User’s Guide Acronis® True Image 9.
Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis® True Image Enterprise Server (the Software) is Copyright © Acronis, Inc., 20002007. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1.
Table of Contents Chapter 1. Introduction...........................................................................................8 1.1 1.2 1.3 1.4 1.5 Acronis® True Image Enterprise Server – a complete solution for corporate users.................. 8 Acronis True Image Enterprise Server Architecture............................................................... 9 License policy .................................................................................................................
3.10 Viewing disk and partition information............................................................................. 27 Chapter 4. Using Acronis True Image Management Console................................29 4.1 General information......................................................................................................... 29 4.2 Installing/updating Acronis components on a remote machine ............................................ 29 4.3 Managing a single remote computer .................
7.4 Setting restore options .................................................................................................... 70 7.4.1 7.4.2 7.4.3 7.4.4 7.4.5 7.4.6 7.4.7 Files to exclude from restoration ................................................................................ 70 Files overwriting mode .............................................................................................. 70 Pre/post commands ...............................................................................
13.4.1 Old and new disk partition layouts.......................................................................... 100 Chapter 14. Adding a new hard disk ...................................................................102 14.1 Selecting a hard disk ................................................................................................... 102 14.2 Creating new partitions ................................................................................................ 102 14.3 Disk add summary...
Chapter 1. Introduction 1.1 Acronis® True Image Enterprise Server – a complete solution for corporate users You have come to rely on your servers to run your business and retain key enterprise data. Acronis True Image Enterprise Server provides comprehensive, reliable, and cost-effective system backup and recovery for systems and entire networks. With Acronis True Image Enterprise Server you have peace of mind knowing you are protected and can recover from any situation.
Supports Cutting Edge Technology Businesses today are moving to leverage the latest technologies, dual-core 64 bit processors and 64 bit operating systems. With Acronis True Image Enterprise Server, you can protect these new machines, as well as legacy ones, running one solution. Leverages Existing Technology Investments The product can leverage your current storage infrastructure by supporting a wide variety of storage media, so you can avoid costly hardware purchases to implement the solution.
6. Acronis Universal Restore – an option to Acronis True Image Enterprise Server (a separately sold plug-in), enabling Windows to be recovered from an image created on different hardware. 7. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or RIS packages enabling data recovery in case of non-Windows or corrupted operating system. 1.
• Pre/post backup/restore commands – Users can specify their own commands which will be executed before and after the backup or restore process.
• Windows XP Professional x64 Edition • Windows Vista all Editions (except for installation of Acronis components on remote machines running Vista) Acronis True Image Agent for Windows Acronis True Image Enterprise Server Acronis Backup Server Acronis Group Server • Windows NT 4.0 Workstation SP6/2000 Professional SP4/XP Professional SP2 • Windows NT 4.
1.5.4 Supported storage media • Hard disk drives • Networked storage devices such as Storage Area Networks (SANs) and Network Attached Storage (NAS) • SCSI tape drives • IDE and SCSI RAID controllers of any level • FTP-servers* • CD-R/RW, DVD-R/RW, DVD+R (including double-layer DVD+R), DVD+RW, DVD-RAM** • USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices • ZIP®, Jaz® and other removable media * - an FTP-server must allow passive mode for file transfers.
Chapter 2. Acronis True Image Enterprise Server installation and starting 2.
installation (disabled by default) provides the ability to include Acronis True Image Enterprise Server into a Bart PE plug-in tab. The plug-in files will be placed into the component installation folder along with other program files. Acronis Secure Zone manager lets you create, delete and resize a special hidden partition for storing backup archives (see 3.3 Acronis Secure Zone).
Acronis Universal Restore can only be installed on a computer where at least one of the following Acronis components is installed: Acronis True Image Agent for Windows Acronis True Image Enterprise Server (local version) Bootable Media Builder.
2.3.2 Firewall setup Acronis True Image Enterprise Server uses the following ports and IP addresses for remote operation: • server (Acronis True Image Agent) UDP port: 9876 • server (Acronis True Image Agent) TCP port: 9876, if busy choose a port at random • client (Acronis True Image Management Console) UDP port: 9877, if busy choose a port at random • IPv4 multicast address: 239.255.219.45 • IPv6 multicast address: FF05::fAA5:741E. You might have to set the appropriate firewall access options.
2.5 Removing Acronis True Image Enterprise Server components You can remove any Acronis True Image Enterprise Server component separately by selecting Control panel -> Add or remove programs -> -> Remove. Then follow instructions on the screen. You may have to reboot your computer afterwards to complete the task. 18 Copyright © Acronis, Inc.
Chapter 3. General information proprietary Acronis technologies and 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this Guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone full backup may be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Alternatively, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
3.4 Acronis Startup Recovery Manager 3.4.1 How it works The Acronis Startup Recovery Manager enables starting Acronis True Image Enterprise Server on a local computer without loading the operating system. With this feature, if the operating system won't load for some reason, you can run Acronis True Image Enterprise Server by itself to restore damaged partitions.
The following will give you the first idea of Acronis Backup Server. For information on how to install Acronis Backup Server see 2.1.4 Acronis Backup Server installation and setup. For information on how to manage Acronis Backup Server see 4.5 Managing backup server. 3.5.1 Backup locations, their quotas and time limits Backup server is a networked computer where Acronis Backup Server is installed. A backup location is an automatically managed storage area for backups on a backup server local hard disk.
Administrator profiles are used for managing backups, created by backup tasks, remotely controlled from Acronis True Image Management Console. An administrator assigns a backup location and sets quotas and time limits for each computer running Acronis True Image Agent.
2. Writes on the hard disk its own drivers, which intercept system queries to the files. When the user opens files or launches applications, the drivers receive the system queries and restore the sectors that are necessary for the current operation. 3. At the same time, Acronis True Image Enterprise Server proceeds with the complete sector-by-sector image restoration in the background. However, the system requested sectors have the highest priority.
Using Microsoft System Preparation Tool (Sysprep) does not solve this problem, because Sysprep permits replacing drivers only for Plug-and-Play devices (sound cards, network adapters, video cards etc.). As for system Hardware Abstraction Layer (HAL) and mass storage device drivers, they must be identical on the source and the target computers (see Microsoft Knowledge Base, articles 302577 and 216915).
3.7.4 Using Acronis Universal Restore in virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, deployment and support of PC applications. Using Acronis True Image Enterprise Server with Acronis Universal Restore you can perform real-to-virtual and virtual-to-real computer migration in the same way as with real systems.
If Acronis True Image Enterprise Server runs in rescue mode (for example, booted from Bootable Rescue media), dynamic disks will not be accessible. Therefore, to be able to repair a system partition, you must keep its image on a basic, network, or removable disk. 3.9 Backing up to tape drive Acronis True Image Enterprise Server supports SCSI tape drives.
physical (sectors, location, etc.), and logical (file system, free space, assigned letter, etc.) parameters. You can change the width of a column by dragging its borders with the mouse. 28 Copyright © Acronis, Inc.
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managing data backup/restore on remote computers where Acronis True Image Agent is installed. The Console allows managing computer groups and corporate backup archives via Group and Backup Servers, as well as managing individual backup/restore tasks for every computer. Acronis True Image Management Console main window with the Network pane active 4.
3. Select the Acronis component and specify the component features you want to install (for custom component features see 2.1 Installing Acronis True Image Enterprise Server components). 4. Specify network name or IP address of the machine on which Acronis component is to be installed. You can also select the machine from the list of available using Browse… button. At that point you will have to provide administrator username and password.
the name will be identified as a domain one. After connection is established, in the central part of Acronis True Image Management Console main window you will see a list of operations available: Main window of Acronis True Image Management Console when connected to a remote computer The task list content depends on the programs installed on the connected computer.
• Backup and restore data, including system disks/partitions Click Backup or Recovery, then follow the Wizard’s instructions. See details in Chapter 6. Creating backup archives and Chapter 7. Restoring the backup data. • Schedule backup operations Click Show tasks -> Manage Computer Tasks, then follow the Wizard’s instructions. See details in Chapter 8. Scheduling tasks. • Set up backup or restore options, such as system/network resources usage, before/after backup commands etc.
Here you can monitor states of Acronis True Image Enterprise Server tasks (backup, restore, validating backup archives) on all networked computers: Ready – the remote computer is available for the next task Prepare - preparations are being made on a remote machine for the task execution (analyzing partitions, preparing backup scripts, etc.
3. Create a disk/partition backup task for several remote computers at once (see 4.4.2 Creating new group backup tasks). 4. Connect to a remote computer to see the operation log, start or edit tasks for this computer etc. (see 4.3 Managing a single remote computer). To do so, select a computer and click Connect. 5. Invoke Group tasks management window for viewing, deleting or rescheduling group tasks. 4.4.
You should also provide the archive name for each computer, unless the archives are targeted to Acronis Secure Zones or a backup server. Pressing the button to the right of the name input field will assign to each archive the respective computer’s name. 5. Specify the usual backup settings: backup mode (full, incremental or differential), a password for the backup archive (if necessary), default or custom backup options and comment. For more information see Chapter 6. Creating backup archives. 6.
4.4.3 Group tasks management The Group Tasks Management window displays the list of group tasks. To see details of a group task, mouse over the task name. To create new or delete existing backup task, use the New Group Task and Delete Group Task items. When deleting a group task, enter the same username and password you entered when created the task. 4.5 Managing backup server Before you start managing the backup server, be sure to read section 3.
When connecting to a backup server inside a domain, mind whether your domain or local account is registered on the backup server. If you entered Windows on a network computer using your domain account while your local account is registered, enter the local user name along with the backup server name (for example, Server1\username). Otherwise the name will be identified as a domain one. 4.5.
To enable Acronis Backup Server to process archives, schedule quotas/time limits check task. Select Specify Default Settings -> Schedule Automatic Consolidation and Backup Management and schedule one-time, daily, weekly or monthly check of all user’s/computers archives on the backup server for meeting limitations. If the check reveals that some of quotas/time limits are exceeded, the archive processing described in 3.5.2 Quotas and time limits for computers and users will be executed.
You might need to change a computer profile already set. To do so, select the computer and click Edit. The Edit Computer Profile Wizard will guide you through the same selections, as the Add Computer Profile Wizard. Changing the computer backup location will move all existing and redirect future backups of this computer to another folder (device etc.).
default backup location, quotas and time limits or make particular settings for the new user. If you specify a new path to backup location for the new user, a new backup location will be created. To add another administrator, first add this person’s local or domain account to the AcronisBackupServerUsers group. Then click Set up User profiles -> Add, select the user name and choose Create user with administrator’s rights on the next page.
Deleting an administrator profile will not result in deleting any archives. There must be at least one administrator on a backup server. Therefore, deleting the last administrator profile is not possible. The maximum number of administrators is not limited. 4.5.5 Configuring Backup Locations To display a full list of backup locations, click Configure Backup Locations.
Cleaning and deleting backup locations might be time-consuming operations, so you can schedule them for the off-peak period. 4.5.6 Managing Archives To display a full list of backups, stored on the backup server, click Manage Backup Archives. You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the list all user’s or all computer’s backups (use buttons in the Filter group). 3.
Chapter 5. Using Acronis True Image Enterprise Server (local version) Acronis True Image Enterprise Server supports the command-line mode for data backup and restore, as well as the GUI mode, and can be used to execute XML scripts. Here we describe the operations available in GUI mode, which provides more functionality. For console commands and scripting see Chapter 15. Command-line mode and scripting. 5.
• Show Log – open the Log Viewer window • Manage Acronis Secure Zone – create, delete and resize a special hidden partition for storing archives (Acronis Secure Zone) • Activate Acronis Startup Recovery Manager – activate the boot restoration manager (F11 key). • Manage System Restore – turn on/off Microsoft Windows System Restore tool and set its options directly from Acronis True Image Enterprise Server Program menu The program menu bar features the Operations, View, Tools and Help items.
5.2 Managing a local computer You can perform the following operations on the local computer. • Backup and restore data, including system disks/partitions Click Backup or Recovery, then follow the Wizard’s instructions. See details in Chapter 6. Creating backup archives and Chapter 7. Restoring the backup data. • Schedule backup operations Click the very left button on a tasks pane toolbar, then follow the Wizard’s instructions. See details in Chapter 8. Scheduling tasks.
• Turn on/off Windows System Restore tool See 11.5 Managing System Restore. • Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Some of the above operations can be executed in command-line mode. For more information on Acronis True Image Enterprise Server command-line mode see 15.1 Working in the command-line mode. 46 Copyright © Acronis, Inc.
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
6. Set filters for the specific types of files you do not wish to back up. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be stored in the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .exe files with names consisting of five symbols and starting with “my”.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged. Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.3 Acronis Secure Zone) or Acronis Backup Server (see details in 3.5 Acronis Backup Server) for storing backups.
12. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 6.3 Setting backup options for more information. 13. Click Next. 14. Provide a comment for the archive.
6.2 Backing up disks and partitions (image backup) 1. Invoke the Create Backup Wizard by clicking on the backup operation icon in the main program window. 2. Click Next. 3. Select The entire disk contents or individual partition and click Next. 4. Select disks or partitions to back up. You can select a random set of disks and partitions. 5. Click Next. 6. Select the name and location of the archive.
7. Click Next. 8. If your choice was not Acronis Backup Server, select whether you want to create a full or incremental backup. If you have not backed up the selected disks/partitions yet, or the full archive seems too old to append incremental changes to it, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backup). 9. Click Next. 10.
You can edit the default (or set the temporary) backup options while creating a backup task as well. 6.3.1 Archive protection The preset is no password. An archive can be protected with a password. To protect the archive data from being accessed by anybody except you, enter a password and its confirmation into the text fields. A password should consist of at least eight symbols and contain both letters (in the upper and lower cases preferably) and numbers to make it more difficult to guess.
Please do not try to execute interactive commands, i.e. commands that require user input (for example, “pause”). These are not supported. Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the backup process to run concurrently with your commands execution. 6.3.
backup procedure may take quite long time. Therefore, the database idle time will be minimal. Before/after data capture commands can also be used for purposes different from suspending the database, especially if VSS support is enabled. You may want to suspend an application other than a database, for example. The commands execution and the VSS actions will be sequenced as follows: “before” commands -> VSS Suspend -> data capture -> VSS Resume -> “after” commands.
If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Enterprise Server. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second. 6.3.7 Fast incremental/differential backup The preset is Use fast incremental/differential backup. Incremental/differential backup captures only changes in data occurred since the last backup.
When backing up to a diskette, CD-R/RW or DVD+R/RW: Acronis True Image Enterprise Server will ask you to insert a new disk when the previous one is full. Alternatively, you can select Fixed size and enter the desired file size or select it from the drop-down list. The backup will then be split into multiple files of the specified size. That comes in handy when backing up to a hard disk with a view to burning the archive to CDR/RW or DVD+R/RW later on.
partitions must be included in the image. Any partitions which are missing from the image will be lost. If you want more functionality during restoration, write a standalone version of Acronis True Image Enterprise Server to the rescue disk. Then you will be able to configure the restore task using Restore Data Wizard, use Acronis Snap Restore or Acronis Universal Restore etc. Under Advanced tab you can select full, safe or both Acronis True Image Enterprise Server loader version.
Chapter 7. Restoring the backup data 7.1 Restore under Windows or boot from CD? As mentioned above (see 2.4.1 Running Acronis True Image Enterprise Server (local version)), Acronis True Image Enterprise Server can be run in several ways. We recommend that you first try to restore data running Acronis True Image Enterprise Server under Windows, because this method provides more functionality. Boot from the bootable media or use the Startup Recovery Manager (see 3.
7.2 Restoring files and folders from file archives Here we describe how to restore file/folders from a file backup archive. You can restore the desired files/folders from a disk/partition image as well. To do so, mount the image (see Chapter 12. Mounting an image as a virtual drive) or start the image restoration and select Restore specified files or folders (see 7.3 Restoring disks/partitions or files from images). 1.
To restore data from a differential backup, you must have the initial full backup as well. 6. Click Next. 7. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 8. Click Next. 9. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 10. Click Next. 11.
screen. Then your settings will be saved as default. See 7.4 Setting restore options for more information. 12. Click Next. 13. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be restored from the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.
7.3 Restoring disks/partitions or files from images To restore a partition (disk) from an image, Acronis True Image Enterprise Server must obtain exclusive access to the target partition (disk). This means no other applications can access it at that time. If you receive a message stating that the partition (disk) can not be blocked, close applications that use this partition (disk) and start over. If you can not determine which applications use the partition (disk), close them all. 7.3.
To restore data from an incremental backup, you must have all previous incremental backups and the initial full backup. If any of successive backups is missing, restoration is not possible. To restore data from a differential backup, you must have the initial full backup as well. 4. Click Next. 7.3.3 Restoration type selection 1.
However, you can choose an ordinary way of restoration for that image. This will allow you to make changes to the restored partition that would not be possible when using Acronis Snap Restore. Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 2. Click Next. 7.3.4 Selecting a disk/partition to restore 1. The selected backup can contain images of several partitions or even disks. Select which disk/partition to restore.
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Yes, I want to delete all the partitions on the destination hard disk before restoring – all existing partitions will be deleted and all their data will be lost. • No, I do not want to delete partitions – no existing partition will be deleted, discontinuing the recovery operation.
2. Click Next. 7.3.7 Changing the restored partition file system 1. Though seldom required, you can change the partition file system during its restoration. Acronis True Image Enterprise Server can make the following file system conversions: FAT 16 -> FAT 32, Ext2 -> Ext3. For partitions with other native file systems this option is not available. Let us imagine you are to restore a partition from an old, low-capacity FAT16 disk to a newer disk.
7.3.9 Assigning a letter to the restored partition 1. Acronis True Image Enterprise Server will assign an unused letter to a restored partition. You can select the desired letter from a drop-down list. If you set the switch to No, no letters will be assigned to the restored partition, hiding it from OS. You should not assign letters to partitions inaccessible to Windows, such as to those other than FAT and NTFS. 2. Click Next. 7.3.10 Restoring several disks or partitions at once 1.
3. If the target hardware has a specific mass storage controller (such as a SCSI, RAID, or Fibre Channel adapter) for the hard disk, you can install the appropriate driver manually, bypassing the automatic driver search-and-install procedure. Use this option only if the automatic search-and-install procedure was unsuccessful. Acronis Universal Restore uses three sources for drivers: - the driver repository - a folder or folders on a network drive or CD specified in restore options.
7.4 Setting restore options To view or edit the default restore options in Acronis True Image Enterprise Server local version, select Tools -> Options -> Default Restoration Options from the main program menu. To do the same remotely, connect Acronis True Image Management Console to the remote computer, click Remote Computer Options and select Default Restoration options. You can edit the default (or set the temporary) restore options while creating a restore task as well. 7.4.
7.4.3 Pre/post commands You can specify commands or batch files to be automatically executed before and after the restore procedure. Click Edit to open the Edit Command window where you can easily input the command, its arguments and working directory or browse folders to find a batch file. Please do not try to execute interactive commands, i.e. commands that require user input (for example, “pause”). These are not supported.
Here you can specify a path to the driver repository on a network drive or CD where Acronis Universal Restore will search for drivers at restoring a system disk on dissimilar hardware. If several paths are specified, the program will scan all locations and choose the most suitable driver. 7.4.7 Additional settings 1. You can choose whether to restore files’ date and time from the archive or assign the files the current date and time. 2.
Chapter 8. Scheduling tasks Acronis True Image Enterprise Server allows you to schedule periodic backup tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week.
• When I log on – the task will be executed each time the current user logs in to the OS • When my computer shuts down – the task will be executed before every server shutdown or reboot • When I log off – the task will be executed each time the current user logs off of the OS. Some of these options might be disabled depending on the operating system. 5. Click Next. 6. Specify the task start time and other schedule parameters, according to the selected periodicity (see 8.1.1 - 8.1.4). 7. Click Next. 8.
• Every х days – once in several days (specify the interval). If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.2 Managing scheduled tasks The task Status, Schedule, Last Run Time and Last Result are shown on the Active tasks pane of the main window. To view the other task details, right-click on its name. There are two ways of changing the task parameters. Editing allows you to change any task parameters.
Chapter 9. Managing Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is necessary for using Acronis Startup Recovery Manager. For more information about these functions, see 3.3 Acronis Secure Zone and 3.4 Acronis Startup Recovery Manager. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives.
4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is about 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased.
5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup and recovery, mounting images or validating archives on the zone, rescue boot with the F11 key, resizing and deleting the zone. Acronis True Image Enterprise Server repair or update will not affect the password. However, if the program is removed and then installed again while keeping the Acronis Secure Zone on the disk, the password to the zone will be reset.
9.3 Changing the password for Acronis Secure Zone To change or remove the password for Acronis Secure Zone you will have to delete the zone and create it again with the new password or without a password. 9.4 Deleting Acronis Secure Zone 1. When prompted by the wizard, select Remove Acronis Secure Zone. 2. Select the partitions to which you want to add the space freed from the zone. If you select several partitions, the space will be distributed proportionally to each partition. 3.
Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Enterprise Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Enterprise Server version.
The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from remote locations. To find more about components of other Acronis products, see the respective user guides. 3. Select the type of bootable media (CD-R/RW, DVD+R/RW or 3.5” diskettes) to create. If your BIOS has this feature, you can create other bootable media such as removable USB flash drives. You can also choose to create a bootable disk ISO image or save bootable data on the RIS server.
5. Next, the program will calculate how many blank disks are required (in case you have not chosen ISO or RIS) and give you time to prepare them. When you are finished, click Proceed. After you create a boot disk, mark it and keep it in a safe place. 10.2 Creating Win PE ISO with Acronis True Image Enterprise Server Windows Preinstallation Environment (Win PE) is a minimal Windows system based on the Windows XP Professional and the Windows Server 2003 kernels.
Chapter 11. Other operations 11.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. 1. To invoke the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools group or click Validate Backup Archive on the toolbar. 2. Click Next. 3. Select the archive to validate. The Acronis Secure Zone can be selected only as a whole because all its contents is considered as a single archive. 4. Click Next. 5.
Provide the email address to which notifications will be sent and the outgoing SMTP server name. A user name and a password might also be needed if the SMTP server requires authentication.
- when the operation is completed successfully - when the operation failed - during the operation when user interaction is required. 11.3 Viewing logs Acronis True Image Enterprise Server allows users to view its working logs. They can provide information about scheduled tasks results, including reasons for failure, if any. To invoke the log window, select Show log on the toolbar or from the Tools menu.
11.4 Event tracing 11.4.1 Windows event log You can choose whether to store event log messages issued by Acronis True Image Enterprise Server to Windows Event Log (to see this log, run eventvwr.exe or select Control Panel -> Administrative tools -> Event Viewer -> Application). The default setting – Do not save messages To change this setting, select Tools -> Options -> Windows event log. An additional choice is available between recording All events, Warnings and Errors, or Errors only. 11.4.
3. Now you can turn on/off System Restore on all your hard disk(s) partitions at once or do it individually for each partition. Note that you cannot turn off System Restore on the system disk (partition), yet keep it on other disks (partitions). 4. Click Next. 5. The program lists the configured changes. You can click Back to choose different settings. If you click Cancel, all new settings will be lost. Click Proceed to apply the changes.
Chapter 12. Mounting an image as a virtual drive Acronis True Image Enterprise Server can mount partition images as virtual drives, thus letting you access them as though they were physical drives.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Enterprise Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 4. Click Next. 5. If you selected an archive containing incremental images, Acronis True Image Enterprise Server will suggest that you select one of the successive incremental images by its creation date/time.
You can connect multiple partition images. If you want to connect another partition image, repeat the procedure. 12.2 Unmounting an image We recommend that you unmount the virtual disk after all necessary operations are finished, as keeping up virtual disks takes considerable system resources. If you do not, the virtual disk will disappear after your server is turned off. To disconnect the virtual disk, click Unmount Image and select the disk to unmount.
Chapter 13. new disk Transferring the system to a 13.1 General information Sooner or later any computer user finds out that the hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 13.3.
unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers are inexpedient, as they leave much unallocated space on the new disk. Using the "as is" method, Acronis True Image Enterprise Server transfers unsupported and damaged file systems.
If you selected manual partition creation earlier, the partition layout will look different. This partitioning method is described below. 13.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks. Cloning a disk containing the currently active operating system will require a reboot. In that case, after clicking Proceed you will be asked to confirm the reboot. Canceling the reboot will cancel the entire procedure.
To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window. Be careful! Clicking Back in this window will reset all size and location changes that you've selected, so you will have to specify them again. First, select a partition to resize. It will be underlined in red. Resize and relocate it on the next step.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the server has space for another disk, it would be easier to add a data disk drive than to clone a system one. This feature is available in Acronis True Image Enterprise Server local version only.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there is unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process.
Chapter 15. scripting Command-line mode and Acronis True Image Enterprise Server (local version) supports the command-line mode and enables backup automation by executing XML scripts. The command-line mode functionality is somewhat limited as compared to the GUI mode. You will not be able to perform operations that require reboot of the system, such as restore a system partition or clone system drive. These operations can be done through the GUI only. As for scripting, it is intended only for backup.
When using the Acronis Universal Restore option: /ur_path:[path] /ur_username:[user] /ur_password:[pwd] /ur_driver:[inf-filename] filerestore Restores files and folders from a file archive verify Verifies the archive data integrity list Lists available drives and partitions.
asz_delete Deletes the Acronis Secure Zone clone /password:[password] /oss_numbers /reboot /log:[file name] /partition:[partition number] /reboot /harddisk:[disk number] /target_harddisk:[disk number] Clones a hard disk help Shows usage 15.1.
/compression:[0…9] /split:[size in MB] Specify the data compression level. It ranges from 0 to 9 and is set to 3 by default Any Split the backup into parts of the specified size Other than ASZ Declares that numbers of partitions in the /partition option are adjusted for MBR partition table rather than be simple ascending numbers. This means that primary partitions have numbers 1-1, 1-2, 13 (and 1-4 if there are not logical partitions on the disk) and logical partitions numbers start with 1-4.
/raw /progress:[on | off] Use this option to create an image of a disk (partition) with unrecognized or unsupported file system. This will copy all disk/partition contents sector-by-sector. Without this option only the sectors containing useful system and user data are imaged. Shows/hides the progress information (percent completed). It is shown by default. filebackup /include:[names] Files and folders to be included in the backup (semicolon separated).
/type:[active | primary | logical] Sets the restored partition active, primary or logical, if possible (for example, there cannot be more than four primary partitions on the disk.) Setting a partition active always sets it primary, while a partition set primary may stay inactive. If the type is not specified, the program tries to keep the target partition type. If the target partition is active, the restored partition is set active.
/restore_security:[on | off] /original_date:[on | off] Specifies whether to restore files’ security attributes (default) or the files will inherit the security settings of the folder where they will be restored. Specifies whether to restore files’ original date and time from the archive or assign the current date and time to the restored files. If not specified, the current date is assigned. list /filename:[file_name] With this option, the image contents is displayed.
asz_delete /partition:[partition number] Specifies partitions to which free space will be added after the Acronis Secure Zone is deleted. If you specify several partitions, the space will be distributed proportionally to each partition’s size. clone /harddisk:[disk number] Specifies a source hard disk which will be cloned to the new hard disk. /target_harddisk:[disk number] Specifies the target hard disk number where the source hard disk will be cloned. 15.1.4 trueimagecmd.exe usage examples 1.
• This will restore partition 2-1, stored in image 1.tib, to hard disk 3. A new logical partition will be created on disk 3 from 63 to 64000 sector. trueimagecmd /deploy /filename:z:\Server30Cdrive.tib /partition:1-1 /target_partition:2-1 /type:active /password:123qwe • This will restore partition 1-1, stored in image Server30Cdrive.tib, protected with password ‘123qwe’, to partition 2-1. The restored partition will be of active type. 3.
7. Clone trueimagecmd /clone /harddisk:2 /target_harddisk:3 • Clone hard disk 2 to hard disk 3. 8. Explore image trueimagecmd /explore /filename:\\myserver\backup\mybackup.tib /net_user:john /net_password:qwerty • This will connect all images, stored in file mybackup.tib on the network drive, as virtual drives. 15.1.5 Command-line mode usage under DOS For use in the MS-DOS compatible environments Acronis True Image Enterprise Server includes the TrueImageCmdDos.exe utility.
Source. Specifies the partitions or disks to be imaged. Letters assigned to partitions must be used without colon. Disk numbers correspond to their system numbers. To create images of several partitions or disks, use the SOURCE tag for each of them, e.g.: Target. Specifies the name and the location of an image file, e.g.:
xml version="1.0" encoding="utf-8" ?> Copyright © Acronis, Inc.