User's Guide Acronis True Image 9.1 Enterprise Server Compute with confidence www.acronis.
Copyright © Acronis, Inc., 2000-2006. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis True Image Enterprise Server (the Software) is Copyright © Acronis, Inc., 2000-2006. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1.
Table of Contents CHAPTER 1. INTRODUCTION ....................................................................................................................... 7 1.1 ACRONIS TRUE IMAGE ENTERPRISE SERVER – A COMPLETE SOLUTION FOR CORPORATE USERS ................... 7 1.2 ACRONIS TRUE IMAGE ENTERPRISE SERVER ARCHITECTURE ....................................................................... 8 1.3 NEW IN ACRONIS TRUE IMAGE 9.1 ENTERPRISE SERVER ...............................................................
4.5 MANAGING BACKUP SERVER ...................................................................................................................... 33 4.5.1 Default settings................................................................................................................................... 34 4.5.2 Set up Administrator profiles.............................................................................................................. 35 4.5.
8.1.4 Setting up one-time execution............................................................................................................. 75 8.2 MANAGING SCHEDULED TASKS ................................................................................................................... 76 CHAPTER 9. MANAGING ACRONIS SECURE ZONE ............................................................................. 77 9.1 CREATING ACRONIS SECURE ZONE ..............................................................
Chapter 1. Introduction 1.1 Acronis True Image Enterprise Server – a complete solution for corporate users You have come to rely on your servers to run your business and retain key enterprise data. Acronis True Image Enterprise Server provides comprehensive, reliable, and cost-effective system protection and recovery for systems and entire networks. With Acronis True Image Enterprise Server you have peace of mind knowing you are protected and can recover from any situation.
Supports Cutting Edge Technology Businesses today are moving to leverage the latest technologies, dual-core 64 bit processors and 64 bit operating systems. With Acronis True Image Enterprise Server, you can protect these new machines, as well as legacy ones, running one solution. Leverages Existing Technology Investments The product can leverage your current storage infrastructure by supporting a wide variety of storage media, so you can avoid costly hardware purchases to implement the solution.
6. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or RIS packages enabling data recovery in case of non-Windows or corrupted operating system. 1.3 New in Acronis True Image 9.
• Bootable backup media – When backing up to removable media, users can make this media bootable in the same manner as rescue CD, so separate recover media is not required • Bootable disks ISOs and RIS packages – In addition to burning a bootable rescue disk, users can save its ISO image for burning later, or create a RIS package for remote boot of Acronis True Image Enterprise Server • Acronis Bootable Agent – Adding this Agent to the rescue disk or RIS package will enable the administrator to manage
• SuSE 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 9.3, RedHat 7.3, 8.0, 9.0, Advanced Server 2.1, Advanced Server 3.0, Advanced Server 4.0, Fedora Core 1, Fedora Core 2, Fedora Core 3, Fedora Core 4, Enterprise Server 3.0, Mandrake 8.0, 9.2, 10.0, 10.1, Slackware 10, Debian stable and unstable (sarge), ASPLinux 9.2, ASPLinux 10, ASPLinux 11, ASPLinux Server II, ASPLinux Server IV, Virtuozzo 2.6.x, Gentoo, UnitedLinux 1.0, Ubuntu 4.10, TurboLinux 8.0, TurboLinux 10.0 and some others Linux distributions are supported.
products that you can’t solve yourself by using this guide, then please contact Acronis Technical Support. More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.com/enterprise/support/ 12 Copyright © Acronis, Inc.
Chapter 2. Acronis True Image Enterprise Server installation and starting 2.
(disabled by default) provides the ability to include Acronis True Image Enterprise Server into Bart PE plug-in tab. The plug-in files will be placed into the component installation folder along with other program files. Acronis Secure Zone manager lets you create, delete and resize a special hidden partition for storing backup archives (see 3.3 Acronis Secure Zone). When installing Acronis True Image Group Server, you will have to enter credentials, i.e.
2.3.2 Firewall setup Acronis True Image Enterprise Server uses the following ports and IP addresses for remote operation: • server (Acronis True Image Agent) UDP port: 9876 • server (Acronis True Image Agent) TCP port: 9876, if busy chose port at random • client (Acronis True Image Management Console) UDP port: 9877, if busy chose port at random • IPv4 multicast address: 239.255.219.45 • IPv6 multicast address: FF05::fAA5:741E. You might have to set the appropriate firewall access options.
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this Guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, are compressed and stored.
this case, you need not to re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Alternatively, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup. It is particularly effective if your data changes tend to be little as compared to the full data volume. The same is true for incremental backup.
3.4 Acronis Startup Recovery Manager 3.4.1 How it works The Acronis Startup Recovery Manager enables starting Acronis True Image Enterprise Server on a local computer without loading the operating system. With this feature, if the operating system won't load for some reason, you can run Acronis True Image Enterprise Server by itself to restore damaged partitions.
3.5.1 Backup locations, their quotas and time limits Backup server is a networked computer where Acronis Backup Server is installed. A backup location is an automatically managed storage area for backups on a backup server. An administrator can organize one or more backup locations and set the overall limitations to size/storage time for every location, i.e. quotas and time limits. An administrator can Move, Clear or Delete existing backup locations or edit their Quotas and time limits. 3.5.
Administrator profiles are used for managing backups, created by backup tasks, remotely controlled from Acronis True Image Management Console. An administrator assigns a backup location and sets quotas and time limits for each computer running Acronis True Image Agent.
Finally, the image will be fully restored even if the user performs no actions at all. But if you choose to start working as soon as possible after the system failure, you will gain at least several minutes, considering that restoration of a 10-20 Gb image (most common image size) takes about 10 minutes. The larger the image size, the more time you save. 3.6.
Acronis Universal Restore does not conflict with Microsoft System Preparation Tool (sysprep). If you got accustomed to using Sysprep, you can use both tools on the same system. Acronis Universal Restore is an optional program feature. It should be purchased separately and installed from a separate .msi setup file.
3.7.2 Using Acronis Universal Restore in virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, deployment and support of PC applications. Using Acronis True Image Enterprise Server with Acronis Universal Restore you can perform real-to-virtual and virtual-to-real computer migration in the same way as with real systems.
3.8 Using dynamic disks and volumes Acronis True Image Enterprise Server supports Windows LDM (also called Dynamic Disks). However, as dynamic disks are organized differently than basic, physical disk drives, their backup has some peculiar features. You can create an image of the entire dynamic disk or one or more dynamic volumes. This is because a dynamic volume is located on several dynamic disks, so a partial backup would not create a usable image.
3.10 Viewing disk and partition information You can change the way of data representation in all schemes you see in various wizards. To the right are three icons: Arrange Icons by, Choose Details and i (Display the properties of the selected item), the last duplicated in the context menu invoked by right-clicking objects. To sort messages by a particular column, click the header (another click will switch the messages to the opposite order) or Arrange Icons by button and select the column.
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managing data backup/restore on remote computers where Acronis True Image Agent is installed. The Console allows managing computer groups and corporate backup archives via Group and Backup Servers, as well as managing individual backup/restore tasks for every computer. Acronis True Image Management Console main window with the Network pane active 4.
4. Specify network name or IP address of the machine on which Acronis component is to be installed. You can also select the machine from the list of available using Browse… button. At that point you will have to provide administrator username and password. Acronis True Image Agent and Acronis True Image Enterprise Server installation requires the system restart. To allow immediate remote computer reboot, check the Reboot the remote computer box. 5.
Main window of Acronis True Image Management Console when connected to a remote computer The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery Tasks (via Acronis True Image Agent), Group Server Management (via Acronis True Image Group Server) and Backup Server Management (via Acronis Backup Server). 4.3.
Click Show tasks -> Manage, then follow the Wizard’s instructions. See details in Chapter 8. Scheduling tasks. • Set up backup/restore options, such as system/network resources usage, before/after backup commands etc. Click Remote Computer Options, select Default backup options or Default restoration options and make settings. See details in 6.3 Setting backup options and 7.4 Setting restore options.
Here you can monitor states of Acronis True Image Enterprise Server tasks (backup, restore, validating backup archives) on all networked computers: Ready – the remote computer is available for the next task Prepare - preparations are being made on a remote machine for the task execution (analyzing partitions, preparing backup scripts, etc.
3. Create a disk/partition backup task for several remote computers at once (see 4.4.2 Creating new group backup tasks). 4. Connect to a remote computer to see the operation log, start or edit tasks for this computer etc. (see 4.3 Managing a single remote computer). To do so, select a computer and click Connect. 5. Invoke Group tasks management window for viewing, deleting or rescheduling group tasks. 4.4.
You should also provide the archive name for each computer, unless the archives are targeted to Acronis Secure Zones or a backup server. Pressing the button to the right of name input field will assign to each archive the respective computer’s name. 5. Specify usual backup settings: backup mode (full, incremental or differential), a password to backup archive (if necessary), default or custom backup options and comment. For more information see Chapter 6. Creating backup archives. 6.
4.4.3 Group tasks management The Group Tasks Management window displays the list of group tasks. To see details of a group task, click the button to the left of the task name. To create new or delete existing backup task, use the New Group Task and Delete Group Task items. When deleting a group task, enter the same username and password you entered when created the task. 4.5 Managing backup server Before you start managing the backup server, be sure to read section 3.
4.5.1 Default settings Each user or computer, added to Acronis Backup Server database, is associated with the default backup location and the default user/computer quotas and time limits. When installed on a computer (which becomes a backup server from this point on), Acronis Backup Server creates the following folder: C:\Documents and Settings\All Users\Application Data\Acronis\BackupServer. This folder is a default backup location.
To enable Acronis Backup Server to process archives, schedule quotas/time limits check task. Select Specify Default Settings -> Schedule Automatic Consolidation and Backup Management and schedule one-time, daily, weekly or monthly check of all user’s/computers archives on the backup server for meeting limitations. If the check reveals that some of quotas/time limits are exceeded, the archive processing described in 3.5.2 Quotas and time limits for computers and users will be executed.
You can use the default backup location, quotas and time limits or make particular settings for the new computer. If you specify a new path to backup location for the new computer, a new backup location will be created. You might need to change a computer profile already set. To do so, select the computer and click Edit. The Edit Computer Profile Wizard will guide you through the same selections, as the Add Computer Profile Wizard.
To do so, first, add this person to AcronisBackupServerUsers group. Then click Set up User profiles -> Add, select the user name and specify backup location, quotas and time limits for this user in Add User Profile Wizard windows. Use the default backup location, quotas and time limits or make particular settings for the new user. If you specify a new path to backup location for the new user, a new backup location will be created.
Deleting a user profile will disable backup to backup server for this user and his existing archives will be deleted. This operation might also be time-consuming, so you can schedule it for the off-peak period. Deleting an administrator profile will not result in deleting any archives. There must be at least one administrator on a backup server. Therefore, deleting the last administrator profile is not possible. The maximum number of administrators is not limited. 4.5.
The default backup location cannot be deleted. If you try to do so, the program will clean the default backup location and issue an appropriate message. To delete the location completely, first reassign the default backup location by selecting Specify Default Settings -> Set backup location. Cleaning and deleting backup locations might be time-consuming operations, so you can schedule them for the off-peak period. 4.5.
Acronis True Image Management Console does not contain Rescue Media Builder in its own installation. Therefore, to be able to create bootable media/RIS package from Acronis True Image Management Console, you must have Acronis True Image Enterprise Server or another Acronis product including Rescue Media Builder, installed on the same computer. 40 Copyright © Acronis, Inc.
Chapter 5. Using Acronis True Image Enterprise Server (local version) Acronis True Image Enterprise Server supports the command-line mode for data backup and restore, as well as the GUI mode, and can be used to execute XML scripts. Here we describe the operations available in GUI mode, which provides more functionality. For console commands and scripting see Chapter 15. Command-line mode and scripting. 5.
• Show Log – opens the Log Viewer window • Manage Acronis Secure Zone – used to create, delete and resize a special hidden partition for storing archives (Acronis Secure Zone) • Activate Acronis Startup Recovery Manager – activates the boot restoration manager (F11 key). Program menu The program menu line features the Operations, View, Tools and Help items. The Operations menu contains a list of the available operations, including scheduling tasks.
5.2 Managing a local computer You can perform the following operations on the local computer. • Backup and restore data, including system disks/partitions Click Backup or Recovery, then follow the Wizard’s instructions. See details in Chapter 6. Creating backup archives and Chapter 7. Restoring the backup data. • Schedule backup operations Click the very left button on a tasks pane toolbar, then follow the Wizard’s instructions. See details in Chapter 8. Scheduling tasks.
• Turn on/off Windows System Restore tool See 11.5 Managing System Restore. • Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Some of the above operations can be executed in command-line as well. For more information on Acronis True Image Enterprise Server command-line mode see 15.1 Working in the command-line mode. 44 Copyright © Acronis, Inc.
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
6. Set filters for not to back up files of specific types. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be stored in the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .exe files with names, consisting of five symbols and starting with “my”.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged. Data saved to a network disk, ftp-server or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.3 Acronis Secure Zone) for storing backups. In that case, you need not provide the file name.
11. Click Next. 12. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as default. See 6.3 Setting backup options for more information. 13. Click Next. 14.
In Acronis True Image Enterprise Server local version you can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from the appearing menu. How to set the default priority, see in 6.3.6 Backup performance. 18. You may want to see the log when the task is completed. To view the log, click the Show Operation Logs button on the toolbar.
5. Click Next. 6. Select the name and location of the archive file. If you are going to create a full archive, type the file name in the File Name line, or use the file name generator (a button to the right of the line). If you select an existing archive, it will be overwritten. If you are going to create an incremental backup (see 3.2 Full, incremental and differential backup), select the latest full or incremental backup you have.
changes to it, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backup). 9. Click Next. 10. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task.
6.3.1 Archive protection The default setting – no password. An archive can be protected with a password. To protect the archive from being restored by anybody except you, enter a password and its confirmation into the text fields. A password should consist of at least eight symbols and contain both letters (in the upper and lower cases preferably) and numbers to make it more difficult to guess.
Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the backup process to run concurrently with your commands execution. 6.3.4 Database support Database servers, such as MS SQL Server and MS Exchange, prove to be troublesome to backup, partially due to open files and indexes and partially due to rapid data changes. Therefore many system administrators prefer to suspend the database at the backup (capturing the Snapshot) moment. 1.
Before/after data capture commands can also be used for purposes, different from suspending the database, especially if VSS support is enabled. You may want to suspend an application other than database, for example. The commands execution and the VSS actions will be sequenced as follows: “before” commands -> VSS Suspend -> data capture -> VSS Resume -> “after” commands.
If you frequently backup data to network drives, think of limiting the network usage used by Acronis True Image Enterprise Server. To set the desired data transfer speed, drag the slider or enter the bandwidth limit for transferring backup data in kilobytes per second. 6.3.7 Fast incremental/differential backup The default setting – Use fast incremental/differential backup. Incremental/differential backup captures only changes in data occurred since the last backup.
When backing up to a diskette, CD-R/RW or DVD+R/RW: Acronis True Image Enterprise Server will ask you to insert a new disk when the previous one is full. Alternatively, you can select Fixed size and enter the desired file size or select it from the drop-down list. The backup will then be split into multiple files of the specified size. That comes in handy when backing up to a hard disk with a view to burning the archive to CDR/RW or DVD+R/RW later on.
If you want more functionality during restoration, write a standalone version of Acronis True Image Enterprise Server to the rescue disk. Then you will be able to configure the restore task using Restore Data Wizard, use Acronis Snap Restore or Acronis Universal Restore etc. Under Advanced tab you can select full, safe or both Acronis True Image Enterprise Server loader version. The safe version does not have USB, PC card or SCSI drivers and is useful only in case the full version does not load.
Chapter 7. Restoring the backup data 7.1 Restore under Windows or boot from CD? As mentioned above (see 2.4.1 Running Acronis True Image Enterprise Server (local version)), Acronis True Image Enterprise Server can be run in several ways. We recommend that you first try to restore data running Acronis True Image Enterprise Server under Windows, because this method provides more functionality. Boot from the bootable media or use the Startup Recovery Manager (see 3.
1. Invoke the Restore Data Wizard by clicking on the restore operation icon in the main program window. 2. Click Next. 3. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive on the next step. If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. Data recovery directly from ftp-server requires the archive to consist of files no more than 2 Gb in size.
6. Click Next. 7. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 8. Click Next. 9. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 10. Click Next. 11.
12. Click Next. 13. Set filters for not to restore files of specific types. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be restored from the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .exe files with names, consisting of five symbols and starting with “my”.
7.3 Restoring disks/partitions or files from images To restore a partition (disk) from an image, Acronis True Image Enterprise Server must obtain exclusive access to the target partition (disk). This means no other applications can access it at that time. If you receive a message stating that the partition (disk) can not be blocked, close applications that use this partition (disk) and start over. If you can not determine which applications use the partition (disk), close them all. 7.3.
To restore data from an incremental backup, you must have all previous incremental backup files and the initial full backup. If any of successive backups is missing, restoration is impossible. To restore data from a differential backup, you must have the initial full backup as well. 4. Click Next. 7.3.3 Restoration type selection 1.
However, you can choose an ordinary way of restoration for that image. This will allow you to make changes to the restored partition, that would be impossible when using Acronis Snap Restore. Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 2. Click Next. 7.3.4 Selecting a disk/partition to restore 1. The selected archive file can contain images of several partitions or even disks. Select which disk/partition to restore.
If you are restoring a system partition to the new (or the same) disk and want to load an operating system from it, you will select Active. If you restore a system partition to another hard disk with its own partitions and OS, most probably, you will need only the data. In this case, you can restore the partition as Logical to access the data only. By default, the original partition type is selected.
These changes might be useful if you are to copy your hard disk to a new high-capacity one by creating its image and restoring it to a new disk with larger partitions. This way of cloning is used if it is impossible to connect the second hard disk to the server (for more details about cloning see 13.1 General information). 2. Click Next. 7.3.9 Assigning a letter to the restored partition 1. Acronis True Image Enterprise Server will assign an unused letter to a restored partition.
7.3.12 Using Acronis Universal Restore Acronis Universal Restore is an optional Acronis True Image Enterprise Server feature. It should be purchased separately and installed from a separate .msi setup file. The following is true for Acronis True Image Enterprise Server installations including Acronis Universal Restore. Acronis Universal Restore option is not available when restoring dynamic disks and volumes. 1.
4. Click Next. 5. If you know which drivers will fit for the new hardware, add them to the drivers list in the next window. You can add HAL and hard disk controller drivers. Drivers for devices (sound cards, network adapters, video cards etc.) will be found by Windows itself when it boots. Thus, Acronis Universal Restore uses three sources for drivers search: the driver repository, the list of user-specified (enforced) drivers, and the Windows default driver storage folders (in the image being restored).
If Acronis Universal Restore finds no HAL or hard disk controller drivers compatible with the new hardware in all available sources, you will be prompted to browse network share drive, floppy disk or CD to select missing drivers. On starting Windows, it will initialize a common procedure for installing new hardware. At this point, you will be able to specify drivers for devices, if Windows cannot find them automatically. 7.
Overwrite existing file if it is older – this will give the priority to the most recent file modification, whether it is in the archive or on the disk. Do not overwrite existing file – this will give the file on the hard disk unconditional priority over the archived file. This option is effective only when restoring files from file/folders archives. 7.4.3 Pre/post commands You can specify commands or batch files to be automatically executed before and after the restore procedure.
Verification of the file system is available only when restoring disk/partitions under Windows and for FAT16/32 and NTFS file systems. Copyright © Acronis, Inc.
Chapter 8. Scheduling tasks Acronis True Image Enterprise Server allows you to schedule periodic backup tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Active Tasks area of the main window. You can start, stop, edit, delete and rename the scheduled tasks. 8.
• When my computer shuts down – the task will be executed before every server shutdown or reboot • When I log off – the task will be executed each time the current user logs off of the OS. Some of these options might be disabled depending on the operating system. 5. Click Next. 6. Specify the task start time and other schedule parameters, according to the selected periodicity (see 8.1.1 - 8.1.4). 7. Click Next. 8.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.2 Setting up weekly execution If you select the weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check days on which to execute the task.
8.1.3 Setting up monthly execution If you select the monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.2 Managing scheduled tasks The task Status, Schedule, Last Run Time and Last Result are shown on the Active tasks pane of the main window. To view the other task details, right-click on its name. There are two ways of changing the task parameters. Editing allows you to change any task parameters.
Chapter 9. Managing Acronis Secure Zone 9.1 Creating Acronis Secure Zone Acronis Secure Zone can be located on any local disk. It is created using unallocated space, if available, or at the expense of free space on a partition. A computer can have only one secure zone. To create a zone on another disk, you must first delete an existing zone. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives.
9.2 Resizing Acronis Secure Zone 1. When prompted by the wizard, select Manage Acronis Secure Zone. 2. Select to increase or decrease the zone. You might need to increase it to provide more space for archives. The opposite situation might arise if either partition lacks free space. 3. Select partitions from which free space will be used to increase Acronis Secure Zone or that will receive free space after the zone is reduced. 4. Enter the new size of the zone or drag the slider. 5.
Zone deletion might take several minutes or more. Please wait until the whole procedure is finished. Acronis Secure Zone deletion will automatically disable Acronis Startup Recovery Manager if it is activated and destroy all backups stored in the zone. Copyright © Acronis, Inc.
Chapter 10. Creating bootable media You can run Acronis True Image Enterprise Server on a bare metal or on a crashed computer that cannot boot. You can also back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Enterprise Server version.
Acronis True Image Enterprise Server offers the following components: • Acronis True Image Enterprise Server full version Includes support of USB, PC Card and SCSI interfaces along with the storage devices connected via them, therefore is highly recommended. • Acronis True Image Enterprise Server safe version Does not include USB, PC Card, or SCSI drivers.
4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to create a bootable disk ISO image, specify the ISO file name and the folder where to place it. If you chose to save bootable data on a RIS server, specify the server and provide the user name and password to access it. 5. Next, the program will calculate how many blank disks are required (in case you have not chosen ISO or RIS) and give you time to prepare them.
Chapter 11. Other operations 11.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. 1. To invoke the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools group or click Validate Backup Archive on the toolbar. 2. Click Next. 3. Select the archive to validate. If the archive is located in Acronis Secure Zone, select it to choose the archive on the next step. 4. Click Next. 5.
11.2.1 Email notification To set up the e-mail notification, select Tools -> Options -> Notifications -> E-mail: Provide the email address to which notifications will be sent and the outgoing SMTP server name. A user name and a password might also be needed if the SMTP server requires authentication.
Provide the name of the computer to which notifications will be sent. Below in this window you can choose whether you want to get notifications: - when the operation is completed successfully - when the operation failed - during the operation when user interaction is required. 11.3 Viewing logs Acronis True Image Enterprise Server allows users to view its working logs. They can provide information about scheduled tasks results, including reasons for failure, if any.
You can also change column width by dragging the borders with a mouse. 11.4 Event tracing 11.4.1 Windows event log You can choose whether to store event log messages, issued by Acronis True Image Enterprise Server, to Windows Event Log (to see this log, run eventvwr.exe or select Control Panel -> Administrative tools -> Event Viewer -> Application). The default setting – Do not save messages To change this setting, select Tools -> Options -> Windows event log.
1. To invoke the System Restore Management Wizard, select Manage System Restore from the menu or from the Tools group, or click Manage System Restore on the toolbar. 2. Click Next. 3. Now you can turn on/off System Restore on all your hard disk(s) partitions at once or do it individually for each partition. Note that you cannot turn off System Restore on the system disk (partition), yet keep it on other disks (partitions). 4. Click Next. 5. The program lists the configured changes.
Chapter 12. Mounting an image as a virtual drive Acronis True Image Enterprise Server can mount partition images as virtual drives, thus letting you access them as though they were physical drives.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Enterprise Server will ask for it. Neither the partitions layout, nor the Next button will be enabled until you enter the correct password. 4. Click Next. 5. If you are to mount an incremental image, Acronis True Image Enterprise Server will suggest that you select one of successive incremental archives by date/time of its creation.
8. Click Next. 9. Select whether you want to mount image in Read-only or Read/Write mode. 10. Click Next. 11. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the comment to this file. 12. The program displays a summary containing a single operation. Click Proceed to connect the selected partition image as a virtual disk. 13.
Chapter 13. Transferring the system to a new disk 13.1 General information Sooner or later any server user finds out that his hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 13.3.
unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers are inexpedient, as they leave much unallocated space on the new disk. Using the "as is" method, Acronis True Image Enterprise Server transfers unsupported and damaged file systems.
If you have selected manual partition creation before, the partition layout will look different. This partitioning method is described below. 13.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks. Cloning a disk containing the currently active operating system will require reboot. In that case, after clicking Proceed you will be asked to confirm the reboot. Canceling the reboot will cancel the entire procedure.
To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window. Be careful! Clicking Back in this window will reset all size and location changes that you've selected, so you will have to specify them again. First, select a partition to resize. It will be underlined in red. Resize and relocate it on the next step.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the server has space for another disk, it would be easier to add a data disk drive than to clone a system one. This feature is available in Acronis True Image Enterprise Server local version only.
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition size. If the cursor turns to four arrows, it is pointed at the partition, so you can move it to the left or right (if there is unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process.
Chapter 15. Command-line mode and scripting Acronis True Image Enterprise Server (local version) supports the command-line mode, as well as the GUI mode, and can be used to execute XML scripts. 15.1 Working in the command-line mode An administrator might need a console interface in some situations. Acronis True Image Enterprise Server supports this mode with TrueImageCmd.exe utility.
Specifies the partitions to include into the image file by numbers. The list of available partitions is provided by /list. Partition numbers are specified as -, e.g.: /partition: 1-1,1-2,3-1 /file_partition:[partition letter] Specifies the partition where the image file will be stored (by letter or number). This option is used with /filename:file_name. In that case the file name must be specified without drive letter or root folder.
/password:[password] Specifies the password for the image file (if required). /harddisk:[disk number] Specifies the hard disks to restore by numbers. /partition:[partition number] Specifies the partitions to restore by numbers. /target_harddisk:[disk number] Specifies the hard disk number where the image will be restored. /start:[start sector] Sets the start sector for restoring a partition to the hard disk unallocated space. /size:[partition size in sectors] Sets the new partition size (in sectors).
/target_harddisk:[disk number] Specifies the target hard disk number where the source hard disk will be cloned. 5. explore Connects an image file as a virtual drive. Options /filename:[image file name] The image file name. /password:[image password] The password for the image file (if required). /partition:[partitions list] Specifies a list of partitions to be mounted as virtual drives. Without this option, all partitions stored in the image file will be mounted.
Specifies partitions from which free space will be taken for Acronis Secure Zone creation. /size:[ASZ size in sectors] Sets the Acronis Secure Zone size (in sectors). If this size is not specified, it will be set as average between maximal and minimal values, including unallocated spaces on the all listed partitions. /asz_activate Activates the Acronis Secure Zone after creation (or, rather, activates Acronis Startup Recovery Manager).
/net_password:[password] Specifies a user password when verifying an image from a network drive. 11. help Shows help for commands. 15.1.2 trueimagecmd.exe usage examples 1. Create image trueimagecmd /create /filename:"C:\Test\1.tib" /partition:21,1-3 • This will create an image named 1.tib of the partitions 2-1 and 1-3. Image will be saved to c:\Test\ folder. trueimagecmd /create /filename:"\Test\1.tib" /partition:2-1,13 /file_partition:3-1 • This will create an image named 1.
3. List trueimagecmd /list • This will list available partitions. 4. Clone trueimagecmd /clone /harddisk:2 /target_harddisk:3 • Clone hard disk 2 to hard disk 3. 5. Explore image trueimagecmd /explore /filename:\\myserver\backup\mybackup.tib /net_user:john /net_password:qwerty • This will connect all images, stored in file mybackup.tib on the network drive, as virtual drives. 15.1.
15.2.2 Script structure Scripts are written in the XML language and you can use the following tags: Source. Specifies the partitions or disks to be imaged. Letters assigned to partitions must be used without colon. Disk numbers correspond to their system numbers. To create images of several partitions or disks, use the SOURCE tag for each of them, e.g.: Target. Specifies the name and the location of an image file, e.g.
The script for backing up to tape (tapeN specifies the tapes numbers): xml version="1.0" encoding="utf-8" ?> 110 Copyright © Acronis, Inc.