other move (moves 1, 3, 5, 7, 9, 11...
incremental backups on first level (A) - to gain time and storage savings for the most frequent backup operations; but data recovery from such backups takes longer because it generally requires access to three backups full backups on the last level (E for five-level pattern) - the rarest backups in the scheme, take more time and occupy more space in storage differential backups on all intermediate levels (B, C and D for five-level pattern) an old backup on a level is kept until a new back
The retention rules are effective if the archive contains more than one backup. This means that the last backup in the archive will be kept, even if a retention rule violation is detected. Please do not try to delete the only backup you have by applying the retention rules before backup. This will not work. Use the alternative setting Clean up archive > When there is insufficient space while backing up (p. 206) if you accept the risk of losing the last backup. 1.
Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Example Delete backups older than = 3 Months Keep the archive size within = 200GB Never delete backups younger than = 10 Days Every time the retention rules are applied, the program will delete all backups created more than 3 months (or more exactly, 90 days) ago.
Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The resulting backup will not contain data that was present in the deleted backup and was absent from the retained incremental or differential backup. Backups resulting from consolidation always have maximum compression. This means that all backups in an archive may acquire the maximum compression as a result of repeated cleanup with consolidation.
Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to unallocated space of a disk group to unallocated space of a basic disk. Recovery over an existing volume When a dynamic volume is recovered over an existing volume, either basic or dynamic, the target volume’s data is overwritten with the backup content. The type of target volume (basic, simple/spanned, striped, mirrored, RAID 0+1, RAID 5) will not change.
Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing volumes during recovery You can resize the resulting basic volume, both MBR and GPT, during recovery, or change the volume's location on the disk. A resulting dynamic volume cannot be moved or resized. Preparing disk groups and volumes Before recovering dynamic volumes to bare metal you should create a disk group on the target hardware.
For detailed instructions on how to recover logical volumes, see Recovering MD devices and logical volumes (p. 259). You do not need to create the volume structure if it already exists on the machine (such is the case when some data on the volume was lost, but no hard disks were replaced). How to select logical volumes to back up Logical volumes appear at the end of the list of volumes available for backup. Basic volumes included in logical volumes are also shown in the list with None in the Type column.
2.10 Backing up RAID arrays (Linux) Acronis Backup & Recovery 10 Agent for Linux can back up and recover Linux Software RAID devices (known as multiple-disk devices or MD devices) and hardware RAID arrays. Software RAID arrays Software RAID arrays, or MD devices, combine several volumes and make solid block devices (/dev/md0, /dev/md1, ..., /dev/md31), information of which is stored in /etc/raidtab or in dedicated areas of those volumes.
Recovery Parameters of software RAID arrays are not backed up, so they can only be recovered over a basic volume, to unallocated space, or to a previously configured array. Recovery can be performed in Linux or a Linux-based bootable media. When started from bootable media, the bootable agent tries to access parameters of a software disk array and configure it. However, if the necessary information is lost, the array cannot be configured automatically.
a locally attached tape device (tape drive or tape library) by... Agent for Windows Agent for Linux Tape written on a tape device through... Backup Server Storage Node ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 ATIE 9.1 ATIE 9.5 ATIE 9.7 ABR10 + + + + + + + + + - + + + + + + + + + - + + + + + + + + + - + + + + + + + + + + + + + + 2.11.
5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis Universal Restore (p. 372) is proposed at every disk or volume recovery, even when recovering a Linux or non-system Windows volume. 6. Acronis Active Restore (p. 360) is not available when recovering from a tape. Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape containing the backup you need to recover.
With the new Acronis Secure Zone behavior, you obtain the ability to: list archives located in the zone and backups contained in each archive examine a backup's content mount a disk backup to copy files from the backup to a physical disk safely delete archives and backups from the archives. For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 155) section.
2.12.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis products, including images of systems prepared with Microsoft System Preparation Tool (Sysprep). The following is an example of using both tools on the same system.
If you do not enable the option, the system recovery will proceed in the usual way and the machine will become operational after the recovery is completed. If you enable the option, the sequence of actions will be set as follows. Once the system recovery is started, the operating system boots from the backup. The machine becomes operational and ready to provide necessary services.
If you try to log off, shut down or hibernate the machine using the Start Menu commands, the end of the current session will be automatically postponed until the recovery is completed. Should you decide to switch off the machine with the Power button though, all the changes made to the system since the last boot up would be lost, the system will not be recovered, not even partially, and the only possible solution in this case will be to start the recovery process anew, from a bootable media. 6.
Organizing a managed archive storage What should the capacity of your centralized vault be? What if transferring sizeable backups to the vault will cause network congestion? Does backup of an online production server affect the server performance? To ensure that the centralized backup will not slow down business processes in your company and to minimize the resources required for the data protection, you install Acronis Backup & Recovery 10 Storage Node (p.
You have to protect each server as a whole, the users' data on the workstations, and the virtual machines. You want to be able to track the health of the data protection, be sure that the backup archives do not store duplicated information and that the obsolete backups are deleted from the storage in a timely manner. These goals can be achieved by regular backup of the desired data items to a centralized vault with deduplication. Setting up the Acronis infrastructure 1.
Installation tips Both AMS and ASN can be installed on a workstation operating system as well. Multiple Acronis Backup & Recovery 10 components can be installed on a machine with a single installation procedure. In an Active Directory domain, you can deploy the components using the Group Policy. There can be multiple storage nodes on the network. Each of the nodes can manage up to 20 local or remote vaults.
2.13.2.2 Protecting the workstations Here is how to set up the most popular schedule: weekly full backup and daily incremental backup of users' default document folders. In addition, we will retain only backups from the last 7 days. 1. Create a policy that backs up [All Profiles Folder] to the managed vault on the storage node. This will back up the folder where user profiles are located (for example, C:\Documents and Settings in Windows XP). Choose the Custom backup scheme. a.
Advanced product editions other than Virtual Edition (Acronis Backup & Recovery 10 Advanced Server, Advanced Server SBS Edition and Advanced Workstation) allow using only the last of the above methods. 2.13.3 Grouping the registered machines As soon as a machine is registered (p. 371) on the management server, the machine appears in the All machines built-in group (p. 363). By applying a backup policy to this group, you protect all the registered machines.
Besides physical machines, you can group virtual machines (p. 305) hosted on registered virtualization servers. Virtual machines have their own grouping criteria depending on their properties. 2.13.3.4 Example The diagram below presents an example of group hierarchy.
The policy applied to the parent group (G2) will be applied to the child group (G3), but members of G3 are not considered as members of G2 and so its dynamic nature is considered intact. In real life, the administrator would most likely prefer to protect the manager's machine by applying the policy directly to the machine, without including it in any group, so this case is just an illustration of nesting different types of groups. With multiple group members, nesting of the groups comes in handy. 2.13.3.
Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks is created on each machine according to the configuration provided by the policy. Revoking a policy is the reverse action to the aggregate of applying and deploying. Revoking removes the correspondence between the policy and one or more machines and then removes the tasks from the machines.
1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the second application of the same policy, but the server remembers that the policy has been applied twice. 2. A policy, revoked from the group, remains on the machine. 3. A policy, revoked from the machine, remains on the group and therefore on the machine. 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.13.4.
2.13.4.3 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group besides the All machines group. Let's start from this simplified approach. In the diagram below, the container stands for a group; the two-color circle stands for a machine with two applied policies; the three-color circle stands for a machine with three applied policies and so on. 64 Copyright © Acronis, Inc.
Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is G1's child. The "green" policy, applied to the All machines group, is inherited by all machines. The "orange" policy, applied to G1, is inherited by the G1 members and all its child groups, both immediate and indirect. The "blue" policy, applied to G2, is inherited only by the G2 members since G2 does not have child groups. The "violet" policy is applied straight to machine #4.
#5 or #6 "green" Inherited All machines -> #5 or #6 "orange" Inherited G1 -> G2 -> #5 or #6 "blue" Inherited G2 -> #5 or #6 2.13.5 Backup policy's state and statuses Centralized management presumes that the administrator can monitor the health of the entire product infrastructure using a few easily understandable parameters. The state and status of a backup policy are included in such parameters.
Backup policy state diagram 2.13.5.2 Policy status on a machine To see this parameter, select any group of machines in the tree, then select the machine, and then select the Backup policies tab on the Information pane. In each of the states, the backup policy can have one of the following statuses: Error; Warning; OK. While the policy is in the Deployed state, its status reflects how successfully the policy is executed.
/dev/sda1 volume (since the [System] volume is not found). The policy will get the Error status on Linux machines that do not have a SCSI device. The following table provides details.
2.13.5.5 Cumulative state and status of a policy In addition to the deployment state and status as related to a specific machine or group, the backup policy has a cumulative deployment state and a cumulative status. The cumulative state of a backup policy To see this parameter, select Backup policies in the tree. The Deployment state column displays the cumulative deployment state for each policy.
Performed in the vault after a backup is completed. The storage node analyses the vault's archives and deduplicates data in the vault. When creating a backup plan, you have the option to turn off deduplication at source for that plan. This may lead to faster backups but a greater load on the network and storage node. Deduplicating vault A managed centralized vault where deduplication is enabled is called a deduplicating vault.
1. It moves the items (disk blocks or files) from the archives to a special folder within the vault, storing duplicate items there only once. This folder is called the deduplication data store. Items that cannot be deduplicated remain in the archives. 2. In the archives, it replaces the moved items with the corresponding references to them. As a result, the vault contains a number of unique, deduplicated items, with each item having one or more references to it from the vault's archives.
Indexing of a backup requires that the vault have free space with a minimum size of 1.1 multiplied by the size of the archive the backup belongs to. If there is not enough free space in the vault, the indexing task will fail and start again after 5–10 minutes, on the assumption that some space has been freed up as a result of cleanup or of other indexing tasks. The more free space there is in the vault, the faster your archives will reduce to the minimum possible size.
If the volume is a compressed volume If the volume's allocation unit size—also known as cluster size or block size—is not divisible by 4 KB Tip: The allocation unit size on most NTFS and ext3 volumes is 4 KB and so allows for block-level deduplication. Other examples of allocation unit sizes allowing for block-level deduplication include 8 KB, 16 KB, and 64 KB.
Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Console on one machine and Acronis Backup & Recovery 10 Agent on another machine. You might need to specify logon credentials to establish a remote connection. To establish a remote connection 1. On the toolbar, click Connect, then point to New connection, and then click Manage a remote machine. 2.
2.13.7.3 Privileges for remote connection in Windows To establish a remote connection to a machine running Windows, the user must be a member of the Acronis Remote Users security group on that machine. After remote connection is established, the user has management rights on the remote machine as described in User rights on a managed machine (p. 30).
2. Add the names of the non-root users, whom you want to allow to connect to the machine remotely, to the Acronis_Trusted group. For example, to add the existing user user_a to the group, run the following command: usermod -G Acronis_Trusted user_a 3. Create the file /etc/pam.d/Acronisagent-trusted with the following content: #%PAM-1.0 auth required auth required account required pam_unix.so pam_succeed_if.so user ingroup Acronis_Trusted pam_unix.
Acronis Backup & Recovery 10 Management Server When Acronis Backup & Recovery 10 Management Server is being installed on a machine, two groups are created (or updated): Acronis Centralized Admins A user who is a member of this group is a management server administrator.
2.13.7.7 User privileges on a storage node The scope of a user's privileges on Acronis Backup & Recovery 10 Storage Node depends on the user's rights on the machine where the storage node is installed.
2.13.7.8 Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Backup & Recovery 10 Management Server, and Acronis Backup & Recovery 10 Storage Node components run as services. When installing any of these components, you need to specify the account under which the component's service will run. For each service, you can either create a dedicated user account (recommended in most cases) or specify an existing account of a local or domain user—for example: .
This section also provides information on configuring communication settings, selecting a network port for communication, and managing security certificates. 2.13.8.1 Secure communication Acronis Backup & Recovery 10 provides the capability to secure the data transferred between its components within a local area network and through a perimeter network (also known as demilitarized zone, DMZ).
Acronis Backup & Recovery 10 Bootable Agent 2.13.8.3 Yes Yes Configuring communication settings You can configure communication settings, such as whether to encrypt transferred data, for Acronis Backup & Recovery 10 components installed on one or more machines, by using Acronis Administrative Template. For information on how to load the Administrative Template, see How to load Acronis Administrative Template (p. 324).
Client Encryption options Specifies whether to encrypt the transferred data when the component acts as a client application, and whether to trust self-signed SSL certificates. Select one of the following: Not configured The component will use the default settings, which is to use encryption if possible and to trust self-signed SSL certificates (see the following option). Enabled Encryption is enabled.
The component will use the default setting, which is to use encryption if possible (see the following option). Enabled Encryption is enabled. In Encryption, select one of the following: Enabled Data transfer will be encrypted if encryption is enabled on the client application, otherwise it will be unencrypted. Disabled Encryption is disabled; any connection to a client application which requires encryption will not be established.
Linux Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the Acronis_agent daemon. Configuring the port in a bootable environment While creating Acronis bootable media, you have the option to pre-configure the network port that will be used by the Acronis Backup & Recovery 10 Bootable Agent.
Tip: Alternatively, you can manage the list of certificates of a remote machine. To do this, click Another computer and then type the remote machine's name. 7. Click Close to close the Add Standalone Snap-in dialog box, and then click OK to close the Add/Remove Snap-in dialog box.
3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1 Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.
The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3 Time-based alerts Last backup This option is effective when the console is connected to a managed machine (p. 369) or to the management server (p. 370). The option defines whether to alert if no backup was performed on a given machine for a period of time.
The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items. To make a selection, choose the font from the respective combo-box and set the font's properties. You can preview the font's appearance by clicking the button to the right. 3.
3.2.3 Event tracing You can configure the management server to log events in the Application Event Log of Windows, besides the management server's own log. You can configure the management server to send Simple Network Management Protocol (SNMP) objects to a specified SNMP manager. 3.2.3.1 Windows event log This option defines whether the management server has to record its own log events in the Application Event Log of Windows (to see this log, run eventvwr.
3.2.4 Domain access credentials This option determines the user name and password that the management server will use to access the domain. The preset is: No credentials The management server needs domain access credentials when working with a dynamic group that is based on the Organizational unit criterion (p. 302). When you are creating such group and no credentials are given by this option, the program will ask you for credentials and save them in this option.
3.2.6.1 VMware vCenter integration This option defines whether to show virtual machines managed by a VMware vCenter Server in the management server and show the backup status of these machines in the vCenter. Integration is available in all Acronis Backup & Recovery 10 advanced editions; a license for Virtual Edition is not required. No software installation is required on the vCenter Server.
To access the machine options, connect the console to the managed machine and then select Options > Machine options from the top menu. 3.3.1 Machine management This option defines whether the machine has to be managed centrally by the Acronis Backup & Recovery 10 Management Server. To be able to use this option, you must be logged on as a member of the Administrators group on the machine.
This option defines whether the agent(s) operating on the managed machine have to log events in the Application Event Log of Windows (to see this log, run eventvwr.exe or select Control Panel > Administrative tools > Event Viewer). You can filter the events to be logged. You can override the settings set here, exclusively for the events that occur during backup or during recovery, in the Default backup and recovery options (p. 95).
Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only. Server name/IP – type the name or IP address of the host running the SNMP management application, the messages will be sent to. Community – type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong. The typical community is "public". To disable sending SNMP messages, clear the Send messages to SNMP server check box.
3.3.4 Customer Experience Program This option defines whether the machine will participate in the Acronis Customer Experience Program (ACEP). If you choose Yes, I want to participate in the ACEP, information about the hardware configuration, the most and least used features and about any problems will be automatically collected from the machine and sent to Acronis on a regular basis.
Source files exclusion (p. 98) + + + + + + Pre/Post backup commands (p. 99) + + + + PE only PE only Pre/Post data capture commands (p. 100) + + + + - - Multi-volume snapshot (p. 102) + + - - - - File-level backup snapshot (p. 102) - + - + - - Use VSS (p. 103) + + - - - - Compression level (p. 103) + + + + + + + + + + - - HDD writing speed (p. 104) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p.
Overwrite data on a tape without prompting user for confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dest: Tape Dismount media after backup is finished Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Dest: removable media Validate backup after creation - - - - + + Reset archive
used for verification purposes. With this two-level security, the backup data is protected from any unauthorized access, but recovering a lost password is not possible. 3.4.1.2 Source files exclusion This option is effective for Windows and Linux operating systems and bootable media. This option is effective for disk-level backup of NTFS and FAT file systems only. This option is effective for file-level backup of all supported file systems.
3.4.1.3 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the backup procedure. The following scheme illustrates when pre/post commands are executed.
command is executed despite successfully execution failure executed. Fail the or success. task if the command execution fails. execution and irrespective of the command execution result. Post-backup command To specify a command/executable file to be executed after the backup is completed 1. In the Command field, type a command or browse to a batch file. 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3.
Click Edit to specify a new command or a batch file Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture command To specify a command/batch file to be executed before data capture 1. In the Command field, type a command or browse to a batch file. The program does not support interactive commands, i.e. commands that require user input (for example, "pause".) 2.
complete Result Preset N/A Continue the backup after the Continue the backup command is only after the executed despite command is command successfully execution failure executed. Delete the or success. TIB file and temporary files and fail the task if the command execution fails. 3.4.1.5 Continue the backup concurrently with the command execution and irrespective of the command execution result.
When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously. Use this option to create a time-consistent backup of data spanned across multiple volumes, for instance for an Oracle database. When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a result, if the data spans across several volumes, the resulting backup may be not consistent. 3.4.1.
compressed files, such as .jpg, .pdf or .mp3. However, formats such as .doc or .xls will be compressed well. To specify the compression level Select one of the following: None – the data will be copied as is, without any compression. The resulting backup size will be maximal. Normal – recommended in most cases. High – the resulting backup size will typically be less than for the Normal level. Maximum – the data will be compressed as much as possible. The backup duration will be maximal.
Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating system and applications because of the large amounts of data that needs to be written to the disk. You can limit the hard disk usage by the backup process to the desired level. The preset is: Maximum.
2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can enter several addresses separated by semicolons. 3. Under Send notifications, select the appropriate check boxes as follows: When backup completes successfully – to send a notification when the backup task has completed successfully When backup fails – to send a notification when the backup task has failed The When user interaction is required check box is always selected. 4.
2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported.
Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying the type of event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup & Recovery 10 in its log). The preset is: Use the setting set in the Machine options.
Automatic With this setting, Acronis Backup & Recovery 10 will act as follows. When backing up to a hard disk: A single backup file will be created if the destination disk's file system allows the estimated file size. The backup will automatically be split into several files if the destination disk's file system does not allow the estimated file size. Such might be the case when the backup is placed on FAT16 and FAT32 file systems that have a 4GB file size limit.
To completely eliminate this kind of problem, disable preserving file security settings in archives. The recovered files and folders will always inherit the permissions from the folder to which they are recovered or from the disk, if recovered to the root. Alternatively, you can disable recovery (p. 120) of the security settings, even if they are available in the archive. The result will be the same - the files will inherit the permissions from the parent folder.
When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can set the time interval and the number of attempts. The attempts will be stopped as soon as the operation succeeds OR the specified number of attempts is performed, depending on which comes first. For example, if the backup destination on the network becomes unavailable or not reachable, the program will attempt to reach the destination every 30 seconds, but no more than 5 times.
You might have to provide the access credentials for the secondary destination. Enter the credentials on prompt. 3.4.1.18 Task start conditions This option is effective in Windows and Linux operating systems. This option is not available when operating under bootable media. This option determines the program behavior in case a backup task is about to start (the scheduled time comes or the event specified in the schedule occurs), but the condition (or any of multiple conditions) is not met.
Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up data strictly at the specified time. Then it makes sense to skip the backup rather than wait for the conditions, especially if the events occur relatively often. 3.4.1.19 Task failure handling This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media.
Separate tape set is a tape set which contains only backups of the specific protected data. Other backups cannot be written to a separate tape set. (For the backup policy/plan to be created) Use a separate tape set The preset is: Disabled. If you leave this option unchanged, then the backups, belonging to the policy or plan being created, might be written onto tapes containing backups written by different backup policies and comprising of data from different machines.
3.4.1.21 Additional settings Specify the additional settings for the backup operation by selecting or clearing the following check boxes. Overwrite data on a tape without prompting for user confirmation This option is effective only when backing up to a tape device. The preset is: Disabled. When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To disable this warning, select this check box.
Restart the machine automatically after backup is finished This option is available only when operating under bootable media. The preset is: Disabled. When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the machine boots from a hard disk drive by default and you select this check box, the machine will be restarted and the operating system will start as soon as the bootable agent has finished creating the backup.
3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a recovery task, you can either use a default option, or override the default option with the custom value that will be specific for this task only. You can also customize a default option itself by changing its value against the pre-defined one.
Check file system after recovery + - + - + - Reboot machine automatically if it is required for recovery + + + + - - Windows recovery - Windows recovery - Windows recovery - E-mail (p. 120) + + + + - - Win Pop-up (p. 121) + + + + - - Windows events log (p. 122) + + - - - - SNMP (p. 122) + + + + - - Change SID after recovery Notifications: Event tracing: 3.4.2.
4. Depending on the result you want to obtain, select the appropriate options as described in the table below. 5. Click Test command to check if the command is correct. Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not recover until the command execution is complete Selected Selected Cleared Cleared N/A Perform the recovery concurrently with the command execution and irrespective of the command execution result.
To specify the recovery process priority Select one of the following: Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine Normal – to run the recovery process with normal speed, allocating resources on a par with other processes High – to maximize the recovery process speed by taking resources from the other processes. 3.4.2.
Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types are available for selection. Some Internet service providers require authentication on the incoming mail server before being allowed to send something. If this is your case, select the Log on to incoming mail server check box to enable a POP server and to set up its settings: Incoming mail server (POP) – enter the name of the POP server. Port – set the port of the POP server.
Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootable media. This option defines whether the agent(s) operating on the managed machine have to log events of the recovery operations in the Application Event Log of Windows (to see this log, run eventvwr.exe or select Control Panel > Administrative tools > Event Viewer). You can filter the events to be logged. The preset is: Use the setting set in the Machine options.
Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Errors only. Server name/IP – type the name or IP address of the host running the SNMP management application, the messages will be sent to. Community – type the name of SNMP community to which both the host running SNMP management application and the sending machine belong. The typical community is "public". Click Send test message to check if the settings are correct.
This option defines whether to validate a backup to ensure that the backup is not corrupted, before data is recovered from it. Check file system after recovery This option is effective only when recovering disks or volumes. When operating under bootable media, this option is not effective for the NTFS file system. The preset is Disabled. This option defines whether to check the integrity of the file system after a disk or volume recovery.
4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vaults tree. Click this item to display groups of centralized and personal vaults. Centralized. This group is available when the console is connected to a managed machine or to a management server. Expand this group to display a list of centralized vaults added by the management server administrator. Click any centralized vault in the vaults tree to open the detailed view of this vault (p.
To learn more about privileges depending on the user rights, see the User privileges on a storage node (p. 78) section. Unmanaged vaults An unmanaged vault is a centralized vault that is not managed by a storage node. To access an unmanaged vault, a user has to have access privileges for the location from the network. Any user that has permission to read/write files in an unmanaged vault can: back up data to the unmanaged vault recover data from any backup located in the unmanaged vault.
Operations with backups (p. 159) Filtering and sorting archives (p. 160) Bars of the "Actions and tools" pane [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates actions of the vault's toolbar. [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicates actions of the archives toolbar. [Backup Name] The Actions bar is available when you expand the archive and click on any of its backups.
another storage node. Explore an unmanaged vault 1. Select the unmanaged vault. Explore. 2. Click The vault will be available for examination with the standard file manager program. Attach the managed vault that was deleted without removing its content. Click Change user credentials for accessing a vault Click Change user. Refresh a vault's information Click Attach. The procedure of attaching a managed vault to a storage node is described in-depth in the Attaching a managed vault (p. 132) section.
Specify a local folder on the storage server to create a vault-specific database. This database will store the metadata required for cataloguing the archives and performing deduplication. Deduplication [Optional] Select whether to enable archive deduplication in the vault. Deduplication minimizes storage space taken by the archives and backup traffic. It reduces the size of archives in the vault by eliminating redundant data such as duplicate files or disk blocks.
The folder size may become large—one estimate is 200 GB per 8 TB of used space, or about 2.5 percent. The folder permissions must allow the user account under which the storage node's service is running (by default, ASN User) to write to the folder. When assigning permissions, specify the user account explicitly (not just Everyone).
Specify where the vault will be created. After you have performed all the required steps, click OK to commit creating the unmanaged centralized vault. Vault path To specify the path where the unmanaged vault will be created 1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree. Unmanaged vaults can be organized: on a network share on a Storage Area Network (SAN) on a Network Attached Storage (NAS) on FTP and SFTP servers.
4.1.3 Tape libraries This section describes in detail how to use robotic tape devices as vaults for storing backup archives. A tape library (robotic library) is a high-capacity storage device that contains the following: one or more tape drives barcode readers (optional). multiple (up to several thousand) slots to hold tape cartridges one or more loaders (robotic mechanisms) intended for relocating the tape cartridges between the slots and the tape drives 4.1.3.
one or more loaders (robotic mechanisms) intended for relocating the tape cartridges between the slots and the tape drives barcode readers (optional). Each tape may have a special label attached to the side of a cartridge and comprise of: a barcode to scan by a special reader that is usually mounted on a loader a readable barcode digital value. Such labels are used for tape identification in a tape library or especially in off-site storage.
Through RSM an application can get its own pools with proper names, move media from the Free pool into its own pools, use its own pools’ media for correct purpose, return media to the Free pool, etc. Acronis Backup & Recovery 10 Storage Node manages the tapes belonging to the Acronis pool. If you fill tape library slots with unused tapes, all the tapes will be included into the Free pool automatically.
1. Click Control Panel > Programs > Programs and Features > Turn Windows features on or off. 2. Select the Removable Storage Management check box. Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted, you can define the tape label for identification purposes later.
At the Delete operation, the vault content will be deleted from the storage node database without accessing the tapes. The plans and tasks that use this vault will fail. The backup archives, belonging to a deleting centralized vault on a tape library, will be deleted as well, but these archives might be recovered by any storage node through the Rescan operation.
Keep in mind that a data recovery operation may require access to a number of tapes. For example, data recovery from an incremental backup commonly might require loading, mounting, rewinding and reading of the following tapes containing the data backups: tapes storing the incremental backup selected to recover the data tapes containing all incremental backups created after the last full or differential backups before the selected incremental one if necessary.
Rescan As stated above the storage node keeps information about tapes and their contents in a dedicated database. The Rescan task reads information about the content of user-selected tapes and updates the database. The task can take a long-time so it is only initiated manually. You should select each slot with a tape you want to rescan before the task launch.
4.1.3.7 Tape support These options are effective when the backup destination is a managed vault located on a tape library. Tape support options enable you to specify how the backup tasks will distribute backups among the tapes. Some combinations of tape options might degrade usage efficiency of both the whole tape library and each tape. If you are not forced to modify these options by some specific needs, leave them unchanged. An archive can occupy several tapes.
When this option is enabled, each full backup will be written onto a free tape. The tape will be loaded to a drive especially for this operation. If the Use a separate tape set option is enabled, only incremental and differential backups of the same data will be appended to the tape. For each differential backup The preset is: Disabled. When this option is enabled, each differential backup will be written onto a free tape.
The Custom backup scheme enables you to specify a backup schedule and retention rules to define a desired tape rotation. Use this scheme, when the Grandfather-Father-Son and the Tower of Hanoi schemes’ usage is not enough. For example, if the full size of protected data is considerably less than the size of a tape, the best choice is to use the Custom backup scheme with regular daily/weekly/monthly full backups, some simple retention rules, and tape options by default.
. Using the Grandfather-Father-Son tape rotation scheme Tape rotation for the GFS backup scheme is substantially defined by the tape options specified for the backup policy/plan to be created. Assume the GFS settings are the following: Start backup at: 11:00:00 PM Back up on: Workdays Weekly/Monthly: Friday Keep backups: Daily: 2 weeks; Weekly: 2 months; Monthly: 1 year. The main goal is to achieve full automation of tape rotation for these settings.
For each incremental backup option is cleared. The backup is drawn as a green rectangle in the figure. The next three incremental backups are written onto tape 01 on 5th, 6th and 7th of January. As a result the free space on the tape is only 16 Gb at the moment. On 8th of January the data differential backup (40 Gb) is recorded onto the same tape 01, as the Always use a free tape: For each differential backup option is cleared.
Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year for the GFS backup scheme in combination with the specified tape options. A number in the green rectangle marks an incremental backup created on Monday of the corresponding week of the year. Tape usage during the first year The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year.
The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and 24 on Friday of the 52nd week. As all backups of tape 01 have been deleted, the tape is considered as free and can be reused. Further analysis of the example proves that the maximal number of tapes required to store the data backups is 25 tapes. This maximum occurs on the 16th week of the following year.
If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups displayed in the next figure. Copyright © Acronis, Inc.
This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GFS Example 1. The advantages of the GFS Example 2 tape rotation scheme for the analyzed case are the following: it uses 16 tapes instead of 25 a data recovery task requires one (25%) or two (75%) tapes data recovery from a full backup requires only one tape that makes the data recovery from an incremental or differential backup faster.
The main drawback is the large number of required tapes that is used 5-10%. If we have to keep a daily backup for a week (4 backups) and a weekly backup for a month (4 backups), the total number of required tapes will be equal to 4+4+13+1 = 22. Using the Tower of Hanoi tape rotation scheme The ToH scheme requires fewer tapes for rotation as compared with the GFS scheme. So the ToH scheme is the best choice for small tape libraries, especially for autoloaders.
the Use a separate tape set option is selected the Always use a free tape: For each full backup option is cleared the Always use a free tape: For each incremental backup option is cleared the Always use a free tape: For each differential backup option is cleared. The figure below shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options. The recurring part of the scheme contains sixteen backup sessions.
the Use a separate tape set option is selected the Always use a free tape: For each full backup option is selected the Always use a free tape: For each incremental backup option is cleared the Always use a free tape: For each differential backup option is cleared. The only difference between ToH Example 2 and ToH Example 1 is that the Always use a free tape: For each full backup option is selected.
the Always use a free tape: For each full backup option is selected the Always use a free tape: For each incremental backup option is selected the Always use a free tape: For each differential backup option is selected. The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the rotation is seven that is more than in classical five-level ToH scheme. Two additional tapes used for: 1.
compression level specified for backing up the data tape rotation scheme ( frequency of backups, retention rules) tape-append options requirements to support off-site tape cartridge archives. There is no common formula to calculate a number of tapes required in all possible combinations of above listed considerations. But the general way to get a number of tapes for a case includes the following steps: 1. 2. 3. 4.
compression level provides CL average reduction coefficient selected tape rotation scheme is Custom with the following settings: differential backup - every 2 days incremental backup - every 1 day, every 6 hours retention rules: delete backups older than 5 days tape options are the following: full backup - every 10 days the Use a separate tape set option is selected the Always use a free tape: For each full backup option is selected the Always use a free tape: For each increme
node cannot be read by an agent in a locally attached tape device. However the storage node can read tapes written by an agent. Please refer to the tape compatibility table (p. 47) to get comprehensive information about the compatibility of tape formats in Acronis Backup & Recovery 10.
Vault toolbar The toolbar contains operational buttons that let you perform operations with the selected personal vault. See the Actions on personal vaults (p. 156) section for details. Pie chart with legend The pie chart lets you estimate the vault's load: it shows the proportion of the vault's free space and occupied space. - free space: space on the storage device, where the vault is located.
The following is a guideline for you to perform operations with personal vaults. To Do Create a personal vault Click Create. The procedure of creating personal vaults is described in-depth in the Creating a personal vault (p. 157) section. Edit a vault 1. Select the vault. Edit. 2. Click The Edit personal vault page lets you edit the vault's name and information in the Comments field. Change user account for accessing a vault Click Change user.
4.2.2.2 Merging and moving personal vaults What if I need to move the existing vault from a one place to another? Proceed as follows 1. Make sure that none of the backup plans uses the existing vault while moving files, or temporarily disable (p. 187) schedules of the given plans. 2. Move the vault folder with all its archives to a new place manually by means of a third-party file manager. 3. Create a new vault. 4. Edit the backup plans and tasks: redirect their destination to the new vault. 5.
or multiple archives 2. Click Delete. The program duplicates your selection in the Backups deletion (p. 160) window that has check boxes for each archive and each backup. Review the selection and correct if need be (select the check boxes for the desired archives), then confirm the deletion. Delete all archives in the Please be aware that if filters have been applied to the vaults list, you see only a part vault of the vault content.
if need be (select the check boxes for the desired backups), then confirm the deletion. Delete all archives and backups in the vault Please be aware that if filters have been applied to the vaults list, you see only a part of the vault content. Be sure that the vault does not contain archives you need to retain before starting the operation. Delete all. Click The program duplicates your selection in the Backups deletion (p. 160) window that has check boxes for each archive and each backup.
To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden. Copyright © Acronis, Inc.
5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not met is defined by the Task start conditions (p. 112) backup option. What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not completed? The event will be ignored. What if an event occurs while the scheduler is waiting for the condition required by the previous event? The event will be ignored.
1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6PM. If you have created the task after 6 PM, the task will be started for the first time on the next day at 6 PM. To: not set. The task will be performed for an indefinite number of days. "Three-hour time interval lasting for three months" schedule Run the task every three hours.
From: 09/20/2009. To: not set. Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. 5.2 Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a weekly schedule In the Schedule area, select the appropriate parameter as follows: Every: <...> week(s) on: <...> Specify a certain number of weeks and the days of the week you want the task to be run.
3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still be available in the Tasks view after this date. (If this date were not a Friday, the task would be last performed on the last Friday preceding this date.) This schedule is widely used when creating a custom backup scheme.
From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM. 3. Effective: From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: From: not set. To: not set. 5.3 Monthly schedule Monthly schedule is effective in Windows and Linux operating systems.
Advanced scheduling settings (p. 171) are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area. All the settings you made are displayed in the Result field at the bottom of the window. Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every month. The schedule's parameters are set up as follows. 1. 2. 3. 4. Months: . Days: Last.
During northern summer, the task runs every first and fifteenth of every month at 10 PM. Thus, the following three schedules are added to the task. First schedule 1. 2. 3. 4. Months: December, January, February. On: Once at: 10:00:00 PM. Effective: From: 11/01/2009. To: not set. Second schedule 1. Months: March, April, May, September, October, November. 2. On: . 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Effective: From: 11/01/2009.
Specifies the event type: Error, Warning, Information, Audit success, or Audit failure. Event ID Specifies the event number, which typically identifies the particular kind of events among events from the same source. For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block on a disk, whereas an Error event with Event source disk and Event ID 15 occurs when a disk is not ready for access yet.
2. In the Computer Management console, expand System Tools, and then expand Event Viewer. 3. In Event Viewer, click the name of a log that you want to view—for example, Application. Note: To be able to open the security log (Security), you must be a member of the Administrators group. To view properties of an event, including the event source and event number 1. In Event Viewer, click the name of a log that you want to view—for example, Application.
Run the task: Daily Once at: 09:00:00 AM Distribute start time within the time window Maximum delay: 1 Hour(s) Distribution method: Random Then the task's start time on each machine may be any time between 09:00:00 AM and 09:59:59 AM—for instance: First machine: Every day at 09:30:03 AM Second machine: Every day at 09:00:00 AM Third machine: Every day at 09:59:59 AM Example 2 Suppose that you are deploying a backup policy with the following schedule to three machines: Run the task: Daily Every: 2 Hour(s) Fr
task anyway. With this setting, the program will automatically handle the situation when the conditions are not met for too long and further delaying the backup is undesirable. backup task start time matters - skip the backup task if the conditions are not met at the time when the task should be started. Skipping the task run makes sense when you need to back up data strictly at the specified time, especially if the events are relatively often.
Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location's host is not available at that moment (for instance, due to maintenance work), skip the backup and wait for the next workday to start the task. It is assumed that the backup task should not be started at all rather than failed. Event: Weekly, Every 1 week(s) on ; Once at 09:00:00 PM. Condition: Location's host is available Task start conditions: Skip the task execution.
In this case, whether and when the task will run depends on the task start conditions: If the task start conditions are Skip the task execution, the task will never run. If the task start conditions are Wait until the conditions are met and the Run the task anyway after check box is cleared, the task (scheduled to run at 3:00 PM) will start at 6:00 PM—the time when the condition is met.
(2) if the machine is restarted after 12 hours have passed since the completion of the latest successful backup, the backup task will start immediately. (3) if the machine is never restarted, the task will never start. You can start the backup manually, if need be, in the Backup plans and tasks view. 176 Copyright © Acronis, Inc.
6 Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1 Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.
working. Please make sure you have a valid license on Acronis License Server. Trial version of product expires in X day(s) Connect Once the trial version of the product is installed, the program starts the countdown of days remaining until the trial period expires. Connect 15 day trial period has expired. Enter a full license key.
Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on this date. Information Highlight the date in green if only "Information" log entries appeared on this date (normal activity.) The Select current date link focuses selection to the current date. System view Shows summarized statistics of backup plans, tasks, and brief information on the last backup. Click the items in this section to obtain the relevant information.
Use the Information panel to review detailed information on the selected plan (task). The panel chevron. The content of the panel is is collapsed by default. To expand the panel, click the also duplicated in the Plan details (p. 189) and Task details (p. 187) windows respectively. 6.1.2.1 Understanding states and statuses Backup plan execution states A backup plan can be in one of the following execution states: Idle; Waiting; Running; Stopping; Need Interaction.
Otherwise, see 2 following: Remove the reason of the failure -> [optionally] Start the failed task manually Edit the local plan to prevent its future failure in case a local plan has failed Edit the backup policy on the management server in case a centralized plan has failed When creating a backup plan or policy the administrator can turn on the option to stop executing the backup plan as soon as the backup plan gets the Error status.
The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state. A waiting task can also be stopped. In this case, since the task is not running, "stop" means removing it from the queue . Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A task status is derived from the result of the last run of the task.
6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you to perform operations with backup plans and tasks. To Do Create a new backup plan, or a task Click New, then select one of the following: Backup plan (p. 192) Recovery task (p. 211) Validation task (p. 230) View details of a plan/task Backup plan View details. Click In the Plan Details (p. 189) window, review the plan details. Task View details. Click In the Task Details (p.
Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task over again.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 192), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1. It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2. If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. The backup plan has a centralized origin.
Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu. The menu items that are ticked off correspond to the column headers presented in the table. 2. Click the items you want to be displayed/hidden.
Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing VM) Recovery of a virtual machine backup to an existing virtual machine Recovery (new VM) Recovery of a virtual machine backup to a new virtual machine Validat
Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates in four tabs all the information on the selected backup plan. The respective message will appear at the top of the tabs, if one of the plan's tasks requires user interaction. It contains a brief description of the problem and action buttons that let you select the appropriate action or stop the plan.
6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the machine, or actions a user takes on the machine using the program. For instance, when a user edits a task, the respective entry is added to the log. When the program executes a task, it adds multiple entries. With the log, you can examine operations, results of tasks' execution including reasons for failure, if any. Way of working with log entries Use filters to display the desired log entries.
Save the selected log entries to a file 1. Select a single log entry or multiple log entries. Save Selected to File. 2. Click 3. In the opened window, specify a path and a name for the file. Save all the log entries to a file 1. Make sure, that the filters are not set. Save All to File. 2. Click 3. In the opened window, specify a path and a name for the file. Save all the filtered log entries to a file 1. Set filters to get a list of the log entries that satisfy the filtering criteria.
6.1.3.3 Log entry details Displays detailed information on the log entry you have selected and lets you copy the details to the clipboard. To copy the details, click the Copy to clipboard button. Log entry data fields A local log entry contains the following data fields: Type - type of event (Error; Warning; Information) Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem.
[Optional] Type a description of the backup plan. To access this option, select the Advanced view check box. What to backup Source type (p. 195) Select the type of data to back up. The type of data depends on the agents installed on the machine. Items to backup (p. 195) Specify the data items to back up. A list of items to backup depends on the data type, specified previously. Access credentials (p.
After any of the settings is changed against the default value, a new line that displays the newly set value appears. The setting status changes from Default to Custom. Should you modify the setting again, the line will display the new value unless the new value is the default one. When the default value is set, the line disappears and so you always see only the settings that differ from the default values in this section of the Create backup plan page.
To specify credentials 1. Select one of the following: Run under the current user The tasks will run under the credentials with which the user who starts the tasks is logged on. If any of the tasks has to run on schedule, you will be asked for the current user's password on completing the plan creation. Use the following credentials The tasks will always run under the credentials you specify, whether started manually or executed on schedule. Specify: User name.
6.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks and/or volumes to back up. You can select a random set of disks and volumes. If your operating system and its loader reside on different volumes, always include both volumes in the backup. The volumes must also be recovered together; otherwise there is a high risk that the operating system will not start. 2.
6.2.5 Access credentials for source Specify the credentials required for access to the data you are going to backup. To specify credentials 1. Select one of the following: Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section. Use the following credentials The program will access the source data using the credentials you specify.
Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file named test.log located in the folder C:\Finance Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. 6.2.7 Archive Specify where the archive will be stored and the name of the archive. 1.
3. Naming the new archive Once you select the archive destination, the program generates a name for the new archive and displays it in the Name field. The name commonly looks like Archive(1). The generated name is unique within the selected location. If you are satisfied with the automatically generated name, click OK. Otherwise enter another unique name and click OK. Backing up to an existing archive You can configure the backup plan to back up to an existing archive.
Warning: According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.2.9 Backup schemes Choose one of the available backup schemes: Back up now – to create a backup task for manual start and run the task immediately after its creation.
6.2.9.3 Simple scheme With the simple backup scheme you just schedule when and how often to back up data and set the retention rule. At the first time a full backup will be created. The next backups will be incremental. To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 162) section. Retention rule 6.2.9.
Back up on: Specifies the days on which to perform a backup. The default value is Workdays. Weekly/Monthly: Specifies which of the days selected in the Back up on field you want to reserve for weekly and monthly backups. A monthly backup will be performed every fourth such day. The default value is Friday. Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in hours, days, weeks, months, or years.
Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set up a GFS scheme so as to make your backups more short-lived, at the same time ensuring that your information can be recovered in case of an accidental data loss.
Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups performed on Fridays. Note that, in order to choose Friday in the Weekly/monthly field, you need to first select it in the Back up on field. Such an archive would allow you to compare your financial documents as of the first and the last day of work, and have a five-year history of all documents, etc.
Recur: Every 1 day Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14 sessions) of this scheme's schedule look. Shaded numbers denote backup levels. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have different types: Last-level (in this case, level 4) backups are full; Backups of intermediate levels (2, 3) are differential; First-level (1) backups are incremental.
A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Since it depends on the full backup of day one, that backup is available as well. This enables us to go as far back as 11 days, which is the best-case scenario. The following day, however, a new third-level differential backup is created, and the old full backup is deleted.
The archive will be cleaned up only during backup and only if there is not enough space to create a new backup.
By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it become subject to deletion too. For more information, see Retention rules (p. 39). Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates the use of all options available in the Custom scheme. Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and daily incremental backups.
Incremental backup, runs manually Differential backup, runs manually You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans and tasks section in the left pane. If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks: three backup tasks and one cleanup task. 6.2.10 Archive validation Set up the validation task to check if the backed up data is recoverable.
6.2.11.2 Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations. Which agent is installed on the host? The resulting virtual machine type and location depend on the agent that resides on the selected host.
6.3 Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running the operating system and create the recovery task. If the managed machine's operating system fails to start or you need to recover data to bare metal, boot the machine from the bootable media (p. 363) or using Acronis Startup Recovery Manager (p. 50). Then, create a recovery task. Acronis Universal Restore (p.
Content (p. 214) Select the backup and content to be recovered. Access credentials (p. 215) [Optional] Provide credentials for the archive location if the task account does not have the right to access it. To access this option, select the Advanced view check box. Where to recover This section appears after the required backup is selected and the type of data to recover is defined. The parameters you specify here depend on the type of data being recovered. Disks (p. 216) Volumes (p.
[Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery commands, recovery priority, error handling or notification options. If you do nothing in this section, the default values (p. 117) will be used. After any of the settings is changed against the default value, a new line that displays the newly set value appears. The setting status changes from Default to Custom.
If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself.
Selecting an MBR You will usually select the disk's MBR if: The operating system cannot boot The disk is new and does not have an MBR Recovering custom or non-Windows boot loaders (such as LILO and GRUB) The disk geometry is different to that stored in the backup. There are probably other times when you may need to recover the MBR, but the above are the most common.
According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.3.6 Destination selection Specify the destination the selected data will be recovered to. 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine.
Disk destination To specify a destination disk: 1. Select a disk where you want the selected disk to recover to. The destination disk's space should be at least the same size as the uncompressed image data. 2. Click OK. All the data stored on the target disk will be replaced by the backed up data, so be careful and watch out for non-backed-up data that you might need. NT signature When the MBR is selected along with the disk backup, you need to retain operating system bootability on the target disk volume.
The selected volumes will be recovered to the physical disks of the machine the console is connected to. On selecting this, you proceed to the regular volume mapping procedure described below. New virtual machine (p. 220) If Acronis Backup & Recovery 10 Agent for Windows is installed. The selected volumes will be recovered to a new virtual machine of any of the following types: VMware Workstation, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer virtual appliance.
2. Click OK. All the data stored on the target volume will be replaced by the backed up data, so be careful and watch out for non-backed-up data that you might need. When using bootable media Disk letters seen under Windows-style bootable media might differ from the way Windows identifies drives. For example, the D: drive in the rescue utility might correspond to the E: drive in Windows. Be careful! To be on the safe side, it is advisable to assign unique names to the volumes.
volume to a volume that exceeds that limit, without changing the file system. It would make sense here to change the file system from FAT16 to FAT32. Older operating systems (MS-DOS, Windows 95 and Windows NT 3.x, 4.x) do not support FAT32 and will not be operable after you recover a volume and change its file system. These can be normally recovered on a FAT16 volume only. Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter from a drop-down list.
Disks Initial setting: the number and size of the source machine's disks. The number of disks is generally equal to that of the source machine, but might be different if the program has to add more disks to accommodate the source machine volumes because of limitations set by the virtualization product. You can add virtual disks to the machine configuration or, in some cases, delete the proposed disks.
Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file named test.log located in the folder C:\Finance Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. The above settings are not effective for the files or folders that were explicitly selected for recovery.
Recover now - the recovery task will be started immediately after you click the final OK. Recover later - the recovery task will be started at the date and time you specify. If you do not need to schedule the task and wish to start it manually afterwards, select the Task will be started manually (do no schedule the task) check box. 6.3.9 Universal Restore Use Acronis Backup & Recovery 10 Universal Restore when you need to recover and boot up Windows on dissimilar hardware.
specified locations, it will specify the problem device and ask for a disc or a network path to the driver. Once Windows boots, it will initialize the standard procedure for installing new hardware. The network adapter driver will be installed silently if the driver has the Microsoft Windows signature. Otherwise, Windows will ask for confirmation whether to install the unsigned driver.
Click Recover to open the Recover data page. Start creating a recovery task as described in "Recovering data (p. 211)". Select the archive and then select the disk or volume backup you want to convert. 3. 4. 5. 6. 7. 8. Use the Navigation pane to navigate to the vault where the archive is stored. Select the archive and then select the disk or volume backup you want to convert. Click Recover as virtual machine. The Recover data page opens with the pre-selected backup.
The system was recovered on dissimilar hardware and the new hardware is incompatible with the most critical drivers included in the backup Solution for Windows: Recover the volume once again. When configuring recovery, opt for using Acronis Universal Restore and specify the appropriate HAL and mass storage drivers. Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic, simple or mirrored volume.
6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot loader manual pages for the appropriate procedure. There is also the corresponding Knowledge Base article on the Acronis Web site. The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to identical hardware. 1. Start Linux or boot from the bootable media, and then press CTRL+ALT+F2. 2.
10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first disk, run the following command: setup (hd0) 11. Exit the GRUB shell: quit 12. Unmount the mounted file systems and then reboot: umount umount umount umount reboot /mnt/system/dev/ /mnt/system/proc/ /mnt/system/boot/ /mnt/system/ 13. Reconfigure the bootloader by using tools and documentation from the Linux distribution that you use.
If all parts of the MD device are volumes (a typical case, such as in the first example), make sure that the type of each volume—called partition type or system ID—is Linux raid automount; the hexadecimal code of this partition type is 0xFD. This will guarantee that the device will be automatically assembled following the reboot. To view or change the partition type, use a disk partitioning utility such as fdisk.
6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acronis Backup & Recovery 10 Storage Node, you may want to perform a disk backup of the machine where the storage node itself is installed. This section describes how to recover the storage node registered on the management server in case the storage node and the management server are installed on different machines (if they are installed on the same machine, simply recover that machine).
You can access the Validation page from the Vaults (p. 125) view. Right-click the object to validate (archive, backup or vault) and select Validate from the context menu. The Validation page will be opened with the pre-selected object as a source. All you need to do is to select when to validate and (optionally) provide a name for the task. To create a validation task, perform the following steps. General Task name [Optional] Enter a unique name for the validation task.
2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 30) section. 6.4.2 Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
6.4.3 Backup selection To specify a backup to validate 1. In the upper pane, select a backup by its creation date/time. The bottom part of the window displays the selected backup content, assisting you to find the right backup. 2. Click OK. 6.4.4 Location selection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree. To select a centralized vault, expand the Centralized group and click the appropriate vault.
Password. The password for the account. 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.4.6 When to validate As validation is a resource-intensive operation, it makes sense to schedule validation to the managed machine's off-peak period.
Specify the path to the archive location and select the archive containing disk backups. Backup (p. 236) Select the backup. Access credentials (p. 236) [Optional] Provide credentials for the archive location. To access this option, select the Advanced view check box. Mount settings Volumes (p. 236) Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mount point, choose the read/write or read only access mode.
While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 6.5.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup.
3. If several volumes are selected for mounting, click on every volume to set its mounting parameters, described in the previous step. 4. Click OK. 6.6 Managing mounted images Once a volume is mounted, you can browse files and folders contained in the backup using a file manager and copy the desired files to any destination. Thus, if you need to take out only a few files and folders from a volume backup, you do not have to perform the recovery procedure.
recovery without access to the storage node in case of networking problems or failure of the storage node recovery of the storage node itself. Export from an HDD-based vault to a tape device can be considered as simple on-demand archive staging. The resulting archive's name By default, the exported archive inherits the name of the original archive.
Different ways to create an export task Using the Export page is the most general way to create an export task. Here, you can export any backup, or archive you have permission to access. You can access the Export page from the Vaults view. Right-click the object to export (archive or backup) and select Export from the context menu. The Export page will be opened with the preselected object as a source. All you need to do is to select a destination and (optionally) provide a name for the task.
Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 31) section.
2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. If the archive is password-protected, provide the password. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 6.7.3 Backup selection To specify a backup(s) to export 1.
To export data to a centralized unmanaged vault, expand the Centralized vaults group and click the vault. To export data to a personal vault, expand the Personal vaults group and click the vault. To export data to a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them.
In any of the above cases, provide an archive name that is unique to the destination folder or vault. If you need to redo the export using the same archive name, first delete the archive that resulted from the previous export operation. 6.7.6 Access credentials for destination Specify credentials required for access to the location where the resulting archive will be stored. The user whose name is specified will be considered as the archive owner. To specify credentials 1.
Settings Password (p. 244) [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the password appear at any operation relating to the zone. After you configure the required settings, click OK. In the Result confirmation (p. 245) window, review the expected layout and click OK to start creating the zone. 6.8.1.1 Acronis Secure Zone Disk The Acronis Secure Zone can be located on any fixed hard drive.
To disable password 1. Choose Do not use. 2. Click OK. 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout according to the settings you have chosen. Click OK, if you are satisfied with the layout and the Acronis Secure Zone creation will start. How the settings you make will be processed This helps you to understand how creating the Acronis Secure Zone will transform a disk containing multiple volumes.
6.8.2.1 Increasing Acronis Secure Zone To increase Acronis Secure Zone 1. On the Manage Acronis Secure Zone page, click Increase. 2. Select volumes from which free space will be used to increase the Acronis Secure Zone. 3. Specify the new size of the zone by: dragging the slider and selecting any size between the current and maximum values.
6.9 Acronis Startup Recovery Manager Acronis Startup Recovery Manager is a modification of the bootable agent (p. 363), residing on the system disk in Windows, or on the /boot partition in Linux and configured to start at boot time on pressing F11. It eliminates the need for a separate media or network connection to start the bootable rescue utility.
Services (RIS). These servers with uploaded bootable components can be thought of as a kind of bootable media too. You can create bootable media or configure the PXE server or WDS/RIS using the same wizard. Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent based on Linux kernel. The agent can boot and perform operations on any PC-compatible hardware, including bare metal and machines with corrupted or non-supported file systems.
Windows XP Professional with Service Pack 2 (PE 1.5) Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1) Windows 7 (PE 3.0) If you already have media with PE1.x distribution, unpack the media ISO to a local folder and start the Bootable Media Builder either from the management console, by selecting Tools > Create Bootable Media or, as a separate component. The wizard will guide you through the necessary operations.
Universal Restore can be enabled if Acronis Backup & Recovery 10 Universal Restore is installed on the machine where the media is created. 3. [optional] The timeout interval for the boot menu plus the component that will automatically start on timeout. If not configured, the Acronis loader waits for someone to select whether to boot the operating system (if present) or the Acronis component. If you set, say, 10 sec.
vga=ask Prompts for the video mode to be used by the bootable media's graphical user interface. Without the vga parameter, the video mode is detected automatically. vga=mode_number Specifies the video mode to be used by the bootable media's graphical user interface. The mode number is given by mode_number in the hexadecimal format—for example: vga=0x318 Screen resolution and the number of colors corresponding to a mode number may be different on different machines.
Uses PCI BIOS calls to get the interrupt routing table. You may want to use this parameter if the kernel is unable to allocate interrupt requests (IRQs) or discover secondary PCI buses on the motherboard. These calls might not work properly on some machines. But this may be the only way to get the interrupt routing table. Network settings While creating Acronis bootable media, you have an option to pre-configure network connections that will be used by the bootable agent.
Network port While creating bootable media, you have an option to pre-configure the network port that the bootable agent listens for incoming connection. The choice is available between: the default port the currently used port the new port (enter the port number). If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also used as default by the Acronis Backup & Recovery 10 Management Console.
Windows PE 2004 (1.5) (Windows XP Professional with Service Pack 2) Windows PE 2005 (1.6) (Windows Server 2003 with Service Pack 1). To add Acronis Plug-in to WinPE 1.x: 1. Unpack all files of your WinPE 1.x ISO to a separate folder on the hard disk. 2. Start the Bootable Media Builder either from the management console, by selecting Tools > Create Bootable Media or, as a separate component. 3. Select Bootable media type: Windows PE. 4. 5. 6. 7.
4. [optional] Specify Windows drivers to be added to Windows PE. Once you boot a machine into Windows PE, the drivers can help you access the device where the backup archive is located. Click Add and specify the path to the necessary *.inf file for a corresponding SCSI, RAID, SATA controller, network adapter, tape drive or other device. You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 5.
Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -> Storage -> Acronis Backup & Recovery 10 to start. 6.10.2 Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the IP address(es) obtained from DHCP or set according to the pre-configured values.
1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then proceed with booting. 3. From the list of supported video modes, choose the appropriate one by typing its number (for example, 318), and then press ENTER.
Acronis command line utilities acronis asamba lash restoreraids trueimagecmd trueimagemnt Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp chown kill scsi_id chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv
hexdump readcd hotplug reboot 6.10.5 Recovering MD devices and logical volumes To recover Linux Software RAID devices, known as MD devices, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery.
6. Click Recover, then specify the path to the archive and any other required parameters, and then click OK. If Acronis Backup & Recovery 10 could not create the volume structure (or if it is not present in the archive), create the structure manually. 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD devices and logical volumes by using a Linux-based bootable media, and an example of such recovery. You can use a similar procedure in Linux.
The following picture illustrates this configuration. Do the following to recover data from this archive. Step 1: Creating the volume structure 1. Boot the machine from a Linux-based bootable media. 2. In the management console, press CTRL+ALT+F2. 3. Run the following commands to create the MD devices: mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/sd[ab] mdadm --create /dev/md1 --level=1 --raid-devices=2 /dev/sd[cd] 4.
3. 4. 5. 6. In Backup, click Change and then select the backup from which you want to recover data. In Data type, select Volumes. In Items to recover, select the check box next to my_volgroup-my_logvol. Under Where to recover, click Change, and then select the logical volume that you created in Step 1. Click the chevron buttons to expand the list of disks. 7. Click OK to start the recovery.
Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder. To upload bootable components, start the Bootable Media Builder (either from the management console, by selecting Tools > Create bootable media or as a separate component) and follow the step-by-step instructions described in the "Bootable Media Builder (p. 249)" section. Booting multiple machines from the Acronis PXE Server makes sense if there is a Dynamic Host Control Protocol (DHCP) server on your network.
6.10.6.3 PXE and DHCP on the same server If Acronis PXE Server and the DHCP server are on the same machine, add to the DHCP server option 60: “Client Identifier” with string value “PXE Client”. This can be done as follows: C:\WINDOWS\system32>netsh netsh>dhcp netsh>dhcp>server \\ or netsh dhcp>add optiondef 60 PXEClient STRING 0 comment=”Option added for PXE support” netsh dhcp>set optionvalue 60 STRING PXEClient 6.10.6.
2. Test your disk to make sure it is fully functional and does not contain bad sectors or file system errors. 3. Do not perform any disk/volume operations while running other software that has low-level disk access. Close these programs before running Acronis Disk Director Lite. With these simple precautions, you will protect yourself against accidental data loss. 6.11.2 Running Acronis Disk Director Lite You can run Acronis Disk Director Lite under Windows or start it from a bootable media.
The graphic panel at the bottom of the view also graphically depicts all the disks and their volumes as rectangles with basic data on them (label, letter, size, status, type and file system). Both parts of the view also depict all unallocated disk space that can be used in volume creation.
2. Right-click on the selected volume, and then click Initialize in the context menu. You will be forwarded to the Disk Initialization window, that will provide the basic hardware details such as the disk’s number, capacity and state to aid you in the choice of your possible action. 3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk type (basic or dynamic). The new disk state will be graphically represented in the Disk Management view of the console immediately.
Cloning method and advanced options The Clone basic disk operation usually means that the information from the source disk is transferred to the target “As is”. So, if the destination disk is the same size and even if it is larger, it is possible to transfer all the information there exactly as it is stored at the source. But with the wide range of available hardware it is normal that the target disk would differ in size from the source.
2. 3. 4. 5. 6. 7. two, and the OS on the second disk will become unbootable.” The Turn off the machine after the cloning operation check box is selected and disabled automatically. Click Finish to add the pending operation. Click Commit on the toolbar and then click Proceed in the Pending Operations window. Wait until the task is finished. Wait until the machine is turned off. Disconnect either the source or the target hard disk drive from the machine. Start up the machine.
6.11.5.4 Disk conversion: GPT to MBR If you plan to install an OS that does not support GPT disks, conversion of the GPT disk to MBR is possible the name of the operation will be listed as Convert to MBR. If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the selected volume, and then click Convert to MBR in the context menu. You will receive a warning window, stating that you are about to convert GPT into MBR.
Basic to dynamic conversion of the disk, comprising of system volumes, takes a certain amount of time, and any power loss, unintentional turning off of the machine or accidental pressing of the Reset button during the procedure could result in bootability loss. In contrast to Windows Disk Manager the program ensures bootability of an offline operating system on the disk after the operation. 6.11.5.6 Disk conversion: dynamic to basic You would want to convert dynamic disks back to basic ones, e.g.
6.11.5.7 Changing disk status Changing disk status is effective for Windows Vista SP1, Windows Server 2008, Windows 7 operating systems and applies to the current disk layout (p. 265). One of the following disk statuses always appears in the graphical view of the disk next to the disk's name: Online The online status means that a disk is accessible in the read-write mode. This is the normal disk status.
Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can consist of one region on the disk or several regions, virtually united by the Logical Disk Manager (LDM). It provides no additional reliability, no speed improvement, nor extra size. Spanned Volume A volume created from free disk space virtually linked together by the LDM from several physical disks.
Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to any previous step if necessary to change any previously selected options. To help you with your choices, each parameter is supplemented with detailed instructions. If you want to create a volume: Run the Create volume wizard by selecting Create volume on the Wizards bar, or right-click any unallocated space and select Create volume in the appearing context menu.
If you are creating a dynamic volume and select one or several basic disks, as its destination, you will receive a warning that the selected disk will be converted to dynamic automatically. If need be, you will be prompted to add the necessary number of disks to your selection, according to the chosen type of the future volume. If you click the Back button, you will be returned to the previous page: Select the type of volume being created (p. 274).
A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be converted into dynamic, otherwise or Active and Primary options will be disabled and you will only be able to select the Logical volume type. The warning message will advise you that an OS installed on this volume will not be bootable.
Please note, that due to setting the new active volume, the former active volume letter might be changed and some of the installed programs might stop running. 3. If another active volume is present in the system, you will receive the warning that the previous active volume will have to be set passive first. By clicking OK in the Warning window, you'll add the pending operation of setting active volume.
If when setting a new volume label you use characters that are unsupported by the currently installed operating system, you will get the appropriate warning and the OK button will be disabled. You will have to use only supported characters to proceed with changing the volume label. (To finish the added operation you will have to commit (p. 278) it. Exiting the program without committing the pending operations will effectively cancel them.
All planned operations are added to the pending operation list. The Undo action lets you undo the latest operation in the list. While the list is not empty, this action is available. The Redo action lets you reinstate the last pending operation that was undone. The Commit action forwards you to the Pending Operations window, where you will be able to view the pending operation list. Clicking Proceed will launch their execution.
7 Centralized management This section covers operations that can be performed centrally by using the components for centralized management. The content of this section is only applicable to advanced editions of Acronis Backup & Recovery 10. 7.1 Administering Acronis Backup & Recovery 10 Management Server This section describes the views that are available through the navigation tree of the console connected to the management server, and explains how to work with each view. 7.1.
less than 10% free space. View vaults will take you to the Centralized vaults (p. 127) view where you can examine the vault size, free space, content and take the necessary steps to increase the free space. Bootable media was not created Create now To be able to recover an operating system when the machine fails to boot, you must: 1. Back up the system volume (and the boot volume, if it is different) 2. Create at least one bootable media (p. 363). Create now will launch the Bootable Media Builder (p.
Statistics for the selected date are displayed to the right of the chart. All the statistics fields are interactive, i.e. if you click any field, the Log view will be opened with the log entries pre-filtered by this field. At the top of the chart, you can select the activities to display depending on the presence and severity of the errors. The Select current date link focuses selection to the current date.
7.1.2.1 Backup policy deployment states A backup policy deployment state is a combination of the policy deployment states on all machines the policy is applied to. For example, if the policy is applied to three machines and has the "Deploying" state on the 1st machine, the "Updating" state on the 2nd machine and the "Deployed" state on the 3rd machine, the state of the policy will be "Deploying, Updating, Deployed.
In the Log view, apply the Error filter if there are too many log entries. You can also sort the "error" entries by backup plans, managed entities or machines. 2. Once the reason of the failure is clear, do one or more of the following: Remove the reason of the failure. After that, you may want to start the failed task manually to maintain the backup scheme consistency, for example, if the policy uses the GFS or Tower of Hanoi backup scheme. Edit the backup policy to prevent future failure.
Edit a policy Edit. Click Editing policies is performed in the same way as creating (p. 339). Once the policy is edited, the management server updates the policy on all machines the policy was deployed to. Delete a policy Click Delete. As a result, the policy will be revoked from the machines it was deployed to and deleted from the management server. If the machine is currently offline, the policy will be revoked when the machine comes online again.
Filter backup policies by name/owner Type a policy's name / owner's name in the fields below the corresponding column's header. As a result you will see the list of the backup policies, whose names (or their owners' names) fully or just partly coincide with the entered value. Filter backup policies by deployment state, status, source type, last result, schedule In the field below the corresponding column's header, select the required value from the list.
machine (group). View log of the machine (group) Click Revoke policy from the machine (group). Click 7.1.3 View log. The Log (p. 315) view will display a list of the log entries, pre-filtered by the selected machine (group). Revoke. The management server will revoke the policy from the selected machine or group of machines. The policy itself remains on the management server.
existing machines' properties and will analyze every newly registered machine. The machine that meets a certain dynamic criterion will appear in all groups that use this dynamic criterion. To learn more about grouping machines, see the Grouping the registered machines (p. 59) section. To learn more about how policies are applied to machines and groups, see the Policies on machines and groups (p. 61) section. Way of working with machines First, add machines to the management server.
In the Import machines from file (p. 293) window, browse for a .txt or .csv file, containing the names (or IP addresses) of machines to import to the management server. The management console addresses to the agent and initiates the registration procedure. Because registration requires the agent's participation, it cannot take place when the machine is offline. An additional agent installed on a registered machine becomes registered on the same management server automatically.
actions will be performed on the machine as soon as the machine becomes available to the management server. Other actions Direct management operations Create a backup plan on a machine Click Recover data Click Backup. This operation is described in depth in the Creating a backup plan (p. 192) section. Recover. This operation is described in depth in the Recovering data (p. 211) section. Connect to a machine directly Click Connect directly. Establishes a direct connection to the managed machine.
Note for Virtual Edition users: When adding a VMware ESX/ESXi host, enter the IP of the virtual appliance running Acronis Backup & Recovery 10 Agent for ESX/ESXi. 4. Specify the user name and password of a user who is a member of the Administrators group on the machine. Note for Virtual Edition users: When adding a VMware ESX/ESXi host, specify the user name and password for your vCenter or ESX/ESXi host. Click Options>> and specify: User name.
Deletes and then tries again to add registered machines that are present in the list, but their current availability (p. 294) is Withdrawn. As a result, only those physical machines that are listed in the file will be present in the All physical machines group. Text file requirements The file should contain machine names or IP addresses, one machine per line. Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.
{username password} belong to a user who is a member of the Administrators group on all machines listed in the file. If not specified, the single sign-on mechanism is used to operate on all the machines. Importing machines from a text file To import machines from a file 1. In the Navigation tree, select Physical machines, or All physical machines. Import machines from file on the toolbar. 2. Click 3. In the Path field, enter a path to the .txt or .
Once the machines appear in the group, the policy that was applied to the group (if any), is deployed to the machines. If any of the selected machines is not available or reachable at the moment, the action will be kept in the management server as pending and will be performed as soon as the machine becomes available to the server. Machine details Accumulates in four tabs all information on the selected machine.
Backup policies Displays a list of backup policies applied to the selected machine and lets the management server administrator perform the following operations: To Do View details of a policy Click View details. In the Policy details (p. 286) window, examine all information related to the selected backup policy. View tasks of a policy Click View tasks. The Tasks (p. 312) view will display a list of the tasks related to the selected backup policy. View log of a policy Click View log. The Log (p.
View plan's/task's log Backup plan Click View log. You will be taken to the Log (p. 190) view containing the list of the plan-related log entries. Task Click View log. You will be taken to the Log (p. 190) view containing the list of the task-related log entries. Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to run. Running the backup plan starts the selected task of that plan immediately in spite of its schedule and conditions.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 192), except for the following limitations: It is not always possible to change backup scheme properties if the created archive is not empty (i.e. contains backups). 1. It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2. If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. The backup plan has a centralized origin. A centralized plan can be deleted by the management server administrator by revoking the backup policy that produced the plan. Task Click Delete.
Remove machine from a group. Click Remove. The centralized plans, which were deployed to the parent group, will no longer affect this machine. Hosted virtual machines The tab displays a list of the machines hosted on the selected virtualization server or managed by the specified virtual appliance. You can create a dynamic group based on the list of the hosted virtual machines. To do this, click Create a dynamic group. The created group will be accessible in the Virtual machines view (p. 305).
7.1.3.2 Actions on groups Actions are available when you select the then click on a group. Physical machines view in the Navigation tree, and The following is a guideline for you to perform actions on selected groups. To Do Create a custom static or a dynamic group Click Create group. In the Create group (p. 300) window, specify the required parameters of the group. Custom groups can be created in the root folder ( other custom groups.
2. Choose the type of group: a. Static - to create a group that will contain machines added manually. b. Dynamic - to create a group that will contain machines added automatically according to the specified criteria. Click the Add criteria and select the criterion pattern. Operating system All the machines running the selected operating system will be members of the dynamic group. Organizational unit (p.
There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server. Organizational unit criterion Organizational unit criterion is specified for the domain the management server is currently in, as follows: OU=OU1 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it manually. If the domain access credentials were not specified in the management server options, the program will ask you to provide them.
The root folder of the machines tree contains groups of the first level. Groups that include other groups are called parent groups. Groups that are in parent groups are called child groups. All the backup policies applied to the parent group will be applied to its child groups as well. 2. Click OK. Editing custom groups Editing a custom group is performed in the same way as creating (p. 300) one. Changing the type of group will result in its conversion.
group. The management server revokes the policy from the group. While the changes are being transferred to the machines and the agents are deleting the backup plans, the policy state of the group is Revoking.The policy itself remains on the management server. Examine where the policy applied to the group came from Click Explore inheritance. The Inheritance order (p. 304) window will display the inheritance order of the policy applied to the group.
machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server. Adding Hyper-V virtual machines 1. Integration services have to be installed in the guest systems. 2. Install Acronis Backup & Recovery 10 Agent for Hyper-V on the Hyper-V host. The agent is installed as an add-on to Acronis Backup & Recovery 10 Agent for Windows. 3. Register (p. 290) the Hyper-V host on the management server. If the machine is already registered, skip this step. 4.
What happens when a policy is applied to a group of virtual machines Each machine will be backed up by a separate task to a separate archive. The default archive name will include the virtual machine name and the policy name. It is advisable to keep default archive naming so that you can easily find each machine's backups in the storage vault. Grouping of virtual machines The Virtual machines section of the navigation tree contains one built-in group called All virtual machines.
functioning on the machines. This way, by removing the integration you remove only the machines that are not manageable. 7.1.4.3 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an easy way to deploy Agent for ESX/ESXi to every VMware ESX or ESXi server whose virtual machines you want to back up. A virtual appliance with an agent will be created on every ESX/ESXi server you specify and registered on the management server.
When deploying directly to the ESX/ESXi server - The account that will be used for agent connection to the ESX server. The management server will use this account to establish a trusted relationship with the agent during registration. Centralized backup plans and recovery tasks, originating from the management server, will run under this account by default. This means the account must have the necessary privileges on the vCenter Server.
Server 1 uses storages A, B, C, D Server 2 uses storages C, D, E Server 3 uses storages B, C, D The VA can be deployed to either C or D. If there is no storage shared by all the servers, you can import the VA manually into any of the hosts. This will work, but backup performance will be far from optimal. After deployment, the agent virtual appliance can appear on any of the hosts included in the cluster, depending on how the load balancing is configured.
Note: You can skip this step if both the storage node and the users' machines are in the same Active Directory domain. For information about user rights on a storage node and in its managed vaults, see User rights on a storage node (p. 78). 3. Add (p. 311) the storage node to the Acronis Backup & Recovery 10 Management Server. 4. Create a managed vault (p.
Change the compacting task schedule After deleting backups from deduplicating vaults, either manually or during cleanup, unreferenced data may appear in the deduplicating vaults and their databases. The compacting procedure deletes such data in order to free up more storage space. Only one compacting task is available per storage node. Click Reschedule compacting. In the Schedule window, set up the schedule for the compacting procedure. Only the time events (daily (p. 163), weekly (p.
Storage node properties The tab displays the following information about the selected storage node: Name - the name of the machine where the storage node is installed IP - the IP address of the machine where the storage node is installed Availability: Unknown - this status is displayed until the first connection between the management server and the storage node is established after adding the storage node or starting the management server's service.
7.1.6.1 Actions on tasks The following is a guideline for you to perform operations with tasks. To Do Create a new backup plan, or a task on a registered machine Click New, and select one of the following: Backup plan (p. 192) Recovery task (p. 211) Validation task (p. 230) Then, you have to specify the registered machine on which the selected task, or the backup plan will run. View details of a task Click View details. In the Tasks details (p.
Delete a task Click Delete. Why can't I delete the task? Task belongs to a backup plan A task belonging to a backup plan cannot be deleted separately from the plan. Edit the plan to remove the task or delete the entire plan. Do not have the appropriate privilege Without Administrator privileges on the machine, a user cannot delete tasks owned by other users. This is a built-in compacting task Each storage node has a built-in service task called a compacting task. This task cannot be deleted.
7.1.7 Log The Acronis Backup & Recovery 10 log stores the history of actions the software does on a machine or a user does on a machine using the software. For example, when a user edits a task, an entry is added to the log. When the software executes a task, it adds multiple entries saying what it is currently doing. Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has local and centralized logs of events.
Tasks 7.1.7.1 Select a task, and then click View log. The Log view appears with the log entries belonging to the selected task. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these operations can also be performed with the context menu (by right-clicking the log entry), or with the Log actions bar (on the Actions and tools pane). The following is a guideline for you to perform actions on log entries.
given time period 2. In the To field, select the date up to which to display the log entries. Filter log entries by type Press or release the following toolbar buttons: to filter error messages to filter warning messages to filter information messages Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed entity type) column header, select the backup plan or the type of managed entity from the list.
Message - The event text description. The log entry's details that you copy will have the following appearance: ---------------------------Log Entry Details--------------------------Type: Information Date and time: DD.MM.
The report will contain the information selected, grouped and sorted according to the template settings. The report appears in a separate interactive window that enables expanding and collapsing the tables. You can export the report to an XML file and open it later using Microsoft Excel or Microsoft Access. 7.1.8.1 Report about the machines In this view, you can generate a report about the machines that are registered on the management server. This report consists of one or more tables.
Schedule: The types of the backup policies' schedules—Manual and/or Scheduled. Manual schedule means that the corresponding centralized backup plan runs only when you start it manually. Owner: The list of users who created the backup policies. With the default filter settings, the report includes all backup policies. Report view Under Report view, choose how the report will look: Select whether to show all items in a single table or to group them by a particular column.
Filters Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter criteria are included. Origin: The types of origin of the tasks—Centralized, Local, and/or Local without backup plan. A centralized task belongs to a centralized backup plan. A local task might not belong to a backup plan (for example, a recovery task). Backup policies (centralized tasks only): The backup policies on which the tasks are based.
Report view Under Report view, choose how the report will look: Select whether to show all items in a single table or to group them by a particular column. Specify which table columns to show, and in which order. Specify how to sort the table. 7.1.8.6 Report about the vaults' statistics In this view, you can generate a report about the use of the centralized managed vaults that are currently added to the management server. This report consists of one or more tables and diagrams.
Backup policies (centralized tasks only): The backup policies on which the tasks are based. The default setting means all backup policies that ever existed during the report period. Machines: The list of machines on which the tasks exist. Type: The task types—for example, disk backup tasks. Owner: The list of users who created the tasks. With the default filter settings, the report includes all tasks that existed on the registered machines any time during the report period. 7.1.8.
In Linux, instead of using the administrative template and modifying the registry, parameters are configured by editing the corresponding configuration files. If the values of any of these parameters set through the administrative template differ from those set through the graphical user interface, the template-based parameters take precedence and are effective immediately; the parameters shown in the GUI will be changed accordingly.
http://msdn2.microsoft.com/en-us/library/aa374177.aspx 7.2.1.2 Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup & Recovery 10 Storage Node that can be set by using Acronis Administrative Template. Client Connection Limit Description: Specifies the maximum number of simultaneous connections to the storage node by the agents that perform backup or recovery.
Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as a percentage) below which a warning or error is recorded in the log. This parameter contains the following settings: Vault Free Space Warning Limit Description: Specifies the amount of free space in a managed vault, in megabytes, below which a warning is recorded in the storage node's log.
Description: Specifies the amount of free space, in megabytes, on the volume containing a managed vault's database, below which a warning is recorded in the storage node's log. Possible values: Any integer number between 0 and 2147483647 Default value: 20 If the amount of free space on the volume containing a managed vault's database is less than the value in Vault Database Free Space Warning Limit, a warning is recorded in the storage node's log, indicating the vault in question.
Specifies how to clean up the centralized event log stored in the management server's reporting database. This parameter has the following settings: Max Size Description: Specifies the maximum size of the centralized event log, in kilobytes.
Description: Specifies the network name or IP address of the SNMP server. Possible values: Any string 0 to 32765 characters long Default value: Empty string SNMP Community Description: Specifies the community name for the SNMP notifications.
Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priority machine once in the number of seconds given by Period, by using an available worker thread (see Maximum Workers described previously). If there are fewer worker threads than normal-priority machines, the actual interval between synchronizations may be longer than the value of this parameter.
Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between attempts to connect to a registered machine which appears to be offline. Possible values: Any integer number between 120 and 2147483647 Default value: 1800 Normally, the management server connects to each registered machine with a certain time interval (see Period and Period-High Priority earlier in this section).
If this setting is 0, the snapshot storage will not be created. The initial size will not exceed the available space minus 50 MB. Without the snapshot storage, taking snapshots is still possible. The size of the snapshot storage does not affect the size of the backup. 7.2.1.4 Acronis Backup & Recovery 10 Agent for Windows The following are the parameters of Acronis Backup & Recovery 10 Agent that can be set by using Acronis Administrative Template.
If the value is 0, no reconnection attempts will be performed; the agent will only check for the license as determined by License Check Interval. License Server Address Description: Specifies the network name or IP address of Acronis License Server. Possible values: Any string 0 to 32765 characters long Default value: Empty string Log Cleanup Rules Specifies how to clean up the agent log.
Description: Specifies the minimum level of severity of events for sending SNMP notifications about them. Only notifications about events of levels greater than or equal to Trace Level will be sent. Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), or 5 (Critical error) Default value: 4 (only errors and critical errors will be recorded—if Trace State is set to True) SNMP Address Description: Specifies the network name or IP address of the SNMP server.
Possible values: Any integer number between 0 and 100 Default value: 50 If this setting is 0, the snapshot storage will not be created. The initial size will not exceed the available space minus 50 MB. Without the snapshot storage, taking snapshots is still possible. The size of the snapshot storage does not affect the size of the backup. 7.2.1.
Authentication parameters Selecting the Trust self-signed certificates check box allows the client to connect to the server applications that use self-signed SSL certificates such as certificates created during the installation of Acronis Backup & Recovery 10 components—see SSL certificates (p. 84). You should keep this check box selected, unless you have a Public Key Infrastructure (PKI) in your environment.
Always use The use of SSL certificates is enabled. The connection will be established only if the use of SSL certificates is enabled on the client application. Disabled The same as Not configured. Event tracing parameters In Windows, the events occurring in Acronis Backup & Recovery 10 can be recorded into the event log, a file, or both.
Specifies whether the machine where the Acronis Backup & Recovery 10 component is installed will participate in the Customer Experience Program. Select one of the following: Not Configured By default, the machine does not participate in the Customer Experience Program.
This database contains a list of vaults that are managed by the storage node, other than tape vaults (see the next parameter). Its typical size does not exceed a few kilobytes. Possible values: Any string 0 to 32765 characters long Default value: C:\Program Files\Acronis\StorageNode Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabasePath Description: Specifies the folder where Acronis Backup & Recovery 10 Storage Node stores its tape vaults database.
Where to back up Archive (p. 347) Specify the path to the location, where the backup archive will be stored, and the archive name. It is advisable that the archive name be unique within the location. The location must be available at the time when the management server starts to deploy the policy. Access credentials (p. 348) [Optional] Provide credentials for the location if the backup policy account does not have access permissions to the location. To access this option, select the Advanced view check box.
When to convert (p. 209) [Optional] Specify whether to convert every full, every incremental or every differential backup or convert the last created backup on schedule. Specify the conversion schedule if required. Host (p. 210) Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Virtualization server (p. 210) Here you select the resulting virtual machine type and location.
7.3.2 Items to back up Specify selection rules for backing up items, selected in the Source type field of the General section. Volumes to back up selection rules (p. 342) Files to back up selection rules (p. 345) 7.3.2.1 Volumes to back up selection rules Define volume selection rules, according to which the volumes will be backed up on the machines the policy will be applied to. To define volume selection rules In the first line, select the rule from the list, or type it manually.
All fixed volumes Type or select: [Fixed Volumes] Refers to all volumes other than removable media. Fixed volumes include volumes on SCSI, ATAPI, ATA, SSA, SAS and SATA devices, and on RAID arrays. Linux volumes First partition on the first IDE hard disk of a Linux machine Type or select: /dev/hda1 hda1 is the standard device name for the first partition of the first IDE hard disk drive. For more details, see "Note on Linux machines" below.
Operating systems starting from Windows 7 and Windows Server 2008 R2 create a dedicated system volume called System Reserved. If you select [SYSTEM], only this dedicated volume will be backed up. Always select both [SYSTEM] and [BOOT] when backing up machines running these operating systems.
/dev/mda1 7.3.2.2 Files to back up selection rules Define file selection rules, according to which the files and (or) folders will be backed up on the machines the policy will be applied to. To define file selection rules In the first line, select the rule from the list, or type it manually. To add another rule, click the next empty line, and select the rule from the list, or type it manually.
Templates Templates are similar to environment variables, but are already pre-customized. To include In the Files and folders column, type or select: Comments All files on all volumes on [All Files] a machine Points to all files on all volumes of the machine. All user profiles existing on a machine Points to the folder where all user profiles are located (typically, C:\Documents and Settings in Windows XP, and C:\Users in Windows Vista).
7.3.4 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folders, as well as files with specific extensions, to be stored in the archive. To specify which files and folders to exclude: Set up any of the following parameters: Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute.
To store archives on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. To store archives on an FTP or SFTP server, expand the corresponding group and reach the appropriate server, then select the folder that will be used for storing archives.
The program will access the location using the credentials of the backup policy specified in the General section. Use the following credentials The program will access the location using the credentials you specify. Use this option if the policy credentials do not have access permissions to the location. You might need to provide special credentials for a network share or a storage node. Specify: User name.
7.3.7.2 Back up later scheme With the Back up later scheme, the backup will be performed only once, at the date and time you specify. Specify the appropriate settings as follows Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in the archive, a full backup will be created regardless of your selection. Date and time Specify when to start the backup.
Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday, which is left for weekly and monthly backups. Monthly backups run every fourth Friday, and weekly backups run on all other Fridays. Monthly ("Grandfather") backups are full; Weekly ("Father") backups are differential; Daily ("Son") backups are incremental. Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup.
Be able to recover files as of any date over the past seven days Have access to weekly backups of the past month Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start backup at: 11:00 PM Back up on: All days Weekly/monthly: Saturday (for example) Keep backups: Daily: 1 week Weekly: 1 month Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created.
Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months.
Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 163), weekly (p. 165), or monthly (p. 167) schedule. Setting up schedule parameters allows creating simple schedules (example of a simple daily schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (example of a complex daily schedule: a task will be run every 3 days, starting from January 15.
Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level doubles the full backup and roll-back periods. To see why the number of recovery days varies, let us return to the previous example. Here are the backups we have on day 12 (numbers in gray denote deleted backups).
Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the archive contains no backups at the time of the task run, a full backup is created instead of the incremental backup. Differential Specifies on what schedule and under which conditions to perform a differential backup. If the archive contains no full backups at the time of the task run, a full backup is created instead of the differential backup.
Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full backup: Schedule: Weekly, every Friday, at 10:00 PM Here, all parameters except Schedule in Full backup are left empty. All backups in the archive are kept indefinitely (no archive cleanup is performed). Full and incremental backup plus cleanup With the following scheme, the archive will consist of weekly full backups and daily incremental backups.
Finally, we create retention rules for the archive: let us retain only backups that are no older than six months, and let the cleanup be performed after each backup task and also on the last day of every month. Retention rules: Delete backups older than 6 months Apply the rules: After backing up, On schedule Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted as long as it has dependent backups that must be kept.
3. Validation schedule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. For more information see the Scheduling (p. 162) section. Copyright © Acronis, Inc.
8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 366) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 369), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers. Agent-side cleanup Cleanup (p. 364) performed by an agent (p.
Backup options Configuration parameters of a backup operation (p. 361), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 362). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: what data to back up [optionally] the archive validation rules (p. 373) where to store the backup archive (p.
5. On each machine, the agent installed on the machine creates a backup plan (p. 362) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 364). 6. On each machine, the agent installed on the machine creates a set of centralized tasks (p. 364) that will carry out the plan. Backup scheme A part of the backup plan (p. 362) that includes the backup schedule and [optionally] the retention rules and the cleanup (p. 364) schedule. For example: perform full backup (p.
built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p. 362) can be applied to a built-in group. C Centralized backup plan A backup plan (p. 362) that appears on the managed machine (p. 369) as a result of deploying a backup policy (p. 362) from the management server (p. 370). Such plan can be modified only by editing the backup policy.
Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 362) that produces the archive. This operation checks if the archive has exceeded its maximum size and/or for expired backups. This may or may not result in deleting backups depending on whether the retention rules are violated or not. For more information please refer to Retention rules (p. 39). Console (Acronis Backup & Recovery 10 Management Console) A tool for remote or local access to Acronis agents (p.
operations are configured on the management server (p. 370) and propagated by the server to the managed machines). The direct management operations include: creating and managing local backup plans (p. 369) creating and managing local tasks (p. 369), such as recovery tasks creating and managing personal vaults (p. 370) and archives stored there viewing the state, progress and properties of the centralized tasks (p.
Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, better performance or larger volume size. A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the dynamic volumes' configuration.
Dynamic volume Any volume located on dynamic disks (p. 366), or more precisely, on a disk group (p. 366). Dynamic volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired goal: to increase the volume size (a spanned volume) to reduce the access time (a striped volume) to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.) E Encrypted archive A backup archive (p. 361) encrypted according to the Advanced Encryption Standard (AES).
G GFS (Grandfather-Father-Son) A popular backup scheme (p. 363) aimed to maintain the optimal balance between a backup archive (p. 361) size and the number of recovery points (p. 370) available from the archive. GFS enables recovering with daily resolution for the last several days, weekly resolution for the last several weeks and monthly resolution for any time in the past. For more information please refer to GFS backup scheme (p. 34). I Image The same as Disk backup (p. 366).
Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 371) and storage node-side validation (p. 372) for each archive stored in the managed vault. An administrator can specify additional operations that the storage node will perform (deduplication (p. 365), encryption).
R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 369) managed by a management server (p. 370). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 371) procedure. Registration A procedure that adds a managed machine (p. 369) to a management server (p. 370). Registration sets up a trust relationship between the agent (p.
Since the cleanup schedule exists on the machine (p. 369) the agent (p. 360) resides on, and therefore uses the machine’s time and events, the agent has to initiate the storage node-side cleanup every time the scheduled time or event comes. To do so, the agent must be online. The following table summarizes the cleanup types used in Acronis Backup & Recovery 10.
the image being recovered is located in Acronis Secure Zone (p. 360) or when using Acronis Active Restore (p. 360), because these features are primarily meant for instant data recovery on the same machine. Universal Restore is not available when recovering Linux. Unmanaged vault Any vault (p. 373) that is not a managed vault (p. 369). V Validation An operation that checks the possibility of data recovery from a backup (p. 361).
Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1). WinPE is commonly used by OEMs and corporations for deployment, test, diagnostic and system repair purposes. A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. The Acronis Plug-in for WinPE (p. 360) enables running the Acronis Backup & Recovery 10 Agent (p. 360) in the preinstallation environment. 374 Copyright © Acronis, Inc.
Action pages • 12, 13, 15 9 Index A A policy on a machine or a group • 62 Actions on a tape library vault • 136 Actions on backup plans and tasks • 179, 183 Actions on backup policies • 282, 284 About Windows loaders • 228 Actions on centralized vaults • 57, 126, 127, 128 Access credentials • 235, 236 Actions on groups • 61, 288, 300 Access credentials for archive location • 193, 199 Actions on log entries • 190, 315, 316 Access credentials for destination • 212, 222, 239, 243 Actions on personal
Archive selection • 211, 213, 231, 232, 234, 235, 239, 240 Archive validation • 193, 209, 358 At Windows Event Log event • 169 Attaching a managed vault • 129, 132 B Backup scheme • 362, 363, 369, 372 Backup scheme selection • 340, 349 Backup schemes • 193, 200 Backup selection • 231, 233, 235, 236, 239, 241 Backup splitting • 96, 108 Basic concepts • 8, 26, 54, 192 Back up later scheme • 200, 350 Back up now scheme • 200, 349 Basic disk cloning • 266, 267 Basic precautions • 264 Backing up dynamic vol
Column selection • 323 Common operations • 158 Communication between Acronis Backup & Recovery 10 components • 79 Components for centralized management • 18 Cumulative state and status of a policy • 69 Custom backup scheme • 40, 166, 168, 206, 355 Customer Experience Program • 95 D Compression level • 96, 103 Conditions • 112, 172 Configuring Acronis Backup & Recovery 10 components • 323 Daily schedule • 163, 204, 311, 354 Dashboard • 177, 179, 280 Data type • 211, 214 Configuring communication setting
Disk management • 44, 211, 264 Disk operations • 266 Disks • 212, 216 Disks/volumes selection • 214 Domain access credentials • 90, 302 Drivers for Universal Restore • 250, 253 Dual destination • 49, 96, 111 Dynamic disk • 42, 360, 366, 367, 368 Dynamic group • 59, 364, 367 Dynamic grouping criteria • 59 Dynamic volume • 42, 363, 368 E Filtering and sorting log entries • 190, 191, 315, 316 Filtering and sorting machines • 288, 299 Filtering and sorting tasks • 312, 314 Fits time interval • 174 Fonts • 87
Importing machines from Active Directory • 288, 291 Main area, views and action pages • 11, 14 Increasing Acronis Secure Zone • 246 Managed machine • 10, 26, 87, 360, 362, 364, 365, 369, 371, 372 Incremental backup • 361, 363, 365, 369 Inheritance of policies • 64 Inheritance order • 295, 299, 304 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 135, 138, 154 Items to back up • 193, 195, 339, 342 K Kernel parameters • 249, 250 Managed vault • 55, 309, 365, 368, 369, 371, 372, 373 Management
O Operations with a machine • 63 Operations with archives stored in a vault • 126, 127, 156, 158 Operations with backups • 126, 128, 156, 159 Operations with custom groups • 61 Operations with panes • 14 Options • 86 Organizational unit criterion • 90, 301, 302 Post-data capture command • 101 Post-recovery command • 119 Pre/Post commands • 96, 99, 100, 117, 118 Pre/Post data capture commands • 96, 100, 103 Pre-backup command • 99 Pre-data capture command • 101 Pre-recovery command • 118 Prerequisites • 135
Report about the backup plans • 320 Report about the backup policies • 319 Report about the machines • 319 Report about the task activities • 322 Report about the tasks • 320 Setting up regular conversion to a virtual machine • 209 Setting up SNMP services on the receiving machine • 94 Simple scheme • 201, 350 Report about the vaults' statistics • 322 SNMP notifications • 89, 93, 97, 107, 118, 122 Report view • 323 Source files exclusion • 96, 98 Reporting • 318 Source type • 189, 193, 195 Rescan •
Task credentials • 213, 231, 239 Task details • 179, 180, 183, 187, 295, 313 User privileges on a storage node • 78, 127, 310 Using a single tape drive • 48 Task failure handling • 96, 113 Using custom groups • 59 Task start conditions • 96, 112, 163, 172, 181 Using the Grandfather-Father-Son tape rotation scheme • 34, 143 Task states • 179, 181, 312 Using the management console • 8, 10 Task statuses • 179, 182, 312 Using the Tower of Hanoi tape rotation scheme • 39, 149 Tasks • 285, 286, 290, 295
W Weekly schedule • 165, 204, 311, 354 What if • 154 When deduplication is most effective • 71 When to recover • 212, 222 When to validate • 231, 234 Why is the program asking for the password? • 194 Windows event log • 89, 92, 97, 107, 118, 122 WinPE (Windows Preinstallation Environment) • 360, 363, 373 Work across subnets • 264 Working under bootable media • 256 Working with backup plans and tasks • 183 Working with the • 126, 127, 155, 280 Copyright © Acronis, Inc.