User’s Guide Acronis® True Image Echo Enterprise Server
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
Table of Contents Chapter 1. Introduction ......................................................................................7 1.1 1.2 1.3 1.4 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users ...........7 Acronis True Image Echo Enterprise Server components .......................................................9 New in Acronis True Image Echo Enterprise Server ..............................................................9 Supported file systems and storage media ...
3.7.4 Limitations in using Acronis Universal Restore.............................................................. 32 3.7.5 Getting Acronis Universal Restore ............................................................................... 32 3.8 Backing up to tape libraries and tape drives ....................................................................... 33 3.8.1 3.8.2 3.8.3 3.8.4 Backing up to a locally attached tape device ................................................................
7.2 Restoring files and folders from file archives ...................................................................... 83 7.3 Restoring disks/partitions or files from images ................................................................... 87 7.3.1 Starting the Restore Data Wizard................................................................................ 87 7.3.2 Archive selection ....................................................................................................... 87 7.3.
12.4 Event tracing ............................................................................................................... 127 12.4.1 Windows event log ................................................................................................ 127 12.4.2 SNMP notifications ................................................................................................. 128 12.5 Managing System Restore ............................................................................................
Chapter 1. Introduction 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users Acronis True Image Echo Enterprise Server is a comprehensive backup and recovery solution for heterogeneous computer infrastructure that may include any combination of physical and virtual, networked and standalone, Windows- and Linux-based servers.
availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used during backups, allowing minimal disruption of business operations. A feature that allows you to suspend database activity for several seconds is provided so that you can create a valid image of mission-critical applications such as Microsoft Exchange Server, Microsoft SQL Server and Oracle.
1.2 Acronis True Image Echo Enterprise Server components Acronis True Image Echo Enterprise Server includes the following components. 1. Acronis True Image Management Console is a tool for remote access to Acronis components. Administrator uses the console to install, configure and control the components from remote. 2. Acronis True Image Agent is an application that resides on client computers and performs Acronis operations such as data backup or restore.
Set how often to check the computers state (status refresh rate) Wake on LAN for backup Backup server Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library for every user Backup Backup and restore of 2+TB volumes Encrypting backups with industry-standard AES cryptographic algorithm (key size 128, 192, 256 bit) Multi-volume snapshot for databases spread on several disks Control network bandwidth usage when backing up to FTP Error
Operations with hard disks Convert basic disk to dynamic Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create Acronis Secure Zone on the space Security Encrypted (SSL) communication between Acronis True Image Echo Enterprise Server components 1.4 Supported file systems and storage media 1.4.
USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices ZIP®, Jaz® and other removable media * - Data recovery directly from FTP-server will require the archive to consist of files no more than 2GB in size, so please note this during the backup image creation. It is recommended that you change the source computer firewall settings to disable the Routing and Remote Access Windows service.
Chapter 2. Acronis True Image Echo Enterprise Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis True Image Echo Enterprise Server requires the following hardware: Pentium processor or higher 512MB RAM FDD or CD-RW drive for bootable media creation Mouse (recommended). 2.1.
Windows Vista all Editions Acronis True Image Echo Enterprise Server bootable version enables disk-level backup and recovery on a computer running any PC-based operating system. 2.2 Security parameters 2.2.1 Credentials Acronis True Image Echo Enterprise Server fully supports all security standards used in Windows. To install Acronis components on a computer, the user must be a member of the Administrators group on the computer.
2.2.3 Encrypted communication Acronis True Image Echo Enterprise Server provides capability to secure all data transferred between Acronis components within local net and through DMZ, including the backup stream. Encryption starts on the first (earliest) stage of connection attempt, so all data transferred on the next steps (including data required for client authentication) is encrypted.
For detailed information about Windows GPO Editor please see: http://msdn2.microsoft.com/en-us/library/aa374163.aspx For detailed information about Group Policies please see: http://msdn2.microsoft.com/en-us/library/aa374177.aspx The Acronis Administrative Template contains the following settings. Encryption Options Server Requires Encryption This option defines the server behavior in case the client does not support encryption. When enabled, connection to the client will be terminated.
Acronis True Image Echo Enterprise Server Install Window It is recommended that you install Acronis True Image Management Console first. After that you will be able to install Acronis True Image Echo Enterprise Server (local version) and Acronis True Image Agent for Windows remotely to networked computers. 2.3.
2.3.2 Installation of Acronis True Image Agent for Linux To install the Acronis True Image Agent for Linux, extract its setup file to a shared network drive or removable media, assign the attribute Executable to this file, then perform installation procedure on a Linux-based system. For how to extract the file, see 2.4 Extracting Acronis True Image Echo Enterprise Server components. 2.3.
4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can create a folder for the backup location on the storage drive. To see the folder in the tree and add it to the path, collapse and expand the drive. 5. Click Back -> Configure Backup Locations -> make sure that the new default location is created and delete the location in \Documents and Settings. 6.
Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator? 9. Define which users will be allowed to back up data on the backup server. Add the users as follows: Add the person’s local or domain account to the AcronisBackupServerUsers group on the backup server. Click Set up User profiles -> Add. Choose the user name. Choose Use default settings. Click Proceed. 10.
Click Set up Administrator profiles -> Add. Choose the computer or enter its name. Choose Use default settings. Click Proceed. Adding a computer to the administrator profile 11. Schedule a check for exceeding the quotas and time limits, if needed according to the selected policy. To do so, select Acronis Backup Server Management -> Specify Default Settings -> Schedule automatic consolidation and backup management. Choose Periodically. Choose Weekly.
2.3.5 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image Echo Enterprise Server. It is purchased separately and installed from a separate setup file. Acronis Universal Restore has its own serial number that is required at installation.
to learn more about this procedure. To run the program, press F11 during the server bootup when you see a corresponding message that tells you to press that key. Acronis True Image Echo Enterprise Server will be run in the standalone mode, allowing you to recover the damaged partitions.
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone, full backup could be an optimal solution if you often roll back the system to the initial state (for example, systems in a gaming club or Internet café where you need to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial and the restore time will be minimal.
Manage Acronis Secure Zone wizard and check the zone free space, or manually remove or consolidate unnecessary backups. For manual backup consolidation and removal, see 9.4 Managing backups in the Acronis Secure Zone Acronis Secure Zone contents can be viewed directly from Windows Explorer. Open My Computer (Start -> My computer, or Start -> Run… -> explorer /n, /e, /select, c:\ ) and double-click on the Acronis Secure Zone icon.
Recovery Manager" message. This will run a standalone version of Acronis True Image Echo Enterprise Server that only slightly differs from the complete version. For information on restoring damaged partitions, see Chapter 7. Restoring the backup data. Be careful! Disk letters in standalone Acronis True Image Echo Enterprise Server might sometimes differ from the way Windows identifies drives.
You can move, clear or delete existing backup locations or edit their size limitations and storage period. 3.5.2 Quotas and time limits for computers and users Individual quotas and time limits determine every computer’s or user’s quota on a backup server. This include 1) maximum storage space, allocated to a user/computer, in MB, GB or TB 2) maximum number of backups 3) maximum number of incremental backups for each full backup 4) maximum storage period for the user’s/computer’s backups.
Generally, there are two types of profiles on the backup server: Administrators and Users. The Administrators profiles are designed to perform backups on remote computers with Acronis True Image Agents. Whatever computer the administrator backs up, backup data will be sent to the same location, assigned to the computer. Administrators can also manage archives on the backup server, including archives created via Users’ profiles.
user sees the folder tree with files, though file contents still is not recovered. Nevertheless, the user can start working. 2. Next, the application writes on the hard disk its own drivers, which intercept system queries to the files. When the user attempts to open files or launch applications, the drivers receive the system queries and restore the sectors that are necessary for the requested operation. 3.
3.7 Acronis Universal Restore 3.7.1 Acronis Universal Restore purpose A system disk image can be deployed easily on the hardware where it was created or to identical hardware. However, if you change a motherboard or use another processor version — a likely possibility in case of hardware failure — the restored system could be unbootable.
3.7.3 Acronis Universal Restore and Microsoft Sysprep Acronis Universal Restore is not a system preparation tool. You can apply it to any system image created by Acronis products, including images prepared with Microsoft System Preparation Tool (Sysprep). The following is an example of using both tools on the same system.
3.8 Backing up to tape libraries and tape drives A tape library is a high-capacity storage device consisting of one or more tape drives and a loader that automatically selects and loads multiple tape cartridges. Tape libraries with only one drive and loader are known as autoloaders. Acronis True Image Echo Enterprise Server supports tape libraries, autoloaders, and SCSI tape drives as storage devices. Tape libraries, autoloaders and tape drives are accessible through the Acronis Backup Server.
3.8.1 Backing up to a locally attached tape device Backup to a locally attached tape device can be performed using either Acronis True Image Echo Enterprise Server local version or bootable media. Only SCSI tape drives are supported when backing up in this mode. Tape libraries and autoloaders are not supported. When working with locally attached tape drives, you do not need the RSM service (opposing to the Backup Server, where you do need to use RSM for tape management).
metadata on tape, so that identification information can be obtained when mounting a tape that is not registered in the database. If the database is lost or not available (say, you detach the tape device and attach it to another computer or reinstall Windows) the necessary information is derived from the metadata saved on the tape and the database will be recreated on the new host using the new host RSM.
Saving a full backup to a new tape You can enable saving a full backup on a new tape even if the currently mounted tape is not full. To do so, dismount the current tape and eject it, add a new tape and move the tape to the Free pool using RSM. Incremental or differential backups cannot be performed in this way because access to the previous backups is required. 3.8.3 Backing up to a tape device through Acronis Backup Server To enable backup to a tape device in the local network: 1.
[Tape library or autoloader] The program finds the tapes and inserts them automatically in the right order. A prompt comes up if the required tape is not found. Archives created on tape devices through Acronis Backup Server cannot be accessed by a locally attached tape device in Acronis True Image Echo Enterprise Server local version.
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managing data backup/restore on remote computers where Acronis True Image Agent is installed. The console allows for the managing of computer groups and corporate backup archives using Group and Backup Servers, as well as managing individual backup/restore tasks for every computer. Acronis True Image Management Console main window 4.
If the remote computer runs Windows XP with Service Pack 2 or Windows 2003 Server, the option Control panel -> Windows Firewall -> Exceptions -> File and Printer Sharing must be enabled on that computer. To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main window, on the toolbar or the sidebar, or select the same item from the Tools menu. 2.
5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account credentials for one computer and set the option to apply it to all computers that you select. Domain administrator credentials and universal credentials for workgroups can be applied in this way.
7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed. To update an Acronis component on a remote computer, perform the same procedure. 4.3 Managing a single remote computer To perform any operation on a single remote computer, you must first connect to it. 4.3.1 Connecting to a remote computer To establish a remote connection: 1.
The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery Tasks (using the Acronis True Image Agent; and if the MSE Agent is installed at the local computer, the Microsoft Exchange Tasks and Tools will become available as well), Acronis Group Server Management and Acronis Backup Server Management.
With the Console you can perform the following operations on the remote computer: Operation How to access Back up and Recover Back up and restore data, including system Click Backup or Recovery, then follow the disks/partitions Wizard’s instructions. See details in Chapter 6. Creating backup archives and Chapter 7. Restoring the backup data. Browse logs of Acronis True Image Agent Click Show Log. See details in 12.3 operation Viewing logs.
Run, stop, edit, clone, rename, delete Click Show tasks to navigate to the backup and archive validation tasks Manage Computer Tasks window. See details in 8.2 Managing scheduled tasks. Archives Management Validate backup archives wherever they Click Validate Backup Archive, then reside, be it local, network or removable follow the wizard’s instructions. See details media in 11.1 Validating backup archives.
Other Tools Create bootable rescue media, its ISO or See Chapter 10. Creating bootable media. RIS package Update the remote agent Click Update the remote agent, then follow the Wizard’s instructions. The procedure is the same as described in 4.
The tasks you have planned for the remote computer can be checked and edited at the Manage Computer Tasks screen. From this screen you can also proceed to managing Microsoft Exchange Tasks, if you follow the link, presented there. After you perform all necessary operations on the remote computer, select Disconnect or New connection on the toolbar, sidebar or the Connect menu. 4.4 Managing groups of computers 4.4.
Here you can monitor states of Acronis True Image Echo Enterprise Server tasks (backup, restore, validating backup archives) on all networked computers: Ready – the remote computer is available for the next task Prepare - preparations are being made on a remote machine for the task execution (analyzing partitions, preparing backup scripts, etc.
To add multiple computers from a file: prepare a .txt or .csv file, listing semicolon-separated computers names and IP addresses as follows: Name1; IP1; Name2; IP2;… click Add on the toolbar specify path to the above file. 3. Export computers from the group server to a .txt or .csv file that can be used by other application or new versions of Acronis Group Server. To do so: click Export on the toolbar specify name of the file and a path to a folder where you want to create it. 4.
5. Specify the paths for the backup archives. To place every archive on its local computer, specify Local path or select Acronis Secure Zone, if there is such a zone on every remote computer. For more information about the Acronis Secure Zone see 3.3 Acronis Secure Zone. To place backups on the network, check Network path, select the target folder and specify the username and password for access to the network drive.
12. After you click Proceed, Acronis True Image Management Console connects to every computer of the group in turn to distribute the task. If a remote computer is inaccessible (shut down, for example), a dialog box appears. In this box, choose Ignore to exclude the computer from the group or Cancel to cancel the entire task. When distribution is complete, the group task appears in Group Tasks Management window.
To stop or restart the task execution, use the Stop or Restart toolbar items. The task schedule, if created, remains valid. For a group task that is not currently being executed on either computer, the following operations are also available: Run now - an instant task start command. The task schedule, if created, remains valid.
To adjust the status refresh rate, connect the console to the computer where Acronis Group Server is installed and select Tools -> Options -> Network -> Status check interval. 4.5 Managing backup server Before you start managing the backup server, be sure to read section 3.5 Acronis Backup Server stating the basic operating principles of this application. When connected to a computer where Acronis Backup Server is installed, click Acronis Backup Server management to display the following window.
Otherwise the name will be identified as a domain one. 4.5.1 Default settings Each user or computer, added to Acronis Backup Server database, is associated with the default backup location and the default user/computer quotas and time limits. When installed on a computer (which becomes a backup server from this point on), Acronis Backup Server creates the following folder: C:\Documents and Settings\All Users\Application Data\Acronis\BackupServer. This folder is a default backup location.
To enable Acronis Backup Server to process archives, schedule quotas/time limits check task. Select Specify Default Settings -> Schedule Automatic Consolidation and Backup Management and schedule one-time, daily, weekly or monthly check of all user’s/computers archives on the backup server for meeting limitations. If the check reveals that some of quotas/time limits are exceeded, the archive processing described in 3.5.2 Quotas and time limits for computers and users will be executed.
You might need to change a computer profile already set. To do so, select the computer and click Edit. The Edit Computer Profile Wizard will guide you through the same selections, as the Add Computer Profile Wizard. Changing the computer backup location will move all existing and redirect future backups of this computer to another folder (device etc.).
To enable any other user to back up data from any networked computer where Acronis True Image Echo Enterprise Server local version is installed to backup server, an administrator should add this user to Acronis Backup Server database. To do so, first, add this person’s local or domain account to the AcronisBackupServerUsers group. Then click Set up User profiles -> Add User.
specify backup location, quotas and time limits for this user in Add User Profile Wizard windows. Use the default backup location, quotas and time limits or make specific settings for the new user. If you specify a new path to backup location for the new user, a new backup location will be created. To add another administrator, first add this person’s local or domain account to the AcronisBackupServerUsers group.
If you select a user profile and click Clear, all archives created by this user will be deleted. However, this operation will not work for the administrators’ profiles. If you select a user profile and click Delete, this will disable backup to the backup server for this user and his existing archives will be deleted. This operation might also be timeconsuming, so you can schedule it for the off-peak period. Deleting an administrator profile will not result in deleting any archives.
To delete a backup location, select the location and click Delete. This will delete all archives stored in this location and redirect the associated computer/user’s backups to the default backup location. The default backup location cannot be deleted. If you try to do so, the program will clean the default backup location and issue an appropriate message. To delete the location completely, first reassign the default backup location by selecting Specify Default Settings -> Set backup location.
Editing images, mounted in R/W mode, results in creating incremental backups, that are a kind of offshoots of the incremental chain. Such backups are always excluded from the archive being imported. 4.5.7 Limiting access to Acronis Backup Server To access the Acronis Backup Server options, connect the console to the backup server and select Tools -> Options from the menu. 1.
Chapter 5. Using Acronis True Image Echo Enterprise Server (local version) Acronis True Image Echo Enterprise Server (local version) supports the GUI mode, the command-line mode, and can be used to execute XML scripts. Here we describe the operations available in the GUI mode, which provides the widest functionality. For console commands and scripting please see Chapter 16. Command-line mode and scripting. 5.
Manage Hard Disks – clone disk (i.e.
Status bar There is a status bar divided into two parts at the bottom of the main window. The left side briefly describes the selected operation; the right side indicates operation progress and results. If you double-click on the operation results, you will see the log window. Taskbar notification area icon During most of the operations, a special indicator icon appears in the Windows taskbar notification area. If you mouse over the icon, you will see a tool tip indicating the operation’s progress.
scheduled tasks. Archives Management Explore any archive’s contents and restore Select Tools -> Explore Backup Archive individual files from any archive and follow the wizard’s instructions. See details in 11.2.1 Exploring an archive Validate backup archives wherever they Select Tools -> Validate Backup reside, be it local, network or removable Archive, then follow the wizard’s media instructions. See details in 11.1 Validating backup archives.
RIS package Turn on/off Windows System Restore tool See 12.5 Managing System Restore. Some of the above operations can be executed in command-line mode. For more information on Acronis True Image Echo Enterprise Server command-line mode see 16.1 Working in the command-line mode. 65 Copyright © Acronis, Inc.
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will exclude all .exe files with names consisting of five symbols and starting with “my”. All of these settings will take effect for the current task. For information on how to set the default filters that will be called each time you create a file backup task, see 6.3.2 Source files exclusion. 5. Select the name and location of the archive.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged, but won’t be useful if the computer is destroyed in a fire or flood. Data saved to a network disk, ftp server or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may select Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 6.3 Setting backup options for more information. 8. Provide a comment for the archive.
You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from the menu that appears. For information on how to set the default priority, see 6.3.6 Backup performance. 11. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar.
4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing full backup, it will be overwritten. Including [date] in the backup file name will add to the name the time and date of the backup creation formatted as . Example: C:\MyBackup[date].tib. If you are going to create an incremental backup (see 3.
See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select whether you want to create a full or incremental backup. If you have not backed up the selected disks/partitions yet, or the full archive seems too old to append incremental changes to it, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backup). 6.
6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being accessed by anybody except you, enter a password and its confirmation into the text fields. A password should consist of at least eight symbols and contain both letters (in the upper and lower cases preferably) and numbers to make it more difficult to guess.
This option is effective for file/folders backup only. When creating a disk/partition image, you cannot filter out any files. 6.3.3 Pre/post commands You can specify commands or batch files to be automatically executed before and after the backup procedure. For example, you may want to remove some tmp files from the disk before starting backup or configure a third-party antivirus product to be started each time before the backup starts.
net start “Microsoft Exchange POP3” net start “Microsoft Exchange Routing Engine” Create batch files in any text editor (for example, name it pause_services.bat and resume_services.bat). Use Edit buttons to the right of Before data capture command and After data capture command fields, to open the Edit Command window where you can browse folders to find the respective batch files or scripts. A single command can be specified in the same window along with its arguments and working directory.
The preset is Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process. Decreasing the backup priority will free more resources for other CPU tasks. Increasing the backup priority may speed up the backup process due to taking resources from the other currently running processes. The effect will depend on total CPU usage and other factors. 2. HDD writing speed The preset is Maximum.
6.3.8 Archive splitting Sizeable backups can be split into several files that together make the original backup. A backup file can be split for burning to removable media or saving on an FTP server (data recovery directly from an FTP server requires the archive to be split into files no more than 2GB in size). The preset is Automatic.
Properties -> General -> Advanced Attributes -> Encrypt contents to secure data). Check the option if there are encrypted files in the backup and you want them to be accessed by any user after restore. Otherwise, only the user who encrypted the files/folders will be able to read them. Decryption may also be useful if you are going to restore encrypted files on another computer. These options relate only to file/folders backup. 6.3.10 Media components The preset is disabled.
Corporate administrators need an option to continue a back up despite any errors that might occur without the system popping up an error box. Details of the operation, including errors, if any, could be found in the operation log. With the silent mode enabled, the program will not display interactive windows. Instead, it will automatically handle situations requiring user intervention such as running out disk space (except for handling bad sectors, which is defined as a separate option.
Before using the feature, make sure that Wake On LAN is enabled both on the computers that you intend to back up and the Acronis Group Server. To enable the Wake On LAN feature on a computer to be backed up: 1. Enter the computer BIOS and set Power -> Wake On PCI PME -> Power On. 2. Set the NIC properties on the computer as follows.
possible if the user is away, because the program will wait for someone to press OK in the prompt box. Therefore, you should disable the prompt when scheduling a backup to removable media. Then, if the removable media is available (for example, CD-R/RW inserted), the task can run unattended. 4. Reset archive bit The preset is disabled. The option relates only to file-level backup.
Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1 Running Acronis True Image Echo Enterprise Server (local version)), Acronis True Image Echo Enterprise Server can be run in several ways. We recommend that you first try to restore data running Acronis True Image Echo Enterprise Server under Windows because this method provides more functionality.
7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). For more information on dynamic disks, please refer to your Windows documentation. Acronis True Image Echo Enterprise Server can back up and recover dynamic volumes. A dynamic volume can be recovered over the same volume or unallocated space of a dynamic group.
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. Data recovery directly from an FTP server requires the archive to consist of files no more than 2GB in size. If you suspect that some of the files may be larger, first copy the entire archive (along with the initial full backup) to a local hard disk or network share disk. See notes and recommendations for supporting FTP server in 1.4.
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 5. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 6. Select the options for the restoration process (that is, pre/post restoration commands, restoration process priority, file-level security settings etc.).
7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be restored from the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will reject all .exe files with names consisting of five symbols and starting with “my”.
Clicking Proceed will launch the task. 10. (For Acronis True Image Echo Enterprise Server local or bootable version) The task progress will be shown in a special window. You can stop the procedure by clicking Cancel. Please keep in mind that the aborted procedure still may cause changes in the destination folder. 7.
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. Data recovery directly from an FTP server requires the archive to be split into files no more than 2GB in size. If you suspect that some of the files may be larger, first copy the entire archive (along with the initial full backup) to a local hard disk or network share disk. See notes and recommendations for supporting FTP server in 1.4.
Restore specified files or folders With this selection, you will be further offered to select where to restore selected folders/files (original or new location), choose files/folders to be restored and so on. These steps look like those in file archive restore. However, watch your selection; if you want to restore files instead of disk/partition, uncheck the unnecessary folders. Otherwise you will restore a lot of extra files. Then you will be taken directly to Restoration Summary screen (7.3.
7.3.4 Selecting a disk/partition to restore The selected backup can contain images of several partitions or even disks. Select which disk/partition to restore. Disks and partitions images contain a copy of track 0 along with the MBR (Master Boot Record). It appears in this window in a separate line. You can choose whether to restore MBR and track 0 by checking the respective box. Restore the MBR if it is critical to your system boot. 7.3.
• access all Windows Restore Points on the recovered disk, • access VSS snapshots via Windows Vista's "Previous Versions" feature on the recovered disk, • keep licensing and other information for installed appliacations as some programs may use NT disk signature for licensing and other purposes, • keep the existing scheduled task without the need to re-create or edit it, as all scheduled tasks of the program use the NT disk signature for disk identification. 7.3.6 Selecting a target disk/partition 1.
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data. You will have to select between: Yes, I want to delete all the partitions on the destination hard disk before restoring – all existing partitions will be deleted and all their data will be lost. No, I do not want to delete partitions – no existing partition will be deleted, discontinuing the recovery operation.
7.3.9 Changing the restored partition size and location You can resize and relocate a partition by dragging it or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this feature, you can redistribute the disk space between partitions being restored. In this case, you will have to restore the partition to be reduced first.
1. Using Acronis Universal Restore will help you create a bootable system clone on different hardware (for more information see 3.7 Acronis Universal Restore). Choose this when restoring a system disk to a computer with a dissimilar processor, different motherboard or other mass storage device than in the imaged system. 2.
7.3.14 Restoration summary and executing restoration 1. At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, no changes will be made to disk(s). Clicking Proceed will launch the task execution. 2. (For Acronis True Image Echo Enterprise Server local or standalone version) The task progress will be shown in a special window. You can stop the procedure by clicking Cancel.
You can edit the default (or set the temporary) restore options while creating a restore task as well. 7.4.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are not to be restored. Use the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.exe will exclude all .exe files with names, consisting of five symbols and starting with “my”.
The backup process will run concurrently with your commands if you uncheck the Do not perform operations until the commands execution is complete box, which is checked by default. 7.4.4 Restoration priority The default setting – Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process. Decreasing the restoration priority will free more resources for other CPU tasks.
7.4.7 Additional settings 1. Set current date and time for the restored files The preset is enabled. Choose whether to restore files’ date and time from the archive or assign the files the current date and time. 2. Validate backup archive before restoration The preset is disabled. Before data is restored from the archive, Acronis True Image Echo Enterprise Server can check its integrity. If you suspect that the archive might have been corrupted, select this option.
8. Use FTP in active mode The preset is disabled. Previous versions of the software required usage of passive mode for the target FTP server and usage of TCP and UDP ports 20 and 21 on the source computer. The current version has no such limitations: you can use either active or passive mode. Check this option if the FTP server where the target backup is stored uses active mode and specify the port number in the FTP port number field.
2. Start the Dynamic Volume Creation Wizard by selecting Tools -> Create Dynamic Volume in the main program menu. 3. Select basic, dynamic or newly connected disks on which the dynamic volume will be created. Dynamic disks are selected by default. You can deselect any, if need be, later in the wizard. If you tick off disks other than dynamic, these will be converted to dynamic disks and included in the dynamic group. However, this will be done when the operation starts.
6. Click Proceed in the summary window. On completion of operations, the dynamic volumes are unformatted and have no letters assigned. You will be able to assign the letters using Windows Disk Management tool after restoring Windows on the created volumes. 101 Copyright © Acronis, Inc.
Chapter 8. Scheduling tasks Acronis True Image Echo Enterprise Server allows you to schedule periodic backup and archive validation tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Scheduled Tasks window, where you can start, stop, edit, delete and rename them.
Manually later – the task will be saved, but not launched automatically.
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, all settings will be lost. Click Finish to save the task. 8. The task schedule and default name appear in the Scheduled Tasks window. You can rename the task, if need be. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: Day – on the specified date The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.5 Setting up event-driven execution Execution on increasing or decreasing free space on a disk. The task will be started when the free space on the either disk selected for the backup changes by the specified value. The preset is 20MB. 8.
Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a special partition for storing archives on the computer system itself. For more information, see 3.3 Acronis Secure Zone. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives. If a zone is found, the wizard will offer to manage it (consolidate or remove backups, resize or change the password) or delete. If there is no zone, you’ll be prompted to create it.
4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is approximately 35MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased.
5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup and recovery, mounting images or validating archives on the zone, using the Acronis Startup Recovery Manager with the F11 key, resizing and deleting the zone. Acronis True Image Echo Enterprise Server repair or update will not affect the password.
2. Select Change password. 3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question that will be asked in case you forget the password. 4. To perform the password change operation, click Proceed in the final wizard window. 9.4 Managing backups in the Acronis Secure Zone The purpose of the Acronis Secure Zone management is to manually free up space in the Acronis Secure Zone by deleting or consolidating backups. 1.
4. [Consolidation]: Select the backup. Backups created earlier will be consolidated into the selected backup. Backups created later will remain untouched. [Remove]: Select the backup you want to remove. Be careful: all dependent incremental and differential backups will be also removed. 5. After you click Proceed, Acronis True Image Echo Enterprise Server will start backup consolidation\deletion. 9.5 Deleting Acronis Secure Zone Acronis Secure Zone deletion will destroy all backups stored in the zone.
Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Echo Enterprise Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Echo Enterprise Server version.
The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from remote locations. To find more about components of other Acronis products, see the respective user guides. The Start automatically after parameter specifies the timeout interval for the boot menu. If this parameter is not specified, at booting a computer the program will display the boot menu and wait for someone to select whether to boot the OS or the Acronis component.
4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to create a bootable disk ISO image, specify the ISO file name and the folder in which to place it. If you chose to save bootable data on a RIS server, specify the server and provide the user name and password to access it. 5.
Media based on Win PE 2.0 and including Acronis True Image Echo Enterprise Server requires at least 768MB RAM to work. 116 Copyright © Acronis, Inc.
Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is not damaged. Here’s how to run a one-time validation task. For how to schedule regular archive validation, see 8.1 Creating scheduled tasks. 1. To start the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools group or click Validate Backup Archive on the toolbar. 2. Select the archive to validate.
Both operations are performed through the Backup Archives category. Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives lets you access them as though they were physical drives.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Enterprise Server will ask for it. Further steps will not be enabled until you enter the correct password. 3. The program opens a Windows Explorer window displaying the archive contents.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Echo Enterprise Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 3. If you selected an archive containing incremental images, Acronis True Image Echo Enterprise Server will suggest that you select one of the successive incremental images by its creation date/time.
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the comment to this file. 7. The program displays a summary containing a single operation. Click Proceed to connect the selected partition image as a virtual disk. 8.
security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consolidate two backups in one. File name-based consolidation keeps whichever backups you choose and deletes any backups that are not selected. Consolidation can be performed both using the Acronis True Image Management Console connected to Acronis True Image Agent and with Acronis True Image Echo Enterprise Server local version.
Editing images, mounted in R/W mode, results in creating incremental backups, that are a kind of offshoots of the incremental chain. Therefore, they cannot be consolidated and always will be excluded from the archive copy. The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full backup 4. Choose location and name for the archive copy.
In our example, when consolidation is completed, the folder Backups will contain two archives MyBackup and MyBackup(1). The first is the source archive, the second is the copy consisting of MyBackup(1) and MyBackup(1)2. MyBackup(1) is a full backup containing data as of Tuesday, July 17, 2007, 5:35:09 PM. MyBackup(1)2 is an incremental backup containing data as of Tuesday, July 17, 2007, 6:54:40 PM.
Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Enterprise Server can notify you when it is finished through the WinPopup service or e-mail. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion. By default all notifications are disabled. 12.
1. Enable the Messenger service on both the computer executing the task and the computer that will receive messages. The Messenger service is disabled by default in Windows Server 2003 family. Change the service Startup mode to Automatic and start the service. 2. Select Tools -> Options -> Notifications -> Windows Messenger (WinPopup): Provide the name of the computer to which notifications will be sent.
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows. To delete a log, select it and click Delete. If any step was terminated by an error, the corresponding log will be marked with a red circle with a white “X” inside. The right window features the list of steps contained in the selected log.
An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image Echo Enterprise Server can provide the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 1.3.6.1.4.1.24769.100.200.1.0 - string identifying a type of occurred event (Information, Warning, Error) 1.3.6.1.4.1.24769.100.200.2.
If you run Acronis True Image Echo Enterprise Server regularly, this feature in your operating system is redundant. You can turn it off, freeing up to 12% of your hard disk space, directly from Acronis True Image Echo Enterprise Server. This feature is available in Acronis True Image Echo Enterprise Server local version only. Managing System Restore using Acronis True Image Management Console is not possible. 1.
Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, deployment and support of PC applications. As with physical machines, virtual machine (VM) data needs to be backed up periodically to prevent its loss due to hardware failure or human errors.
If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable media ISO to the virtual machine. Another option is to create a new virtual machine with same configuration and disk size as the imaged machine and recover data to this disk. The procedure is the same as with physical machines. See details in Chapter 7. Restoring the backup data. The alternative way of recovering a VM is by converting the image (.
3. Create a new VM with the converted system disk. 4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: the fastest replacement of the physical machine with the previously created virtual copy moving multiple workloads from legacy physical servers to virtual machines to reduce hardware maintenance and power consumption costs.
Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and click Convert to Virtual disk. On a computer where Acronis True Image Echo Enterprise Server local version is installed, select Tools -> Convert to Virtual Disk in the main program menu. 2. Select the disk image to convert.
Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too small. If you don’t have space for more data, you can add another disk specifically for data storage. For example, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software. In this case, you have to transfer the system to a higher-capacity hard disk.
14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 14.3.3 Selecting destination disk After you select the source disk, select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
Keep data – leave the old disk partitions and data intact Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 14.3.
If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system and label. The unused space will become unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers are not recommended, as they leave much unallocated space on the new disk.
Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including primary, logical and unallocated space are marked with different colors. If you selected manual partition creation earlier, the partition layout will look different. This partitioning method is described below. 14.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks.
Along with the hard disk number, you will see disk capacity, label, partition and file system information. Different partition types, including primary, logical and unallocated space are marked with different colors. To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window.
Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk to store data, leaving the system on the old disk. If the server has space for another disk, it would be easier to add a data disk drive than to clone a system one. This feature is available in Acronis True Image Echo Enterprise Server local version only.
You will be prompted to set the new partition location and size. You can do this by entering values to the Unallocated space before, Partition size, or Unallocated space after fields, by dragging the partition borders or by dragging the partition itself. If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size.
Chapter 16. Command-line mode and scripting Acronis True Image Echo Enterprise Server (local version) supports the command-line mode and enables backup automation by executing XML scripts. The command-line mode functionality is somewhat limited as compared to the GUI mode. You will not be able to perform operations that require the reboot of the system, such as restore a system partition or clone a system drive. These operations only can be done through the GUI. Scripting is intended only for backup. 16.
/log_net_password:[password] filebackup Backs up specified files and folders deploy Restores disks and partitions, except for the MBR, from an image /filename:[file name] /password:[password] /asz /net_user:[username] /net_password:[password] /ftp_user /ftp_password /incremental /differential /compression:[0…9] /split:[size in MB] /reboot /log:[file name] /log_net_user:[remote user] /log_net_password:[password] /include:[names] /exclude_names:[names] /exclude_masks:[masks] /exclude_system /exclude_hidde
archive consolidate Creates a consistent copy of the archive which will contain only the specified backups convert Converts an image to virtual disk format for using with a virtual machine list Lists available drives and partitions.
asz_files /password:[password] Displays the Acronis Secure Zone size, free space and contents using the generated file names asz_delete_fi les Deletes the most recent backup in the archive located in the Acronis Secure Zone /filename:[file name] /password:[password] /log:[file name] /log_net_user:[remote user] /log_net_password:[password] /partition:[partition number] Deletes the Acronis Secure Zone /password:[password] /oss_numbers /reboot /log:[file name] /log_net_user:[remote user] /log_net_passwo
access /net_password:[password] Specify a password for network drive access Network drive /ftp_user:[username] Specify a user name for access to an FTP server FTP server /ftp_password:[password] Specify a password for access to an FTP server FTP server Set the backup type to incremental. If not specified or there is no basic full backup, a full backup will be created Any Set the backup type to differential.
/harddisk:[disk number] Specifies the hard disks to include into the image file. The list of available hard disks is provided by the /list command. An image may contain data of more than one hard disk. In that case, separate disk numbers by commas, e.g.: /harddisk:1,3 By specifying /harddisk:DYN you will back up all dynamic volumes present in the system. /partition:[partition number] Specifies the partitions to include into the image file. The list of available partitions is provided by /list.
letter] number). This option is used with /filename:file_name. In this case the file name must be specified without drive letter or root folder. For example: /file_partition:D /filename:"\1.tib” Dynamic volumes are specified with prefix DYN, e.g.: /file_partition:DYN1 /filename:”\1.tib” /harddisk:[disk number] /partition:[partition number] Specifies the basic hard disks to restore. Specifies the partitions to restore. Dynamic volumes are specified with prefix DYN, e.g.
/preserve_mbr When restoring a partition over an existing one, the target partition is deleted from the disk along with its entry in the target disk MBR. Then, with the /preserve_mbr option, the restored partition’s entry will occupy the upper empty position in the target disk MBR. Thus, the target disk MBR is preserved. If not specified, the restored partition’s entry will occupy the same position as in the source disk MBR saved in the image.
/net_src_user:[password] Specifies the password for logon to network share to access the source archive /net_user:[username] Specifies the username for logon to network share to save the resulting archive /net_user:[password] Specifies the password for logon to network share to save the resulting archive Convert /target_filename:[file name] Specifies the path to and name of the virtual disk file to be created.
/partition:[partition number] Specifies a list of partitions to be mounted as virtual drives. Without this option, all partitions stored in the image will be mounted. To obtain the partition number for this option, list the image contents with the /list/filename command an use the number from the Idx column. /letter Assigns letters to the mounted drives. This option is used with /partition option only. Unplug /letter:X Specifies the virtual drive to be disconnected by letter.
16.1.4 Trueimagecmd.exe usage examples 1. Image disks and partitions trueimagecmd /create /filename:"C:\Test\1.tib" /partition:21,1-3 This will create an image named 1.tib of the partitions 2-1 and 1-3. The image will be saved to the C:\Test\ folder. trueimagecmd /create /asz /partition:2-1,1-3 This will create an image of the partitions 2-1 and 1-3 in the Acronis Secure Zone. trueimagecmd /create /filename:"\Test\1.tib" /partition:21,1-3 /file_partition:3-1 This will create an image named 1.
This will restore partition 2-1, stored in image 1.tib, to hard disk 3. A new logical partition will be created on disk 3 from 63 to 64000 sector. trueimagecmd /deploy /filename:z:\Server30Cdrive.tib /partition:1-1 /target_partition:2-1 /type:active /password:123qwe This will restore partition 1-1, stored in image Server30Cdrive.tib, protected with password ‘123qwe’, to partition 2-1. The restored partition will be of active type.
trueimagecmd /consolidate /filename:\\smbsrv\Archives\Kons.tib /target_filename:D:\Kons_new.tib /include pits:2,4,5 This will create on the disk D: an archive consisting of three files Kons_new.tib, (pit 2 of the archive \\smbsrv\Archives\Kons.tib, former \\smbsrv\Archives\Kons2.tib) Kons_new2.tib (pit 4, former \\smbsrv\Archives\Kons4.tib) and Kons_new3.tib (pit 5, former \\smbsrv\Archives\Kons5.tib). 6. Convert an image to virtual disk trueimagecmd /convert /filename:C:\MyBackup.
trueimagecmd /asz_files /password:aszpw This will list the Acronis Secure Zone size, free space and contents using generated filenames. In our example, the Acronis Secure Zone contains three archives. The archive AAA2 (2 stands for number of backups in the archive) consists of: - full (base) image backup created on 2/16/2007 at 3:43 - incremental backup created on 4/25/2007 at 11:44. The archive FAAA (F means that this is a file-level archive) contains one base file-level backup.
trueimagecmd /explore /filename:\\myserver\backup\mybackup.tib /net_user:john /net_password:qwerty This will connect all images, stored in file mybackup.tib on the network drive, as virtual drives. 16.1.5 ICompGS.exe tool: adding machines to the group server out of a *.txt file Syntax: ICompGS.
The purpose of the Tdbrepair.exe tool is to rescan tapes and add tape information into Acronis tape database. It is necessary when Acronis True Image Echo cannot recognize any Acronis Tape Plugin backups on tapes, though the archive is mounted in the RSM Import Media pool. The reason for this is when you are trying to restore\validate an archive spanned over two or more tapes made by earlier versions of Acronis True Image Echo (builds up to 8163) via Acronis Backup Server of the latest version.
Arguments include the following: /help – outputs help information about TrueImageTerminal.exe parameters. /progress – outputs progress of backup operations run either from Acronis True Image Echo Enterprise Server graphics user interface, or from the script. /execute: [script file name] – executes a script. If there are several scripts to be executed, they are queued. An example for executing MyBackup.tis script: TrueImageTerminal.exe /execute:C:\MyBackup.
Split: splits a large image file into a number of smaller files of the specified size, which can be provided in bytes, kilobytes, megabytes, etc. Password: adds password protection to an image file. 16.2.3 Script usage examples The following example illustrates the usage of a script to backup two partitions (logical drives), C and F. mybackup2.tib is specified as an incremental image file. High compression level is selected and the image is to be split into 650MB parts for recording to CD-R/RW media.