Acronis® Backup & Recovery ™ 10 Server for Windows User's Guide
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware is a registered trademark of VMware, Inc. Windows and MS-DOS are registered trademarks of Microsoft Corporation.
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ......................................................... 6 1.1. Acronis Backup & Recovery 10 overview ............................................................................ 6 1.2. Getting started .................................................................................................................... 6 1.2.1. 1.3. 1.3.1. 1.3.2. 1.3.3. Using the management console .........................................................
. Vaults .................................................................................................................. 80 4.1. 4.1.1. 4.1.2. 4.2. 4.2.1. 4.2.2. 4.2.3. 4.2.4. 5. Personal vaults .................................................................................................................. 81 Working with the "Personal vault" view .................................................................................................. 81 Actions on personal vaults .......................
6.4. 6.4.1. 6.4.2. 6.4.3. 6.4.4. 6.4.5. 6.4.6. 6.5. 6.5.1. 6.5.2. 6.5.3. 6.5.4. Validating vaults, archives and backups.......................................................................... 157 Task credentials........................................................................................................................................158 Archive selection ......................................................................................................................................
1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 succeeds Acronis True Image Echo as the next generation disaster recovery solution.
Windows Start the console by selecting it from the start menu. 3. Connect the console to the machine where the agent is installed. Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the GUI elements see the next section. 1.2.1. Using the management console As soon as the console connects to a managed machine (p. 217) or to a management server (p.
Main area The main place of working, where you create, edit and manage backup plans, policies, tasks and perform other operations. Displays the different views and action pages (p. 11) depending on items selected in the menu, Navigation tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you perform all the operations, available on both panes. Menu items change dynamically.
If the console and agent are installed on the same machine, the shortcut to this machine will be added to the shortcuts bar automatically as Local machine [Machine name]. 1.2.1.2. "Actions and tools" pane The Actions and tools pane enables you to easily and efficiently work with Acronis Backup & Recovery 10. The pane's bars provide quick access to program's operations and tools. All items of the Actions and tools bar are duplicated in the program menu.
"Actions" bar on a managed machine and on a management server Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 provided with lists of specific help topics. 1.2.1.3.
1.2.1.4. Main area, views and action pages The main area is a basic place where you work with the console. Here you create, edit and manage backup plans, policies, tasks and perform other operations. The main area displays different views and action pages according the items you select in the menu, Navigation tree, or on the Actions and Tools pane. Views A view appears on the main area when clicking any item in the Navigation tree in the Navigation pane (p. 8).
Action pages An action page appears in the main area when clicking any action item in the Actions menu, or in the Actions bar on the Actions and tools pane. It contains steps you need to perform in order to create and launch any task, or a backup plan, or backup policy. Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The basic representation hides such fields as credentials, comments, etc.
Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you started to create a backup plan, and then for any reason switched to another view without accomplishing the plan creation, you can click the Back navigation button on the menu. Or, if you have passed several steps forward, click the Down arrow and select the page where you started the plan creation from the list. Thus, you can perform the remaining steps and accomplish the backup plan creation.
File backup File-level data protection is based on backing up files and folders residing on the machine where the agent is installed or on a network share. Files can be recovered to their original location or to another place. It is possible to recover all files and folders that were backed up or select which of them to recover.
1.3.3. Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for local access to Acronis Backup & Recovery 10 agent. 1.4.
1.6. Hardware requirements This section lists the minimum and recommended hardware requirements to install and run Acronis Backup & Recovery 10 components.
2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can use the product in various circumstances without step-by-step instructions. 2.1. Basic concepts Please familiarize yourself with the basic notions used in the Acronis Backup & Recovery 10 graphical user interface and documentation. Advanced users are welcome to use this section as a step-by-step quick start guide. The details can be found in the context help.
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. 18 Copyright © Acronis, Inc.
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan and execute the operation. This will help you extract files and logical volumes from a system that failed to boot, take an image of the offline system or back up sector-by-sector an unsupported file system. Recovery under operating system When it comes to data recovery, you create a recovery task on the managed machine.
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operation is taking place. If required, you can connect the console to another machine and configure a recovery operation on that machine. This ability (remote parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not provide it.
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery operation in the same way as the recovery task. The following diagram illustrates the recovery using the bootable media. 2.2. Full, incremental and differential backups Acronis Backup & Recovery 10 provides the capability to use popular backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental backup may be not slower than recovery from a full one. A full backup is most useful when: • • you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.
specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme. Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2.3. User privileges on a managed machine When managing a machine running Windows, the scope of a user's management rights depends on the user's privileges on the machine.
Managing a plan (task) owned by another user Having Administrator privileges on the machine, a user can modify tasks and local backup plans owned by any user registered in the operating system. When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are cleared. This prevents the "modify settings, leave passwords" trick. The program displays a warning each time you are trying to edit a plan (task) last modified by another user.
2.5. GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme in Acronis Backup & Recovery 10. With this backup scheme you are not allowed to back up more often than once a day. The scheme enables you to mark out the daily, weekly and monthly cycles in your daily backup schedule and set the retention periods for the daily, monthly and weekly backups.
Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day of the week from the days selected in the previous step. Each 1st, 2nd and 3rd backup created on this day of the week will be considered as a weekly backup. Each 4th backup created on this day of the week will be considered as a monthly backup. Backups created on the other days will be considered as daily backups. Assume you select Friday for Weekly/Monthly backup.
Keep backups: Monthly This step defines the retention rule for monthly backups. The cleanup task will run after each monthly backup and delete all monthly backups that are older than you specify. The monthly backups’ retention period cannot be less than the weekly backups’ retention period. It is usually set several times longer. You have the option to keep the monthly backups infinitely.
Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups will start to be deleted. The diagram for weekly and monthly backups will look similar to the week-based timescale. The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. When using the incremental and differential backup methods, you cannot delete a backup as soon as the scheme requires if later backups are based on this backup.
2.6. Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keeping such backups for a long time. The Tower of Hanoi (ToH) backup scheme is a useful compromise. Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In the puzzle a series of rings are stacked in size order, the largest on the bottom, on one of three pegs. The goal is to move the ring series to the third peg.
Tower of Hanoi by Acronis The Tower of Hanoi backup scheme is generally too complex to mentally calculate the next media to be used. But Acronis Backup & Recovery 10 provides you with automation of the scheme usage. You can set up the backup scheme while creating a backup plan.
For information about using Tower of Hanoi for tape libraries, see Using the Tower of Hanoi tape rotation scheme. 2.7. Retention rules The backups produced by a backup plan make an archive. The two retention rules described in this section enable you to limit the archive size and set the lifetime (retention period) of the backups. 1. Delete backups older than This is a time interval counted back from the moment when the retention rules are applied.
There is a certain risk that all but one backup will be deleted if the maximum archive size is set improperly (too small) or a regular backup turns out to be too large. To protect the recent backups from deletion, select the Never delete backups younger than check box and specify the maximum age of backups that must be retained. The diagram below illustrates the resulting rule. Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size.
• Retain the backup until all dependent backups become subject to deletion The outdated backup will be kept until all backups that depend on it also become outdated. Then all the chain will be deleted at once during the regular cleanup. This mode helps to avoid the potentially time-consuming consolidation but requires extra space for storing backups whose deletion is postponed. The archive size and/or the backup age can exceed the values you specify.
Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic GPT volumes. Backing up dynamic volumes Dynamic and basic GPT volumes are backed up in the same way as basic MBR volumes. When creating a backup plan through the GUI, all types of volumes are available for selection as Items to back up. When using the command line, specify the dynamic and GPT volumes with the DYN prefix.
o o If the data size is less than 20GB, then one disk can hold, say, 10GB; the other will hold the remaining 10GB. This way, a striped volume will be created on both disks and 20GB on the second disk will remain unallocated. If the data size is more than 20GB, the data cannot be distributed evenly between the two disks, but can fit into a single simple volume. A simple volume accommodating all the data will be created on the second disk. The first disk will remain untouched.
2.9. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape drives as storage devices. A tape device can be locally attached to a managed machine (in this case, the Acronis Backup & Recovery 10 Agent writes and reads the tapes) or accessed through the Acronis Backup & Recovery 10 Storage Node. Storage nodes ensure fully automatic operation of tape libraries and autoloaders. Backup archives created using different ways of access to tape have different formats.
Tape written on a tape device through... Backup Server Storage Node 2.9.2. ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 - - - + Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device. The functionality of a locally attached autoloader or tape library is limited to the ordinary tape drive.
Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape containing the backup you need to recover. When creating a recovery task, select the tape device from the list of available locations and then select the backup. After recovery is started, you will be prompted for other tapes if the tapes are needed for recovery. 2.10.
With the new Acronis Secure Zone behavior, you obtain the ability to: • • list archives located in the zone and backups contained in each archive • • mount a disk backup to copy files from the backup to a physical disk examine a backup's content safely delete archives and backups from the archives. For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 81) section.
2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recovery 10 Universal Restore is the Acronis proprietary technology that helps recover and boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.
Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardware differences in devices that are not critical for the system start, such as video, audio and USB. Windows takes control over this process during the logon phase, and if some of the new hardware is not detected, you will have a chance to install drivers for it later manually. Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool.
Limitation The only supported archive location is a local drive, or more precisely, any device available through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or any internal hard drive. How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the selected disks or volumes in the backup.
4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Restore check box. Acronis Active Restore will choose for the boot-up and subsequent recovery the first operating system found during the backup scan. Do not try to recover more than one operating system using Active Restore if you want the result to be predictable. When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5.
3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 3.1. Console options The console options define the way information is represented in the Graphical User Interface of Acronis Backup & Recovery 10. To access the console options, select Options > Console options from the top menu. 3.1.1.
The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displaying of pop-up messages is disabled, you can review the task execution states and results in the Tasks view. The preset is: Enabled for all results. To make a setting for each result (successful completion, failure or success with warnings) individually, select or clear the respective check box. 3.1.3.
3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10. The Menu setting affects the drop-down and context menus. The Application setting affects the other GUI elements. The preset is: System Default font for both the menus and the application interface items.
You can further override the settings set in the default backup and recovery options, when creating a backup plan or a recovery task. The settings you obtain in this case will be plan-specific or taskspecific. The preset is: Disabled. To enable this option, select the Log events check box. Use the Types of events to log check box to filter the events to be logged in the Application Event Log of Windows: o o o All events - all events (information, warnings and errors) Errors and warnings Errors only.
o Community – type the name of the SNMP community to which both the host running SNMP management application and the sending machine belong. The typical community is "public". To disable sending SNMP messages, clear the Send messages to SNMP server check box. The messages are sent over UDP. The next section contains additional information about Setting up SNMP services on the receiving machine (p. 48). 3.2.1.3.
3.3. Default backup and recovery options 3.3.1. Default backup options Each Acronis agent has its own default backup options. Once an agent is installed, the default options have pre-defined values, which are referred to as presets in the documentation. When creating a backup plan, you can either use a default option, or override the default option with the custom value that will be specific for this plan only.
Backup priority (p. 58) + + - - HDD writing speed (p. 59) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p. 59) Dest: network share Dest: network share Dest: network share Dest: network share Fast incremental/differential backup (p. 63) + - + - Backup splitting (p. 63) + + + + Preserve files’ security settings in archives - + - - In archives, store encrypted files in decrypted state - + - - Media components (p.
Reboot after the backup - - + + E-mail (p. 60) + + - - Win Pop-up (p. 61) + + - - Windows events log (p. 61) + + - - SNMP (p. 62) + + - - Notifications: Event tracing: 3.3.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable media. This option is effective for both disk-level and file-level backup. The preset is: Disabled. To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2.
The option defines which files and folders to skip during the backup process and thus exclude from the list of backed-up items. The preset is: Exclude files matching the following criteria: *.tmp, *.~, *.bak. To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute.
The following scheme illustrates when pre/post commands are executed. Pre-backup command Backup Post-backup command Examples of how you can use the pre/post commands: • • • delete some temporary files from the disk before starting backup configure a third-party antivirus product to be started each time before the backup starts copy an archive to another location after the backup ends. The program does not support interactive commands, i.e. commands that require user input (for example, "pause").
the command is successfully executed. Fail the task if the command execution fails. executed despite execution failure or success. the command execution and irrespective of the command execution result. Post-backup command To specify a command/executable file to be executed after the backup is completed 1. In the Command field, type a command or browse to a batch file. 2. In the Working directory field, specify a path to a directory where the command/batch file will be executed. 3.
To specify pre/post data capture commands 1. Enable pre/post data capture commands execution by checking the following options: o Execute before the data capture o Execute after the data capture 2. Do any of the following: o Click Edit to specify a new command or a batch file o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture command To specify a command/batch file to be executed before data capture 1.
3. In the Arguments field specify the command’s execution arguments, if required. 4. Depending on the result you want to obtain, select the appropriate options as described in the table below. 5. Click Test command to check if the command is correct.
3.3.1.6. Multi-volume snapshot This option is effective only for Windows operating systems. This option applies to disk-level backup. This option also applies to file-level backup when the filelevel backup is performed by taking a snapshot. (The File-level backup snapshot (p. 56) option determines whether a snapshot will be taken during file-level backup). The option determines whether to take snapshots of multiple volumes at the same time or one by one. The preset is: Enable.
vssadmin list writers Note: In Microsoft Windows Small Business Server 2003, the writer for Microsoft Exchange Server 2003 is turned off by default. For instructions on how to turn it on, see the corresponding Microsoft Help and Support article http://support.microsoft.com/kb/838183/en. 3.3.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable media. The option defines the level of compression applied to the data being backed up. The preset is: Normal.
To specify the backup process priority Select one of the following: • Low – to minimize resources taken by the backup process, leaving more resources to other processes running on the machine • Normal – to run the backup process with normal speed, allocating resources on a par with other processes • High – to maximize the backup process speed by taking resources from other processes. HDD writing speed This option is effective for Windows and Linux operating systems and bootable media.
• Click Transferring speed stated in kilobytes per second, and then enter the bandwidth limit for transferring backup data in kilobytes per second. 3.3.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about backup completion through e-mail or the messaging service. E-mail This option is effective for Windows and Linux operating systems. This option is not available when operating under the bootable media.
• • Port – set the port of the SMTP server. By default, the port is set to 25. • Password – enter the password. User name – enter the user name. 6. Click Send test e-mail message to check if the settings are correct. Messenger service (WinPopup) This option is effective for Windows and Linux operating systems on the sending machine and only for Windows on the receiving machine. This option is not available when operating under bootable media.
The preset is: Use the setting set in the Machine options. To select whether to log the backup operations events in the Application Event Log of Windows: Choose one of the following: • Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 46). • Log the following event types – to log events of the backup operations in the Application Event Log.
Click Send test message to check if the settings are correct. • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP managers. 3.3.1.12. Fast incremental/differential backup The option is effective in Windows and Linux operating systems and bootable media. This option is effective for incremental and differential disk-level backup.
Fixed size Enter the desired file size or select it from the drop-down list. The backup will then be split into multiple files of the specified size. This comes in handy when creating a backup that you plan to burn to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since data recovery directly from an FTP server requires the backup to be split into files no more than 2GB in size. 3.3.1.14.
When backing up to removable media, you can make this media work as regular Linux-based bootable media (p. 211) by writing additional components to it. As a result, you will not need a separate rescue disc. The preset is: None selected. Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is the minimal addition to a disk backup stored on removable media, allowing for easy recovery from this backup.
Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up window each time it comes across a bad sector and ask for a user decision as to whether to continue or stop the backup procedure. In order to back up the valid information on a rapidly dying disk, enable ignoring bad sectors. The rest of the data will be backed up and you will be able to mount the resulting disk backup and extract valid files to another disk. 3.3.1.17.
This option determines the program behavior in case a backup task is about to start (the scheduled time comes or the event specified in the schedule occurs), but the condition (or any of multiple conditions) is not met. For more information on conditions please see Scheduling (p. 87) and Conditions (p. 97). The preset is: Wait until the conditions are met.
This option is not available when operating under the bootable media. This option determines the program behavior when any of the backup plan's tasks fails. The preset is not to restart a failed task. The program will try to execute the failed task again if you select the Restart a failed task check box and specify the number of attempts and the time interval between the attempts.
Ask for the first media while backing up to removable media This option is effective only when backing up to removable media. The option defines whether to display the Insert First Media prompt when backing up to removable media. The preset is: Enabled. When the option is enabled, backing up to removable media may be not possible if the user is away, because the program will wait for someone to press OK in the prompt box. Hence, you should disable the prompt when scheduling a backup to removable media.
The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target). Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node. The eventual size of the backup in the vault is independent of whether deduplication at source is turned on.
• • The environment the agent operates in (Windows, bootable media) • The operating system being recovered from the disk backup The type of data being recovered (disk, file) The following table summarizes the availability of the recovery options. Agent for Windows Bootable media (Linux-based or PEbased) Disk recovery File recovery Disk recovery (also from a disk backup) File recovery (also from a disk backup) Pre/Post recovery commands (p. 72) + + PE only PE only Recovery priority (p.
Event tracing: Windows events log (p. 76) + + - - SNMP (p. 76) + + - - 3.3.2.1. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to define the commands to be automatically executed before and after the data recovery.
Do not recover until the command execution is complete Selected Selected Cleared Cleared Perform the recovery after the command is executed despite execution failure or success. N/A Perform the recovery concurrently with the command execution and irrespective of the command execution result. Result Preset Perform the recovery only after the command is successfully executed. Fail the task if the command execution failed.
To specify the recovery process priority Select one of the following: • Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine • Normal – to run the recovery process with normal speed, allocating resources on a par with other processes • High – to maximize the recovery process speed by taking resources from the other processes. 3.3.2.3.
5. Click Additional e-mail parameters, to configure additional e-mail parameters as follows, then click OK: o From - type the e-mail address of the user from whom the message will be sent. If you leave this field empty, messages will be constructed as if they are from the destination address. o Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types are available for selection.
The When user interaction is required check box – to send notification during the operation when user interaction is required – is always selected. 4. Click Send Test WinPopup Message to check if the settings are correct. 3.3.2.5. Event tracing It is possible to duplicate log events of the recovery operations, performed on the managed machine, in the Application Event Log of Windows; or send the events to the specified SNMP managers.
The preset is: Use the setting set in the Machine options. To select whether to send the recovery operations events to the SNMP managers: Choose one of the following: • Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 46). • Send SNMP notifications individually for recovery operation events – to send the events of the recovery operations to the specified SNMP managers.
3.3.2.7. Additional settings Specify the additional settings for the recovery operation by selecting or clearing the following check boxes. Set current date and time for recovered files This option is effective only when recovering files. The preset is Enabled. This option defines whether to recover the files’ date and time from the archive or assign the files the current date and time. Validate backup before recovery The preset is Disabled.
Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system. You do not need a new SID when recovering a system over itself or when creating a system replica that will replace the original system. Generate a new SID if the original and the recovered systems will work concurrently in the same workgroup or domain. Use FTP in Active mode The preset is: Disabled.
4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata makes for fast and convenient operations with archives and backups stored in the vault. A vault can be organized on a local or networked drive, detachable media or a tape device attached to the Acronis Backup & Recovery 10 Storage Node. There are no settings for limiting a vault size or number of backups in a vault.
Click any personal vault in the vaults tree to open the detailed view of this vault (p. 81) and to take actions on the vault (p. 82), archives (p. 84) and backups (p. 85) stored in there. 4.1. Personal vaults A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each managed machine. Personal vaults are visible to any user that can log on to the system.
The legend displays the following information about the vault: • • full path to the vault • the ratio of the occupied space to the original data size. total number of archives and backups stored in the vault Vault content The Vault content section contains the archives table and toolbar. The archives table displays archives and backups that are stored in the vault. Use the archives toolbar to perform actions on the selected archives and backups.
Change user account for accessing a vault Click Change user. In the appearing dialog box, provide the credentials required for accessing the vault. Create Acronis Secure Zone Click Explore a vault's content Click Create Acronis Secure Zone. The procedure of creating the Acronis Secure Zone is described in-depth in the Creating Acronis Secure Zone (p. 170) section. Explore. In the appearing Explorer window, examine the selected vault's content. Validate a vault Click Validate.
How can I merge two vaults? Suppose you have two vaults A and B in use. Both vaults are used by backup plans. You decide to leave only vault B, moving all the archives from vault A there. To do this, proceed as follows 1. Make sure that none of the backup plans uses vault A while merging, or temporarily disable (p. 111) schedules of the given plans. 2. Move the archives to vault B manually by means of a third-party file manager. 3.
The program duplicates your selection in the new window that has check boxes for each archive and each backup. Review the selection and correct if need be, then confirm the deletion. 4.2.2. Operations with backups To perform any operation with a backup, you have to select it first. To select a backup, expand the archive, then click the backup. If the archive is protected with a password, you will be asked to provide it.
4.2.3. Deleting archives and backups The Backups deletion window displays the same tab as for the vaults view, but with check boxes for each archive and backup. The archive or backup you have chosen to delete has the check mark. Review the archive or backup that you have selected to delete. If you need to delete other archives and backups select the respective check boxes, then click Delete selected and confirm the deletion. The filters in this window are from the archives list of the vault view.
5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data safely protected. The scheduler uses local time of the machine the backup plan exists on. Before creating a schedule, be sure the machine’s date and time settings are correct. Schedule To define when a task has to be executed, you need to specify an event or multiple events.
The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not met is defined by the Task start conditions (p. 66) backup option. What-ifs • What if an event occurs (and a condition, if any, is met) while the previous task run has not completed? The event will be ignored. • What if an event occurs while the scheduler is waiting for the condition required by the previous event? The event will be ignored.
Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day(s). 2. Once at: 06:00:00 PM. 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6PM. If you have created the task after 6 PM, the task will be started for the first time on the next day at 6 PM. To: not set. The task will be performed for an indefinite number of days.
The obvious way is to add five simple schedules. If you spend one minute for examination, you can think out a more optimal way. As you can see, the time interval between the first and the second task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the optimal way is to add two schedules to the task. First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2009. To: not set. Second daily schedule 1.
Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10 Management Server. To specify these settings, click Change in the Advanced settings area. All the settings you made are displayed in the Result field at the bottom of the window. Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six months. The schedule's parameters are thus set up as follows. 1.
Several weekly schedules for one task In the case when the task needs to be run on different days of the weeks with different time intervals, consider adding a dedicated schedule to every desired day of the week, or to several days. For example, you need the task to be run with the following schedule: • • • • Monday: twice at 12 PM (noon) and 9 PM • • • Friday: twice at 12 PM and 9 PM (i.e.
5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a monthly schedule In the Schedule area, select the appropriate parameter as follows: Months: <...> Select a certain month(s) you want to run the task in. Days: <...> Select specific days of the month to run the task on. You can also select the last day of the month, irrespective of its actual date. On: <...> <...> Select specific days of the weeks to run the task on.
This schedule is widely used when creating a custom backup scheme. The "Last day of every month" schedule is added to the full backups, while the differential backups are scheduled to be performed once a week and incremental on workdays. For more details, see the Monthly full, weekly differential, and daily incremental backups plus cleanup example in the Custom backup scheme (p. 132) section. "Season" schedule Run the task on all workdays during the northern autumn seasons of 2009 and 2010.
2. On: . 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. Third schedule 1. Months: June, July, August. 2. Days: 1, 15. 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. 5.4. At Windows Event Log event This type of schedule is effective only in Windows operating systems.
Examples "Bad block" emergency backup One or more bad blocks that have suddenly appeared on a hard disk usually indicate that the hard disk drive will soon fail. Suppose that you want to create a backup plan that will back up hard disk data as soon as such a situation occurs. When Windows detects a bad block on a hard disk, it records an event with the event source disk and the event number 7 into the System log; the type of this event is Error.
To view properties of an event, including the event source and event number 1. In Event Viewer, click the name of a log that you want to view—for example, Application. Note: To be able to open the security log (Security), you must be a member of the Administrators group. 2. In the list of events in the right pane, double-click the name of an event whose properties you want to view. 3.
5.5.1. User is idle Applies to: Windows "User is idle" means that a screen saver is running on the managed machine or the machine is locked. Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If the user is still active by 11PM, run the task anyway. • • • Event: Daily, every 1 day(s); Once at: 09:00:00 PM. Condition: User is idle. Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s).
Restricts a backup task's start time to a specified interval. Example A company uses different locations on the same network-attached storage for backing up users data and servers. The workday starts at 8AM and ends at 5 PM. Users' data should be backed up as soon as the users log off, but not earlier than 4:30 PM and not later than 10 PM. Every day at 11 PM the company's servers are backed up. So, all the users' data should be preferably backed up before this time, in order to free network bandwidth.
Example Run the backup task at 8 PM on the first and third Friday of every month, preferably when all users are logged off. If one of the users is still logged on at 11 PM, run the task anyway. • Event: Monthly, Months: ; On: , ; Once at 08:00:00 PM. • • Condition: User logged off. Task start conditions: Wait until the conditions are met, Run the task anyway after 3 hour(s). As a result, (1) If all users are logged off at 8PM, the backup task will start at 8PM.
6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection. The content of this section is applicable to both stand-alone and advanced editions of Acronis Backup & Recovery 10. 6.1. Administering a managed machine This section describes the views that are available through the navigation tree of the console connected to a managed machine, and explains how to work with each view. 6.1.1.
Bootable media was not created Create now To be able to recover an operating system when the machine fails to boot, you must: 1 Back up the system volume (and the boot volume, if it is different) 2 Create at least one bootable media (p. 211). Create now will launch the Bootable Media Builder (p. 218). No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on the machine for a relatively long period of time.
If you select the check box for the Do not show this window when tasks require interaction. I will see this information in the tasks' details and dashboard. parameter, the tasks will be displayed on the Dashboard among other alerts and warnings. Alternatively, you can review the task execution states in the Backup plans and tasks (p. 103) view and specify your decision on each task in the Information panel (or in the Task details (p. 111) window). 6.1.2.
1 State How it is determined How to handle Need interaction At least one task needs user interaction. Identify the tasks that need interaction (the program will display what action is needed) -> Stop the tasks or enable the tasks to run (change media; provide additional space on the vault; ignore the read error; create the missing Acronis Secure Zone). Otherwise, see 2. 2 Running At least one task is running. No action is required. Otherwise, see 3. 3 Waiting At least one task is waiting.
plan's execution can be resumed using the Restart button. 2 Warning At least one task has succeeded with warnings. View the log to read the warnings -> [optionally] Perform actions to prevent the future warnings or failure. Otherwise, see 3. 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK in case none of the tasks has been started yet or some of the tasks are stopped or being stopped. These situations are considered as normal.
Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A task status is derived from the result of the last run of the task.
6.1.2.2. Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you to perform operations with backup plans and tasks. To Do Create a new backup plan, or a task Click View details of a plan/task New, then select one of the following: • Backup plan (p. 117) • Recovery task (p. 137) • Validation task (p. 157) Backup plan Click View details. In the Plan Details (p. 113) window, review the plan details. Task View details.
Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all the task operations will be aborted. Task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, exporting, conversion, migration). The task enters the Stopping state first, then becomes Idle. The task schedule, if created, remains valid. To complete the operation you will have to run the task over again.
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 117), except for the following limitations: It is not always possible to use all scheme options, when editing a backup plan if the created archive is not empty (i.e. contains backups). 1 It is not possible to change the scheme to Grandfather-Father-Son or Tower of Hanoi. 2 If the Tower of Hanoi scheme is used, it is not possible to change the number of levels.
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan? • The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of its tasks is running. • Do not have the appropriate privilege Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users. • The backup plan has a centralized origin.
Filter plans and tasks by state, status, type, origin, last result, schedule. In the field below the corresponding header, select the required value from the list. Configuring backup plans and the tasks table By default, the table has six columns that are displayed, others are hidden. If required, you can hide the displayed columns and show hidden ones. To show or hide columns 1. Right-click any column header to open the context menu.
Types of tasks Task name Description Backup (disk) Backing up disks and volumes Backup (file) Backing up files and folders Backup (virtual machine) Backing up an entire virtual machine or its volumes Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recovery (MBR) Master boot record recovery Recovery (disk to existing VM) Recovery of a disk/volume backup to an existing virtual machine Recovery (disk to new
Provides details on the selected backup: when it was created, its type (full, incremental, differential), information on the archive and the vault the backup is stored in. Settings The Settings tab displays information on scheduling and the options changed against the default values. Progress The Progress tab is available while the task is running. It is common for all types of tasks. The tab provides information about task progress, elapsed time and other parameters.
Destination The Destination tab provides the following information: • • Location - name of the vault or path to the folder, where the archive is stored. • Archive comments - comments on the archive (if provided). Archive name - name of the archive. Settings The Settings tab displays the following information: • • • Backup scheme - the selected backup scheme and all its settings with schedules.
6.1.3.1. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these operations can also be performed with the context menu (by right-clicking the log entry), or with the Log actions bar (on the Actions and tools pane). The following is a guideline for you to perform actions on log entries. To Do Select a single log entry Click on it.
to filter information messages Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed entity type) column header, select the backup plan or the type of managed entity from the list. Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machine name, owner name, etc.) in the field below the respective column header.
The log entry's details that you copy will have the appearance as follows: ---------------------------Log Entry Details--------------------------Type: Information Date and time: DD.MM.YYYY HH:MM:SS Backup plan: Backup plan name Task: Task name Message: Description of the operation Code: 12(3x45678A) Module: Module name Owner: Owner of the plan ----------------------------------------------------------------------- Date and time presentation varies depending on your locale settings. 6.2.
Exclusions (p. 122) [Optional] Set up exclusions for the specific types of files you do not wish to back up. To access this option, select the Advanced view check box. Where to back up Archive (p. 123) Specify path to the location, where the backup archive will be stored, and the archive name. It is advisable that the archive name be unique within the location. The default archive name is Archive(N) where N is the sequence number of the archive in the location you have selected. Access credentials (p.
Not available on machines running Linux By setting up regular conversion, you obtain a copy of your server or workstation on a virtual machine which can be readily powered on in case the original machine fails. The conversion can be performed by the same agent that performs the backup or by an agent installed on another machine. If the latter is the case, you need to store the archive in a shared location, such as a network folder or a managed vault, so that the other machine can access the archive.
o Use the following credentials The tasks will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK. To learn more about operations available depending on the user privileges, see the Users' privileges on a managed machine (p. 23) section. 6.2.3.
If your operating system and its loader reside on different volumes, always include both volumes in the backup. The volumes must also be recovered together; otherwise there is a high risk that the operating system will not start. 2. [Optional] To create an exact copy of a disk or volume on a physical level, select the Back up sector-by-sector check box. The resulting backup will be equal in size to the disk being backed up (if the Compression level option is set to “None”).
6.2.5. Access credentials for source Specify the credentials required for access to the data you are going to backup. To specify credentials 1. Select one of the following: o Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section. o Use the following credentials The program will access the source data using the credentials you specify.
Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file named test.log located in the folder C:\Finance Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1.
2. Using the archives table To assist you with choosing the right destination, the table displays the names of the archives contained in each location you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3.
Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) • Password. The password for the account. 2. Click OK. Warning: According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 6.2.9.
Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in the archive, a full backup will be created regardless of your selection. Date and time Specify when to start the backup. The task will be started manually Select this check box, if you do not need to put the backup task on a schedule and wish to start it manually afterwards. 6.2.9.3.
• • Monthly ("Grandfather") backups are full; • Daily ("Son") backups are incremental. Weekly ("Father") backups are differential; Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The default value is Workdays.
Backup scheme parameters can then be set up as follows. • • Start backup at: 11:00 PM • • Weekly/monthly: Saturday (for example) Back up on: All days Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be available for seven days since creation.
• Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (daily incremental backup). • Have a weekly summary of file changes since last month (Friday weekly differential backup). • Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months.
• • One backup of each level is stored at a time Higher density of more recent backups Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 88), weekly (p. 90), or monthly (p. 93) schedule.
Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to have is called the roll-back period. The following table shows full backup and roll-back periods for schemes of various levels.
6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full backup can be set up to run every Sunday at 1:00 AM as soon as all users are logged off. Incremental Specifies on what schedule and under which conditions to perform an incremental backup.
backup for some reason. Apply the rules Specifies when to apply the retention rules (p. 31). (only if the retention rules are set) For example, the cleanup procedure can be set up to run after each backup, and also on schedule. This option is available only if you have set at least one retention rule in Retention rules. Cleanup schedule Specifies a schedule for archive cleanup. (only if On schedule is selected) For example, the cleanup can be scheduled to start on the last day of each month.
Full backup: Schedule: Monthly, every Last Sunday of the month, at 9:00 PM Incremental: Schedule: Weekly, every workday, at 7:00 PM Differential: Schedule: Weekly, every Saturday, at 8:00 PM Further, we want to add conditions that have to be satisfied for a backup task to start. This is set up in the Conditions fields for each backup type.
You can run any of these backup tasks by selecting it from the list of tasks in the Backup plans and tasks section in the left pane. If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks: three backup tasks and one cleanup task. 6.2.10. Archive validation Set up the validation task to check if the backed up data is recoverable. If the backup could not pass the validation successfully, the validation task fails and the backup plan gets the Error status.
6.2.11.2. Selecting a host that will perform conversion Specify the machine that will perform the conversion. The machine has to have Acronis Backup & Recovery 10 Agent for Windows, Agent for ESX/ESXi or Agent for Hyper-V installed. Take into account the following considerations. Which agent is installed on the host? The resulting virtual machine type and location depend on the agent that resides on the selected host.
Since the space is not pre-allocated, the physical disk on which the virtual machine will run is expected to have sufficient free space for the virtual disks to increase in size. 6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running the operating system and create the recovery task.
Task credentials (p. 140) [Optional] The task will run on behalf of the user who is creating the task. You can change the task account credentials if necessary. To access this option, select the Advanced view check box . What to recover Archive (p. 140) Select the archive to recover data from. Data type (p. 140) Applies to: disk recovery Choose the type of data you need to recover from the selected disk backup. Content (p. 141) Select the backup and content to be recovered. Access credentials (p.
[Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (p. 150) Use the Acronis Universal Restore when you need to recover and boot up Windows on dissimilar hardware. Automatic drivers search Specify where the program should search for HAL, mass storage and network adapter drivers. Acronis Universal Restore will install drivers that better fit the target hardware.
To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 23) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 23) section. 6.3.2. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
• • Disks - to recover disks • Files - to recover specific files and folders Volumes - to recover volumes 6.3.4. Content selection The representation of this window depends on the type of data stored in the archive. 6.3.4.1. Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive backups by its creation date and time. Thus, you can revert the disk data to a certain moment in time. Specify the items to recover.
6.3.5. Access credentials for location Specify the credentials required for access to the location where the backup archive is stored. To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the task account specified in the General section. o Use the following credentials The program will access the location using the credentials you specify.
The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displayed in the Virtual Machine Settings (p. 147) section. Check the settings and make changes if necessary. Then you proceed to the regular disk mapping procedure described below. Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed.
• Create new The program will generate a new NT signature for the target hard disk drive. • Recover from backup The program will replace the NT signature of the target hard disk with one from the disk backup. Recovering the disk signature may be desirable due to the following reasons: o Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk.
Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 145) Choose the disk to recover the Master Boot Record to. NT signature: (p. 143) Select the way the disk's signature contained in the MBR will be handled. The disk signature is used by Windows and the Linux kernel version 2.6 and later. Recover [Volume] [Letter] to: Disk # /Volume (p. 145) Sequentially map each of the source volumes to a volume or an unallocated space on the destination disk. Size (p.
Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and multiple logical drives. By default, the program selects the original volume's type. You can change this setting, if required. • Primary. Information about primary volumes is contained in the MBR partition table. Most operating systems can boot only from the primary volume of the first hard disk, but the number of primary volumes is limited.
To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the virtualization server that I select option. 2. In the left part of the window, select the virtualization server. Use the right part of the window to review details on the selected server. 3. Click OK to return to the Data recovery page. To select the type of virtual machine 1. Choose the Save as files of the VM type that I select to the folder that I specify option. 2.
This is the number of processors of the new virtual machine. In most cases it is set to one. The result of assignment of more than one processor to the machine is not guaranteed. The number of virtual processors may be limited by the host CPU configuration, the virtualization product and the guest operating system. Multiple virtual processors are generally available on multi-processor hosts. A multicore host CPU or hyperthreading may enable multiple virtual processors on a single-processor host. 6.3.6.5.
Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file named test.log located in the folder C:\Finance Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and starting with “my”. The above settings are not effective for the files or folders that were explicitly selected for recovery.
• Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the recovery task: • • Recover now - the recovery task will be started immediately after you click the final OK. Recover later - the recovery task will be started at the date and time you specify. If you do not need to schedule the task and wish to start it manually afterwards, select the Task will be started manually (do no schedule the task) check box. 6.3.9.
- If the drivers are on a vendor's disc or other removable media, turn on the Search removable media. - If the drivers are located in a networked folder or on the bootable media, specify the path to the folder in the Search folder field. During recovery, Universal Restore will perform the recursive search in all the sub-folders of the specified folder, find the most suitable HAL and HDD controller drivers of all those available, and install them into the recovered system.
XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation machine can be converted to the open virtualization format (OVF) using the VMware OVF tool. With Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi, you can recover a disk (volume) backup to a new virtual machine on the respective virtualization server. To convert a disk backup to a virtual machine: 1.
6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it will boot after recovery. However, the information the operating system stores and uses for booting up may become outdated during recovery, especially if you change volume sizes, locations or destination drives. Acronis Backup & Recovery 10 automatically updates Windows loaders after recovery. Other loaders might also be fixed, but there are cases when you have to re-activate the loaders.
• The system loader points to the wrong volume This may happen when system or boot volumes are not recovered to their original location. Solution: Modification of the boot.ini or the boot\bcd files fixes this for Windows loaders. Acronis Backup & Recovery 10 does this automatically and so you are not likely to experience the problem. For the GRUB and LILO loaders, you will need to correct the GRUB configuration files.
The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu item. o The device on which the Linux kernel is located—typically, this is the boot partition or the root partition, such as root (hd0,0) in this example. o The path to the kernel on that device and the root partition—in this example, the path is /vmlinuz-2.6.24.4 and the root partition is /dev/sda2.
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect Windows Vista/2008 A part of the loader resides in the partition boot sector, the rest is in the files bootmgr, boot\bcd. At starting Windows, boot\bcd is mounted to the registry key HKLM \BCD00000000. 6.3.12.
6.4. Validating vaults, archives and backups Validation is an operation that checks the possibility of data recovery from a backup. Validation of a file backup imitates recovery of all files from the backup to a dummy destination. Validation of a disk or volume backup calculates a checksum for every data block saved in the backup. Both procedures are resource-intensive. Validation of an archive will validate all the archive's backups.
Access Credentials (p. 160) [Optional] Provide credentials for accessing the source if the task account does not have enough privileges to access it. To access this option, select the check box for Advanced view. When to validate Validate (p. 160) Specify when and how often to perform validation. After you configure all the required settings, click OK to create the validation task. 6.4.1. Task credentials Provide credentials for the account under which the task will run. To specify credentials 1.
o If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself.
• To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer.
o o • Date and time - the date and time when to start the task. The task will be started manually (do not schedule the task) - select this check box, if you wish to start the task manually later. On schedule - to schedule the task. To learn more about how to configure the scheduling parameters, please see the Scheduling (p. 87) section. 6.5. Mounting an image Mounting volumes from a disk backup (image) lets you access the volumes as though they were physical disks.
6.5.1. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree. o If the archive is stored in a centralized vault, expand the Centralized group and click the vault. o If the archive is stored in a personal vault, expand the Personal group and click the vault. o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder.
6.5.3. Access credentials To specify credentials 1. Select one of the following: o Use the current user credentials The program will access the location using the credentials of the current user. o Use the following credentials The program will access the location using the credentials you specify. Use this option if the current user account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify: • User name.
Exploring images Exploring mounted volumes lets you view and modify (if mounted in the read/write mode) the volume's content. Explore. The default file manager To explore a mounted volume select it in the table and click window opens, allowing the user to examine the mounted volume contents. Unmounting images Maintaining the mounted volumes takes considerable system resources. It is recommended that you unmount the volumes after the necessary operations are completed.
The resulting archive's name By default, the exported archive inherits the name of the original archive.
Different ways to create an export task Using the Export page is the most general way to create an export task. Here, you can export any backup, or archive you have permission to access. You can access the Export page from the Vaults view. Right-click the object to export (archive or backup) and select Export from the context menu. The Export page will be opened with the preselected object as a source. All you need to do is to select a destination and (optionally) provide a name for the task.
To specify credentials 1. Select one of the following: o Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. o Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name.
According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. o If the archive is stored on a locally attached tape device, expand the Tape drives group, then click the required device. 2. In the table to the right of the tree, select the archive.
6.7.5. Location selection Specify a destination where the exported object will be stored. Exporting backups to the same archive is not allowed. 1. Selecting the export destination Enter the full path to the destination in the Path field, or select the desired destination in the folders tree. • To export data to a centralized unmanaged vault, expand the Centralized vaults group and click the vault. • • To export data to a personal vault, expand the Personal vaults group and click the vault.
• • exporting part of an archive to the same location • exporting an archive or part of an archive to the same location twice exporting an archive or part of an archive to a location where an archive of the same name exists In any of the above cases, provide an archive name that is unique to the destination folder or vault. If you need to redo the export using the same archive name, first delete the archive that resulted from the previous export operation. 6.7.6.
To create Acronis Secure Zone, perform the following steps. Space Disk (p. 171) Choose a hard disk (if several) on which to create the zone. Acronis Secure Zone is created using unallocated space, if available, or at the expense of the volume's free space. Size (p. 171) Specify the exact size of the zone. Moving or resizing of locked volumes, such as the volume containing the currently active operating system, requires a reboot. Settings Password (p.
6.8.1.3. Password for Acronis Secure Zone Setting up a password protects the Acronis Secure Zone from unauthorized access. The program will ask for the password at any operation relating to the zone and the archives located there, such as data backup and recovery, validating archives, resizing and deleting the zone. To set up a password 1. Choose Use password. 2. In the Enter the password field, type a new password. 3. In the Confirm the password field, re-type the password. 4. Click OK.
If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. The zone does not perform automatic cleanup, that is, deleting old archives, anymore. Use backup schemes with automatic cleanup to back up to the zone, or delete outdated archives manually using the vault management functionality.
6.8.2.3. Deleting Acronis Secure Zone To delete the zone without uninstalling the program, proceed as follows: 1. In the Acronis Secure Zone Actions bar (on the Actions and tools pane), select Delete. 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from the zone and then click OK. If you select several volumes, the space will be distributed proportionally to each partition. If you do not select any volume, the freed space becomes unallocated.
6.10. Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media supported by a machine BIOS as a boot device) that boots on any PC-compatible machine and enables you to run Acronis Backup & Recovery 10 Agent either in a Linux-based environment or Windows Preinstallation Environment (WinPE), without the help of an operating system.
6.10.1. How to create bootable media To enable creating physical media, the machine must have a CD/DVD recording drive or allow a flash drive to be attached. To enable PXE or WDS/RIS configuration, the machine must have a network connection. Bootable Media Builder can also create an ISO image of a bootable disk to burn it later on a blank disk.
3. Install the Microsoft .NET Framework v.2.0 from this kit (NETFXx86 or NETFXx64, depending on your hardware.) 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AIK from this kit. 6. Install Bootable Media Builder on the same machine. It is recommended that you familiarize yourself with the help documentation supplied with Windows AIK. To access the documentation, select Microsoft Windows AIK -> Documentation from the start menu.
o upload the selected components to a WDS/RIS. 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 181). This window appears only if the Acronis Universal Restore add-on is installed and a media other than PXE or WDS/RIS is selected. 9. Path to the media ISO file or the name or IP and credentials for PXE or WDS/RIS. Kernel parameters This window lets you specify one or more parameters of the Linux kernel. They will be automatically applied when the bootable media starts.
nousb Disables loading of the USB (Universal Serial Bus) subsystem. nousb2 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you to use some USB drives in the USB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing on some hardware. nofw Disables the FireWire (IEEE1394) interface support. nopcmcia Disables detection of PCMCIA hardware.
• • DNS server WINS server. Once the bootable agent starts on a machine, the configuration is applied to the machine’s network interface card (NIC.) If the settings have not been pre-configured, the agent uses DHCP auto configuration. You also have the ability to configure the network settings manually when the bootable agent is running on the machine. Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network interface cards.
Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to the media. The drivers will be used by Universal Restore when recovering Windows on a machine with a dissimilar processor, different motherboard or different mass storage device than in the backed up system.
To add Acronis Plug-in to WinPE 1.x: 1. Unpack all files of your WinPE 1.x ISO to a separate folder on the hard disk. 2. Start the Bootable Media Builder either from the management console, by selecting Tools > Create Bootable Media or, as a separate component. 3. Select Bootable media type: Windows PE. o Select Use WinPE files located in the folder I specify 4. Specify path to the folder where the WinPE files are located. 5. Specify the full path to the resulting ISO file including the file name. 6.
4. [optional] Specify Windows drivers to be added to Windows PE 2.x. Once you boot a machine into Windows PE, the drivers can help you access the device where the backup archive is located. Click Add and specify the path to the necessary *.inf file for a corresponding SCSI, RAID, SATA controller, network adapter, tape drive or other device. You will have to repeat this procedure for each driver you want to be included in the resulting WinPE boot media. 5.
10. Specify the output folder and the full path to the resulting ISO file including the file name or the media to create. 11. Build the Bart PE. 12. Burn the ISO to CD or DVD (if this has not been done yet) or copy to a flash drive. Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -> Storage -> Acronis Backup & Recovery 10 to start. 6.10.2.
To access an unmanaged centralized vault, type the full path to the vault's folder. After entering access credentials, you will see a list of archives located in the vault. 6.10.3.1. Setting up a display mode For a machine booted from media, a display video mode is detected automatically based on the hardware configuration (monitor and graphics card specifications). If, for some reason, the video mode is detected incorrectly, do the following: 1. In the boot menu, press F11. 2.
5. If you want to allow writing data onto the device, specify the five-character write key. Without this key, the device will be available in the read-only mode. 6. Click OK. 6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based bootable media contains the following commands and command line utilities, which you can use when running a command shell. To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console.
fdisk mkswap swapon fsck more sysinfo fxload mount tar gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.10.5.
To create the volume structure by using the management console 1. Boot the machine from a Linux-based bootable media. 2. Click Acronis Bootable Agent. Then, click Run management console. 3. In the management console, click Recover. Under the archive contents, Acronis Backup & Recovery 10 will display a message saying that it detected information about the volume structure. 4. Click Details in the area with that message. 5. Review the volume structure, and then click Apply RAID/LVM to create it.
6. If you previously mounted the backup by using the trueimagemnt utility, use this utility again to unmount the backup (see "Mounting backup volumes" later in this topic). 7. Return to the management console by pressing CTRL+ALT+F1, or by running the command: /bin/product (Do not reboot the machine at this point. Otherwise, you will have to create the volume structure again.) 8. Click Recover, then specify the path to the archive and any other required parameters, and then click OK.
Caution: The pvcreate command destroys all data on the /dev/md0 and /dev/md1 devices. lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgroup /dev/md0 /dev/md1 lvm vgdisplay The output of the lvm vgdisplay command will contain lines similar to the following: --- Volume group --VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk7W-yDG3-uF1l-Q2AL-C0z0-vMeACu 5.
The output will contain lines similar to the following: Num Idx Partition Flags Start Size ---- --- --------- ----- ----- --------Disk 1: Table 0 Disk 2: Table 0 ... Dynamic & GPT Volumes: DYN1 4 my_volgroup-my_logvol 12533760 Type -----Table Table Ext2 You will need the volume's index, given in the Idx column, in the next step. 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimagemnt --mount /mnt --filename smb://server/backups/linux_machine.
1. Create a disk image of the disk on which volumes will be created or managed. Having your most important data backed up to another hard disk or CD will allow you to work on disk volumes being reassured that your data is safe. Acronis Backup & Recovery 10 is an extremely effective comprehensive data backup and recovery solution. It creates a data or disk backup copy stored in a compressed archive file that can be restored in case of any accident. 2.
6.11.4. "Disk management" view Acronis Disk Director Lite is controlled through the Disk management view of the console. The top part of the view contains a disks and volumes table enabling data sorting and columns customization and toolbar. The table presents the numbers of the disks, as well as assigned letter, label, type, capacity, free space size, used space size, file system, and status for each volume.
6.11.5.1. Disk initialization If you add any new disk to your machine, Acronis Disk Director Lite will notice the configuration change and scan the added disk to include it to the disk and volume list. If the disk is still not initialized or, possibly, has a file structure unknown to the machine system, that means that no programs can be installed on it and you will not be able to store any files there.
Selecting source and target disks The program displays a list of partitioned disks and asks the user to select the source disk, from which data will be transferred to another disk. The next step is selection of a disk as target for the cloning operation. The program enables the user to select a disk if its size will be sufficient to hold all the data from the source disk without any loss.
on the second disk will lose their letters, all paths will be invalid on the disk, and programs won't find their files. The operating system on that disk will be unbootable. You have the following two alternatives to retain system bootability on the target disk volume: 1. Copy NT signature – to provide the target disk with the source disk NT signature matched with the Registry keys also copied on the target disk. 2.
Please note: A GPT-partitioned disk reserves the space in the end of the partitioned area necessary for the backup area, which stores copies of the GPT header and the partition table. If the disk is full and the volume size cannot be automatically decreased, the conversion operation of the MBR disk to GPT will fail. The operation is irreversible.
2. Right-click on the selected volume, and then click Convert to dynamic in the context menu. You will receive a final warning about the basic disk being converted to dynamic. 3. If you click OK in this warning window, the conversion will be performed immediately and if necessary, your machine will be restarted. Please note: A dynamic disk occupies the last megabyte of the physical disk to store the database, including the four-level description (Volume-Component-Partition-Disk) for each dynamic volume.
In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when the size of one mirror establishes the size of the other mirror, or the last 8Mb of disk space are reserved for the future conversion of the disk from basic to dynamic). System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynamic to basic conversion of the disk, if: 1. There is a single Windows 2008/Vista operating system installed on the disk. 2.
• • Change Label (p. 205) - Changes the selected volume label Format Volume (p. 206) - Formats a volume giving it the necessary file system The full version of Acronis Disk Director will provide more tools and utilities for working with volumes. Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk management utilities (like Windows Disk Management utility) can access it at that time.
Mirrored Volume A fault-tolerant volume, also sometimes called RAID 1, whose data is duplicated on two identical physical disks. All of the data on one disk is copied to another disk to provide data redundancy. Almost any volume can be mirrored, including the system and boot volumes, and if one of the disks fails, the data can still be accessed from the remaining disks. Unfortunately, the hardware limitations on size and performance are even more severe with the use of mirrored volumes.
If the current operating system, installed on this machine, does not support the selected type of volume , you will receive the appropriate warning. In this case the Next button will be disabled and you will have to select another type of volume to proceed with the new volume creation. After you click the Next button, you will proceed forward to the next wizard page: Select destination disks (p. 202).
of one mirror establishes the size of the other mirror, or the last 8Mb of the disk space is reserved for the future conversion of the disk from basic to dynamic). For basic volumes if some unallocated space is left on the disk, you also will be able to choose the position of the new volume on the disk. If you click the Back button, you will be returned to the previous page: Select destination disks (p. 202). If you click the Next button, you will proceed to the next page: Set the volume options (p. 203).
6.11.6.2. Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is mainly a tool for preparing bare-metal systems for recovering previously saved volume images.
6.11.6.4. Change volume letter Windows operating systems assign letters (C:, D:, etc) to hard disk volumes at startup. These letters are used by applications and operating systems to locate files and folders in the volumes. Connecting an additional disk, as well as creating or deleting a volume on existing disks, might change your system configuration. As a result, some applications might stop working normally or user files might not be automatically found and opened.
6.11.6.6. Format volume You might want to format a volume if you want to change its file system: • to save additional space which is being lost due to the cluster size on the FAT16 or FAT32 file systems • as a quick and more or less reliable way of destroying data, residing in this volume If you want to format a volume: 1. Select a volume to format. 2. Right-click on the selected volume, and then click Format in the context menu.
The Commit action forwards you to the Pending Operations window, where you will be able to view the pending operation list. Clicking Proceed will launch their execution. You will not be able to undo any actions or operations after you choose the Proceed operation. You can also cancel the commitment by clicking Cancel. Then no changes will be done to the pending operation list.
Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup (p. 214) and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background.
Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and enables other management operations on the machine (p. 217), such as task management and operations with hard disks. The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers. Agent-side cleanup Cleanup (p. 213) performed by an agent (p.
Backup options Configuration parameters of a backup operation (p. 209), such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan (p. 210). Backup plan (Plan) A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies: • • • what data to back up where to store the backup archive (p. 209) (the backup archive name and location) the backup scheme (p.
3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 209) installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up. 5. On each machine, the agent installed on the machine creates a backup plan (p. 210) using other rules specified by the policy. Such backup plan is called a centralized plan (p. 212). 6.
A management server has two built-in groups that contain all machines of each type: All physical machines (p. 218), All virtual machines (p. 221). Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a physical machine from the built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p.
On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user's archives will be managed by the storage node as well as other archives stored in the vault. Cleanup Deleting backups (p. 209) from a backup archive (p. 209) in order to get rid of outdated backups or prevent the archive from exceeding the desired size.
Differential backup A differential backup stores changes to the data against the latest full backup (p. 216). You need access to the corresponding full backup to recover the data from a differential backup. Direct management Any management operation that is performed on a managed machine (p. 217) using the direct console (p. 213)-agent (p. 209) connection (as opposed to centralized management (p. 212) when the operations are configured on the management server (p.
and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine. For more information about disk groups please refer to the following Microsoft knowledge base article: 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/ Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000.
• IP address range. A machine remains in a dynamic group as long as the machine meets the group's criteria. The machine is removed from the group automatically as soon as • • the machine's properties change so that the machine does not meet the criteria anymore OR the administrator changes the criteria so that the machine does not meet them anymore. There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server.
F Full backup A self-sufficient backup (p. 209) containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup. G GFS (Grandfather-Father-Son) A popular backup scheme (p. 211) aimed to maintain the optimal balance between a backup archive (p. 209) size and the number of recovery points (p. 219) available from the archive.
Managed vault A centralized vault (p. 212) managed by a storage node (p. 219). Archives (p. 209) in a managed vault can be accessed as follows: bsp://node_address/vault_name/archive_name/ Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup (p. 220) and storage node-side validation (p. 220) for each archive stored in the managed vault.
Plan See Backup plan (p. 210). Policy See Backup policy (p. 210). R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machine (p. 217) managed by a management server (p. 218). A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration (p. 219) procedure. Registration A procedure that adds a managed machine (p. 217) to a management server (p. 218).
• prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malefactor, by using encrypted vaults (p. 216). Storage node-side cleanup Cleanup (p. 213) performed by a storage node (p. 219) according to the backup plans (p. 210) that produce the archives (p. 209) stored in a managed vault (p. 217). Being an alternative to the agentside cleanup (p. 209), the cleanup on the storage node side relieves the production servers of unnecessary CPU load.
U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. The Universal Restore is not available: • • when the machine is booted with Acronis Startup Recovery Manager (p. 208) (using F11) or • when using Acronis Active Restore (p.
Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 217) is considered virtual if it can be backed up from the virtualization host without installing an agent (p. 209) on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server.
Agent-side cleanup • 209, 220 Index A About Windows loaders • 155 Access credentials • 161, 163 Access credentials for archive location • 118, 124 Agent-side validation • 209, 220 Archive • 118, 123, 208, 209 Archive protection • 49, 51 Archive selection • 138, 140, 157, 158, 161, 162, 166, 167 Archive validation • 118, 135 At Windows Event Log event • 95 Access credentials for destination • 138, 149, 166, 170 B Access credentials for location • 138, 142 Back up later scheme • 125 Access credentials
Bootable agent • 39, 174, 208, 211 Creating a volume • 199, 200 Bootable components and media builder • 14 Creating Acronis Secure Zone • 83, 170 Bootable media • 14, 17, 65, 102, 137, 174, 175, 192, 208, 211, 214, 218 Building Bart PE with Acronis Plug-in from Windows distribution • 177, 183 Built-in group • 211 C Centralized backup plan • 38, 210, 211, 212 Centralized management • 212, 213, 214 Centralized task • 211, 212, 214 Centralized vault • 212, 218 Change volume label • 200, 205 Change volume
Drivers for Universal Restore • 178, 181 Grandfather-Father-Son scheme • 126 Dual destination • 38, 50, 66 H Dynamic disk • 33, 208, 214, 215, 216 Dynamic group • 212, 215 Dynamic volume • 33, 211, 216 E E-mail • 51, 60, 71, 74 Encrypted archive • 216 Encrypted vault • 216, 220 Error handling • 50, 65, 71, 77 Hardware requirements • 16 HDD writing speed • 50, 59 How to convert a disk backup to a virtual machine • 151 How to create bootable media • 176, 182 How to reactivate GRUB and change its configu
Managed vault • 213, 216, 218, 219, 220, 221 Management Console • 15 Management server (Acronis Backup & Recovery 10 Management Server) • 7, 45, 210, 211, 212, 213, 214, 215, 218, 219 Managing Acronis Secure Zone • 172 Managing mounted images • 163 MBR destination • 145 Media builder • 102, 218 Media components • 50, 64 Merging and moving personal vaults • 83 Personal vault • 208, 214, 218 Personal vaults • 39, 81 Physical machine • 212, 218 Plan • 219 Policy • 219 Pop-up messages • 44 Post-backup command
Selecting disks and volumes • 120 Technical support • 16 Selecting files and folders • 121 Temporarily disabling a backup plan • 83, 84, 111 Selecting source and target disks • 195 Selection rule • 210, 219 Set active volume • 199, 204 Set the volume options • 203 Set the volume size • 202, 203 Setting up a conversion schedule • 119, 135 Setting up a display mode • 185 Setting up regular conversion to a virtual machine • 135 Setting up SNMP services on the receiving machine • 48 Time since last backup
Volume properties • 145 Volume selection • 161, 163 Volume Shadow Copy Service • 49, 54, 57 Volumes • 138, 144 W Weekly schedule • 90, 130 When to recover • 138, 150 When to validate • 158, 160 Why is the program asking for the password? • 119 Windows event log • 46, 51, 61, 72, 76 WinPE (Windows Preinstallation Environment) • 208, 211, 222 Working under bootable media • 184 Working with backup plans and tasks • 107 Working with the • 81 228 Copyright © Acronis, Inc.