AcronisBackupAdvanced 11.5 Userguide en-US
AcronisBackupAdvanced 11.5 Userguide en-US
USER GUIDE
Copyright Statement
Copyright © Acronis International GmbH, 2002-2015. All rights reserved.
“Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
"Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore”,
“Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the
United States and/or other jurisdictions.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at http://kb.acronis.com/content/7696
Console
The console provides Graphical User Interface to other Acronis Backup components. Usage of the
console is not licensed.
Bootable Media Builder does not require a license if installed together with an agent. To use a media
builder on a machine without an agent, you need to enter the license key or have at least one license
on the license server. The license may be either available or assigned.
Disk backup
Disk-level data protection is based on backing up either a disk or a volume file system as a whole,
along with all the information necessary for the operating system to boot; or all the disk sectors using
the sector-by-sector approach (raw mode). A backup that contains a copy of a disk or a volume in a
packaged form is called a disk (volume) backup or a disk (volume) image. It is possible to recover
disks or volumes as a whole from such backup, as well as individual folders or files.
File backup
File-level data protection is based on backing up files and folders residing on the machine where the
agent is installed or on a network share. Files can be recovered to their original location or to another
place. It is possible to recover all files and folders that were backed up or select which of them to
recover.
Disk management
Agent for Windows includes Acronis Disk Director Lite - a handy disk management utility. Disk
management operations, such as cloning disks; converting disks; creating, formatting and deleting
volumes; changing a disk partitioning style between MBR and GPT or changing a disk label, can be
performed either in the operating system or using bootable media.
File backup
File-level data protection is based on backing up files and directories residing on the machine where
the agent is installed or on a network share accessed using the smb or nfs protocol. Files can be
recovered to their original location or to another place. It is possible to recover all files and
directories that were backed up or select which of them to recover.
The agent uses Microsoft VSS to ensure the consistency of the backed-up databases. After a
successful backup, the agent can truncate the SQL Server transaction log.
The agent is installed with Agent for Windows (p. 17) or on a machine where Agent for Windows is
already installed.
The agent is installed with Agent for Windows (p. 17) or on a machine where Agent for Windows is
already installed.
The most important function of a storage node is deduplication (p. 228) of backups stored in its
vaults. This means that identical data will be backed up to this vault only once. This minimizes the
network usage during backup and storage space taken by the archives.
The storage nodes enable creating highly scalable and flexible, in terms of the hardware support,
storage infrastructure. Up to 50 storage nodes can be set up, each being able to manage up to 20
vaults.
The administrator controls the storage nodes centrally from the Acronis Backup Management Server
(p. 19). Direct console connection to a storage node is not possible.
You can install a license server as a separate component or use the one integrated into the
management server. The functionality of the license server (p. 380) is similar for both types of
installation.
The console has two distributions: for installation on Windows and installation on Linux. While both
distributions enable connection to any Acronis Backup agent and Acronis Backup Management
Server, we recommend that you use the console for Windows if you have a choice between the two.
The console that installs on Linux has limited functionality:
Remote installation of Acronis Backup components is not available.
The Active Directory-related features, such as browsing the AD, are not available.
The media builder that installs on Windows can create bootable media based on either Windows
Preinstallation Environment, or Linux kernel. The media builder that installs on Linux creates
bootable media based on Linux kernel.
To install the product in the trial mode, run the setup program locally or use the remote installation
functionality. Unattended installation and other ways of installation are not supported.
To specify a license key, click Help > Change License (p. 335). Specifying the key by running the setup
program is not possible.
If you have activated a trial or purchased a subscription for the cloud backup service (p. 412), cloud
backup will be available until the subscription period expires, regardless of whether you specify a
license key.
Product Updates
You can download the latest updates for all your registered Acronis software products from our
website at any time after logging into your Account (http://www.acronis.com/en-us/my) and
registering the product. See Registering Acronis Products at the Website
(http://kb.acronis.com/content/4834) and Acronis Website User Guide
(http://kb.acronis.com/content/8128).
Step 2. Running
Run Acronis Backup Management Console.
In Windows Start the console by selecting Acronis Backup from the Start menu.
In Linux Log in as root or log in as an ordinary user and then switch user as
required. Start the console with the command
/usr/sbin/acronis_console
For understanding of the GUI elements see "Using the management console" (p. 26).
Step 4. Connection
Connect the console to the managed machine, or to the management server.
Step 5. Backup
Step 6. Recovery
Step 7. Management
The Navigation pane (at the left part of the console) enables you to navigate across the product
views that are used for different administering purposes.
Use the Backup plans and tasks view to manage backup plans and tasks: run, edit, stop and
delete plans and tasks, view their states and progress.
Use the Alerts view to rapidly identify and solve the problems.
Use the Log view to browse the operations log.
The location where you store backup archives is called a vault (p. 446). Navigate to the
Vaults (p. 176) view to obtain information about your vaults. Navigate further to the specific
vault to view backups and their contents. You can also select the data to recover and perform
manual operations with backups (mounting, validating, deleting).
Administering the management server
Use the Machines with agents view to manage machines registered on the management
server. To effectively work with a large number of machines, organize them into groups (p. 365).
Use the Virtual machines (p. 377) view to manage supported virtualization environments.
Navigation tree
The Navigation tree enables you to navigate across the program views. Views depend on whether
the console is connected to a managed machine or to the management server. In both cases, you can
choose between the Full list or the Short list of views. The Short list contains the most frequently
used views from the Full list.
2.1.2.1 Views
A view appears on the main area when clicking any item in the Navigation tree in the Navigation
pane (p. 27).
"Log" view
Sort items by any column Click a column's header to sort items in ascending order.
Click it once again to sort items in descending order.
Filter items by predefined In a field below the corresponding column's header, select the required value
column value from the drop-down list.
Filter items by entered value In a field below the corresponding column's header, type a value.
As a result you will see the list of values, fully or just partly coincide with the
entered value.
Filter items by predefined Click the appropriate buttons above the table.
parameters
For example, in the Log view, you can filter the log entries by event type
(Error, Warning, Information) or by the period when the event occurred (For
last 24 hours, For last week, For last three months, or For custom period).
Show or hide table columns By default, any table has a fixed number of columns that are shown, others
are hidden. If required, you can hide the shown columns and show the hidden
ones.
To show or hide columns
1. Right-click any column header to open the context menu.
2. Click the items you want to be displayed/hidden.
Acronis Backup remembers the changes you made on the action pages. For example, if you started to
create a backup plan, and then for any reason switched to another view without accomplishing the
plan creation, you can click the Back navigation button on the menu. Or, if you have passed several
steps forward, click the Down arrow and select the page where you started the plan creation from
the list. Thus, you can perform the remaining steps and accomplish the backup plan creation.
Navigation buttons
To access the console options, select Options > Console options from the top menu.
To show (hide) alerts, select (clear) the check boxes next to the respective alert types.
If the option is disabled, the credentials are stored only until the console is closed.
To clear the credentials cache for the current user account, click the Clear credentials cache button.
2.1.3.3 Fonts
The option defines the fonts to be used in the Graphical User Interface of Acronis Backup. The Menu
font setting affects the drop-down and context menus. The Application font setting affects all other
GUI elements.
The preset is: System Default font for both the menus and the application interface items.
To make a selection, choose the font from the respective combo-box and set the font's properties.
You can preview the font's appearance by clicking Browse to the right.
To make a selection, select or clear the The “Interaction Required” dialog check box.
To make a selection, select or clear the The “Feedback Confirmation” dialog check box.
To make a selection, select or clear the Notify if bootable media is not created check box.
To make a selection, select or clear the Notify when the management console is connected to a
component of a different version check box.
To make a selection, select or clear the Request description when ejecting a tape check box.
Note Tape devices can only be used with Acronis Backup Advanced.
The option defines whether to display the pop-up messages about task run results: successful
completion, failure or success with warnings. When the displaying of pop-up messages is disabled,
you can review the task execution states and results in the Backup plans and tasks view.
To make a setting for each result (successful completion, failure or success with warnings)
individually, select or clear the respective check box.
To make a selection, select or clear the check box for Show the "Dashboard" view.
This option can also be set on the Welcome screen. If you select the check box for At startup, show
the Dashboard instead of the current view on the Welcome screen, the setting mentioned above
will be updated accordingly.
3.1 Owners
This section explains the concept of a backup plan (task) owner and an archive owner.
A centralized backup plan owner is the management server administrator who created or last
modified the centralized backup plan.
Tasks, belonging to a backup plan, either local or centralized, are owned by the backup plan owner.
Tasks that do not belong to a backup plan, such as the recovery task, are owned by the user who has
created or last modified the task.
When a user opens a plan or task for editing, which is owned by another user, all passwords set in
the task are cleared. This prevents the "modify settings, leave passwords" trick. The program displays
a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the
warning, you have two options:
Click Cancel and create your own plan or task. The original task will remain intact.
Continue editing. You will have to enter all credentials required for the plan or task execution.
Archive owner
An archive owner is the user who saved the archive to the destination. To be more precise, this is the
user whose account was specified when creating the backup plan in the Where to back up step. By
default, the plan's credentials are used.
Access credentials
When browsing backup locations, setting up backups, or creating recovery tasks, you may need to
provide credentials for accessing various resources, such as the data you are going to back up or the
location where the backups are (or will be) stored.
If the Credentials cache (p. 31) option is enabled (it is enabled by default), the credentials which you
provide during a console session are saved for use during the later sessions. Thus, there is no need to
In Windows
By default, the plan runs under the agent service account, if created by a user having administrative
privileges on the machine. If created by a regular user, such as a member of the Users group, the
plan runs under this user's account.
When creating a backup plan, you are only asked for credentials in specific cases. For example:
You are scheduling backups as a regular user and did not enter credentials when connecting the
console to the machine. This may be the case when the console is installed on the same machine
that you are backing up.
You are backing up a Microsoft Exchange cluster to a storage node.
Specifying the credentials explicitly
You have the option to explicitly specify a user account under which the backup plan will run. To do
this, on the backup plan creation page:
1. In the Plan parameters section, click Show plan's credentials, comments, label.
2. Click Plan's credentials.
3. Enter the credentials under which the plan will run. When entering the name of an Active
Directory user account, be sure to also specify the domain name (DOMAIN\Username or
Username@domain).
In Linux
You do not need to specify backup plan's credentials. In Linux, backup plans always run under the
root user account.
Task credentials
Like a backup plan, any task runs on behalf of a user.
In Windows
When creating a task, you have the option to explicitly specify an account under which the task will
run. Your choice depends on whether the task is intended for manual start or for executing on
schedule.
Manual start
Every time you manually start the task, the task will run under the credentials with which you are
currently logged on. Any person that has administrative privileges on the machine can also start
the task. The task will run under this person's credentials.
The task will always run under the same credentials, regardless of the user who actually starts
the task, if you specify the task credentials explicitly.
Scheduled or postponed start
The task credentials are mandatory. You cannot complete the task creation until you specify the
task credentials. Task credentials are specified on the task creation page in a similar manner as
the plan’s credentials are specified.
Regular users
A regular user, such as a member of the Users group, has the following management rights:
Perform file-level backup and recovery of the files that the user has permissions to access—but
without using a file-level backup snapshot (p. 117).
Create backup plans and tasks and manage them.
View—but not manage—backup plans and tasks created by other users.
View the local event log.
Backup operators
A user who is a member of the Backup Operators group, also has the following management right:
Back up and recover the entire machine or any data on the machine, with or without using a disk
snapshot. Using a hardware snapshot provider may still require administrative privileges.
Administrators
A user who is a member of the Administrators group, also has the following management right:
View and manage backup plans and tasks owned by any user on the machine.
Linux
When managing a machine running Linux, the user has or obtains the root privileges, and so can:
Back up and recover any data or the entire machine, having full control over all Acronis Backup
agent operations and log files on the machine.
Manage local backup plans and tasks owned by any user registered in the operating system.
To avoid routine logging on to the system as root, the root user can log on with the ordinary user
credentials and then switch user as required.
The following table lists the services of Acronis Backup components and the privileges for their
accounts.
Service name Purpose Account used Privileges added to the account
by the service
User rights Group Permissions on registry
membership keys
Services for Acronis Backup agents
Acronis Backing up and Acronis Agent Log on as a Backup BackupAndRecovery
Managed recovering data User (new service Operators
Encryption
Machine Service on the machine account) or (for any account)
Adjust memory
user-specified Global
(Main service) quotas for a Administrators
account
process (for new account MMS
only)
Replace a
process level
token
Modify
firmware
environment
values
Acronis VSS Using a Volume Local System No additional privileges
Provider Shadow Copy
(VSS) provider
(Auxiliary
(p. 129) that
service; created
comes with
only for Agent
Acronis Backup
for Windows in a
Windows Server
operating
system)
Acronis Managing locally Local System No additional privileges
Removable attached tape
Storage devices. Can be
Management also used by the
Service Storage Node
Service.
(Auxiliary
service)
Services for Acronis Backup Management Server
Acronis Centrally AMS User Log on as a Acronis AMS
Management managing (new account) service Centralized
BackupAndRecovery
Server Service backup or Admins
operations on user-specified
(Main service)
multiple account
machines
Common services
The following services can be used by multiple components of Acronis Backup and by other Acronis
products. These services always run under a system account. No additional privileges are given to the
account.
Service name Purpose Account used by the service
Services for Acronis PXE Server
Acronis PXE Booting machines into Acronis bootable components over Local System
Server Service the network
Acronis File Providing bootable components for Acronis PXE Server Local System
Server Service
Remote-access and scheduling services
Acronis Remote Providing connectivity among Acronis components Local System
Agent Service (Windows Vista and later)
or
NetworkService
(earlier than Windows Vista)
Comparing backup methods with each other does not make much sense because the methods work
as a team in a backup scheme. Each method should play its specific role according to its advantages.
A competent backup scheme will benefit from the advantages of all backup methods and lessen the
influence of all the methods’ shortcomings. For example, weekly differential backup facilitates
archive cleanup because it can be easily deleted along with the weekly set of daily incremental
backups depending on it.
Backing up with the full, incremental or differential backup method results in a backup (p. 435) of the
corresponding type.
Full backup
A full backup stores all data selected for backup. A full backup underlies any archive and forms the
base for incremental and differential backups. An archive can contain multiple full backups or consist
of only full backups. A full backup is self-sufficient - you do not need access to any other backup to
recover data from a full backup.
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis
technologies, recovery from an incremental backup may be not slower than recovery from a full one.
Differential backup
A differential backup stores changes to the data against the latest full backup. You need access to
the corresponding full backup to recover the data from a differential backup. A differential backup is
most useful when:
you are interested in saving only the most recent data state
the data changes tend to be small as compared to the total data size.
The typical conclusion is: "differential backups take longer to do and are faster to restore, while
incremental ones are quicker to do and take longer to restore." In fact, there is no physical difference
between an incremental backup appended to a full backup and a differential backup appended to
the same full backup at the same point of time. The above mentioned difference implies creating a
differential backup after (or instead of) creating multiple incremental backups.
An incremental or differential backup created after disk defragmentation might be considerably larger than
usual because defragmentation changes file locations on the disk and the backup reflects these changes. It is
recommended that you re-create a full backup after disk defragmentation.
The following table summarizes the advantages and shortcomings of each backup type as they
appear based on common knowledge. In real life, these parameters depend on numerous factors
such as the amount, speed and pattern of data changes; the nature of the data, the physical
specifications of the devices, the backup/recovery options you set, to name a few. Practice is the
best guide to selecting the optimal backup scheme.
Parameter Full backup Differential backup Incremental backup
Storage space Maximal Medium Minimal
Windows
A dynamic volume is a volume located on dynamic disks (p. 440), or more exactly, on a disk group (p.
440). Acronis Backup supports the following dynamic volume types/RAID levels:
simple/spanned
striped (RAID 0)
mirrored (RAID 1)
a mirror of stripes (RAID 0+1)
RAID-5.
Backing up dynamic volumes
Dynamic volumes are backed up in the same way as basic volumes. When creating a backup plan
through the GUI, all types of volumes are available for selection as Items to back up. When using the
command line, specify the dynamic volumes with the DYN prefix.
You also might need to create or increase unallocated space on an existing disk group. This can be
done by deleting volumes or converting basic disks to dynamic.
You might want to change the target volume type (basic, simple/spanned, striped, mirrored, RAID
0+1, RAID 5). This can be done by deleting the target volume and creating a new volume on the
resulting unallocated space.
Acronis Backup includes a handy disk management utility which enables you to perform the above
operations both under the operating system and on bare metal. To find out more about Acronis Disk
Director Lite, see the Disk management (p. 267) section.
Backup
In Acronis Backup GUI, logical volumes appear under Dynamic volumes at the end of the list of
volumes available for backup. If you select logical volumes for backup, the logical volume structure
will be saved to the backup along with the volume contents. This structure can be automatically
recreated when you recover these volumes under a Linux-based bootable media.
To back up all available disks, specify all logical volumes plus basic volumes not belonging to them.
This is the default choice when you open the Create backup plan page.
Recovery
When recovering logical volumes, you have two options:
Recovering volume contents only. The type or other properties of the target volume will not
change.
This option is available both in the operating system and under bootable media.
This option is useful in the following cases:
When some data on the volume was lost, but no hard disks were replaced.
When recovering a logical volume over a basic disk or volume. You can resize the resulting
volume in this case.
A system, recovered from a logical volume backup to a basic disk, cannot boot because its kernel tries
to mount the root file system at the logical volume. To boot the system, change the loader
configuration and /etc/fstab so that LVM is not used and reactivate your boot loader (p. 155).
You can back up active (mounted) MD devices in the same way as logical volumes. The MD devices
appear at the end of the list of volumes available for backup. If you select MD devices for backup, the
structure of the MD devices will be backed up along with their contents.
Backing up volumes included in MD devices does not make sense when an MD device is mounted, as
it won’t be possible to recover them.
When recovering MD devices under bootable media, the structure of MD devices can be recreated
automatically. For detailed information about recovering MD devices under bootable media, see
Recovering MD devices and logical volumes (p. 45).
For information about assembling MD devices when performing recovery in Linux, see Assembling
MD devices for recovery (Linux) (p. 45).
Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they
had a bad partition table or no partition table at all. Backing up such disks does not make sense as it
won’t be possible to recover them.
If the device is not assembled, assemble it by using the mdadm utility. Here are two examples:
Example 1. The following command assembles the device /dev/md0 combined from the volumes
/dev/sdb1 and /dev/sdc1:
mdadm --assemble /dev/md0 -ayes /dev/sdb1 /sdc1
Example 2. The following command assembles the device /dev/md0 combined from the disks
/dev/sdb and /dev/sdc:
mdadm --assemble /dev/md0 -ayes /dev/sdb /dev/sdc
If the recovery requires the machine to be rebooted (usually, when the volumes to recover include
the boot partition), follow these guidelines:
If all parts of the MD device are volumes (a typical case, such as in the first example), make sure
that each volume type—called partition type or system ID—is Linux raid automount; the
hexadecimal code of this partition type is 0xFD. This will guarantee that the device will be
automatically assembled following the reboot. To view or change the partition type, use a disk
partitioning utility such as fdisk.
Otherwise (such as in the second example), perform the recovery from bootable media. No
reboot will be required in that case. In bootable media, you may need to create the MD device
manually or automatically, as described in Recovering MD devices and logical volumes (p. 45).
In Linux-based bootable media, you can choose to recreate the volume structure automatically (p.
46).
This functionality is intended primarily for bare-metal recovery of an entire machine. The software
backs up and recreates the entire logical volume structure, even if not all MD devices or logical
volumes are being backed up or recovered. Therefore, you need at least as many disks as the original
volume structure used.
Do not try to recreate the volume structure automatically in any of the following cases:
The machine has data that must be preserved. The software will destroy all data on the disks
that it chooses to recreate the volume structure on.
If disk configuration has changed. An MD device or a logical volume resides on one or more disks. If
you replaced any of these disks between backup and recovery (or if you are recovering the volumes
to a different machine), ensure that the new disk configuration includes at least the same number of
disks as the original volume structure did. The capacity of the disks must be enough to fit all the data
being recovered.
To create the volume structure automatically
1. Boot the machine from a Linux-based bootable media.
2. Click Acronis Bootable Agent. Then, click Run management console.
3. In the management console, click Recover.
Under the archive contents, Acronis Backup will display a message saying that it detected
information about the volume structure.
4. Click Details in the area with that message.
5. Review the volume structure, and then click Apply RAID/LVM to create it.
Example
Suppose that you previously performed a disk-level backup of a machine with the following disk
configuration:
The machine has two 1-gigabyte and two 2-gigabyte SCSI hard disks, mounted on /dev/sda,
/dev/sdb, /dev/sdc, and /dev/sdd, respectively.
The first and second pairs of hard disks are configured as two MD devices; both are in the RAID-1
configuration, and are mounted on /dev/md0 and /dev/md1, respectively.
A logical volume is based on the two MD devices and is mounted on
/dev/my_volgroup/my_logvol.
The following picture illustrates this configuration.
Acronis Backup can recover data from one disk to another as long as both disks have the same logical
sector size. (This is the sector size presented to the operating system.) Acronis Backup automatically
aligns the disk’s volumes (p. 145) if necessary. This way, the start of a cluster in the file system always
matches the start of a physical sector on the disk.
The disk management (p. 267) functionality of Acronis Backup is not available for disks with a 4-KB
logical sector size.
In terms of the logical sector size, IDEMA specifies two types of Advanced Format disks:
512 Byte emulation (512e) disks have a 512-byte logical sector size. These disks are supported in
Windows starting with Windows Vista, and in modern Linux distributions. Microsoft and Western
Digital use the term “Advanced Format” exclusively for this type of disk.
In Windows:
1. Make sure that the disk contains an NTFS volume.
2. Run the following command as an administrator, specifying the drive letter of the NTFS
volume:
fsutil fsinfo ntfsinfo D:
3. Examine the value in the Bytes Per Sector line. For example, the output may be the
following:
Bytes Per Sector : 512
In Linux:
1. Determine the device name of the disk, such as /dev/sdb.
2. Run the following command as the root user, specifying the device name:
parted /dev/sdb print
3. Examine the first value in the Sector size (logical/physical) line. For example, the output may
be the following:
Sector size (logical/physical): 512B/4096B
This applies to both physical and virtual machines, no matter if the virtual machines are backed up at
a hypervisor level or from inside a guest OS.
Backup and recovery of devices that use 32-bit UEFI are not supported.
Limitations
WinPE-based bootable media of versions earlier than 4.0 and Acronis PXE Server do not support
UEFI booting.
Acronis Active Restore (p. 434) is not available on UEFI machines.
Acronis Startup Recovery Manager (ASRM) (p. 434) is not supported on UEFI machines running
Linux. On UEFI machines running Windows, activate ASRM in Windows rather than under
bootable media.
A machine running Linux cannot be transferred between UEFI and BIOS. For details about
transferring Windows machines, see "Recovering BIOS-based systems to UEFI-based or vice
versa" (p. 148).
Limitations
Acronis Disk Director Lite (p. 267) is not available under Windows 8 and Windows Server 2012.
Disk management operations under bootable media may work incorrectly if storage spaces are
configured on the machine.
The Windows To Go feature of Windows 8 is not supported.
WinPE 4.0 and WinPE 5.0
Acronis Media Builder can create bootable media based on these versions of Windows Preinstallation
Environment (WinPE).
These bootable media support new features of Windows 8 and Windows Server 2012 (see later in
this section). They can boot on machines that use Unified Extensible Firmware Interface (UEFI).
To create bootable media based on these versions of WinPE, you need Windows Assessment and
Deployment Kit (ADK). For more details, see the “WinPE-based bootable media” (p. 258) section.
By using Acronis Media Builder, you can create a bootable media that has a trusted boot loader. To
do this, choose to create a 64-bit Linux-based media or a 64-bit media based on WinPE 4 or later.
In Windows Server 2012 and under a bootable media based on WinPE 4 or later, you can back up
and recover a ReFS volume. Resizing a ReFS volume during recovery is not supported.
Linux-based bootable media and bootable media based on WinPE version earlier than 4.0 cannot
write files to a ReFS volume. Therefore, you cannot recover files to a ReFS volume by using these
media; and you cannot select a ReFS volume as a backup destination.
Storage spaces
In Windows 8 and Windows Server 2012, you can combine several physical disks into a storage pool.
In this storage pool, you can create one or more logical disks, called storage spaces. As with ordinary
disks, storage spaces can have volumes.
In Windows 8, in Windows Server 2012, and under a bootable media based on WinPE 4 or later,
you can back up and recover storage spaces. In Windows Server 2012 and under a bootable media
based on WinPE 4 or later, you also can recover a storage space to an ordinary disk or vice versa.
Linux-based bootable media does not recognize storage spaces. It backs up the underlying disks
sector-by-sector. The same applies to Agent for VMware and Agent for Hyper-V. If you recover all of
the underlying disks to the original disks, the storage spaces will be recreated.
You can back up and recover a data deduplication–enabled volume at a disk level, without limitations.
File-level backup is supported, except when using Acronis VSS Provider. To recover files from a disk
backup, mount the backup (p. 246) on a machine running Windows Server 2012, and then copy the
files from the mounted volume.
The Data Deduplication feature of Windows Server 2012 is unrelated to the Acronis Backup
Deduplication feature.
Disk-level encryption software encrypts data on the fly. This is why data contained in the backup is
not encrypted. Disk-level encryption software often modifies system areas: boot records, or partition
tables, or file system tables. These factors affect disk-level backup and recovery, the ability of the
recovered system to boot and access to Acronis Secure Zone.
Under some conditions, Acronis Backup is compatible with the following disk-level encryption
software:
Microsoft BitLocker Drive Encryption
McAfee Endpoint Encryption
PGP Whole Disk Encryption.
To ensure reliable disk-level recovery, follow the common rules and software-specific
recommendations.
You can recover an encrypted system partition by using bootable media only.
If the recovered system fails to boot, rebuild Master Boot Record as described in the following
Acronis knowledge base article: http://kb.acronis.com/content/1507 and reboot.
1.3.6.1.4.1.24769.100.200.1.0:Information
1.3.6.1.4.1.24769.100.200.2.0:I0064000B
Supported operations
Acronis Backup supports only TRAP operations. It is not possible to manage Acronis Backup using
GET- and SET- requests. This means that you need to use an SNMP Trap receiver to receive
TRAP-messages.
This file can be read by a MIB browser or a simple text editor such as Notepad or vi.
For a long-time backup strategy that includes schedules and conditions, timely deleting of backups or
moving them to different locations, consider creating a backup plan.
Configuring immediate backup is similar to creating a backup plan (p. 55) except for the following:
There are no options to schedule backups and to set up retention rules.
Simplified naming of backup files (p. 77) is used, if the backup destination supports it. Otherwise,
the standard backup naming is used.
The following locations do not support simplified file naming: managed vaults, tape, Acronis
Secure Zone or Acronis Cloud Storage.
Due to simplified file naming, an RDX drive or USB flash drive can only be used in the removable
media (p. 194) mode.
Conversion of a disk-level backup to a virtual machine is not available as a part of the backup
operation. You can convert the resulting backup afterwards.
After that, you might be prompted for the password (p. 77).
The plan you have created will be accessible for examination and managing in the Backup plans and
tasks (p. 322) view.
This option is effective for disk-level backup of NTFS, FAT, Ext3, and Ext4 file systems only. This option
is effective for file-level backup of all supported file systems.
The option defines which files and folders to skip during the backup process and thus exclude from
the list of backed-up items.
Note: Exclusions override selection of data items to back up. For example, if you select to back up file
MyFile.tmp and to exclude all .tmp files, file MyFile.tmp will not be backed up.
To specify which files and folders to exclude, set up any of the following parameters.
The criteria are not case-sensitive in Windows and Linux. For example, if you choose to exclude
all .tmp files and the C:\Temp folder, also excluded will be all .Tmp files, all .TMP files, and the
C:\TEMP folder.
Both in Windows and Linux, you can use a forward slash in the file or folder path (as in C:/Temp and
C:/Temp/File.tmp). In Windows, you can also use the traditional backslash (as in C:\Temp and
C:\Temp\File.tmp).
Under a Windows-style bootable media, a volume might have a different drive letter than in
Windows. For more information, see "Working under bootable media" (p. 261).
Criteria: name
Specify the name of the file or folder, such as Document.txt. All files and folders with that name will
be excluded.
The asterisk (*) substitutes for zero or more characters in a file name. For example, the criterion
Doc*.txt covers files such as Doc.txt and Document.txt
The question mark (?) substitutes for exactly one character in a file name. For example, the criterion
Doc?.txt covers files such as Doc1.txt and Docs.txt, but not the files Doc.txt or Doc11.txt
Exclusion examples
Criterion Example Description
Windows
By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder
C:\Finance
If the automatically generated name looks like [Machine Name]_Archive(N), this means that the
name contain variables. Such might be the case when you have selected virtual machines to back up.
The [Machine Name] stands for the virtual machine name. You can add suffixes to the name but
never delete the variables, since each virtual machine has to back up to a separate archive with the
unique name.
By selecting the existing archive, you are meddling in the area of another backup plan that uses the
archive. This is not an issue if the other plan is discontinued. However, you should generally follow
the rule: "one backup plan - one archive". Doing the opposite will not prevent the program from
functioning but is not practical or efficient, except for some specific cases.
Why two or more plans should not back up to the same archive
1. Backing up different sources to the same archive makes it difficult to use archive. When it comes
to recovery, every second counts, and you might be "lost" in the archive content.
Backup plans that operate with the same archive should back up the same data items (say, both
plans back up volume C.)
2. Applying multiple retention rules to an archive makes the archive content unpredictable. Since
each of the rules will be applied to the entire archive, the backups belonging to one backup plan
can be easily deleted along with the backups belonging to the other. You should not expect the
classic behavior of the GFS and Tower of Hanoi backup schemes.
Normally, each complex backup plan should back up to its own archive.
Cloud storage To back up data to Acronis Cloud Storage, click Log in and specify the credentials to log in
to the cloud storage. Then, expand the Cloud storage group and select the account.
Prior to backing up to the cloud storage, you need to buy a subscription (p. 426) to the
cloud backup service and activate (p. 427) the subscription on the machine(s) you want to
back up.
Cloud backup is not available under bootable media.
Cloud backup of Microsoft Exchange Server data by using Agent for Exchange is not
possible.
Note Acronis Cloud Backup might be unavailable in your region. To find more information,
click here: http://www.acronis.com/en-us/my/cloud-backup/corporate
Personal To back up data to a personal vault, expand the Vaults group and click the vault.
Acronis Secure Zone is considered as a personal vault available to all users that can log on
to the system.
Centralized To back up data to a centralized vault, expand the Vaults group and click the vault.
Local folders To back up data to a local folder of the machine, expand the <Machine name> group and
select the required folder.
CD, DVD, BD To back up data to optical media such as CD, DVD, or Blu-ray Discs (BD), expand the
<Machine name> group, then select the required drive.
RDX, USB To back up data to an RDX drive or USB flash drive, expand the <Machine name> group,
then select the required drive. For information about using these drives, see the
"Removable devices" (p. 194) section.
Tape device To back up data to a locally attached tape device, expand the <Machine name> group,
then click the required device.
Note Tape devices can only be used with Acronis Backup Advanced.
For information about using tapes, see the "Tape devices" (p. 195) section.
Network folders To back up data to a network folder, expand the Network folders group, select the
required networked machine, and then click the shared folder.
If the network share requires access credentials, the program will ask for them.
Note for Linux users: To specify a Common Internet File System (CIFS) network share
which is mounted on a mount point such as /mnt/share, select this mount point instead of
the network share itself.
FTP, SFTP To back up data to FTP or SFTP, type the server name or address in the Path field as
follows:
ftp://ftp_server:port _number or sftp://sftp_server:port number
To establish an active mode FTP connection, use the following notation:
aftp://ftp_server:port _number
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
After entering access credentials, the folders on the server become available. Click the
appropriate folder on the server.
You can access the server as an anonymous user if the server enables such access. To do
so, click Use anonymous access instead of entering credentials.
Note: According to the original FTP specification, credentials required for access to FTP
servers are transferred through a network as plaintext. This means that the user name and
password can be intercepted by an eavesdropper using a packet sniffer.
Storage nodes When you need to back up data to a storage node that is not registered on the
management server, or when operating on a machine booted with bootable media:
To access a managed vault, type the following string in the Path field:
bsp://node_address/vault_name/
To access an unmanaged centralized vault, type the full path to the vault's folder.
NFS folders To back up data to an NFS share, expand the NFS folders group and click the folder.
Available only in Linux and under Linux-based bootable media.
To set up the simple backup scheme, specify the appropriate settings as follows.
Schedule
Set up when and how often to back up the data. To learn more about setting up the schedule,
see the Scheduling (p. 82) section.
Retention rules
Specify how long to store backups in the location and whether to move or delete them afterward.
The retention rules are applied after creating a backup. The Keep backups indefinitely is set by
default, which means that no backups will be deleted automatically. For more information about
retention rules, see Setting up retention of backups (p. 99).
Backup type
To access this setting, click Show backup type, validation, convert to virtual machine.
Select the backup type.
Jan 8—Jan 14 D D D D W - -
Jan 15—Jan 21 D D D D W - -
Jan 22—Jan 28 D D D D M - -
Jan 29—Feb 4 D D D D W - -
Feb 5—Feb 11 D D D D W - -
Feb 12—Feb 18 D D D D W - -
Feb 19—Feb 25 D D D D M - -
Feb 26—Mar 4 D D D D W - -
Daily backups run every workday except Friday, which is left for weekly and monthly backups.
Monthly backups run on the last Friday of each month, and weekly backups run on all other Fridays.
As a result, you will normally obtain 12 monthly backups over a full year.
Parameters
You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme.
Start backup at Specifies when to start a backup. The default value is 12:00 PM.
Back up on Specifies the days of the week when a backup will be performed. The default value is
Workdays.
Weekly/Monthly Specifies which day of the week (out of the days selected in the Back up on field) you
want to reserve for weekly and monthly backups.
The default value is Friday. With this value, a monthly backup will run on the last
Friday of each month. Weekly backups will run on all other Fridays. If you choose a
different day of week, these rules will apply to the day chosen.
Advanced settings Available only in Acronis Backup Advanced when creating a centralized backup plan.
See the "Advanced scheduling settings" (p. 92) section for details.
A backup is not deleted until all backups that directly depend on it become subject to deletion as well. This is
why you might see a backup, marked with the icon, for a few days past its expected expiration date.
Examples
Each day of the past week, each week of the past month
Let us consider a GFS backup scheme that many may find useful.
Back up files every day, including weekends
Be able to recover files as of any date over the past seven days
Have access to weekly backups of the past month
Keep monthly backups indefinitely.
Backup scheme parameters can then be set up as follows.
Start backup at: 11:00 PM
Back up on: All days
Weekly/monthly: Saturday (for example)
Keep backups:
Daily: 1 week
Weekly: 1 month
Monthly: indefinitely
As a result, an archive of daily, weekly, and monthly backups will be created. Daily backups will be
available for seven days since creation. For instance, a daily backup of Sunday, January 1, will be
Limited storage
If you do not want to arrange a vast amount of space to store a huge archive, you may set up a GFS
scheme so as to make your backups more short-lived, at the same time ensuring that your
information can be recovered in case of an accidental data loss.
Work schedule
Suppose you are a part-time financial consultant and work in a company on Tuesdays and Thursdays.
On these days, you often make changes to your financial documents, statements, and update the
spreadsheets etc. on your laptop. To back up this data, you may want to:
Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and
Thursdays (daily incremental backup).
Have a weekly summary of file changes since last month (Friday weekly differential backup).
Have a monthly full backup of your files.
Moreover, assume that you want to retain access to all backups, including the daily ones, for at least
six months.
Such an archive would allow you to compare your financial documents as of the first and the last day
of work, and have a five-year history of all documents, etc.
No daily backups
Consider a more exotic GFS scheme:
Start backup at: 12:00 PM
Back up on: Friday
Weekly/monthly: Friday
Keep backups:
Daily: 1 week
Weekly: 1 month
Monthly: indefinitely
Backup is thus performed only on Fridays. This makes Friday the only choice for weekly and monthly
backups, leaving no other date for daily backups. The resulting “Grandfather-Father” archive will
hence consist only of weekly differential and monthly full backups.
Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in
this situation.
Examples
Weekly full backup
The following scheme yields a full backup performed every Friday night.
Also, let all backups older than one year be deleted from the archive, and let the cleanup be
performed upon creating a new backup.
By default, a one-year-old full backup will not be deleted until all incremental backups that depend
on it become subject to deletion too. For more information, see Retention rules (p. 100).
Monthly full, weekly differential, and daily incremental backups plus cleanup
This example demonstrates the use of all options available in the Custom scheme.
Suppose that we need a scheme that will produce monthly full backups, weekly differential backups,
and daily incremental backups. Then the backup schedule can look as follows.
Full backup: Schedule: Monthly, every Last Sunday of the month, at 9:00 PM
Further, we want to add conditions that have to be satisfied for a backup task to start. This is set up
in the Conditions fields for each backup type.
As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the
backup location becomes available. Likewise, backup tasks for incremental and differential backups
will wait until all users are logged off and users are idle, respectively.
Finally, we create retention rules for the archive: let us retain only backups that are no older than six
months, and let the cleanup be performed after each backup task and also on the last day of every
month.
Example
Schedule parameters are set as follows
Recur: Every 1 day
Frequency: Once at 6 PM
Number of levels: 4
This is how the first 14 days (or 14 sessions) of this scheme's schedule look. Shaded numbers denote
backup levels.
The scheme allows for efficient data storage: more backups accumulate toward the current time.
Having four backups, we could recover data as of today, yesterday, half a week, or a week ago.
Roll-back period
The number of days we can go back in the archive is different on different days. The minimum
number of days we are guaranteed to have is called the roll-back period.
The following table shows full backup and roll-back periods for schemes of various levels.
Number of Full backup On different Roll-back
levels every days, can go period
back
To see why the number of recovery days varies, let us return to the previous example.
Here are the backups we have on day 12 (numbers in gray denote deleted backups).
1 2 3 4 5 6 7 8 9 10 11 12
4 1 2 1 3 1 2 1 4 1 2 1
A new level 3 differential backup has not yet been created, so the backup of day five is still stored.
Since it depends on the full backup of day one, that backup is available as well. This enables us to go
as far back as 11 days, which is the best-case scenario.
The following day, however, a new third-level differential backup is created, and the old full backup is
deleted.
1 2 3 4 5 6 7 8 9 10 11 12 13
4 1 2 1 3 1 2 1 4 1 2 1 3
This gives us only a four day recovery interval, which turns out to be the worst-case scenario.
Backup type
Select the type of backup
Full - selected by default for all backup locations (except for Acronis Cloud Storage).
Incremental. At the first time a full backup will be created. The next backups will be
incremental. Selected as the one and only backup type for Acronis Cloud Storage.
Differential. At the first time a full backup will be created. The next backups will be
differential.
Initial seeding enables you to transfer the first backup, which is full and usually the largest, to the
cloud storage on a hard drive instead of over the Internet. Subsequent backups, which are all
incremental and thus usually much smaller, can be transferred over the Internet after the full backup
has arrived in the cloud storage.
If you back up 500 GB of data or more, initial seeding ensures faster delivery of the backed-up data
and lower traffic costs.
Please refer to the "Initial Seeding FAQ (p. 416)" section for more details.
Validation of a file backup imitates recovery of all files from the backup to a dummy destination.
Validation of a volume backup calculates a checksum for every data block saved in the backup.
If you recover (p. 132) the machine to a VMware ESX(i) using Agent for VMware, or convert (p. 168)
the backup to a ESX(i) virtual machine, these properties will be transferred to the virtual machine's
configuration. You can view them in the virtual machine settings: Edit settings > Options > Advanced
> General > Configuration parameters. You can select, sort and group the virtual machines with the
help of these custom parameters. This can be useful in various scenarios.
Example:
Let's assume you migrate your office or datacenter to a virtual environment. By using third-party
software that can access configuration parameters through VMware API, you can automatically apply
security policies to each machine even before powering it on.
Example
acronisTag.label = “DEPT:BUCH; COMP:SUPERSERVER; OWNER:EJONSON”
When using this variable, the first backup of a new day will be a full backup. Before creating the next
full backup, the software deletes all backups taken earlier that day. Backups taken before that day
are kept. This means you can store multiple full backups with or without incremental ones, but no
more than one full backup per day. You can sort the backups by date. You can also use a script to
copy, move, or delete the older backups.
The value of this variable is the current date surrounded by brackets ([]). The date format depends on
the regional options on the machine. For example, if the date format is year-month-day, the value for
January 31, 2012, is [2012-01-31]. Characters that are not supported in a file name, such as slashes
(/), are replaced with underscores (_).
You can place this variable anywhere in the archive name. You can use both lowercase and
uppercase letters in this variable.
Examples
Example 1. Suppose that you perform incremental backups twice a day (at midnight and noon) for
two days, starting on January 31, 2012. The archive name is MyArchive-[DATE], the date format is
year-month-day. Here is the list of backup files after day two:
MyArchive-[2012-01-31].tib (full, created on January 31 at midnight)
MyArchive-[2012-01-31]2.tib (incremental, created on January 31 at noon)
MyArchive-[2012-02-01].tib (full, created on February 1 at midnight)
MyArchive-[2012-02-01]2.tib (incremental, created on February 1 at noon)
Example 2. Suppose that you perform full backups, with the same schedule, archive name, and date
format as in the previous example. Then, the list of backup files after day two is the following:
MyArchive-[2012-01-31].tib (full, created on January 31 at noon)
MyArchive-[2012-02-01].tib (full, created on February 1 at noon)
This is because the full backups created at midnight were replaced by new full backups of the same
day.
For example, suppose that the first backup of the archive MyData has been split in two parts. Then,
the file names for this backup are MyData1.tib and MyData2.tib. The second backup (supposing that
it is not split) will be named MyData3.tib.
Result. The archive consists of a single file: MyMachine.tib. This file is deleted before creating a new
backup.
If you choose to back up to a locally attached RDX drive or USB flash drive, you will not see the Name
backup files using the archive name... check box. Instead, make sure that the removable device
mode (p. 194) is set to Removable media.
Result:
The backups of January 1, 2012, January 2, 2012, and so on, are stored respectively as
MyMachine-[2012-01-01].tib, MyMachine-[2012-01-02].tib, and so on.
Your script can move older backups based on the date stamp.
See also “The [Date] variable” (p. 79).
Result:
The 24 backups of January 1, 2012, will be stored as ServerFiles[2012-01-01].tib,
ServerFiles[2012-01-01]2.tib, and so on up to ServerFiles[2012-01-01]24.tib.
The following day, the backups will start with the full backup ServerFiles[2012-01-02].tib.
See also "The [Date] variable" (p. 79).
In Windows, if you choose to back up to locally attached RDX drives or USB flash drives, the Name
backup files using the archive name... check box does not appear. Instead, make sure that the
removable device mode (p. 194) is set to Removable media.
4.4 Scheduling
Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and
each employee’s work style. The plans’ tasks will be launched systematically keeping the critical data
safely protected.
The scheduling is available when creating a backup plan (p. 55) with any of the following backup
schemes: Simple, Custom or Tower of Hanoi. The schedule also can be set for validation tasks (p.
237).
Schedule
To define when a task has to be executed, you need to specify an event or multiple events. The task
will be launched as soon as any of the events occurs. The table below lists the events available under
Windows and Linux operating systems.
Event Windows Linux
Time: Daily, Weekly, Monthly + +
Time since completion of the last successful backup within the same backup plan + +
System shutdown + -
Condition
For backup operations only, you can specify a condition or multiple conditions in addition to the
events. Once any of the events occurs, the scheduler checks the condition and runs the task if the
condition is met. With multiple conditions, all of them must be met simultaneously to enable task
execution. The table below lists the conditions available under Windows and Linux operating
systems.
Condition: run the task only if Windows Linux
User is idle (a screen saver is running or the machine is locked) + -
The specified period of time has passed since the completion of the last successful + +
backup within the same backup plan
The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is
not met is defined by the Task start conditions (p. 128) backup option.
What-ifs
What if an event occurs (and a condition, if any, is met) while the previous task run has not
completed?
The event will be ignored.
In the During the day execute the task... area, select one of the following:
Once at: <...> Set up the time at which the task will be run once.
Every: <...> Set up how many times the task will be restarted during the specified time
interval. For example, setting the task frequency to Every 1 hour From
From: <...> Until: <...>
10:00:00 AM until 10:00:00 PM allows the task to run 12 times: from 10 AM
to 10 PM during one day.
Advanced scheduling settings (p. 92) are available only for machines registered on Acronis Backup
Management Server. To specify these settings, click Change in the Advanced settings area.
All the settings you made are displayed in the Result field at the bottom of the window.
Examples
"Simple" daily schedule
Run the task every three hours. The task starts on a certain date (say, September 15, 2009), and ends
after three months.
There are some cases when you might need the task to be run several times a day, or even several
times a day with different time intervals. For such cases, consider adding several schedules to a single
task.
For example, suppose that the task has to be run every 3rd day, starting from 09/20/2009, five times
a day:
first at 8 AM
second at 12 PM (noon)
third at 3 PM
fourth at 5 PM
fifth at 7 PM
The obvious way is to add five simple schedules. If you spend one minute for examination, you can
think out a more optimal way. As you can see, the time interval between the first and the second
task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the
optimal way is to add two schedules to the task.
Advanced scheduling settings (p. 92) are available only for machines registered on Acronis Backup
Management Server. To specify these settings, click Change in the Advanced settings area.
All the settings you made are displayed in the Result field at the bottom of the window.
Examples
"One day in the week" schedule
Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six
months.
"Workdays" schedule
Run the task every week on workdays: from Monday through Friday. During a workday, the task
starts only once at 9 PM.
In the case when the task needs to be run on different days of the weeks with different time intervals,
consider adding a dedicated schedule to every desired day of the week, or to several days.
For example, you need the task to be run with the following schedule:
Monday: twice at 12 PM (noon) and 9 PM
Tuesday: every 3 hours from 9 AM until 9 PM
Wednesday: every 3 hours from 9 AM until 9 PM
Thursday: every 3 hours from 9 AM until 9 PM
Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)
Saturday: once at 9 PM
Sunday: once at 9 PM
Combining the identical times, the following three schedules can be added to the task:
First schedule
1. Every: 1 week(s) on: Mon, Fri.
2. Every: 9 hours
From: 12:00:00 PM Until: 09:00:00 PM.
3. Effective:
From: not set.
To: not set.
Second schedule
1. Every 1 week(s) on: Tue, Wed, Thu.
Advanced scheduling settings (p. 92) are available only for machines registered on Acronis Backup
Management Server. To specify these settings, click Change in the Advanced settings area.
All the settings you made are displayed in the Result field at the bottom of the window.
Examples
"Last day of every month" schedule
"Season" schedule
Run the task on all workdays during the northern autumn seasons of 2009 and 2010. During a
workday, the task is performed every 6 hours from 12 AM (midnight) until 6 PM.
In the case when the task needs to be run on different days or weeks with different time intervals
depending on the month, consider adding a dedicated schedule to every desired month or several
months.
First schedule
1. Months: December, January, February.
2. On: <All> <All workdays>
3. Once at: 10:00:00 PM.
4. Effective:
From: 11/01/2009.
To: not set.
You can schedule a backup task to start when a certain Windows event has been recorded in one of
the event logs such as the Application, Security, or System log.
For example, you may want to set up a backup plan that will automatically perform an emergency
full backup of your data as soon as Windows discovers that your hard disk drive is about to fail.
Parameters
Log name
Specifies the name of the log. Select the name of a standard log (Application, Security, or
System) from the list, or type a log name—for example: Microsoft Office Sessions
Event source
Specifies the event source, which typically indicates the program or the system component that
caused the event—for example: disk
Event type
Specifies the event type: Error, Warning, Information, Audit success, or Audit failure.
Event ID
Specifies the event number, which typically identifies the particular kind of events among events
from the same source.
For example, an Error event with Event source disk and Event ID 7 occurs when Windows
discovers a bad block on a disk, whereas an Error event with Event source disk and Event ID 15
occurs when a disk is not ready for access yet.
Examples
"Bad block" emergency backup
When Windows detects a bad block on a hard disk, it records an event with the event source disk
and the event number 7 into the System log; the type of this event is Error.
When creating the plan, type or select the following in the Schedule area:
Log name: System
Event source: disk
Event type: Error
Event ID: 7
Important: To ensure that such a task will complete despite the presence of bad blocks, you must make the task
ignore bad blocks. To do this, in Backup options, go to Error handling, and then select the Ignore bad sectors
check box.
Suppose that you want to create a backup plan that will automatically perform a backup of the
system—for example, by backing up the volume where Windows is installed—every time that
Windows is about to install updates.
Having downloaded one or more updates and scheduled their installation, the Microsoft Windows
Vista operating system records an event with the event source
Microsoft-Windows-WindowsUpdateClient and event number 18 into the System log; the type of
this event is Information.
When creating the plan, type or select the following in the Schedule area:
Log name: System
Event source: Microsoft-Windows-WindowsUpdateClient
Event type: Information
Event ID: 18
Tip: To set up a similar backup plan for machines running Microsoft Windows XP, replace the text in Event
source with Windows Update Agent and leave the remaining fields the same.
To view properties of an event, including the event source and event number
1. In Event Viewer, click the name of a log that you want to view—for example, Application.
Note: To be able to open the security log (Security), you must be a member of the Administrators group.
2. In the list of events in the right pane, double-click the name of an event whose properties you
want to view.
Use Wake-on-LAN
When this setting is enabled, Acronis Backup Management Server will use the Wake-on-LAN
functionality to wake up turned-off registered machines when a backup, cleanup, or validation is
scheduled to start. If you start any of these operations manually, the Wake-on-LAN functionality will
not be used.
If the backup task on each machine starts with a delay (see the next setting), the management server
will wake up the machines according to those delays.
Before using this setting, ensure that you have enabled Wake-on-LAN on the registered machines.
The machine's basic input/output system (BIOS) configuration, network adapter configuration, and
the operating system configuration must allow waking up the machine from the powered-off state,
also known as the S5 or G2 power state.
You may want to use this setting when creating a centralized backup plan for backing up multiple
machines to a network location, to avoid excessive network load.
The delay values range from zero to the specified maximum delay value, and are determined
according to the chosen distribution method. The delay value for each machine is determined when
the backup plan is deployed to the machine, and remains the same until you edit the backup plan
and change the maximum delay value.
The conditions, if any, will be checked at the task's actual start time on each machine.
Example 1
Suppose that you are deploying a centralized backup plan with the following schedule to three
machines:
Run the task: Daily
Once at: 09:00:00 AM
Distribute start time within the time window
Maximum delay: 1 Hour(s)
Distribution method: Random
In this case, the task's start time on each machine may be any time between 09:00:00 AM and
09:59:59 AM. For instance:
First machine: Every day at 09:30:03 AM
4.4.6 Conditions
Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to
certain conditions. Once a specified event occurs (see the "Scheduling (p. 82)" section for the list of
available events), the scheduler checks the specified condition and executes the task if the condition
is met.
Conditions are available only when the custom backup scheme (p. 69) is used. You can set conditions for full,
incremental and differential backup separately.
The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is
not met, is defined by the Task start conditions (p. 128) backup option. There, you can specify how
important the conditions are for the backup strategy:
conditions are obligatory - put the backup task run on hold until all the conditions are met.
conditions are preferable, but a backup task run has higher priority - put the task on hold for the
specified time interval. If the time interval lapses and the conditions are still not met, run the
"User is idle" means that a screen saver is running on the managed machine or the machine is locked.
Example:
Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If
the user is still active by 11PM, run the task anyway.
Event: Daily, every 1 day(s); Once at: 09:00:00 PM.
Condition: User is idle.
Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s).
As a result,
(1) If the user becomes idle before 9PM, the backup task will start at 9PM.
(2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the
user becomes idle.
(3) If the user is still active at 11PM, the backup task starts anyway.
"Location's host is available" means that the machine hosting the destination for storing archives on
a networked drive is available.
Example:
Backing up data to the networked location is performed on workdays at 9:00 PM. If the location's
host is not available at that moment (for instance, due to maintenance work), skip the backup and
wait for the next workday to start the task. It is assumed that the backup task should not be started
at all rather than failed.
Event: Weekly, Every 1 week(s) on <workdays>; Once at 09:00:00 PM.
Condition: Location's host is available
Task start conditions: Skip the task execution.
As a result,
(1) If 9:00 PM comes and the location's host is available, the backup task starts right on time.
(3) If the location's host will never be available on workdays at 9:00 PM, the task never starts.
Example
A company uses different locations on the same network-attached storage for backing up users data
and servers. The workday starts at 8AM and ends at 5 PM. Users' data should be backed up as soon
as the users log off, but not earlier than 4:30 PM and not later than 10 PM. Every day at 11 PM the
company's servers are backed up. So, all the users' data should be preferably backed up before this
time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that
the backing up of users' data does not take more than one hour. If a user is still logged on within the
specified time interval, or logs off at any other time – do not back up the users' data, i.e. skip task
execution.
Event: When logging off, The following user: Any user.
Condition: Fits the time interval, from 04:30:00 PM until 10:00:00 PM.
Task start conditions: Skip the task execution.
As a result,
(1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immediately
following the logging off.
(2) if the user logs off at any other time, the task will be skipped.
What if...
What if a task is scheduled to be executed at a certain time and this time is outside the specified time
interval?
For example:
Event: Daily, Every 1 day(s); Once at 03:00:00 PM.
Condition: Fits the time interval, from 06:00:00 PM until 11:59:59 PM.
In this case, whether and when the task will run depends on the task start conditions:
If the task start conditions are Skip the task execution, the task will never run.
If the task start conditions are Wait until the conditions are met and the Run the task anyway
after check box is cleared, the task (scheduled to run at 3:00 PM) will start at 6:00 PM—the time
when the condition is met.
If the task start conditions are Wait until the conditions are met and the Run the task anyway
after check box is selected with, say, the 1 Hour waiting time, the task (scheduled to run at
3:00 PM) will start at 4:00 PM—the time when the waiting period ends.
Example
Run the backup task at 8 PM on the first and third Friday of every month, preferably when all users
are logged off. If one of the users is still logged on at 11 PM, run the task anyway.
Event: Monthly, Months: <All>; On: <First>, <Third> <Friday>; Once at 08:00:00 PM.
Condition: Users logged off.
Task start conditions: Wait until the conditions are met, Run the task anyway after 3 hour(s).
As a result,
(1) If all users are logged off at 8PM, the backup task will start at 8PM.
(2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the
user has logged off.
(3) If any of the users is still logged on at 11PM, the backup task starts anyway.
Postpones a backup until the specified time passes since the completion of the last successful backup
within the same backup plan.
Example:
Run the backup task at system startup, but only if more than 12 hours have passed since the last
successful backup.
Event: At startup, Start the task on machine startup.
Condition: Time since last backup, Time since the last backup: 12 hour(s).
Task start conditions: Wait until the conditions are met.
As a result,
(1) if the machine is restarted before 12 hours pass since the completion of the latest successful
backup, the scheduler will wait until 12 hours pass, and then will start the task.
(2) if the machine is restarted after 12 hours have passed since the completion of the latest
successful backup, the backup task will start immediately.
(3) if the machine is never restarted, the task will never start. You can start the backup manually, if
need be, in the Backup plans and tasks view.
Example. You back up your machine to a local folder. The backup is immediately copied to a network
folder. In the original local folder, the backup is stored for just one month.
Usage scenarios
Reliable disaster recovery (p. 102)
Store your backups both on-site (for immediate recovery) and off-site (to secure the backups
from local storage failure or a natural disaster).
Keeping only the latest recovery points (p. 102)
Delete older backups from a fast storage according to retention rules, in order to not overuse
expensive storage space.
Using Acronis Cloud Backup to protect data from a natural disaster (p. 103)
Replicate the archive to the cloud storage by transferring only the data changes outside working
hours.
Reduced costs of storing the backed-up data (p. 104)
Store your backups on a fast storage for as long as a need to access them is likely. Then, move
them to a lower-cost storage to keep them there for a longer term. This enables you to meet
legal requirements on data retention.
Backup to a slow device within a narrow backup window (p. 104)
Back up overnight to a managed vault on a fast storage, and then let Acronis Backup Storage
Node move the backups to tapes during the day.
Replication and retention in backup schemes
The following table shows availability of replication and retention rules in various backup schemes.
Backup scheme Can copy Can move Can delete
backups backups backups
Manual start (p. 74) Yes No No
Restrictions
Copying or moving backups to and from optical discs (CD, DVD, Blu-ray discs) is not supported.
Copying or moving backups to and from removable devices used in the Removable media mode
is not supported.
Copying or moving backups from Acronis Backup Storage Node to a local folder is not supported.
A local folder means a folder on the machine with the agent that created the backup.
A tape device and Acronis Cloud Storage can only be the final locations. Further copying or
moving backups from them is not possible.
You cannot specify the same location more than once. For example, you cannot move a backup
from one folder to another and then back to the original folder.
Which machine performs the operation?
Copying, moving or deleting a backup from any location is initiated by the agent that created the
backup, and is performed:
By that agent, if the location is not a managed vault.
By the corresponding storage node, if the location is a managed vault. However, copying or
moving the backup from the managed vault to the cloud storage is performed by the agent that
created the backup.
If the target vault is a deduplicating vault (p. 439) (possibly on a different storage node), the source
storage node sends only those blocks of data that are not present in the target vault. In other words,
like an agent, the storage node performs deduplication at source (p. 229). This saves network traffic
when you replicate data between geographically separated storage nodes.
If allowed by the backup scheme, you can also specify when to automatically delete the backups
from each of the locations.
A backup is replicated to the next location as soon as it appears in the previous location. If earlier
backups were not replicated (for example, the network connection was lost), the software also
replicates all of the backups that appeared after the last successful replication.
Applying retention rules can be restricted by the Replication/cleanup inactivity time (p. 125) option.
Simple scheme
Each backup is retained until its age exceeds a limit you specify. Then, it is either deleted or moved.
The retention rules are applied after creating a backup. They are applied sequentially in the primary,
the second and all next locations.
The retention rules are applied after creating a backup. They are applied sequentially in the primary,
the second and all next locations.
Custom scheme
Each backup is retained until the rules you specify are met. Then, it is either deleted or moved.
The rules will be applied to all the backups taken on the specific machine and put in this specific
location by this specific backup plan. In Acronis Backup, such set of backups is called an archive.
To set up retention rules for backups:
1. Specify one of the following (options (a) and (b) are mutually exclusive):
a. Backups older than... and/or Archive size greater than....
A backup will be stored until the specified condition (or both of the conditions) are met.
Note: In a deduplicating vault (p. 439), almost all backed-up data is stored in a data store
outside the archive. Thus, the Archive size greater than condition is not effective and is
not displayed.
Example:
Backups older than 5 days
Archive size greater than 100 GB
Retention rules presume deleting or moving some backups while retaining the others. What if the
archive contains incremental and differential backups that depend on each other and on the full
backups they are based on? You cannot, say, delete an outdated full backup and keep its incremental
“children”.
When deletion or movement of a backup affects other backups, one of the following rules is applied:
Retain the backup until all dependent backups become subject to deletion (movement)
The outdated backup (marked with the icon) will be kept until all backups that depend on it
also become outdated. Then, all the chain will be deleted at once during the regular cleanup. If
you chose moving outdated backups to the next location, the backup will be copied there
without delay. Only its deletion from the current location is postponed.
This mode helps to avoid the potentially time-consuming consolidation but requires extra space
for storing backups whose deletion is postponed. The archive size and/or the backup age or
number can exceed the values you specify.
This mode is not available for Acronis Cloud Storage when you copy or move backups there. In
the cloud storage, all backups are incremental except the first backup of an archive which is
always full. This chain cannot be entirely deleted because the most recent backup must always
be kept.
Consolidate these backups
The software will consolidate the backup that is subject to deletion or movement, with the next
dependent backup. For example, the retention rules require to delete a full backup but to retain
the next incremental one. The backups will be combined into a single full backup which will be
dated with the incremental backup date. When an incremental or differential backup from the
middle of the chain is deleted, the resulting backup type will be incremental.
This mode ensures that after each cleanup the archive size and the age or number of backups are
within the bounds you specify. The consolidation, however, may take a lot of time and system
resources. You still need some extra space in the vault for temporary files created during
consolidation.
Result:
You can recover the machine’s volumes or files from a readily available local backup, which is
stored in a dedicated area of the hard disk.
You can recover the machine from the network folder if the machine’s hard disk drive fails.
4.5.5.2 Example 2. Limiting the age and total size of stored backups
Consider the following scenario:
You want to perform a weekly full backup of your machine.
You want to keep all backups that are younger than a month.
You want to keep even older backups, as long as the total size of all backups stays below 200 GB.
In this scenario, create a backup plan with the Custom scheme. When creating the backup plan,
specify a weekly schedule for the full backup. In Clean up archive, select Using retention rules.
Click Retention rules, select the Backups older than and the Archive size greater than check boxes,
and specify respectively 1 month and 200 GB. In If the specified conditions are met, select Delete
the oldest backups.
Click OK. In Apply retention rules, select the After backup check box.
Result:
Backups that are younger than one month are kept, regardless of their total size.
Backups that are older than one month are kept only if the total size of all backups (older plus
younger) does not exceed 200 GB. Otherwise, the software deletes some or all of the older
backups, starting from the oldest one.
The following scenario assumes that the amount of data you want to back up is relatively small. For
larger backups, see “Replicating large amounts of data to the cloud storage” later in this section.
In Backup options, go to Replication/cleanup inactivity time (p. 125), and specify the working hours
(for example, Monday through Friday from 8:00 until 17:00).
Result:
After the backup plan starts, the data is backed up to the local folder.
If the backup finishes outside the working hours, replication starts immediately. Otherwise,
replication is postponed until the end of the working hours.
Note: In the cloud storage, the second and further backups of an archive will always be incremental, no matter
what type they are in the original location. This leads to efficient use of storage space for your cloud backup
subscription.
During the subsequent backups, only changes to the original data will be sent to the cloud storage
and will not affect network traffic as much.
In this scenario, create a backup plan with the Initial seeding scheme. When creating the backup plan,
specify a local folder in the Location field. This can be a folder on the hard drive that you are going to
send. For more details, see “How to perform initial seeding?” (p. 418).
After you have sent the hard drive and the order status becomes The data upload has been
completed, edit the backup plan. Change the backup scheme, destination, and replication settings to
those previously described in this section.
The updated backup plan will produce backups that will be replicated to the cloud storage outside
working hours.
In this scenario, create a backup plan with the Simple scheme and a daily schedule. (All backups will
be full by default.) When creating the backup plan, specify a local folder or Acronis Secure Zone in
the Location field. Under Retention rules, select Move backups older than 1 week. Then, specify the
tape device in the 2nd location field.
Make sure that the tape device is ready to work. The preparation steps are described in the "Backing
up a machine to a directly attached tape device" (p. 199) section.
Result:
After a backup is completed, the agent checks for backups that need to be moved.
The agent moves the backups that are older than one week, by copying them to the tape device
and then deleting them from the original location.
You can eject tapes with backups and securely store them off-site. Once you select data for
recovery, Acronis Backup will prompt you which tapes to insert.
Create a centralized backup plan for all of the machines with the Grandfather-Father-Son (GFS)
scheme. When creating the backup plan, specify the vault on the hard disk in the Location field.
Under Backup type, select Full/Incremental/Differential.
For the primary location, in Keep backups, choose to keep monthly backups for one month (you
need to clear the Keep indefinitely check box). This way, the vault will serve as an intermediate,
short-term storage for the backups.
Select the Replicate newly created backup to another location check box, and then specify the vault
on the tape library in the 2nd location field. For the second location, select to keep monthly backups
indefinitely.
Result:
Agents back up their machines to the vault on the hard disk.
You can also customize a default option itself by changing its value against the pre-defined one. The
new value will be used by default in all backup plans you will create later on this machine.
To view and change the default backup options, connect the console to the managed machine and
then select Options > Default backup and recovery options > Default backup options from the top
menu.
Disk backup File backup Disk backup File backup Disk backup File backup
Deduplicate backup only Dest: dedup. Dest: dedup. Dest: dedup. Dest: dedup. Dest: dedup. Dest: dedup.
after transferring it to the vault vault vault vault vault vault
vault
Reset archive bit - + - - - +
(password + encryption)
Backup cataloging (p. 109) + + + + - -
Backup performance:
Backup priority (p. 110) + + + + - -
HDD writing speed (p. 111) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Dest: HDD Dest: HDD
Event tracing:
Windows events log (p. 117) + + - - - -
Fast incremental/differential + - + - + -
backup (p. 117)
Disk backup File backup Disk backup File backup Disk backup File backup
The option defines whether to display the Insert First Media prompt when backing up to removable
media.
When the option is enabled, backing up to removable media may be not possible if the user is away,
because the program will wait for someone to press OK in the prompt box. Hence, you should disable
the prompt when scheduling a backup to removable media. Then, if the removable media is available
(for example, a DVD is inserted), the task can run unattended.
In Windows operating systems, each file has the File is ready for archiving attribute, available by
selecting File -> Properties -> General -> Advanced -> Archive and Index attributes. This attribute,
also known as the archive bit, is set by the operating system each time the file is changed and can be
reset by backup applications each time they include the file in a backup. The archive bit value is used
by various applications such as databases.
When the Reset archive bit check box is selected, Acronis Backup will reset the archive bits of all files
being backed up. Acronis Backup itself does not use the archive bit value. When performing
incremental or differential backup, it determines whether a file has changed by the file size and the
date/time when the file was last saved.
When the option is enabled, Acronis Backup will restart the machine after the backup process is
completed.
For example, if the machine boots from a hard disk drive by default and you select this check box, the
machine will be restarted and the operating system will start as soon as the bootable agent has
finished creating the backup.
Deduplicate backup only after transferring it to the vault (do not deduplicate at
source)
This option is available only in Acronis Backup Advanced.
This option is effective for Windows and Linux operating systems and bootable media, when the
backup destination is a deduplicating vault.
Enabling this option turns off deduplicating backups at source, meaning that deduplication will be
performed by Acronis Backup Storage Node after the backup is saved to the vault (this is called
deduplication at target).
Turning off deduplication at source may lead to faster backup processes but greater network traffic
and heavier load of the storage node. The eventual size of the backup in the vault is independent of
whether deduplication at source is turned on.
Deduplication at source and deduplication at target are described in Deduplication overview (p. 228).
This option defines whether the archive will be protected with a password and whether the archive’s
content will be encrypted.
This option is not available when the archive already contains backups. For example, this option may
not be available:
When you specify an already existing archive as the destination of the backup plan.
When you edit a backup plan that has already resulted in a backup.
The preset is: Disabled.
To protect the archive from unauthorized access
1. Select the Set password for the archive check box.
2. In the Enter the password field, type a password.
3. In the Confirm the password field, re-type the password.
4. Select one of the following:
Do not encrypt – the archive will be protected with the password only
AES 128 – the archive will be encrypted using the Advanced Encryption Standard (AES)
algorithm with a 128-bit key
AES 192 – the archive will be encrypted using the AES algorithm with a 192-bit key
AES 256 – the archive will be encrypted using the AES algorithm with a 256-bit key.
5. Click OK.
The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a
randomly generated key with a user-defined size of 128, 192 or 256 bits. The larger the key size, the
longer it will take for the program to encrypt the archive and the more secure your data will be.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key.
The password itself is not stored anywhere on the disk or in the backup file; the password hash is
used for verification purposes. With this two-level security, the backup data is protected from any
unauthorized access, but recovering a lost password is not possible.
The Backup cataloging option specifies whether full or fast cataloging will be performed on a backup
as soon as the backup is created.
This option is effective only if backup cataloging is enabled on the backed-up machine or on the
storage node (p. 227).
If you select Full cataloging, the backup contents are cataloged to the highest possible level of detail.
This means that the following data will be displayed in the catalog:
For more information about using the data catalog, see the "Data catalog" (p. 136) section.
Backup performance options might have a more or less noticeable effect on the speed of the backup
process. This depends on the overall system configuration and the physical characteristics of devices
the backup is being performed from or to.
The priority of a process running in a system determines the amount of CPU and system resources
allocated to that process. Decreasing the backup priority will free more resources for other
applications. Increasing the backup priority might speed up the backup process by requesting the
operating system to allocate more resources like the CPU to the backup application. However, the
resulting effect will depend on the overall CPU usage and other factors like disk in/out speed or
network traffic.
This option is available when an internal (fixed) hard disk of the machine being backed up is selected
as the backup destination
Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the
operating system and applications because of the large amounts of data that needs to be written to
the disk. You can limit the hard disk usage by the backup process to the desired level.
This option is available when a location on the network (network share, managed vault or an
FTP/SFTP server) is selected as the backup destination.
The option defines the amount of network connection bandwidth allocated for transferring the
backup data.
By default the speed is set to maximum, i.e. the software uses all the network bandwidth it can get
when transferring the backup data. Use this option to reserve a part of the network bandwidth for
other network activities.
This option is not effective when the backup destination is a managed vault or Acronis Cloud Storage.
Automatic
With this setting, Acronis Backup will act as follows.
When backing up to a hard disk or a network share:
A single backup file will be created if the destination disk's file system allows the estimated file
size.
The backup will automatically be split into several files if the destination disk's file system does
not allow the estimated file size. This might be the case when the backup is placed on FAT16 and
FAT32 file systems that have a 4-GB file size limit.
If the destination disk runs out of free space while creating the backup, the task enters the Need
interaction state. You have the ability to free additional space and retry the operation. If you do
so, the resulting backup will be split into the parts created before and after the retry.
When backing up to removable media (CD, DVD, Blu-Ray Discs, a stand-alone tape drive, an RDX
or USB drive used in the removable device (p. 194) mode):
The task will enter the Need interaction state and ask for a new media when the previous one is
full.
When backing up to an FTP server:
The backup will automatically be split into files no more than 2 GB in size. Splitting is needed to
allow data recovery directly from the FTP server.
When backing up to an SFTP server:
A single backup file will be created. If the destination storage runs out of free space while
creating the backup, the task will fail.
When you replicate or move a backup (p. 96) to other locations, these rules apply to each location
independently.
Example.
Suppose that the primary location for a 3-GB backup is a hard disk, the second location is an FTP
server, and the third location is a network share. In this case, the backup will be stored as a single file
in the primary location, as two files in the second location, and as a single file again in the third
location.
Fixed size
Enter the desired file size or select it from the drop-down list. The backup will then be split into
multiple files of the specified size. This comes in handy when creating a backup that you plan to burn
to multiple CDs or DVDs later on. You might also want to split a backup into 2-GB files if you are
backing up to a hard disk, but you plan to manually copy the backup to an FTP server later.
The option defines the level of compression applied to the data being backed up.
The optimal data compression level depends on the type of data being backed up. For example, even
maximum compression will not significantly reduce the archive size if the archive contains essentially
Disaster recovery plan (DRP) contains a list of backed up data items and detailed instructions that
guide a user through a process of recovering these items from a backup.
A DRP is created after the first successful backup is performed by the backup plan. If the Send
disaster recovery plans option is enabled, the DRP is sent by e-mail to the specified list of users. If
the Save DRP as file option is enabled, the DRP is saved as a file to the specified location. The DRP
will be created again in the following cases:
The backup plan has been edited so that the DRP parameters changed.
The backup contains new data items or does not contain items previously backed up. (This does
not apply to such data items as files or folders.)
If multiple machines are protected by a backup plan, then a separate DRP is created for each
machine. You can specify a local folder (when connected directly to a managed machine), a network
folder, an FTP or SFTP server as a location to save the DRPs.
Note that the DRP will not automatically change if post-backup commands in your backup plan copy
or move the backups from the original location. The DRP points only to the locations specified in the
backup plan.
You can append additional information to a DRP template if you are well familiar with XML and HTML.
The default paths to the DRP template are:
%ProgramFiles%\Acronis\BackupAndRecovery\drp.xsl - in 32-bit Windows
%ProgramFiles(x86)%\Acronis\BackupAndRecovery\drp.xsl - in 64-bit Windows
/usr/lib/Acronis/BackupAndRecovery/drp.xsl - in Linux
To set up sending DRPs:
1. Select the Send disaster recovery plans check box.
2. Enter the e-mail address in the E-mail Address field. You can enter several e-mail addresses in a
semicolon-delimited format.
This option is not available when operating under the bootable media.
The option enables you to receive e-mail notifications about the backup task's successful completion,
failure or when user interaction is required.
These options enable you to specify how to handle errors that might occur during backup.
With the silent mode enabled, the program will automatically handle situations requiring user
interaction (except for handling bad sectors, which is defined as a separate option). If an operation
cannot continue without user interaction, it will fail. Details of the operation, including errors, if any,
can be found in the operation log.
When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation.
You can set the time interval and the number of attempts. The attempts will be stopped as soon as
the operation succeeds OR the specified number of attempts are performed, depending on which
comes first.
For example, if the backup destination on the network becomes unavailable or not reachable, the
program will attempt to reach the destination every 30 seconds, but no more than 5 times. The
attempts will be stopped as soon as the connection is resumed OR the specified number of attempts
is performed, depending on which comes first.
When the option is disabled, the program will display a pop-up window each time it comes across a
bad sector and ask for a user decision as to whether to continue or stop the backup procedure. In
order to back up the valid information on a rapidly dying disk, enable ignoring bad sectors. The rest
of the data will be backed up and you will be able to mount the resulting disk backup and extract
valid files to another disk.
This option is not available when operating under the bootable media.
The option defines whether the agent(s) operating on the managed machine have to send the log
events of the backup operations to the specified Simple Network Management Protocol (SNMP)
managers. You can choose the types of events to be sent.
For detailed information about using SNMP with Acronis Backup, please see "Support for SNMP (p.
53)".
The preset is: Use the setting set in the Machine options.
To select whether to send the backup operations events to the SNMP managers:
Choose one of the following:
Use the setting set in the Machine options – to use the setting specified for the machine. For
more information refer to Machine options.
Send SNMP notifications individually for backup operation events – to send the events of the
backup operations to the specified SNMP managers.
Types of events to send – choose the types of events to be sent: All events, Errors and
warnings, or Errors only.
Server name/IP – type the name or IP address of the host running the SNMP management
application, the messages will be sent to.
Community – type the name of the SNMP community to which both the host running the
SNMP management application and the sending machine belong. The typical community is
"public".
Click Send test message to check if the settings are correct.
Do not send SNMP notifications – to disable sending the log events of the backup operations to
SNMP managers.
This option is not available when operating under the bootable media.
This option defines whether the agent(s) operating on the managed machine have to log events of
the backup operations in the Application Event Log of Windows (to see this log, run eventvwr.exe or
select Control Panel > Administrative tools > Event Viewer). You can filter the events to be logged.
The preset is: Use the setting set in the Machine options.
To select whether to log the backup operations events in the Application Event Log of
Windows:
Choose one of the following:
Use the setting set in the Machine options – to use the setting specified for the machine. For
more information refer to Machine options.
Log the following event types – to log events of the backup operations in the Application Event
Log. Specify the types of events to be logged:
All events – log all events (information, warnings and errors)
Errors and warnings
Errors only
Do not log - to disable logging events of the backup operations in the Application Event Log.
This option defines whether a file change is detected using the file size and time stamp or by
comparing the file contents to those stored in the archive.
Incremental or differential backup captures only data changes. To speed up the backup process, the
program determines whether a file has changed or not by the file size and the date/time when the
file was last modified. Disabling this feature will make the program compare the entire file contents
to those stored in the archive.
This option defines whether to back up files one by one or by taking an instant data snapshot.
Note: Files that are stored on network shares are always backed up one by one.
Simply ignore this option if you do not use the encryption. Enable the option if encrypted files are
included in the backup and you want them to be accessed by any user after recovery. Otherwise,
only the user who encrypted the files/folders will be able to read them. Decryption may also be
useful if you are going to recover encrypted files on a different machine.
File encryption is available in Windows using the NTFS file system with the Encrypting File System (EFS). To
access a file or folder encryption setting, select Properties > General > Advanced Attributes > Encrypt contents
to secure data.
When the option is enabled, files and folders are saved in the archive with the original permissions to
read, write or execute the files for each user or user group. If you recover a secured file/folder on a
machine without the user account specified in the permissions, you may not be able to read or
modify this file.
To completely eliminate this kind of problem, disable preserving file security settings in archives. The
recovered files and folders will always inherit the permissions from the folder to which they are
recovered or from the disk, if recovered to the root.
Alternatively, you can disable recovery (p. 162) of the security settings, even if they are available in
the archive. The result will be the same - the files will inherit the permissions from the parent folder.
To access file or folder NTFS permissions, select Properties > Security.
This option defines how a snapshot of a logical volume is taken. Acronis Backup can do this on its
own or rely on Linux Logical Volume Manager (LVM). Use of a snapshot ensures a time-consistent
backup of a volume whose data may change during the backup process.
If the data changes extremely fast while the software is keeping the snapshot, the snapshot logical
volume will run out of space and the backup will fail. That is why you can change the 10 percent
default value to any value up to 100 percent (which guarantees success) in
/etc/Acronis/BackupAndRecovery.config.
When backing up to this media, you can make this media work as regular Linux-based bootable
media (p. 436) by writing additional components to it. As a result, you will not need a separate
rescue disc.
Choose one of the following components you want to put on the bootable media:
Acronis Bootable Agent is a bootable rescue utility (based on Linux kernel) that includes most of
the functionality of the Acronis Backup agent. Put this component on the media if you want more
functionality during recovery. You will be able to configure the recovery operation in the same
way as under regular bootable media; use Active Restore. If the media is being created in
Windows, the disk management functionality will also be available.
Acronis Bootable Agent and One-Click Restore. The One-Click Restore is the minimal addition to
a disk backup stored on removable media, allowing for easy recovery from this backup. If you
boot a machine from the media and click Run Acronis One-click Restore, the disk will be
immediately recovered from the backup contained on the same media.
Caution: Because the one-click approach does not presume user selections, such as selecting volumes to
recover, Acronis One-Click Restore always recovers the entire disk. If your disk contains several volumes and
you are planning to use Acronis One-Click Restore, include all the volumes in the backup. Any volumes
missing from the backup will be lost.
This option is effective only when you select for backup a folder that is higher in the folder hierarchy
than the mount point. (A mount point is a folder on which an additional volume is logically attached.)
Example
Let's assume that the C:\Data1\ folder is a mount point for the mounted volume. The volume
contains folders Folder1 and Folder2. You create a backup plan for file-level backup of your data.
If you select the check box for volume C and enable the Mount points option, the C:\Data1\ folder in
your backup will contain Folder1 and Folder2. When recovering the backed-up data, be aware of
proper using the Mount points option for recovery (p. 163).
If you select the check box for volume C, and disable the Mount points option, the C:\Data1\ folder
in your backup will be empty.
If you select the check box for the Data1, Folder1 or Folder2 folder, the checked folders will be
included in the backup as ordinary folders, regardless of the state of the Mount points option.
This option applies to disk-level backup. This option also applies to file-level backup when the
file-level backup is performed by taking a snapshot. (The File-level backup snapshot (p. 117) option
determines whether a snapshot will be taken during file-level backup).
The option determines whether to take snapshots of multiple volumes at the same time or one by
one.
When this option is set to Enable, snapshots of all volumes being backed up will be created
simultaneously. Use this option to create a time-consistent backup of data spanned across multiple
volumes, for instance for an Oracle database.
When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a
result, if the data spans across several volumes, the resulting backup may be not consistent.
The program does not support interactive commands, i.e. commands that require user input (for
example, "pause").
To specify pre/post commands
1. Enable pre/post commands execution by checking the following options:
Execute before the backup
Execute after the backup
2. Do any of the following:
Click Edit to specify a new command or a batch file
Select the existing command or the batch file from the drop-down list
3. Click OK.
The option enables you to define the commands to be automatically executed before and after data
capture (that is, taking the data snapshot). Data capture is performed by Acronis Backup at the
beginning of the backup procedure.
The following scheme illustrates when the pre/post data capture commands are executed.
<--------------- Backup --------------->
Pre-backup Pre-data Data Post-data Post-backup
command capture capture capture command
command command
If the Volume Shadow Copy Service (p. 129) option is enabled, the commands' execution and the
Microsoft VSS actions will be sequenced as follows:
"Before data capture” commands -> VSS Suspend -> Data capture -> VSS Resume -> "After data
capture" commands.
Using the pre/post data capture commands, you can suspend and resume a database or application
that is not compatible with VSS. As opposed to the Pre/Post commands (p. 121), the pre/post data
capture commands will be executed before and after the data capture process. This takes seconds.
The entire backup procedure may take much longer, depending on the amount of data to be backed
up. Therefore, the database or application idle time will be minimal.
This option defines a time period when starting replication or applying retention rules is not allowed.
The operations will be performed when the inactivity time ends, if the machine is powered on at that
moment. The operations that had started before the inactivity time began continue without
interruption.
The inactivity time affects all locations, including the primary one.
To specify the inactivity time, select the Do not start replication/cleanup within the following time
check box, and then select the days and the time period during the day.
Usage example
You may want to use this option to separate the backup process from replication or cleanup. For
example, suppose that you back up machines locally during the day and replicate the backups to a
network folder. Make the inactivity time contain the working hours. Replication will be performed
after the working hours, when network load is lower.
To create an exact copy of a disk or volume on a physical level, select the Back up sector-by-sector
check box. The resulting backup will be equal in size to the disk being backed up (if the Compression
Tapes within one pool can be grouped into so-called tape sets.
If you leave this option disabled, data from different machines will be backed up on all tapes
belonging to a pool. If the option is enabled, backups of each machine will be stored on a separate
tape set.
If this check box is selected, at each backup, the software creates supplementary files on a hard disk
of the machine where the tape device is attached. File recovery from disk backups is possible as long
as these supplementary files are intact. The files are deleted automatically when the tape storing the
respective backups is erased (p. 208), removed (p. 211) or overwritten.
When you configure a single-pass disk and application backup (p. 311), the Enable file recovery from
disk backups stored on tapes check box is automatically selected. You can clear it only if you change
the backup destination or disable single-pass backup.
If the supplementary files were not created during backup, or have been deleted, you still can create
them by rescanning (p. 208) the tapes where the backup is stored. This does not apply to backups
created by Acronis Backup & Recovery 11 Update 0 (build 17318) and earlier.
When this check box is selected, the software will eject tapes after any successful backup. If,
according to the backup plan, other operations follow the backup (such as the backup validation or
replication to another location), the tape will be ejected after completion of these operations.
If you disable this option, a tape will remain in the drive after an operation with the tape is
completed.
If both this option and the Eject tapes after successful backups option are enabled, the tape will be
ejected.
You can force using a free tape by changing the following settings.
For each full backup
The preset is: Disabled.
When this option is enabled, each full backup will be written onto a free tape.
For each differential backup (not applicable when backing up Exchange data)
The preset is: Disabled.
When this option is enabled, each differential backup will be written onto a free tape. In addition,
each full backup will be written onto a free tape. The For each full backup check box becomes
selected and disabled.
For each incremental backup (or transaction log backup when backing up Exchange data)
The preset is: Disabled.
When this option is enabled, each incremental backup will be written onto a free tape. In addition,
each full backup and each differential backup will be written onto a free tape. The For each full
backup and For each differential backup check boxes become selected and disabled.
The option applies only to stand-alone tape drives. When this option is enabled, a tape inserted into
a drive will be overwritten every time a full backup is created.
This option is not available when operating under the bootable media.
This option determines the program behavior when any of the backup plan's tasks fails.
If the task fails because of a mistake in the backup plan, you can edit the plan while the task is in the Idle state.
While the task is running, you have to stop it prior to editing the backup plan.
This option determines the program behavior in case a backup task is about to start (the scheduled
time comes or the event specified in the schedule occurs), but the condition (or any of multiple
conditions) is not met. For more information on conditions please see Scheduling (p. 82) and
Conditions (p. 93).
To handle the situation when the conditions are not met for too long and further delaying the backup
is becoming risky, you can set the time interval after which the task will run irrespective of the
condition. Select the Run the task anyway after check box and specify the time interval. The task will
start as soon as the conditions are met OR the maximum time delay lapses, depending on which
comes first.
Use VSS
When Use Volume Shadow Copy Service is selected, choose a snapshot provider from the following
list:
Hardware/software - Select automatically
VSS will use the hardware-based provider that supports the source volume. If one is not found,
VSS will try to use a software-based provider, the Microsoft Software Shadow Copy provider, and
Acronis VSS Provider in turn.
Software - Select automatically
Choose Do not use VSS if your database is incompatible with VSS. Snapshots are taken faster, but
data consistency of the applications whose transactions are not completed at the time of taking a
snapshot cannot be guaranteed. You may use Pre/Post data capture commands (p. 123) to ensure
that the data is being backed up in a consistent state. For instance, specify pre-data capture
commands that will suspend the database and flush all caches to ensure that all transactions are
completed; and specify post-data capture commands that will resume the database operations after
the snapshot is taken.
This option can be useful when you protect Microsoft Exchange Server with a disk-level backup (p.
283).
If enabled, logs of Microsoft Exchange Server and of other VSS-aware applications (except for
Microsoft SQL Server) will be truncated after each successful full, incremental or differential backup.
If the machine's operating system fails to start or you need to recover data to bare metal, boot the
machine from the bootable media (p. 436) or using Acronis Startup Recovery Manager (p. 264) and
configure recovery.
Acronis Backup enables you to transfer Windows operating systems between BIOS-based hardware
and hardware that supports Unified Extensible Firmware Interface (UEFI). See the "Recovering
BIOS-based systems to UEFI-based and back" (p. 148) section for more details.
A Windows system can be brought online in seconds while it is still being recovered. Using the
proprietary Acronis Active Restore (p. 152) technology, Acronis Backup will boot the machine into
the operating system found in the backup as if the system were on the physical disk. The system
becomes operational and ready to provide necessary services. Thus, the system downtime will be
minimal.
The most recent operating systems remain bootable when recovered to dissimilar hardware, or the
VMware or Hyper-V platforms. If a recovered operating system does not boot, use the Acronis
Universal Restore tool to update the drivers and modules that are critical for the operating system
startup. For details, see the Acronis Universal Restore page at http://www.acronis.com/en-us/aur/.
A dynamic volume can be recovered over an existing volume, to unallocated space of a disk group, or
to unallocated space of a basic disk. To learn more about recovering dynamic volumes, please turn to
the "Backup and recovery of dynamic volumes (Windows)" (p. 41) section.
For detailed information about recovering Linux Software RAID devices and volumes created by
Logical Volume Manager (LVM), see "Recovering MD devices and logical volumes" (p. 45).
Acronis Backup Agent for Windows and Agent for Linux have the ability to recover a disk (volume)
backup to a new virtual machine. With Acronis Backup Agent for Hyper-V or VMware, you can create
the new virtual machine on the respective virtualization server. See the "Recovery to the "New
virtual machine" destination" (p. 171) section for more details.
You might need to prepare target disks before recovery. Acronis Backup includes a handy disk
management utility which enables you to create or delete volumes, change a disk partitioning style,
create a disk group and perform other disk management operations on the target hardware, both
under the operating system and on bare metal. To find out more about Acronis Disk Director LV, see
"Disk management" (p. 267).
In Acronis Backup Advanced, you can select either to specify the archive location path as described
above, or use the centralized data catalog.
2. Selecting data
The backed-up data can be selected using the Data view tab, or the Archive view tab. The Data view
tab displays all the backed-up data by versions (the date and time of backup creation) within the
selected archive location. The Archive view tab displays the backed-up data by the archives.
Selecting data using the Data view
Since the Data view tab shares the same functionality with the data catalog, selecting data on the
Data view tab is performed in the same way as in the catalog. For more information about selecting
data, see "Data catalog" (p. 136).
Selecting data using the Archive view
1. Expand the required archive and select one of the successive backups by its creation date and
time. Thus, you can revert the disk data to a certain moment in time.
If the list of archives is not displayed (for example, if the archive metadata has been lost), click
Refresh.
If the list of archives is too long, you can filter the archives by selecting only the required type of
archives to display. To do this, select the required archive type in the Show list.
Note for Microsoft Exchange users: For information about selecting Microsoft Exchange data, refer to the
"Selecting the Exchange data by using the Archive view" section of the "Backing up Microsoft Exchange
Server data" documentation.
2. For disk or volume backups only: in the Backup contents, select the type of data to display from
the drop-down box:
Disks - to recover disks as a whole (with all their volumes).
Volumes - to recover individual basic and/or dynamic volumes.
Files - to recover individual files and folders.
Microsoft SQL databases - to recover Microsoft SQL databases from single-pass disk and
application backups.
Microsoft Active Directory - to extract Microsoft Active Directory data from single-pass disk
and application backups.
3. In the Backup contents, select the check boxes for the items you need to recover.
4. Click OK.
Selecting MBR
When recovering a system volume, you will usually select the disk's MBR if:
The operating system cannot boot.
The disk is new and does not have MBR.
You are recovering custom or non-Windows boot loaders (such as LILO and GRUB).
The disk geometry is different to that stored in the backup.
When recovering the MBR of one disk to another Acronis Backup recovers Track 0, which does not
affect the target disk’s partition table and partition layout. Acronis Backup automatically updates
Windows loaders after recovery, so there is no need to recover the MBR and Track 0 for Windows
systems, unless the MBR is damaged.
Cloud storage If the archive is stored in Acronis Cloud Storage, click Log in and specify the credentials to
log in to the cloud storage. Then, expand the Cloud storage group and select the account.
Exporting and mounting are not supported for backups stored in Acronis Cloud Storage.
Personal If the archive is stored in a personal vault, expand the Personal group and click the
required vault.
Centralized If the archive is stored in a centralized vault, expand the Centralized group and click the
appropriate vault.
Local folders If the archive is stored in a local folder on the machine, expand the <Machine name>
group and select the required folder.
CD, DVD, BD If the archive is stored on optical media such as CD, DVD, or Blu-ray Discs (BD), expand the
<Machine name> group, then select the required drive. First insert the last disc. Then
insert the discs in order starting from the first one when the program prompts.
RDX, USB If the archive is stored on an RDX drive or USB flash drive, expand the <Machine name>
group, then select the required drive. For information about using these drives, see the
"Removable devices" (p. 194) section.
Tape device If the archive is stored on a locally attached tape device, expand the Tape devices group,
then click the required device.
Note Tape devices can only be used with Acronis Backup Advanced.
For information about using tapes, see the "Tape devices" (p. 195) section.
Network folders If the archive is stored on a network share, expand the Network folders group, then select
the required networked machine and then click the shared folder. If the network share
requires access credentials, the program will ask for them.
Note for Linux users: To specify a Common Internet File System (CIFS) network share
which is mounted on a mount point such as /mnt/share, select this mount point instead of
the network share itself.
FTP, SFTP If the archive is stored on an FTP or SFTP server, type the server name or address in the
Path field as follows:
ftp://ftp_server:port _number or sftp://sftp_server:port number
To establish an active mode FTP connection, use the following notation:
aftp://ftp_server:port _number
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
After entering access credentials, the folders on the server become available. Click the
appropriate folder on the server.
You can access the server as an anonymous user if the server enables such access. To do
so, click Use anonymous access instead of entering credentials.
According to the original FTP specification, credentials required for access to FTP servers
are transferred through a network as plaintext. This means that the user name and
password can be intercepted by an eavesdropper using a packet sniffer.
Storage nodes When working in the operating system, access a storage node by selecting the respective
centralized vault. When operating on a machine booted with bootable media:
To access a managed vault, type the following string in the Path field:
bsp://node_address/vault_name/
To access an unmanaged centralized vault, type the full path to the vault's folder.
NFS folders If the archive is stored on an NFS share, expand the NFS folders group and click the folder.
Available only in Linux and under Linux-based bootable media.
Solutions:
If cataloging is disabled
Solution for centralized unmanaged vaults: Select the vault in the Navigation tree, and then select
Data view.
Solution for personal vaults: Connect directly to the machine, select the vault and then select Data
view.
Recover to:
Physical machine
Available when the Acronis Backup Agent for Windows or Agent for Linux is installed.
The selected disks will be recovered to the physical disks of the machine the console is connected
to. On selecting this, you proceed to the regular disk mapping procedure described below.
New virtual machine
If Acronis Backup Agent for Windows or Agent for Linux is installed.
The selected disks will be recovered to a new virtual machine of any of the following types:
VMware Workstation, Microsoft Virtual PC, Red Hat Kernel-based Virtual Machine (KVM), Red
Hat Enterprise Virtualization (RHEV), or Citrix XenServer Open Virtual Appliance (OVA).
The virtual machine files will be saved to the destination you specify in the Storage section. By
default, the new virtual machine will be created in the current user's documents folder.
If Acronis Backup Agent for Hyper-V or Agent for VMware is installed.
These agents enable creating a new virtual machine on the virtualization server you specify.
By default, the new virtual machine will be created in the default storage of the virtualization
server. Whether you can change the storage on the virtualization server or not, depends on the
Then you proceed to the regular disk mapping procedure described below.
Disks/volumes
Map automatically
Acronis Backup attempts to map the selected disks to the target disks as described in the "How
the automatic mapping works" (p. 141) section. If you are unsatisfied with the mapping result,
you can re-map disks manually. To do this, you have to unmap the disks in a reverse order; that is,
the last mapped disk should be unmapped first. Then, map the disks manually as described
below.
Disk #:
Disk # (MODEL) (p. 140)
Select the destination disk for each of the source disks.
NT signature (p. 140)
Select the way the recovered disk's signature will be handled. The disk signature is used by
Windows and the Linux kernel version 2.6 and later.
Disk destination
To specify a destination disk:
1. Select a disk where you want the selected disk to recover to. The destination disk's space should
be at least the same size as the uncompressed image data.
2. Click OK.
All the data stored on the target disk will be replaced by the backed-up data, so be careful and watch out for
non-backed-up data that you might need.
NT signature
The NT signature is a record that is kept in the MBR. It uniquely identifies the disk for the operating
system.
When recovering a disk containing a system volume, you can choose what to do with the NT
signature of the target disk. Specify any of the following parameters:
Select automatically
Recovering the disk signature may be desirable due to the following reasons:
Acronis Backup schedules tasks using the signature of the source hard disk. If you recover the
same disk signature, you don't need to re-create or edit the tasks created previously.
Some installed applications use disk signature for licensing and other purposes.
This enables you to keep all the Windows Restore Points on the recovered disk.
To recover VSS snapshots used by Windows Vista's "Previous Versions" feature.
Keep existing
The program will leave the NT signature of the target hard disk untouched.
Also, you have to map the volumes manually if they are Linux logical volumes, or Linux software RAID
(MD devices). For more information on recovering logical volumes and MD devices, see Recovering
MD devices and logical volumes (p. 45).
Acronis Backup can recover data from one disk to another as long as both disks have the same logical
sector size. (This is the sector size presented to the operating system.) Acronis Backup automatically
aligns the disk’s volumes (p. 145) if necessary. This way, the start of a cluster in the file system always
matches the start of a physical sector on the disk.
The disk management (p. 267) functionality of Acronis Backup is not available for disks with a 4-KB
logical sector size.
In terms of the logical sector size, IDEMA specifies two types of Advanced Format disks:
512 Byte emulation (512e) disks have a 512-byte logical sector size. These disks are supported in
Windows starting with Windows Vista, and in modern Linux distributions. Microsoft and Western
Digital use the term “Advanced Format” exclusively for this type of disk.
4K native (4Kn) disks have a 4-KB logical sector size. Modern operating systems can store data on
these disks, but they generally cannot boot from these disks. These disks are commonly external
drives with USB connection.
By running the appropriate command
To find out the logical sector size of a disk, do the following.
In Windows:
1. Make sure that the disk contains an NTFS volume.
2. Run the following command as an administrator, specifying the drive letter of the NTFS
volume:
fsutil fsinfo ntfsinfo D:
3. Examine the value in the Bytes Per Sector line. For example, the output may be the
following:
Bytes Per Sector : 512
In Linux:
1. Determine the device name of the disk, such as /dev/sdb.
2. Run the following command as the root user, specifying the device name:
parted /dev/sdb print
Recover to:
Physical machine
Available when the Acronis Backup Agent for Windows or Agent for Linux is installed.
The selected volumes will be recovered to the physical disks of the machine the console is
connected to. On selecting this, you proceed to the regular volume mapping procedure described
below.
New virtual machine
If Acronis Backup Agent for Windows or Agent for Linux is installed.
The selected volumes will be recovered to a new virtual machine of any of the following types:
VMware Workstation, Microsoft Virtual PC, Red Hat Kernel-based Virtual Machine (KVM), Red
Hat Enterprise Virtualization (RHEV), or Citrix XenServer Open Virtual Appliance (OVA).
The virtual machine files will be saved to the destination you specify in the Storage section. By
default, the new virtual machine will be created in the current user's documents folder.
If Acronis Backup Agent for Hyper-V or Agent for VMware is installed.
These agents enable creating a new virtual machine on the virtualization server you specify.
By default, the new virtual machine will be created in the default storage of the virtualization
server. Whether you can change the storage on the virtualization server or not, depends on the
virtualization product brand and settings. VMware ESX(i) may have multiple storages. A
Microsoft Hyper-V server enables creating a new virtual machine in any local folder.
The new virtual machine will be configured automatically, the source machine configuration being
copied where possible. The configuration is displayed in the Virtual Machine Settings (p. 173) section.
Check the settings and make changes if necessary.
Then you proceed to the regular volume mapping procedure described below.
Disks/volumes
Map automatically
Acronis Backup attempts to map the selected volumes to the target disks as described in the
"How the automatic mapping works" (p. 141) section. If you are unsatisfied with the mapping
result, you can re-map volumes manually. To do this, you have to unmap the volumes in a
reverse order; that is, the last mapped volume should be unmapped first. Then, map the volumes
manually as described below.
MBR destination
To specify a destination disk:
1. Select the disk to recover the MBR to.
2. Click OK.
Volume destination
To specify a target volume or unallocated space
1. Select a volume or unallocated space where you want the selected volume to be recovered to.
The destination volume/unallocated space should be at least the same size as the uncompressed
image data.
2. Click OK.
All the data stored on the target volume will be replaced by the backed-up data, so be careful and watch out for
non-backed-up data that you might need.
The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...).
File system
By default, the recovered volume will have the same file system as the original volume has. You can
change the volume's file system during recovery, if required.
Acronis Backup can make the following file system conversions: FAT 16 -> FAT 32 and Ext2 -> Ext3.
For volumes with other native file systems, this option is not available.
Assume you are going to recover a volume from an old, low-capacity FAT16 disk to a newer disk.
FAT16 would not be effective and might even be impossible to set on the high-capacity hard disk.
That's because FAT16 supports volumes up to 4 GB, so you will not be able to recover a 4 GB FAT16
volume to a volume that exceeds that limit, without changing the file system. It would make sense
here to change the file system from FAT16 to FAT32.
Older operating systems (MS-DOS, Windows 95 and Windows NT 3.x, 4.x) do not support FAT32 and
will not be operable after you recover a volume and change its file system. These can be normally
recovered on a FAT16 volume only.
If volumes are misaligned, the cluster overlaps more physical sectors than it would have occupied if
aligned. As a result, more physical sectors need to be erased and rewritten each time the data
changes. The redundant read/write operations noticeably slow down the disk speed and overall
system performance. SSD drive misalignment decreases not only system performance, but drive
lifetime. Since SSD memory cells are designed for a certain amount of read/write operations,
redundant read/write operations lead to early degradation of the SSD drive.
When recovering dynamic volumes and logical volumes created in Linux with Logical Volume
Manager (LVM), the appropriate alignment is set up automatically.
If you select the empty value, no letter will be assigned to the recovered volume, hiding it from the
OS. You should not assign letters to volumes that are inaccessible to Windows, such as to those other
than FAT and NTFS.
Recovery exclusions
Set up exclusions for the specific files and folders you do not wish to recover.
Note: Exclusions override selection of data items to recover. For example, if you select to recover file MyFile.tmp
and to exclude all .tmp files, file MyFile.tmp will not be recovered.
Use the Add, Edit, Remove and Remove All buttons to create the list of files and folders to exclude.
Specify the name of the file or folder, such as Document.txt.
The names are not case-sensitive in Windows and Linux. For example, if you choose to exclude
all .tmp files and the Temp folders, also excluded will be all .Tmp files, all .TMP files, and the TEMP
folders.
To learn more about operations available depending on the user privileges, see the "User privileges
on a managed machine" (p. 36) section.
How it works
Depending on whether the machine uses BIOS or UEFI firmware for booting, the disk with the system
volume must have a specific partition style. The partition style is master boot record (MBR) for BIOS,
and GUID partition table (GPT) for UEFI.
When performing a recovery to a machine that has a type of firmware that is different from the
firmware of the original machine, Acronis Backup:
Initializes the disk to which you are recovering the system volume either as an MBR disk or as a
GPT disk, depending on the new firmware.
Adjusts the Windows operating system so that it can start on the new firmware.
For details, including the list of Windows operating systems that can be adjusted this way, see
“Recovering volumes” (p. 149) and “Recovering disks” (p. 150) in this section.
Recommendations
Recover the entire system onto uninitialized disks.
When migrating to UEFI-based hardware, use Linux-based bootable media or WinPE-based
bootable media of versions later than 4.0. Earlier versions of WinPE and Acronis PXE Server do
not support UEFI.
Remember that BIOS does not allow using more than 2 TB of disk space.
Transferring a Windows system between UEFI and BIOS is not supported if a backup is stored in any
of these locations:
Acronis Cloud Storage
Tape device
Optical discs (CDs, DVDs, or Blu-ray discs)
When transferring a system between UEFI and BIOS is not supported, Acronis Backup initializes the
target disk with the same partitioning scheme as the original disk. No adjustment of the operating
system is performed. If the target machine supports both UEFI and BIOS, you need to enable the
boot mode corresponding to the original machine. Otherwise, the system will not boot.
The ability of the recovered system to boot up in different modes depends on the operating systems
installed on the source disk. Operating systems can be convertible i.e. allow changing the boot mode
from BIOS to UEFI and back, or non-convertible. For the list of convertible operating systems, see
Recovering volumes (p. 149).
When a source disk contains one or more operating systems and all of them are convertible, the
boot mode can be automatically changed. Depending on the current boot mode, the target disk
may be initialized either to GPT or to MBR partitioning style.
If at least one operating system on a source disk is non-convertible (or the source disk contains
any boot volumes of the non-convertible OSes), the boot mode cannot be changed automatically
and the software will initialize the target disk as the source one. To boot up the target machine,
you have to turn on/off the UEFI mode in BIOS manually. Otherwise, the system will not boot
after recovery.
This section describes the use of Active Restore during an operating system recovery. While based on
the same technology, recovery of Microsoft Exchange databases or Microsoft SQL databases
proceeds in a different way. For more information, refer to following sections:
When recovering Microsoft Exchange databases, see the "Using Acronis Active Restore for
database recovery" section of the "Backing up Microsoft Exchange Server data" document.
When recovering Microsoft SQL databases, see "Using Acronis Active Restore for SQL database
recovery" (p. 313).
Limitations
Active Restore is meant for instant data recovery on the same machine. It is not available when
recovering to dissimilar hardware.
The only supported archive location is a local drive, or more precisely, any device available
through the machine’s BIOS. This may be Acronis Secure Zone, a USB hard drive, a flash drive or
any internal hard drive.
Active Restore does not support disks with the GPT partitioning style as a source being recovered,
as a recovery destination, or as an archive location. This also means that Unified Extensible
Firmware Interface (UEFI) is not supported. The only supported boot mode is BIOS.
How it works
When configuring a recovery operation, you select disks or volumes to recover from a backup.
Acronis Backup scans the selected disks or volumes in the backup. If this scan finds a supported
operating system, use of Acronis Active Restore becomes available.
If you do not enable Active Restore, the system recovery will proceed in the usual way and the
machine will become operational after the recovery is completed.
If you enable Active Restore, the sequence of actions will be set as follows.
Once the system recovery is started, the operating system boots from the backup. The machine
becomes operational and ready to provide necessary services. The data required to serve incoming
requests is recovered with the highest priority; everything else is recovered in the background.
Because serving requests is performed simultaneously with recovery, the system operation can slow
down even if recovery priority (p. 164) in the recovery options is set to Low. Although the system
downtime is minimal, there may be reduced performance during recovery.
Usage scenarios
1. The system uptime is one of the efficiency criteria.
Examples: Client-oriented online services, Web-retailers, polling stations.
2. The system/storage space ratio is heavily biased toward storage.
Some machines are being used as storage facilities, where the operating system claims a small
space segment and all other disk space is committed to storage, such as movies, sounds or other
multimedia files. Some of these storage volumes can be extremely large as compared to the
system and so practically all the recovery time will be dedicated to recovering the files, which
might be used much later on, if in any near future at all.
5. In Where to recover, make sure that the system disk or volume is mapped to the first disk. If it is
not, map it manually as described in "Selecting target disks" (p. 139).
6. In Acronis Active Restore, select Use.
7. Once the system recovery is started, the operating system boots from the backup. The Acronis
Active Restore icon appears in the system tray. The machine becomes operational and ready to
provide necessary services. The immediate user sees the drive tree and icons and can open files
or launch applications even though they were not yet recovered.
The drivers of Acronis Active Restore intercept system queries and set the immediate priority for
recovery of the files that are necessary to serve the incoming requests. While this on-the-fly
recovery proceeds, the continuing recovery process is transferred to the background.
Please do not shut down or reboot the machine until the recovery is completed. If you switch off the
machine, all the changes made to the system since the last boot up will be lost. The system will not be
recovered, not even partially. The only possible solution in this case will be to restart the recovery process
from a bootable media.
8. The background recovery continues until all the selected volumes are recovered, the log entry is
made and the Acronis Active Restore icon disappears from the system tray.
The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered
to identical hardware.
1. Start Linux or boot from the bootable media, and then press CTRL+ALT+F2.
2. Mount the system you are recovering:
mkdir /mnt/system/
mount -t ext3 /dev/sda2 /mnt/system/ # root partition
mount -t ext3 /dev/sda1 /mnt/system/boot/ # boot partition
3. Mount the proc and dev file systems to the system you are recovering:
mount -t proc none /mnt/system/proc/
mount -o bind /dev/ /mnt/system/dev/
4. Save a copy of the GRUB menu file, by running one of the following commands:
cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup
or
cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup
5. Edit the /mnt/system/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Linux
distributions) or the /mnt/system/boot/grub/grub.conf file (for Fedora and Red Hat Enterprise
Linux distributions)—for example, as follows:
vi /mnt/system/boot/grub/menu.lst
6. In the menu.lst file (respectively grub.conf), find the menu item that corresponds to the system
you are recovering. This menu items have the following form:
title Red Hat Enterprise Linux Server (2.6.24.4)
root (hd0,0)
kernel /vmlinuz-2.6.24.4 ro root=/dev/sda2 rhgb quiet
initrd /initrd-2.6.24.4.img
The lines starting with title, root, kernel, and initrd respectively determine:
The title of the menu item.
The device on which the Linux kernel is located—typically, this is the boot partition or the
root partition, such as root (hd0,0) in this example.
The path to the kernel on that device and the root partition—in this example, the path is
/vmlinuz-2.6.24.4 and the root partition is /dev/sda2. You can specify the root partition by
label (such as root=LABEL=/), identifier (in the form root=UUID=some_uuid), or device name
(such as root=/dev/sda2).
The path to the initrd service on that device.
7. Edit the file /mnt/system/etc/fstab to correct the names of any devices that have changed as a
result of the recovery.
8. Start the GRUB shell by running one of the following commands:
chroot /mnt/system/ /sbin/grub
Reverting the system to the factory settings can be started from the management console or at boot
time. The second method is useful if the operating system became unbootable for some reason.
To start the operation from the management console, click Revert to factory settings in the
Welcome screen.
To start the operation at boot time, press a hot key (usually, F11) and then click Revert to factory
settings in the appeared screen. Alternatively, you can continue booting the operating system.
Sometimes, a system cannot be reverted to the factory settings even at boot time. This may be the
case if a drive failure occurred, if the factory image became corrupted in Acronis Secure Zone, or if
the original drive was replaced with a new one. In these cases, you can revert the system to the
factory settings by using the factory bootable media if it was shipped with the machine.
To start the operation, boot the machine into the factory bootable media and click Revert to factory
settings in the appeared screen. Once you confirm the operation, Acronis Backup will create Acronis
Secure Zone and copy the factory image to it. Then, it will re-deploy the factory image as described
above.
For additional information, refer to "Acronis Secure Zone" (p. 190) and "Acronis Startup Recovery
Manager" (p. 264).
You can also customize a default option itself by changing its value against the pre-defined one. The
new value will be used by default in all recovery tasks you will create later on this machine.
To view and change the default recovery options, connect the console to the managed machine and
then select Options > Default backup and recovery options > Default recovery options from the top
menu.
Event tracing:
Windows events log (p. 162) + + - - - -
This option defines whether to recover the files’ date and time from the archive or assign the files
the current date and time.
This option defines whether to validate a backup to ensure that the backup is not corrupted, before
data is recovered from it.
This option defines whether to check the integrity of the file system after a disk or volume recovery.
The check takes place either immediately after recovery or after the machine boots into the
recovered operating system.
The option defines whether to reboot the machine automatically if it is required for recovery. Such
might be the case when a volume locked by the operating system has to be recovered.
This option enables booting the machine into the recovered operating system without user
interaction.
Acronis Backup can generate an unique security identifier (SID) for the recovered system. You do not
need a new SID when recovering a system over itself or when creating a system replica that will
replace the original system. Generate a new SID if the original and the recovered systems will work
concurrently in the same workgroup or domain.
This option is not available when operating under the bootable media.
These options enable you to specify how to handle errors that might occur during recovery.
With the silent mode enabled, the program will automatically handle situations requiring user
interaction where possible. If an operation cannot continue without user interaction, it will fail.
Details of the operation, including errors, if any, can be found in the operation log.
When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation.
You can set the time interval and the number of attempts. The attempts will be stopped as soon as
the operation succeeds OR the specified number of attempts are performed, depending on which
comes first.
For example, if the network location becomes unavailable or not reachable, the program will attempt
to reach the location every 30 seconds, but no more than 5 times. The attempts will be stopped as
soon as the connection is resumed OR the specified number of attempts is performed, depending on
which comes first.
This option is not available when operating under the bootable media.
The option defines whether the agent(s) operating on the managed machine have to send the log
events of the recovery operations to the specified Simple Network Management Protocol (SNMP)
managers. You can choose the types of events to be sent.
For detailed information about using SNMP with Acronis Backup, please see "Support for SNMP (p.
53)".
The preset is: Use the setting set in the Machine options.
To select whether to send the recovery operations events to the SNMP managers:
Choose one of the following:
Use the setting set in the Machine options – to use the setting specified for the machine. For
more information refer to Machine options.
This option is not available when operating under the bootable media.
This option defines whether the agent(s) operating on the managed machine have to log events of
the recovery operations in the Application Event Log of Windows (to see this log, run eventvwr.exe
or select Control Panel > Administrative tools > Event Viewer). You can filter the events to be
logged.
The preset is: Use the setting set in the Machine options.
To select whether to log the recovery operations events in the Application Event Log of
Windows:
Select one of the following:
Use the setting set in the Machine options – to use the setting specified for the machine. For
more information refer to Machine options.
Log the following event types – to log events of the recovery operations in the Application Event
Log. Specify the types of events to be logged:
All events – log all events (information, warnings and errors)
Errors and warnings
Errors only
Do not log - to disable logging events of the recovery operations in the Application Event Log.
This option defines whether to recover NTFS permissions for files along with the files.
If the file NTFS permissions were preserved during backup (p. 118), you can choose whether to
recover the permissions or let the files inherit the NTFS permissions from the folder to which they
are recovered.
Enable the Mount points option to recover files and folders that were stored on the mounted
volumes and were backed up with the enabled Mount points option. For details of backing up
mounted volumes or cluster shared volumes, see Mount points (p. 120).
This option is effective only when you select for backup a folder that is higher in the folder hierarchy
than the mount point. If you select for recovery folders within the mount point or the mount point
itself, the selected items will be recovered regardless of the Mount points option value.
Please be aware that if the volume is not mounted at the moment of recovery, the data will be recovered
directly to the folder that has been the mount point at the time of backing up.
The option enables you to define the commands to be automatically executed before and after the
data recovery.
A post-recovery command will not be executed if the recovery proceeds with reboot.
To specify pre/post commands
1. Enable pre/post commands execution by checking the following options:
Execute before the recovery
Execute after the recovery
2. Do any of the following:
Click Edit to specify a new command or a batch file
Select the existing command or the batch file from the drop-down list
3. Click OK.
This option is not available when operating under the bootable media.
The priority of a process running in a system determines the amount of CPU and system resources
allocated to that process. Decreasing the recovery priority will free more resources for other
applications. Increasing the recovery priority might speed up the recovery process by requesting the
operating system to allocate more resources to the application that will perform the recovery.
However, the resulting effect will depend on the overall CPU usage and other factors like disk I/O
speed or network traffic.
When this option is enabled, the software uses temporary files to minimize the number of tape
rewinds and thus accelerate the recovery. The software creates the files on a local disk of the
machine where the tape device is attached and deletes the files after the recovery is completed.
This option is especially efficient if you recover large files. However, temporary files require as much
space as the total size of the files you want to recover.
Acronis Backup adjusts the Windows boot mode to the BIOS boot firmware and ensures that
Windows remains bootable.
For Linux operating systems, changing the boot mode from UEFI to BIOS is not supported. When
converting a UEFI-based machine running Linux, make sure that it uses GRUB version 1 and that the
target virtualization platform is ESXi 5. For more details, see "Support for UEFI-based machines" (p.
50).
For more considerations about physical to virtual machine conversion, see the "Backing up virtual
machines" document.
Restrictions
Conversion of a backup from the following locations is not available: CD, DVD, Blu-Ray Discs, tape
devices and Acronis Cloud Storage.
Conversion to a Citrix XenServer virtual machine is not available as a part of the backup plan. As
an alternative, use methods (b) and (c) as described in "Conversion methods" (p. 166).
Microsoft Virtual PC does not support virtual disks larger than 127 GB. During a conversion to a
Virtual PC machine, the size of every disk that exceeds 127 GB will be reduced to this value. If the
disk resize is not possible, the conversion will fail. If you need larger virtual disks in order to
connect them to a Hyper-V machine, use methods (b) and (c) as described in "Conversion
methods" (p. 166).
The settings are specified in the Convert to virtual machine section of the Create backup plan page.
The conversion task will be created on the machine being backed up, and will use this machine's date
and time. If the agent that backs up the machine is installed outside it (such is the case when a ESX(i)
or Hyper-V virtual machine is backed up at a hypervisor level), the task will be created on the
machine where the agent is.
The target virtual machine must be powered off by the time of conversion, otherwise the conversion
task will fail. If this happens, you can restart the conversion task manually after powering off the
machine. Any changes made to the machine while it was powered on, will be overwritten.
Storage space
For VMware, Hyper-V and Virtual PC, disks of the resulting virtual machine will use as much storage
space as the original data occupies. Assuming that the original disk size is 100 GB and the disk stores
10 GB of data, the corresponding virtual disk will occupy about 10 GB. VMware calls this format "thin
provisioning", Microsoft uses the "dynamically expanding disk" term. Since the space is not
pre-allocated, the physical storage is expected to have sufficient free space for the virtual disks to
increase in size.
For KVM or RHEV, disks of the resulting virtual machine will have the raw format. This means that
virtual disk size is always equal to the original disk capacity. Assuming that the original disk size is 100
GB, the corresponding virtual disk will occupy 100 GB even if the disk stores 10 GB of data.
To be able to update the virtual machine, the software stores a few intermediate snapshots of it.
They are named Backup… and Replica… and should be kept. Unneeded snapshots are deleted
automatically.
The latest Replica… snapshot corresponds to the result of the latest conversion. You can go to this
snapshot if you want to return the machine to that state; for example, if you worked with the
machine and now want to discard the changes made to it.
With Acronis Backup Agent for Windows or Agent for Linux, you can create a new virtual machine in
a local or network folder. You can start the machine using the respective virtualization software or
prepare the machine files for further usage. The following table summarizes the available virtual
machine formats and the actions you can take to add the machine to a virtualization server.
VM format Further action and tool to use Target virtualization
platform
VMware Workstation Export using VMware Workstation; or
Convert to OVF using VMware OVF tool > Deploy OVF ESX(i)
template using vSphere Client
Microsoft Virtual PC* Add the VHD file to a Hyper-V machine Hyper-V
Citrix XenServer OVA Import using Citrix XenCenter XenServer
Kernel-based Virtual Move the virtual machine files to a machine running
Machine (Raw format) Linux and run the virtual machine by using Virtual -
Machine Manager
Red Hat Enterprise Import using RHEV Manager RHEV
Virtualization (RHEV)
(Raw format)
*Microsoft Virtual PC does not support disks that are larger than 127 GB. Acronis enables you to create a
Virtual PC machine with larger disks so that you can attach the disks to a Microsoft Hyper-V virtual machine.
With Acronis Backup Agent for Hyper-V or Agent for VMware, you can create a new virtual machine
directly on the respective virtualization server.
8. The destination disk for each of the source disks or source volumes and the MBRs will be
selected automatically. If required, you can change the destination disks.
On a Microsoft Virtual PC, be sure to recover the disk or volume where the operating system's loader
resides to the Hard disk 1. Otherwise, the operating system will not boot. This cannot be fixed by changing
the boot device order in BIOS, because a Virtual PC ignores these settings.
The available options depend on the agent(s) installed on the machine the console is connected to. If
the console is connected to the management server, you can choose any registered machine that is
able to perform the required operation.
To select the virtualization server where the new virtual machine will be created
1. Choose the Create a new virtual machine on the server option.
2. In the left part of the window, select the virtualization server. Use the right part of the window to
review details on the selected server.
[Only if the console is connected to the management server] If multiple agents manage the
selected ESX(i) host, you can choose the agent that will perform recovery. If no agent manages
the ESX(i) and automatic deployment is turned on, Agent for VMware (Virtual Appliance) will be
Disks
Initial setting: the number and size of the source machine's disks.
The number of disks is generally equal to that of the source machine. It might be different if the
software has to add more disks to accommodate the source machine volumes because of limitations
set by the virtualization product. You can add virtual disks to the machine configuration or, in some
cases, delete the proposed disks.
When adding a new virtual disk, along with interface and capacity, you can specify its format.
Thin format. The disk occupies as much storage space as the data it stores. This saves the storage
space. To enable thin format, select the Thin provisioning (for ESX), or Dynamically expanding
disk (for Hyper-V) check box.
Thick format. The disk occupies all the provisioned storage space. This improves the virtual
machine performance. To use thick format, clear the Thin provisioning (for ESX), or Dynamically
expanding disk (for Hyper-V) check box.
The default setting is thick format if a physical machine was backed up. When recovering from a
virtual machine backup, the software tries to reproduce the format of the original machine's disks. If
this is not possible, thick format is used.
Implementation of Xen machines is based on Microsoft Virtual PC and inherits its limitations: up to 3 IDE disks
and 1 processor. SCSI disks are not supported.
Memory
Initial setting: if not contained in the backup, it is the default setting of the virtualization server.
This is the amount of memory allocated to the new virtual machine. The memory adjustment range
depends on the host hardware, the host operating system and the virtualization product settings. For
example, virtual machines may be allowed to use no more than 30% of memory.
Name
Initial setting: if not contained in the backup, New virtual machine.
Processors
Initial setting: if not contained in the backup or if the backed-up setting is not supported by the
virtualization server, it is the default server's setting.
This is the number of processors of the new virtual machine. In most cases, it is set to one. The result
of assignment of more than one processor to the machine is not guaranteed. The number of virtual
processors may be limited by the host CPU configuration, the virtualization product and the guest
operating system. Multiple virtual processors are generally available on multi-processor hosts. A
multicore host CPU or hyperthreading may enable multiple virtual processors on a single-processor
host.
If your virtualization product does not support UEFI, you can create a BIOS-based machine, provided
that the original machine is running Windows. Acronis Backup adjusts the Windows boot mode to
the BIOS boot firmware and ensures that Windows remains bootable.
For Linux operating systems, changing the boot mode from UEFI to BIOS is not supported. Acronis
Backup can convert a UEFI-based machine running Linux only when the machine uses GRUB version 1
and the target machine is also UEFI-based. For more details, see "Support for UEFI-based machines"
(p. 50).
A vault can be organized on a local or networked drive, detachable media or a tape device.
There are no settings for limiting a vault size or number of backups in a vault. You can limit the size of
each archive using cleanup. However, the total size of archives stored in the vault is limited by the
storage size only.
You will not have to remember paths to the folders where the archives are stored. When creating a
backup plan or a task that requires selection of an archive or an archive destination place, the list of
vaults will be available for quick access without drilling down through the folders tree.
A vault is available for access from the Navigation pane. Having selected the vault, you can browse
the archives stored there and perform the following archive management operations:
Get a list of backups included in each archive
Recover data from a backup
Examine backup content
Validate all archives in the vault or individual archives or backups
Mount a volume backup to copy files from the backup to a physical disk
Safely delete archives and backups from the archives.
Creating vaults is highly recommended but is not obligatory. You may choose not to use the shortcuts
and always specify the location path.
Creating a vault results in adding the vault name to the Vaults section of the Navigation pane.
A vault is called personal if it was created using direct connection of the console to a managed
machine. Personal vaults are specific for each managed machine.
You can obtain the total number of archives and backups stored in the vault and full path to the
vault.
For managed vaults only, you can examine the name of the storage node that manages the vault,
encryption and deduplication (p. 228) states.
Data view
The Data view tab lets you browse and select the backed-up data by versions (backup date and time).
The Data view tab shares the same searching and cataloging functionality with the data catalog (p.
136).
Archive view
The Archive view tab displays the backed-up data by archives. Use the Archive view to perform
operations with archives and backups stored in the vault. For more information about these
operations, see the following sections:
Operations with archives stored in a vault (p. 249).
Operations with backups (p. 250).
Sorting, filtering and configuring table items (p. 29).
When browsing archives on the Archive view tab, you may encounter a backup with the icon.
This icon means that the backup is marked for deletion but cannot be deleted immediately for any of
the following reasons:
Other backups depend on it, but consolidation is either not possible or disabled by retention
rules.
The backup is stored on a tape.
You cannot perform any operation on backups marked for deletion. They disappear from the Archive
view after they are physically deleted. This happens when all of the dependent backups are also
deleted, or when the tape is overwritten, or at next cleanup after you enable consolidation in the
retention rules.
As soon as the management server administrator creates a centralized vault, the vault path and
name are distributed to all machines registered on the server. The shortcut to the vault appears on
the machines in the Vaults group. Any backup plan existing on the machines, including local plans,
can use the centralized vault.
The following table explains in details the difference between managed and unmanaged vaults.
Functionality Managed vaults Unmanaged vaults
Requires installation of Acronis Backup Storage Node Yes No
Data stored in the vault is included in the centralized data Yes No
catalog (p. 136)
Dedicated user accounts for accessing a vault (vault Yes No
administrators (p. 183) and vault users (p. 184))
Data deduplication (p. 228) Yes No
Vault encryption (p. 182) Yes No
Archive cleanup, replication and validation set in the backup ...the storage node ...the agent.
plan is performed by... (p. 216) (except
replication to Acronis
Cloud Storage,
performed by the
agent).
Supported types of storage:
Acronis Cloud Storage No Yes
Tape device Yes No
(no deduplication or
vault encryption)
Network share (SMB/CIFS) Yes Yes
NFS share Yes Yes
The following is a guideline for you to perform operations with centralized vaults.
To Do
Create a managed or an 1. Click Create.
unmanaged vault
2. In the Type field, select the vault type: Managed or Unmanaged
The procedure of creating centralized vaults is described in-depth in the following
sections:
Create a managed centralized vault (p. 180)
Create an unmanaged centralized vault (p. 184)
Edit a managed or an 1. Select the vault.
unmanaged vault
2. Click Edit.
Depending on the vault you select (managed or unmanaged), the respective Edit
page will be opened:
The Edit managed vault page lets you change the vault's name, user accounts
and information in the Comments field.
The Edit unmanaged vault page lets you edit the vault's name and information in
the Comments field.
Detach a managed vault 1. Select the vault.
2. Click Detach.
Detaching a vault removes association between the vault and the storage node and
deletes this vault from the GUI. Nevertheless, all archives stored in the vault will
remain untouched. The plans and tasks that use this vault will fail.
Later on, you'll be able to attach this detached vault to the same or to another
storage node.
Notes.
Tape-based vaults cannot be detached.
To detach a vault from an unavailable storage node, remove the storage node (p.
219) from the management server.
Attach the previously Click Attach.
detached managed vault
The procedure of attaching a managed vault to a storage node is described in-depth
2. Click Validate.
You will be taken to the Validation (p. 237) page with an already pre-selected vault
as a source. The vault validation checks all the archives in this vault.
Open an unmanaged 1. Select the unmanaged vault.
vault folder
2. Click Explore.
The vault will be available for examination with the standard file manager program.
Delete a vault 1. Select the vault.
2. Click Delete.
The vault will be deleted along with all the archives stored in there. The plans and
tasks that use this vault will fail.
Change user credentials Click Change user.
for accessing a vault
Changing user credentials is available for vaults that reside on shared storages only.
Refresh a vault's Click Refresh.
information
While you are reviewing the vault content, archives can be added to the vault,
deleted or modified. Click Refresh to update the vault information with the most
recent changes.
Vault path
To specify the path where the managed vault will be created
1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree.
Managed vaults can be organized:
On the hard drives local to the storage node.
On a network share (SMB/CIFS).
On a Network File System (NFS) share.
On a Storage Area Network (SAN).
On a Network Attached Storage (NAS).
On a tape library locally attached to the storage node.
To create a new folder for the vault in the selected location, click Create folder.
2. Click OK.
A vault can be created in an empty folder only.
We do not recommend creating a deduplicating managed vault on a FAT32 volume. The reason is that such
vault stores all deduplicated items in two potentially large files. Because the maximum file size in the FAT file
systems is limited to 4 GB, the storage node may stop working when this limit is reached.
Vault encryption
If you protect a vault with encryption, anything written to the vault will be encrypted and anything
read from it will be decrypted transparently by the storage node using a vault-specific encryption key
This encryption has nothing to do with the archive encryption specified by the backup plan and
performed by an agent. If the archive is already encrypted, the storage node-side encryption is
applied over the encryption performed by the agent.
To protect the vault with encryption
1. Select one of the following encryption algorithms from the drop-down list:
AES 128 – the vault contents will be encrypted using the Advanced Encryption Standard (AES)
algorithm with a 128-bit key
AES 192 – the vault contents will be encrypted using the AES algorithm with a 192-bit key
AES 256 – the vault contents will be encrypted using the AES algorithm with a 256-bit key.
2. In the Enter the word field, specify a word to be used for generating the encryption key.
Details. The word is case-sensitive. You will be asked for this word only when attaching the vault
to another storage node.
3. In the Confirm field, re-type the word you just entered.
4. Click OK.
The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a
randomly generated key with a user-defined size of 128, 192 or 256 bits. The larger the key size, the
longer it will take for the program to encrypt the archives stored in the vault and the more secure the
archives will be.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the selected word as a
key. The word itself is not stored anywhere on the disk; the word hash is used for verification
purposes. With this two-level security, the archives are protected from any unauthorized access, but
recovering a lost word is not possible.
Vault administrators
Vault administrators can back up to the vault, view and manage any archive stored in the vault. By
default, the Administrators group on the storage node is added to the vault administrators.
To add a group or user accounts
1. Enter names of groups or users in the separate fields in accordance with the following patterns:
DisplayName (example: FirstName LastName).
UserName (example: User1).
ObjectName@DomainName (example: User1@Domain1).
DomainName\ObjectName (example: Domain1\User1).
2. Once the names are entered, click Check names. If the entered name is found, click OK (the OK
button is disabled until the name is found).
If no objects were found, delete the name and enter another one. If several objects for the
entered name were found, select one of them and click OK, or click Cancel and specify another
name.
At first, the software tries to find the entered names in the list of local users and groups on the
machine where the storage node is installed. If not found, the software checks the domain users
and groups.
Vault users
Vault users can view and manage only their own archives in the vault. A vault user who is a member
of the Administrators group on a machine can additionally view and manage any archives created
from that machine in a managed vault. By default, the Everyone group on the storage node is added
to the vault users.
To add a group or user accounts
1. Enter names of groups or users in the separate fields in accordance with the following patterns:
DisplayName (example: FirstName LastName).
UserName (example: User1).
ObjectName@DomainName (example: User1@Domain1).
DomainName\ObjectName (example: Domain1\User1).
2. Once the names are entered, click Check names. If the entered name is found, click OK (the OK
button is disabled until the name is found).
If no objects were found, delete the name and enter another one. If several objects for the
entered name were found, select one of them and click OK, or click Cancel and specify another
name.
At first, the software tries to find the entered names in the list of local users and groups on the
machine where the storage node is installed. If not found, the software checks the domain users
and groups.
You will be prompted to specify the domain account credentials, when you enter a user or group
name that cannot be checked using your domain account; for example, if you are logged on using
a domain account other than the domain name you have entered to check.
2. Click OK.
If the old storage node is unavailable, remove it (p. 219) from the management server prior to
attaching its vaults to a new storage node.
Note: Personal, centralized unmanaged and tape-based vaults cannot be attached.
Before attaching
Catalog database
We recommend that you move the vault catalog database from the old storage node to the new one.
Otherwise, you will have to re-catalog the vault, which may take a long time to perform.
The vault catalog database is a set of files located in the folder whose name is the same as the GUID
of the vault. Do not change the folder name when moving it. To learn the GUID of a properly
detached vault, find the file named <vault GUID>_L.FDB in the vault folder.
For the information about the recommended location of the deduplication database, see
"Deduplication best practices" (p. 231).
The deduplication database consists of several files that are named <vault GUID>_u.*. To learn
the GUID of a properly detached vault, find the file named <vault GUID>_L.FDB in the vault folder.
Vault database
The vault database contains the metadata of all archives stored in the vault. Normally, when
detaching a vault from the storage node, the vault database is moved from its default location to the
vault being detached. While attaching the vault, the software searches for the database in the vault.
If the vault database is found, it is moved to the default location on the storage node the vault is
being attached to. If the database is not found in the vault, you will be asked to manually specify the
path to this database.
A personal vault can be organized on a network share, FTP server, detachable or removable media,
Acronis Cloud Storage, tape device, or on a hard drive local to the machine. Acronis Secure Zone is
considered as a personal vault available to all users that can log on the system. Personal vaults are
created automatically when backing up any of the above locations.
Personal vaults can be used by local backup plans or local tasks. Centralized backup plans cannot use
personal vaults except for Acronis Secure Zone.
Metadata
The .meta folder is created during backup in every personal vault. This folder contains additional
information about archives and backups stored in the vault, such as archive owners or the machine
name. If you accidentally delete the .meta folder, it will be automatically recreated next time you
access the vault. But some information, like owner names and machine names, may be lost.
The following is a guideline for you to perform operations with personal vaults.
To Do
Create a personal vault Click Create.
The procedure of creating personal vaults is described in-depth in the Creating a
personal vault (p. 188) section.
Edit a vault 1. Select the vault.
2. Click Edit.
The Edit personal vault page lets you edit the vault's name and information in the
Comments field.
Change user account Click Change user.
If the specified folder does not exist, Acronis Backup will automatically create it when creating or
copying catalog files next time. If you are storing backups on a tape device, create the folder in
advance so as not to catalog the data over again.
To specify a new cache folder in Windows:
1. Add the Catalog key to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\AMS\Configuration (on a management server) or
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\MMS\Configuration (on a managed machine).
2. Add the CatalogDir string value.
3. Specify a new folder path in the CatalogDir string value. The path must end with a backslash (\)
and can be 32765 characters long.
If your backups are stored on a tape device, move the catalog files to the new location so as not to
catalog the data over again. Otherwise, you may let Acronis Backup create or copy the catalog files
anew.
You may also want to delete the old folder. The default cache folder path is as follows:
In Windows XP and Server 2003: %ALLUSERSPROFILE%\Application
Data\Acronis\AMS\AMS\Catalog (on a management server)
or %ALLUSERSPROFILE%\Application Data\Acronis\BackupAndRecovery\MMS\Catalog (on a
managed machine).
In Windows Vista and later versions of
Windows: %PROGRAMDATA%\Acronis\AMS\AMS\Catalog (on a management server)
or %PROGRAMDATA%\Acronis\BackupAndRecovery\MMS\Catalog (on a managed machine).
In Linux: /var/lib/Acronis/BackupAndRecovery/MMS/Catalog/
Should the disk experience a physical failure, the zone and the archives located there will be lost.
That's why Acronis Secure Zone should not be the only location where a backup is stored. In
enterprise environments, Acronis Secure Zone can be thought of as an intermediate location used for
backup when an ordinary location is temporarily unavailable or connected through a slow or busy
channel.
Advantages
Acronis Secure Zone:
Enables recovery of a disk to the same disk where the disk's backup resides.
If you have to take space from the boot or the system volume, please bear the following in mind:
Moving or resizing of the volume from which the system is currently booted will require a reboot.
Taking all free space from a system volume may cause the operating system to work unstably
and even fail to start. Do not set the maximum zone size if the boot or the system volume is
selected.
All the archive management operations available in vaults are also applicable to Acronis Secure Zone.
To learn more about archive management operations, see Operations with archives and backups (p.
249).
4. Click OK.
By a removable device, we mean an RDX drive or USB flash drive. A USB hard disk drive is not
considered to be a removable device unless it is recognized as such by the operating system.
In Linux, an RDX drive or USB flash drive is considered to be a removable device if it is specified by its
name (for example, sdf:/). If a device is specified by its mount point (for example, /mnt/backup), it
behaves as a fixed drive.
The method of working with removable disk libraries (multi-cartridge devices) depends on the device
type, brand, and configuration. Therefore, each case should be considered individually.
Limitations
Centralized vaults cannot be created on removable devices.
Vaults created on removable devices do not have the Data view (p. 136) tab.
Usage modes of removable devices
When creating a backup plan, you can choose whether to use your removable device as a fixed drive
or as removable media. The Fixed drive mode presumes that the removable device will always be
attached to the machine. The Removable media mode is selected by default.
When you back up using the Back up now feature or under bootable media, the removable device is
always used in the Removable media mode.
When you back up using Agent for Exchange or Agent for Hyper-V, the removable device is always
used in the Fixed drive mode.
The difference between the two modes is mostly related to retention and replication of backups.
Functionality Fixed drive Removable media
If there is insufficient space to continue backing up, the ...manually free up disk ...insert new media.
software will prompt you to... space.
You can set retention rules (p. 99) for backups stored on Yes No
the device.
Since the removable device mode determines the naming scheme for backup files, the Name backup
files using the archive name... check box does not appear when the backup destination is a
removable device.
You can work with tape devices only if you have Acronis Backup Advanced.
An autoloader is a particular case of tape libraries. It contains one drive, several slots, a changer and
a barcode reader (optional).
A stand-alone tape drive (also called streamer) contains one slot and can hold only one tape at a
time.
When detecting a tape device (p. 204), Acronis Backup disables the device from RSM (unless it is
being used by other software). As long as you want Acronis Backup to work with the tape device,
make sure that neither a user nor third-party software enables the device in RSM. If the tape device
was enabled in RSM, repeat the tape device detection.
In Windows, Acronis Backup can back up to a tape device even if the drivers for the device's changer
are not installed. Such a tape device is shown in Device Manager as Unknown Medium Changer.
However, drivers for the device's drives must be installed. In Linux and under bootable media,
backing up to a tape device without drivers is not possible.
Recognition of IDE or SATA connected devices is not guaranteed. It depends on whether proper
drivers have been installed in the operating system.
When you use the Simple backup scheme (p. 65), only full backups can be created on tapes. This is
because backups located on tapes cannot be consolidated (p. 438). If you had the option of creating
incremental backups, you would not be able to delete any of the backups.
By default, the Grandfather-Father-Son (p. 66) and Tower of Hanoi (p. 72) backup schemes create
only full backups on tapes. This helps the software to delete each backup on time as defined by the
backup scheme.
You may want to change the default setting to creating full, incremental and differential backups. For
example, if you have a few tapes but your full backups are quite large, you may want to save space
on tapes.
Each level of the above schemes uses a separate tape set within the same tape pool. This means that
the software can only take a tape belonging to a certain tape set or a free tape (when space is
running out on the currently used tape). This helps minimize the quantity of used tapes, because
tapes with incremental and differential backups are filled and rewritten more often than tapes with
full backups.
Set up the custom scheme so that it creates full backups with a reasonable frequency. Otherwise, if
you specify retention rules, the software will not be able to overwrite tapes as appropriate.
In the retention rules of the Custom backup scheme (p. 69), the If a backup to be moved or deleted
has dependencies: Consolidate these backups option is disabled. Only the Retain the backup until
all dependent backups become subject to deletion option is available. This is because backups
located on tapes cannot be consolidated (p. 438).
The operation of detecting the new tape devices (p. 204) can be performed simultaneously with any
other operation. During inventorying (p. 209), no other operation is available except for detecting the
new tape devices.
7.4.2.6 Limitations
The limitations of tape device usage are the following:
1. The consolidation (p. 438) of backups located on tapes is not possible. As a result, usage of
backup schemes has certain peculiarities (p. 197).
2. The deduplication (p. 439) of backups located on tapes is not possible.
3. Simplified naming of backup files (p. 77) is not possible for backups stored on tapes.
4. You cannot recover under an operating system from a backup stored on tapes if the recovery
requires the operating system reboot. Use bootable media to perform such recovery.
5. Files cannot be recovered from disk-level backups created by Acronis Backup & Recovery 11
Update 0 (build 17318) and earlier.
Files can be recovered from a disk-level backup created by Acronis Backup & Recovery 11
Update 0.5 (build 17437) only after you rescan (p. 208) the tapes where the backup is located.
The Enable file recovery from disk backups stored on tapes (p. 126) option value determines
whether files and folders can be recovered from disk-level backups created by Acronis Backup.
6. You can validate (p. 237) any backup or archive stored on tapes, but you cannot select for
validation an entire tape-based vault or tape device.
7. You cannot attach (p. 185) or detach a tape-based vault.
8. A managed tape-based vault cannot be protected with encryption. Encrypt your archives instead.
9. You cannot create a managed tape-based vault (p. 180) with the backward compatibility
property. This means that Acronis Backup & Recovery 10 agents cannot back up to Acronis
Backup managed tape-based vaults.
10. The software cannot simultaneously write one backup to multiple tapes or multiple backups
through the same drive to the same tape.
11. Devices that use the Network Data Management Protocol (NDMP) are not supported.
b. If the loaded tapes were sent to the Unrecognized tapes or Imported tapes pool and you
want to use them for backing up, move (p. 206) such tapes to the Free tapes pool manually.
Tapes sent to the Imported tapes pool contain backups written by Acronis software. Before moving
such tapes to the Free tapes pool, make sure you do not need these backups.
Backing up
On the Actions menu, click Back up now or Create backup plan. Configure (p. 55) the backup settings.
When specifying the backup destination, select the tape device.
Results
The resulting backups will be located in an automatically created personal vault (p. 211). To
access the vault, click Vaults in the Navigation tree. Each time you select the tape device as the
backup destination, the backups will be saved to the same vault.
Tapes with the backups will be moved to the Acronis pool.
b. If the loaded tapes were sent to the Unrecognized tapes or Imported tapes pool and you
want to use them for backing up, move (p. 206) such tapes to the Free tapes pool manually.
c.Decide whether you want to back up to the default Acronis pool (p. 204) or to create a new
pool (p. 205).
Details. Having several pools enables you to use a separate tape set for each machine or
each department of your company. By using multiple pools, you can prevent backups created
via different backup plans from mixing up on one tape.
d. If you chose the Acronis pool, or enabled the new pool to take tapes from the Free tapes
pool when required, skip this step.
Otherwise, move tapes from the Free tapes pool to the new pool.
Tip. To learn whether a pool can take tapes from the Free tapes pool, click the pool and then
click Details.
6. In the Navigation tree, click Storage nodes. Select the storage node to which your tape device is
attached, and then click Create vault. Proceed as described in the "Creating a managed
centralized vault" (p. 180) section. In the Tape pool list, select the pool you decided to use on
step 5c.
Creating a centralized vault is mandatory when the tape device is attached to the storage node.
Backing up
On the Actions menu, click Back up now or Create backup plan. Configure (p. 354) the backup
settings for one or more machines. When specifying the backup destination, select the created vault.
Results
The resulting backups will be located in the vault you created.
Tips for further usage of the tape library
You do not need to perform full inventorying each time you load a new tape. To save time, follow
the procedure described in the "Inventorying" (p. 209) section under "Combination of fast and
full inventorying".
You can create other vaults (p. 211) on the same tape library and select any of them as a
destination for backups.
Predefined pools
Unrecognized tapes
The pool contains tapes that were written by third-party applications. To write to such tapes, you
need to move (p. 206) them to the Free tapes pool explicitly. You cannot move tapes from this pool
to any other pool, except for the Free tapes pool.
Imported tapes
The pool contains tapes that were written by Acronis Backup in a tape device attached to another
storage node or agent. To write to such tapes, you need to move them to the Free tapes pool
explicitly. You cannot move tapes from this pool to any other pool, except for the Free tapes pool.
Free tapes
The pool contains free (empty) tapes. You can manually move tapes to this pool from other pools.
When you move a tape to the Free tapes pool, the software marks it as empty. If the tape contains
backups, they are marked with the icon. When the software starts overwriting the tape, the data
related to the backups will be removed from the database.
Acronis
The pool is used for backing up by default, when you do not want to create your own pools. Usually it
applies to one tape drive with a small number of tapes.
Custom pools
You need to create several pools if you want to separate backups of different data. For example, you
may want to create custom pools in order to separate:
Creating a pool
To create a pool:
1. In the Navigation tree, click Tape management. If connected to the management server, select
the storage node to which your tape device is attached.
2. Click Create pool.
3. Specify the pool name.
4. [Optional] Select tapes to be moved to the pool from the Free tapes pool.
5. [Optional] Clear the Take tapes from the Free tapes pool automatically... check box. If cleared,
only tapes that are included into the new pool at a certain moment will be used for backing up.
6. [Optional] Select the After ... rewritings, move tape to pool check box, specify the number of
information writing cycles, and then select the pool to which a tape will be moved after that.
Tip. Tapes have relatively short durability. So, you can create a special pool and move old tapes
to it. Then, you regularly eject tapes stored in this pool, get rid of them and load new tapes into
your tape device.
7. [Optional] Select the After ... backups, move tape to pool check box, specify the number of
backups, and then select the pool to which a tape will be moved after that.
Tip. For example, this option can be useful in the following case. You back up your machine once
a day from Monday until Friday and move the tape(s) after five backups to a custom pool. Once a
week special employees eject the tapes from this pool and take them to a secure off-site
location.
8. [Optional] Select the When tape is full, move to pool check box, and then select the pool to
which a tape will be moved when it is full.
Tip. For example, this option can be useful for separating filled tapes from tapes being written to
(p. 205).
9. Click OK.
Editing a pool
You can edit parameters of the Acronis pool or your own custom pool.
Deleting a pool
You can delete only custom pools. Predefined tape pools (Unrecognized tapes, Imported tapes, Free
tapes, and the Acronis pool) cannot be deleted.
To delete a pool:
1. In the Navigation tree, click Tape management. If connected to the management server, select
the storage node to which your tape device is attached.
2. Select the required pool and click Remove.
3. If the pool is associated with one or several vaults, the system will notify you that it cannot
delete the pool. You need to click Close, change the pool in the settings of each of the vaults
mentioned in the notification message, and then repeat the pool deletion operation.
Otherwise, select the pool to which the tapes of the pool being deleted will be moved after the
deletion.
4. Click OK to delete the pool.
Renaming
When a new tape is detected by the software, it is automatically assigned a name in the following
format: Tape XXX, where XXX is a unique number. Tapes are numbered sequentially. The renaming
operation allows you to manually change the name of one or several tapes.
To rename tapes:
1. In the Navigation tree, click Tape management. If connected to the management server, select
the storage node to which your tape device is attached.
2. Click the pool that contains the necessary tape(s), and then select the required tape(s).
3. Click Rename.
4. Type new name(s) of the selected tape(s).
5. Click OK to save the changes.
Changing pool
The operation allows you to move one or several tapes from one pool to another.
When you move a tape to the Free tapes pool, the software marks it as empty. If the tape contains
backups, they are marked with the icon. When the software starts overwriting the tape, the data
related to the backups will be removed from the database.
Ejecting
For successful ejecting of a tape from a tape library, the tape library must have the mail slot and the
slot must not be locked by a user or by other software.
To eject a tape:
1. In the Navigation tree, click Tape management. If connected to the management server, select
the storage node to which your tape device is attached.
2. Click the pool that contains the necessary tape, and then select the required tape.
3. Click Eject. The software will prompt you to provide the tape description. We recommend that
you describe the physical location where the tape will be kept. During recovery, the software will
display this description so you could easily find the tape.
Details. You can disable the tape description prompt by clicking Do not show this message again.
To re-enable the prompt: click Options on the menu, then click Console options, click Pop-up
messages, and then select the Request description when ejecting a tape check box.
4. Click OK to start the operation.
Erasing
Erasing a tape physically deletes all backups stored on the tape and removes the information about
these backups from the database. However the information about the tape itself remains in the
database.
After erasing, a tape located in the Unrecognized tapes or Imported tapes pool is moved to the Free
tapes pool. A tape located in any other pool is not moved.
Rescanning
The information about the contents of tapes is stored in a dedicated database. The rescanning
operation reads the contents of tapes and updates the database if the information in it mismatches
the data stored on tapes. The archives detected as a result of the operation are placed in the
specified vault.
Within one operation, you can rescan tapes of one pool. Only online tapes can be selected for the
operation.
4. Click Rescan.
5. Select the vault where the newly detected archives will be placed.
6. Select the Unrecognized tapes pool. This is the pool to which most of the tapes are sent as a
result of the fast inventorying. Rescanning the pool associated with the selected vault or the
Imported tapes pool is also possible.
7. Select the tapes to be rescanned. To select all the tapes of the pool, select the check box next to
the Tape name column header.
8. If necessary, select the Enable file recovery from disk backups stored on tapes check box.
Details. If the check box is selected, the software will create special supplementary files on a
hard disk of the machine where the tape device is attached. File recovery from disk backups is
possible as long as these supplementary files are intact. Be sure to select the check box if the
tapes contain single-pass backups (p. 445). Otherwise, you will not be able to recover the
application data from these backups.
9. If the tapes contain a password-protected archive, select the corresponding check box, and then
specify the password for the archive in the Password box. If you do not specify a password, or
the password is incorrect, the archive will not be detected. Please keep this in mind in case you
see no archives after the rescanning.
Tip. If the tapes contain several archives protected by various passwords, you need to repeat the
rescanning several times specifying each password in turn.
10. Click Start to start the rescanning.
Result. The selected tapes are moved to the pool associated with the selected vault. The backups
stored on the tapes can be found in this vault. A backup spread over several tapes will not appear in
the vault until all of these tapes are rescanned.
Inventorying
The inventorying operation detects tapes loaded into a tape device and assigns names to those that
have none. Perform the operation every time you load tapes into the tape device slots.
Inventorying methods
Acronis Backup provides the following two methods of inventorying.
Fast inventorying
Acronis Backup scans tapes for barcodes. Using barcodes, the software can quickly return a tape to
the pool where it was before.
Select this method to recognize tapes used by the same tape device attached to the same machine.
Other tapes will be sent to the Unrecognized tapes pool.
If your tape library contains no barcode reader, all tapes will be sent to the Unrecognized tapes pool.
To recognize your tapes, perform full inventorying or combine fast and full inventorying as described
later in this section.
Full inventorying
The following table shows pools to which tapes are sent as a result of the full inventorying.
Tape was used by... Tape is read by... Tape is sent to pool...
the same Agent where the tape was before
Agent another Agent Imported tapes
Storage Node Imported tapes
the same Storage Node where the tape was before
Storage Node another Storage Node Imported tapes
Agent Imported tapes
third-party backup application Agent or Storage Node Unrecognized tapes
The fast inventorying can be applied to entire tape devices. The full inventorying can be applied to
entire tape devices, individual drives, or slots.
Full inventorying of an entire tape device may take a long time. If you need to inventory only a few
tapes, proceed as follows:
1. Perform the fast inventorying of the tape device.
2. Click the Unrecognized tapes pool. Find the tapes you want to inventory and note which slots
they occupy.
3. Perform the full inventorying of these slots.
What to do after inventorying
If you want to back up to tapes that were placed in the Unrecognized tapes or Imported tapes pool,
move (p. 206) them to the Free tapes pool, and then to the Acronis pool or a custom pool. If the pool
to which you want to back up is replenishable (p. 445), you may leave the tapes in the Free tapes
pool.
If you want to recover from a tape that was placed in the Unrecognized tapes or Imported tapes
pool, you need to rescan (p. 208) it. The tape will be moved to the pool associated with the vault you
have selected during the rescanning, and the backups stored on the tape will appear in the vault.
Sequence of actions
1. In the Navigation tree, click Tape management. If connected to the management server, select
the storage node to which your tape device is attached.
2. Click Inventory.
3. Select the inventorying method: Fast or Full.
Removing
The removal operation deletes the information about the backups stored on the selected tape and
about the tape itself from the database.
3. Perform the rescanning (p. 208) to match the data stored on tapes with the database.
If you create more than one personal vault, tapes with backups will be placed in the respective pools
specified in the vaults' settings. However, each vault will show all the backups located in all of the
vaults.
To create a personal vault:
1. In the Navigation tree, click Vaults.
2. Click Create.
3. Proceed as described in the "Creating a personal vault" (p. 188) section.
Managed centralized tape-based vaults
To back up a machine to a tape device attached to a storage node, you need to create a managed
centralized vault on the tape device.
To create a managed centralized vault:
1. In the Navigation tree, click Storage nodes.
2. Select the required storage node, and then click Create vault.
3. Proceed as described in the "Creating a managed centralized vault" (p. 180) section.
Tip. If you back up multiple machines to a tape library with multiple drives, associate the vault with
the whole library. This will allow you to back up the machines simultaneously via different drives. If
you associate a vault or several vaults with one drive, backups will be queued.
Sequence of actions
1. Load your tapes into the autoloader slots.
The most important function of a storage node is deduplication of backups stored in its vaults. This
means that identical data will be backed up to this vault only once. This minimizes the network usage
during backup and storage space taken by the archives.
This functionality cannot be disabled in a managed vault. The next two operations are optional.
Encryption
A managed vault can be configured so that anything written to it is encrypted and anything read
from it is decrypted transparently by the storage node. This is done by using a vault-specific
encryption key stored on the node server. In case the storage medium is stolen or accessed by an
unauthorized person, the malefactor will not be able to decrypt the vault contents without access to
this specific storage node.
If the archive is already encrypted by the agent, the storage node applies its own encryption over the
encryption performed by the agent.
If both the users' machines and the machine with the storage node are in one Active Directory
domain, you probably do not need to perform any further steps: all users are typically members of
the Domain Users group and so can access the storage node.
Otherwise, you need to create user accounts on the machine where the storage node is installed. We
recommend creating a separate user account for each user who will access the storage node, so that
the users are able to access only the archives they own.
Example
Suppose that two users on a machine, UserA and UserB, perform backups from this machine to a
centralized vault managed by a storage node. On the storage node, let these users to be added as
regular (non-administrative accounts) UserA_SN and UserB_SN, respectively. While creating a
managed vault, both accounts were added as vault users.
Normally, UserA can access only the archives created by UserA (and owned by UserA_SN), and UserB
can access only the archives created by UserB (and owned by UserB_SN).
However, if UserA is a member of the Administrators group on the machine, this user can
additionally access the archives created from this machine by UserB—even though UserA's account
on the storage node is a regular one.
Indexing
This tab lets you examine the current status of indexing for the deduplicating vaults of the storage
node and review the date and time of the last run.
Every time the compacting task starts, the storage node determines whether to perform compacting.
To do this, the storage node:
1. Checks the size of the backed-up data that has been deleted from the vault since the last
compacting.
2. Uses the Compacting Trigger Rough Estimation Threshold parameter to determine whether this
size, relative to the size of the remaining backed up data, is significant.
3. If so, uses the Compacting Trigger Threshold parameter to determine whether the deduplication
data store contains a significant number of unused items. If so, the storage node performs
compacting.
The parameters are the following.
Specifies the amount of free space in a vault (both as an absolute value and as a percentage) below
which a warning or error is recorded in the log.
The parameter is a string value that should be manually added to the corresponding Catalog key in
the registry. If this parameter is missing in the registry, cataloging is enabled on the storage node.
Enabled
Possible values: 0 (disables cataloging) or 1 (enables cataloging)
Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\Catalog\Enabled
If cataloging is disabled, the storage node will not catalog backups in the managed vaults.
Therefore, the Data view and Data catalog will not display this data.
The preferred indexing algorithm
By default, a storage node is configured to use the newest indexing algorithm whenever possible.
You can change this behavior by using the PreferedDedupIndex parameter.
Possible values: 0 (use the most recent algorithm), 1 (use the pre-Update 6 algorithm), or 2 (use the
Update 6 algorithm)
Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\PreferedDedupInd
ex
Default value: 0
The parameter applies to the deduplication databases that are created after the parameter has been
changed. For existing databases, the corresponding algorithm is selected automatically.
This rule ensures a balance between the storage node performance and the operating system
memory requirements, for systems with RAM ranging from 8 to 64 and more gigabytes. If the server
has plenty of RAM, the storage node takes most of the memory for better performance. If the server
lacks RAM (less than 10 GB with the default parameter values), the storage node reserves the fixed
amount of memory for the operating system.
DatastoreIndexCacheMemoryPercent
Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatastoreIndexCac
heMemoryPercent
DatastoreIndexReservedMemory
Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatastoreIndexRes
ervedMemory
7.5.7 Deduplication
This section describes deduplication, a mechanism designed to eliminate data repetition by storing
identical data in archives only once.
7.5.7.1 Overview
Deduplication is the process of minimizing storage space taken by the data by detecting data
repetition and storing the identical data only once.
Deduplication may also reduce network load: if, during a backup, a data is found to be a duplicate of
an already stored one, its content is not transferred over the network.
Acronis Backup will deduplicate backups saved to a managed vault if you enable deduplication during
the vault creation. A vault where deduplication is enabled is called a deduplicating vault.
Deduplication at source
Performed on a managed machine during backup. The agent uses the storage node to determine
what data can be deduplicated and does not transfer the data blocks whose duplicates are
already present in the vault.
Deduplication at target
Performed in the vault after a backup is completed. The storage node analyses the vault's
contents and deduplicates data in the vault.
When creating a backup plan, you have the option to turn off deduplication at source for that plan.
This may lead to faster backups but a greater load on the network and storage node.
Deduplication database
Acronis Backup Storage Node managing a deduplicating vault, maintains the deduplication database,
which contains the hash values of all data blocks stored in the vault—except for those that cannot be
deduplicated, such as encrypted files.
The deduplication database is stored in the storage node local folder. You can specify the database
path when creating the vault.
The size of the deduplication database is about 1.5 percent of the total size of unique data stored in
the vault. In other words, each terabyte of new (non-duplicate) data adds about 15 GB to the
database.
If the database is corrupted or the storage node is lost, while the vault retains its contents, the new
storage node rescans the vault and re-creates the vault database and then the deduplication
database.
Before sending the data block to the vault, the agent queries the deduplication database to
determine whether the block's hash value is the same as that of an already stored block. If so, the
agent sends only the hash value; otherwise, it sends the block itself. The storage node saves the
received data blocks in a temporary file.
Some data, such as encrypted files or disk blocks of a non-standard size, cannot be deduplicated. The
agent always transfers such data to the vault without calculating the hash values. For more
information about restrictions of deduplication, see Deduplication restrictions (p. 233).
Once the backup process is completed, the vault contains the resulting backup and the temporary
file with the unique data blocks. The temporary file will be processed on the next stage. The backup
(TIB file) contains hash values and the data that cannot be deduplicated. Further processing of this
backup is not needed. You can readily recover data from it.
The indexing activity may take considerable time to complete. You can view this activity's state on
the management server, by selecting the corresponding storage node and clicking View details (p.
221). You can also manually start or stop this activity in that window.
If you back up a large amount of unique data, the indexing activity may fail due to insufficient RAM on the
storage node. The backups will continue to run. You can add more RAM to the storage node, or delete
unnecessary backups and run compacting. After the next backup, the indexing will run again.
By default, the compacting task runs every Sunday night at 03:00. You can re-schedule the task by
selecting the corresponding storage node, clicking View details (p. 221), and then clicking
Compacting schedule. You can also manually start or stop the task on that tab.
Because deletion of unused blocks is resource-consuming, the compacting task performs it only
when a sufficient amount of data to delete has accumulated. The threshold is determined by the
Compacting Trigger Threshold (p. 222) configuration parameter.
It is best to allocate dedicated devices for the vault and the database. If this is not possible, at least
do not place a vault or database on the same disk with the operating system. The reason is that the
operating system performs a large number of hard disk read/write operations, which significantly
slows down the deduplication.
For the purpose of data loss prevention, we recommend using RAID 10, 5 or 6. RAID 0 is not
recommended since it not fault tolerant. RAID 1 is not recommended because of relatively low speed.
There is no preference to local disks or SAN, both are good.
In general, the more RAM you have, the greater the deduplication database size can be, provided
that the deduplication speed is the same.
High-speed LAN
1-Gbit LAN is recommended. It will allow the software to perform 5-6 backups with deduplication in
parallel, and the speed will not reduce considerably.
Back up a typical machine before backing up several machines with similar contents
When backing up several machines with similar contents, it is recommended that you back up one
machine first and wait until the end of the backed-up data indexing. After that, the other machines
will be backed up faster owing to the efficient deduplication. Because the first machine's backup has
been indexed, most of the data is already in the deduplication data store.
If you want to protect an archive while still allowing it to be deduplicated, leave the archive
non-password-protected and encrypt the deduplicating vault itself with a password. You can do this
when creating the vault.
File-level backup
Deduplication of a file is not performed if the file is encrypted and the In archives, store encrypted
files in decrypted state check box in the backup options is cleared (it is cleared by default).
In the NTFS file system, a file may have one or more additional sets of data associated with it—often
called alternate data streams.
When such file is backed up, so are all its alternate data streams. However, these streams are never
deduplicated—even when the file itself is.
New configuration parameters (p. 227) enable you to choose between the old and new indexing
algorithms and control the storage node memory allocation.
Exporting data to a newly created vault is not recommended because it requires additional time to
“assemble” the deduplicated data and additional space to temporarily store this data. Redirecting
backups from an old vault to a new vault results in a full backup of the data and a worse
deduplication ratio because the data is not deduplicated between the two vaults.
If a local path is displayed, this path is on the machine with the storage node.
The datastore file has either the *.ds.0 or the *.ds.1 extension. Two files with these extensions are in
the vault while compacting is in progress. If you find two files, use the sum of both file sizes to
estimate the upgrade time.
The deduplication database files have the *.db3, *.db3-wal, and *.db3-shm extensions.
After verifying the files are present, you can delete the old deduplication database files.
If something goes wrong, you can detach and attach the vault again, pointing to the old
deduplication databases.
If the database files were successfully created, but you prefer the old indexing algorithm, you can
force the storage node to use that algorithm by using the PreferedDedupIndex configuration
parameter (p. 227).
Validation of a file backup imitates recovery of all files from the backup to a dummy destination.
Validation of a disk or volume backup calculates a checksum for every data block saved in the backup.
Both procedures are resource-intensive.
Validation of an archive will validate all the archive's backups. A vault (or a location) validation will
validate all the archives stored in this vault (location).
While successful validation means high probability of successful recovery, it does not check all factors
that influence the recovery process. If you back up the operating system, only a test recovery in a
bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure
that the backup can be successfully validated using the bootable media.
Limitation
You cannot validate archives and backups in Acronis Cloud Storage (p. 412). However, an initial
seeding backup (p. 416) is automatically validated immediately after its creation.
Validation of an archive or of the latest backup in the archive can be scheduled as part of the backup
plan. For more information, see Creating a backup plan (p. 55).
To access the Validation page, first select a validation object: a vault, an archive, or a backup.
To select a vault, click the Vaults icon in the Navigation pane and select the vault by expanding
the vaults tree in the Vaults view or directly in the Navigation pane.
To select an archive, select a vault, and then in the Vault view select the Archive view tab and
click the archive name.
To select a backup, select an archive in the Archive view, expand the archive by clicking the
expand button to the left of the archive name, and then click the backup.
After selecting the validation object, select Validate from the context menu. The Validation page will
be opened with the pre-selected object as a source. All you need to do is to select when to validate
and (optionally) provide a name for the task.
To create a validation task, perform the following steps.
What to validate
Validate
Choose an object to validate:
Archive (p. 243) - in this case, you need to specify the archive.
Backup (p. 238) - specify the archive first. Then, select the desired backup in this archive.
Vault (p. 238) - select a vault (or other location), to validate archives from.
To select a locally attached tape device, expand the Tape drives group, then click the
required device.
Note Tape devices can only be used with Acronis Backup Advanced.
To assist you with choosing the right vault, the table displays the names of the archives
contained in each vault you select. While you are reviewing the location content, archives can be
added, deleted or modified by another user or by the program itself according to scheduled
operations. Use the Refresh button to refresh the list of archives.
2. Click OK.
To learn more about operations available depending on the user privileges, see the User privileges on
a managed machine (p. 36) section.
Export enables you to separate a specific backup from a chain of incremental backups for fast
recovery, writing onto removable or detachable media or other purposes.
Example. When backing up data to a remote location through an unstable or low-bandwidth network
connection (such as backing up through WAN using VPN access), you may want to save the initial full
backup to a detachable media. Then, send the media to the remote location. There, the backup will
be exported from the media to the target storage. Subsequent incremental backups, which are
usually much smaller, can be transferred over the network.
By exporting a managed vault to a detachable media, you obtain a portable unmanaged vault that
can be used in the following scenarios:
Keeping an off-site copy of your vault or of the most important archives.
Physical transportation of a vault to a distant branch office.
Recovery without access to the storage node in case of networking problems or failure of the
storage node.
Recovery of the storage node itself.
The resulting archive's name
By default, the exported archive inherits the name of the original archive. Because having multiple
archives of the same names in the same location is not advisable, the following actions are disabled
with the default archive name:
Exporting part of an archive to the same location.
Exporting an archive or part of an archive to a location where an archive of the same name
exists.
Exporting an archive or part of an archive to the same location twice.
In any of the above cases, provide an archive name that is unique to the destination folder or vault. If
you need to redo the export using the same archive name, first delete the archive that resulted from
the previous export operation.
When the console is connected to a managed machine, you can export an archive or part of an
archive to and from any location accessible to the agent residing on the machine. These include
personal vaults, locally attached tape devices, removable media and, in Acronis Backup Advanced,
managed and unmanaged centralized vaults.
When the console is connected to a management server, two export methods are available:
Export from a managed vault. The export is performed by the storage node that manages the
vault. The destination can be a network share or a local folder of the storage node.
Export from an unmanaged centralized vault. The export is performed by the agent installed on
the managed machine you specify. The destination can be any location accessible to the agent,
including a managed vault.
Operations with an export task
An export task starts immediately after you complete its configuration. An export task can be
stopped or deleted in the same way as any other task.
Once the export task is completed, you can run it again at any time. Before doing so, delete the
archive that resulted from the previous task run if the archive still exists in the destination vault.
Otherwise the task will fail. You cannot edit an export task to specify another name for the
destination archive (this is a limitation).
Tip. You can implement the staging scenario manually, by regularly running the archive deletion task followed
by the export task.
Using the Export page is the most general way to create an export task. Here, you can export any
backup, or archive you have permission to access.
You can access the Export page from the Vaults view. Right-click the object to export (archive or
backup) and select Export from the context menu.
To access the Export page first select a validation object: an archive or a backup.
1. Select a vault. For this click the Vaults icon in the Navigation pane and select the vault expanding
the vaults tree in the Vaults view or directly in the Navigation pane.
2. To select an archive, select a vault, and then in the Vault view select the Archive view tab and
click the archive name.
3. To select a backup, select an archive in the Archive view, expand the archive by clicking the
expand button to the left of archive name, and then click the backup.
After selecting the validation object, select Export from the context menu. The Export page will be
opened with the pre-selected object as a source. All you need to do is to select a destination and
(optionally) provide a name for the task.
To export an archive or a backup perform the following steps.
What to export
Export
As a result, the program shows the Execution state of the task in the Backup plans and tasks view.
When the task ends the Task Information window shows the final state of the task execution.
To export data to an FTP or SFTP server, type the server name or address in the Path field as
follows:
ftp://ftp_server:port _number or sftp://sftp_server:port number
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
To export data to a locally attached tape device, expand the Tape drives group, then click the
required device.
Note Tape devices can only be used with Acronis Backup Advanced.
If the console is connected to the management server and a managed vault is selected as a source
location, the folder tree contains:
Local folders group to export data onto the hard drives that are local to the storage node.
Network folders group to export data to a network share. If the network share requires access
credentials, the program will ask for them.
2. Using the archives table
To assist you with choosing the right destination, the table on the right displays the names of the
archives contained in each location you select in the tree.
While you are reviewing the location content, archives can be added, deleted or modified by another
user or by the program itself according to scheduled operations. Use the Refresh button to refresh
the list of archives.
Mounting volumes in the read/write mode enables you to modify the backup content, that is, save,
move, create, delete files or folders, and run executables consisting of one file. In this mode, the
software creates an incremental backup containing the changes you make to the backup content.
Please be aware that none of the subsequent backups will contain these changes.
You can mount volumes if the disk backup is stored in a local folder (except optical disks), Acronis
Secure Zone, or on a network share.
Usage scenarios
Sharing: mounted images can be easily shared to networked users.
"Band aid" database recovery solution: mount up an image that contains an SQL database from
a recently failed machine. This will provide access to the database until the failed machine is
recovered.
Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable
media and creates an image. Then, the administrator mounts this image in read/write mode,
scans and cleans it with an antivirus program, and finally recovers the machine.
Error check: if recovery failed due to a disk error, mount the image in the read/write mode. Then,
check the mounted disk for errors with the chkdsk /r command.
To mount an image, perform the following steps.
Source
Archive (p. 247)
Specify the path to the archive location and select the archive containing disk backups.
Backup (p. 247)
Select the backup.
Access credentials (p. 247)
[Optional] Provide credentials for the archive location.
Mount settings
Volumes (p. 248)
If the archive is stored on an NFS share, expand the NFS folders group and click the folder.
Access to NFS shares is available only in Linux and under Linux-based bootable media.
2. In the table to the right of the tree, select the archive. The table displays the names of the
archives contained in each vault/folder you select.
While you are reviewing the location content, archives can be added, deleted or modified by
another user or by the program itself according to scheduled operations. Use the Refresh button
to refresh the list of archives.
3. Click OK.
Exploring images
Exploring mounted volumes lets you view and modify (if mounted in the read/write mode) the
volume's content.
To explore a mounted volume select it in the table and click Explore. The default file manager
window opens, allowing the user to examine the mounted volume contents.
Unmounting images
Maintaining the mounted volumes takes considerable system resources. It is recommended that you
unmount the volumes after the necessary operations are completed. If not unmounted manually, a
volume will remain mounted until the operating system restarts.
During the conversion, the selected incremental or differential backup is replaced with a full backup
for the same point in time. The previous backups in the chain are not changed. All subsequent
incremental and differential backups up to the nearest full backup are also updated. The new backup
versions are created first and only after that are the old ones deleted. Therefore, the location must
have enough space to temporarily store both the old and the new versions.
Example
You convert to full the I4 backup. The I4, D5, I6, I7, I8 backups will be updated, while I10 I11 D12 will
remain unchanged, because they depend on F9.
Tips on usage
Conversion does not create a copy of a backup. To obtain a self-sufficient copy of the backup on a
flash drive or removable media, use the export (p. 241) operation.
When you mount an image (p. 246) in the read/write mode, the software creates an incremental
backup containing the changes you make to the backup content. The subsequent backups do not
contain these changes. Naturally, if you convert any of the subsequent backups to full, none of these
changes will appear in the resulting full backup.
Limitations
Conversion is not allowed for the following backups:
Backups stored on tapes, CD/DVD, or in Acronis Cloud Storage.
Backups that have simplified names (p. 77).
Backups of Microsoft Exchange Server data.
There should be enough space in the vault for temporary files created during consolidation. Backups
resulting from consolidation always have maximum compression.
A list of hardware supported by Linux-based media is available in the following Acronis Knowledge
Base article: https://kb.acronis.com/content/55310.
WinPE proved to be the most convenient bootable solution in large environments with
heterogeneous hardware.
Advantages:
Using Acronis Backup in Windows Preinstallation Environment provides more functionality than
using Linux-based bootable media. Having booted PC-compatible hardware into WinPE, you can
use not only Acronis Backup Agent, but also PE commands and scripts and other plug-ins you've
added to the PE.
PE-based bootable media helps overcome some Linux-related bootable media issues such as
support for certain RAID controllers or certain levels of RAID arrays only. Media based on WinPE
2.x and later enable dynamic loading of the necessary device drivers.
Limitations:
Bootable Media Builder does not require a license if installed together with an agent. To use a media
builder on a machine without an agent, you need to enter the license key or have at least one license
on the license server. The license may be either available or assigned.
To enable creating physical media, the machine must have a CD/DVD recording drive or allow a flash
drive to be attached. To enable PXE or WDS/RIS configuration, the machine must have a network
connection. Bootable Media Builder can also create an ISO image of a bootable disk to burn it later
on a blank disk.
These parameters are typically used when experiencing problems while working with the bootable
media. Normally, you can leave this field empty.
You can also specify any of these parameters by pressing F11 while in the boot menu.
Parameters
When specifying multiple parameters, separate them with spaces.
acpi=off
Disables Advanced Configuration and Power Interface (ACPI). You may want to use this
parameter when experiencing problems with a particular hardware configuration.
noapic
Disables Advanced Programmable Interrupt Controller (APIC). You may want to use this
parameter when experiencing problems with a particular hardware configuration.
vga=ask
You can change the settings, except for the MAC address; or configure the settings for a non-existent
NIC, if need be.
Once the bootable agent starts on the server, it retrieves the list of available NICs. This list is sorted
by the slots the NICs occupy: the closest to the processor on top.
The bootable agent assigns each known NIC the appropriate settings, identifying the NICs by their
MAC addresses. After the NICs with known MAC addresses are configured, the remaining NICs are
assigned the settings that you have made for non-existent NICs, starting from the upper
non-assigned NIC.
You can customize bootable media for any machine, and not only for the machine where the media
is created. To do so, configure the NICs according to their slot order on that machine: NIC1 occupies
the slot closest to the processor, NIC2 is in the next slot and so on. When the bootable agent starts
on that machine, it will find no NICs with known MAC addresses and will configure the NICs in the
same order as you did.
Example
The bootable agent could use one of the network adapters for communication with the management
console through the production network. Automatic configuration could be done for this connection.
Sizeable data for recovery could be transferred through the second NIC, included in the dedicated
backup network by means of static TCP/IP settings.
Changes made during a session will be lost after the machine reboots.
Adding VLANs
In the Network Settings window, you can add virtual local area networks (VLANs). Use this
functionality if you need access to a backup location that is included in a specific VLAN.
VLANs are mainly used to divide a local area network into segments. A NIC that is connected to an
access port of the switch always has access to the VLAN specified in the port configuration. A NIC
connected to a trunk port of the switch can access the VLANs allowed in the port configuration only if
you specify the VLANs in the network settings.
To enable access to a VLAN via a trunk port
1. Click Add VLAN.
2. Select the NIC that provides access to the local area network that includes the required VLAN.
3. Specify the VLAN identifier.
After you click OK, a new entry appears in the list of network adapters.
If you need to remove a VLAN, click the required VLAN entry, and then click Remove VLAN.
Local connection
To operate directly on the machine booted from bootable media, click Manage this machine locally
in the startup window.
Remote connection
To connect a management console to a remote machine booted from bootable media, select
Connect > Manage a remote machine in the console menu, and then specify one of the machine's IP
addresses. Provide the user name and password if these were configured when creating the bootable
media.
2. The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...).
These devices are connected to the machine through a network interface and appear as if they were
locally-attached devices. On the network, an iSCSI device is identified by its IP address, and an NDAS
device is identified by its device ID.
An iSCSI device is sometimes called an iSCSI target. A hardware or software component that provides
interaction between the machine and the iSCSI target is called the iSCSI initiator. The name of the
iSCSI initiator is usually defined by an administrator of the server that hosts the device.
To add an iSCSI device
1. In a bootable media (Linux-based or PE-based), run the management console.
gawk mv udevinfo
gpm pccardctl udevstart
grep ping umount
growisofs pktsetup uuidgen
grub poweroff vconfig
gunzip ps vi
halt raidautorun zcat
hexdump readcd
hotplug reboot
Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, reboot the
machine, wait for the prompt "Press F11 for Acronis Startup Recovery Manager…" to appear, and hit
F11. The program will start and you can perform recovery.
You can also back up using Acronis Startup Recovery Manager, while on the move.
On machines with the GRUB boot loader installed, you select the Acronis Startup Recovery Manager
from the boot menu instead of pressing F11.
Activate
Activation enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (if you
do not have the GRUB boot loader) or adds the "Acronis Startup Recovery Manager" item to GRUB's
menu (if you have GRUB).
The system disk (or, the /boot partition in Linux) should have at least 100 MB of free space to activate Acronis
Startup Recovery Manager.
Under Linux, when using a boot loader other than GRUB (such as LILO), consider installing it to a
Linux root (or boot) partition boot record instead of the MBR before activating Acronis Startup
Recovery Manager. Otherwise, reconfigure the boot loader manually after the activation.
Do not activate
Disables boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (or, the menu item in
GRUB). If Acronis Startup Recovery Manager is not activated, you will need one of the following to
recover the system when it fails to boot:
boot the machine from a separate bootable rescue media
use network boot from Acronis PXE Server or Microsoft Remote Installation Services (RIS).
Network booting:
eliminates the need to have a technician onsite to install the bootable media into the system that
must be booted
during group operations, reduces the time required for booting multiple machines as compared
to using physical bootable media.
Bootable components are uploaded to Acronis PXE Server using Acronis Bootable Media Builder. To
upload bootable components, start the Bootable Media Builder (either from the management
console, by selecting Tools > Create bootable media or as a separate component) and follow the
step-by-step instructions described in the "Bootable Media Builder (p. 254)" section.
Booting multiple machines from the Acronis PXE Server makes sense if there is a Dynamic Host
Control Protocol (DHCP) server on your network. Then the network interfaces of the booted
machines will automatically obtain IP addresses.
Limitation:
On a machine that has an operating system on the hard disk, the BIOS must be configured so that the
network interface card is either the first boot device, or at least prior to the Hard Drive device. The
example below shows one of reasonable BIOS configurations. If you don’t insert bootable media, the
machine will boot from the network.
In some BIOS versions, you have to save changes to BIOS after enabling the network interface card so
that the card appears in the list of boot devices.
If the hardware has multiple network interface cards, make sure that the card supported by the BIOS
has the network cable plugged in.
Sometimes after the volume has been backed up and its image placed into a safe storage, the
machine disk configuration might change due to a HDD replacement or hardware loss. In such case
with the help of Acronis Disk Director Lite, the user has the possibility to recreate the necessary disk
configuration so that the volume image can be recovered exactly “as it was” or with any alteration of
the disk or volume structure the user might consider necessary.
All operations on disks and volumes involve a certain risk of data damage. Operations on system, bootable or
data volumes must be carried out very carefully to avoid potential problems with the booting process or hard
disk data storage.
Operations with hard disks and volumes take a certain amount of time, and any power loss, unintentional
turning off of the machine or accidental pressing of the Reset button during the procedure could result in
volume damage and data loss.
All operations on volumes of dynamic disks in Windows XP and Windows 2000 require Acronis Managed
Machine Service to be run under an account with administrator's rights.
Please take all necessary precautions (p. 267) to avoid possible data loss.
Limitations.
Acronis Disk Director Lite is not available under Windows 8/8.1, Windows Server 2012/2012 R2.
Disk management operations under bootable media may work incorrectly if storage spaces are
configured on the machine.
Running Acronis Disk Director Lite under Windows
If you run Acronis Backup Management Console, and connect it to a managed machine, the Disk
management view will be available in the Navigation tree of the console, with which you can start
Acronis Disk Director Lite.
A volume may have a different letter in different Windows operating systems. For example, volume
E: might appear as D: or L: when you boot another Windows operating system installed on the same
machine. (It is also possible that this volume will have the same letter E: under any Windows OS
installed on the machine.)
A dynamic disk created in one Windows operating system is considered as a Foreign Disk in another
Windows operating system or might be unsupported by this operating system.
When you need to perform a disk management operation on such machine, it is necessary to specify
for which operating system the disk layout will be displayed and the disk management operation will
be performed.
The name of the currently selected operating system is shown on the console toolbar after “The
current disk layout is for:”. Click the OS name to select another operating system in the Operating
System Selection window. Under bootable media, this window appears after clicking Disk
management. The disk layout will be displayed according to the operating system you select.
The top part of the view contains a disks and volumes table enabling data sorting and columns
customization and toolbar. The table presents the numbers of the disks, as well as assigned letter,
label, type, capacity, free space size, used space size, file system, and status for each volume. The
toolbar comprises of icons to launch the Undo, Redo and Commit actions intended for pending
operations (p. 282).
The graphic panel at the bottom of the view also graphically depicts all the disks and their volumes as
rectangles with basic data on them (label, letter, size, status, type and file system).
Both parts of the view also depict all unallocated disk space that can be used in volume creation.
Acronis Disk Director Lite will detect that the disk is unusable by the system and needs to be
initialized. The Disk management view will show the newly detected hardware as a gray block with a
grayed icon, thus indicating that the disk is unusable by the system.
If you need to initialize a disk:
1. Select a disk to initialize.
2. Right-click on the selected volume, and then click Initialize in the context menu. You will be
forwarded to the Disk Initialization window, that will provide the basic hardware details such as
the disk’s number, capacity and state to aid you in the choice of your possible action.
3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk
type (basic or dynamic). The new disk state will be graphically represented in the Disk
Management view of the console immediately.
4. By clicking OK, you'll add a pending operation of the disk initialization.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
After the initialization, all the disk space remains unallocated and so still impossible to be used for
program installation or file storage. To be able to use it, proceed normally to the Create volume
operation.
If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Lite disk
tools.
Acronis Disk Director Lite allows the operation to be carried out to basic MBR disks only.
The next step is selection of a disk as target for the cloning operation. The program enables the user
to select a disk if its size will be sufficient to hold all the data from the source disk without any loss.
If there is some data on the disk that was chosen as the target, the user will receive a warning: “The
selected target disk is not empty. The data on its volumes will be overwritten.”, meaning that all
the data currently located on the chosen target disk will be lost irrevocably.
But with the wide range of available hardware it is normal that the target disk would differ in size
from the source. If the destination is larger, then it would be advisable to resize the source disk
volumes to avoid leaving unallocated space on the target disk by selecting the Proportionally resize
volumes option. The option to Clone basic disk “as is” remains, but the default method of cloning
will be carried out with proportional enlargement of all the source disk volumes so that no
unallocated space remains on the target disk.
If the destination is smaller, then the As is option of cloning will be unavailable and proportional
resizing of the source disk volumes will be mandatory. The program analyzes the target disk to
establish whether its size will be sufficient to hold all the data from the source disk without any loss.
If such transfer with proportional resizing of the source disk volumes is possible, but without any
data loss , then the user will be allowed to proceed. If due to the size limitations safe transfer of all
the source disk data to the target disk is impossible even with the proportional resizing of the
volumes, then the Clone basic disk operation will be impossible and the user will not be able to
continue.
If you are about to clone a disk comprising of a system volume, pay attention to the Advanced
options.
By clicking Finish, you'll add the pending operation of the disk cloning.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
If you plan to install an OS that does not support GPT disks, the reverse conversion of the disk to
MBR is also possible through the same menu items the name of the operation will be listed as
Convert to MBR.
3. By clicking OK, you'll add a pending operation of GPT to MBR disk conversion.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
Should you decide to revert your dynamic disks back to basic ones, e.g. if you want to start using an
OS on your machine that does not support dynamic disks, you can convert your disks using the same
menu items, though the operation now will be named Convert to basic.
In contrast to Windows Disk Manager the program ensures bootability of an offline operating
system on the disk after the operation.
3. If you click OK in this warning window, the conversion will be performed immediately.
After the conversion the last 8Mb of disk space is reserved for the future conversion of the disk from
basic to dynamic.
In some cases the possible unallocated space and the proposed maximum volume size might differ
(e.g. when the size of one mirror establishes the size of the other mirror, or the last 8Mb of disk
space are reserved for the future conversion of the disk from basic to dynamic).
One of the following disk statuses always appears in the graphical view of the disk next to the disk's
name:
Online
The online status means that a disk is accessible in the read-write mode. This is the normal disk
status. If you need a disk to be accessible in the read-only mode, select the disk and then change
its status to offline by selecting Change disk status to offline from the Operations menu.
Offline
The offline status means that a disk is accessible in the read-only mode. To bring the selected
offline disk back to online, select Change disk status to online from the Operations menu.
If the disk has the offline status and the disk's name is Missing, this means that the disk cannot
be located or identified by the operating system. It may be corrupted, disconnected, or powered
off. For information on how to bring a disk that is offline and missing back online, please refer to
the following Microsoft knowledge base article:
http://technet.microsoft.com/en-us/library/cc732026.aspx.
Its pages will enable you to enter operation parameters, proceeding step-by-step further on and
return to any previous step if necessary to change any previously selected options. To help you with
your choices, each parameter is supplemented with detailed instructions.
Run the Create volume wizard by selecting Create volume on the Wizards bar, or right-click any
unallocated space and select Create volume in the appearing context menu.
After you click the Next button, you will proceed forward to the next wizard page: Select destination
disks (p. 277).
If you are creating a dynamic volume and select one or several basic disks, as its destination, you will
receive a warning that the selected disk will be converted to dynamic automatically.
If need be, you will be prompted to add the necessary number of disks to your selection, according to
the chosen type of the future volume.
If you click the Back button, you will be returned to the previous page: Select the type of volume
being created (p. 277).
If you click the Next button, you will proceed to the next page: Set the volume size (p. 278).
The maximum value normally includes the most possible unallocated space. But in some cases the
possible unallocated space and the proposed maximum volume size might differ (e.g. when the size
of one mirror establishes the size of the other mirror, or the last 8Mb of the disk space is reserved for
the future conversion of the disk from basic to dynamic).
For basic volumes if some unallocated space is left on the disk, you also will be able to choose the
position of the new volume on the disk.
If you click the Back button, you will be returned to the previous page: Select destination disks (p.
277).
If you click the Next button, you will proceed to the next page: Set the volume options (p. 278).
The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the
volume size has been set at more than 2 GB), FAT32 (disabled, if the volume size has been set at
more than 2 TB), NTFS or to leave the volume Unformatted.
In setting the cluster size you can choose between any number in the preset amount for each file
system. Note, the program suggests the cluster size best suited to the volume with the chosen file
system.
Typically Primary is selected to install an operating system to a volume. Select the Active (default)
value if you want to install an operating system on this volume to boot at machine startup. If the
Primary button is not selected, the Active option will be inactive. If the volume is intended for data
storage, select Logical.
A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be converted into
dynamic, otherwise or Active and Primary options will be disabled and you will only be able to select the Logical
volume type. The warning message will advise you that an OS installed on this volume will not be bootable.
If you use characters when setting a new volume label that are unsupported by the currently installed operation
system, you will get the appropriate warning and the Next button will be disabled. You will have to change the
label to proceed with the creation of the new volume.
If you click the Back button, you will be returned to the previous page: Set the volume size (p. 278).
If you click the Finish button, you will complete the operation planning.
To perform the planned operation click Commit in the toolbar, and then click Proceed in the Pending
Operations window.
If you set a 64K cluster size for FAT16/FAT32 or on 8KB-64KB cluster size for NTFS, Windows can mount the
volume, but some programs (e.g. Setup programs) might calculate its disk space incorrectly.
After a volume is deleted, its space is added to unallocated disk space. It can be used for creation of a
new volume or to change another volume's type.
If you need to delete a volume:
1. Select a hard disk and a volume to be deleted.
2. Select Delete volume or a similar item in the Operations sidebar list, or click the Delete the
selected volume icon on the toolbar.
If the volume contains any data, you will receive the warning, that all the information on this volume will be
lost irrevocably.
3. By clicking OK in the Delete volume window, you'll add the pending operation of volume
deletion.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
3. If another active volume is present in the system, you will receive the warning that the previous
active volume will have to be set passive first. By clicking OK in the Warning window, you'll add
the pending operation of setting active volume.
Please note: even if you have the Operating System on the new active volume, in some cases the machine
will not be able to boot from it. You will have to confirm your decision to set the new volume as active.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
The new volume structure will be graphically represented in the Disk management view
immediately.
Connecting an additional disk, as well as creating or deleting a volume on existing disks, might
change your system configuration. As a result, some applications might stop working normally or
user files might not be automatically found and opened. To prevent this, you can manually change
the letters that are automatically assigned to the volumes by the operating system.
If you need to change a letter assigned to a volume by the operating system:
1. Select a volume to change a letter.
2. Right-click on the selected volume, and then click Change letter in the context menu.
3. Select a new letter in the Change Letter window.
4. By clicking OK in the Change Letter window, you'll add a pending operation to volume letter
assignment.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
The new volume structure will be graphically represented in the Disk management view
immediately.
In Windows, volume labels are shown in the Explorer disk and folder tree: LABEL1(C:), LABEL2(D:),
LABEL3(E:), etc. LABEL1, LABEL2 and LABEL3 are volume labels. A volume label is shown in all
application dialog boxes for opening and saving files.
If you need to change a volume label:
1. Right-click on the selected volume, and then click Change label.
2. Enter a new label in the Change label window text field.
3. By clicking OK in the Change label window, you'll add the pending operation of changing the
volume label .
If when setting a new volume label you use characters that are unsupported by the currently installed
operating system, you will get the appropriate warning and the OK button will be disabled. You will have to
use only supported characters to proceed with changing the volume label.
(To finish the added operation you will have to commit (p. 282) it. Exiting the program without
committing the pending operations will effectively cancel them.)
The new label will be graphically represented in the Disk Management view of the console
immediately.
To prevent you from performing any unintentional change on your disk, the program will first display
the list of all pending operations.
The Disk management view contains the toolbar with icons to launch the Undo, Redo and Commit
actions intended for pending operations. These actions might also be launched from the Disk
management menu of the console.
The Undo action lets you undo the latest operation in the list. While the list is not empty, this action
is available.
The Redo action lets you reinstate the last pending operation that was undone.
The Commit action forwards you to the Pending Operations window, where you will be able to view
the pending operation list. Clicking Proceed will launch their execution. You will not be able to undo
any actions or operations after you choose the Proceed operation. You can also cancel the
commitment by clicking Cancel. Then no changes will be done to the pending operation list.
Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels
them, so if you try to exit Disk management without committing the pending operations, you will
receive the appropriate warning.
This information is valid for both physical and virtual machines, no matter if the virtual machines are
backed up at a hypervisor level or from inside a guest OS.
Disk-level backup can potentially protect any VSS-aware application; however, Acronis has tested the
protection for the following applications:
Microsoft Exchange Server
Microsoft SQL Server
Active Directory (Active Directory Domain Services)
Microsoft SharePoint
Using a disk backup of an application server
A disk or volume backup stores a disk or a volume file system as a whole. Therefore, it stores all of
the information necessary for the operating system to boot. It also stores all application files,
including database files. You can use this backup in various ways depending on the situation.
In case of disaster, you can recover the entire disk to ensure that both the operating system and
applications are up and running.
If the operating system is intact, you may need to revert an application database to a previous
state. To do this, recover the database files and then use the native tools of the application to
make the application acknowledge the database.
You may need to extract only a certain data item, for example a PDF document from a Microsoft
SharePoint server backup. In this case, you can temporarily mount a backed-up volume to the
application server file system and use the native tools of the application to extract the item.
Applications that use databases require a few simple measures to ensure the application data
consistency within a disk backup.
If you are sure that the databases and their associated files are always on the same volumes, you
may want to back up only these volumes. Or you may want to create separate backup plans for the
system volume and for the volumes that store the data. In both cases, make sure that all of the
volumes containing the necessary files are included in the backup. For instructions on how to find out
the database paths, refer to "Locating database files" (p. 285).
A VSS provider notifies VSS-aware applications that the backup is about to start. This ensures that all
database transactions are completed by the time Acronis Backup takes the data snapshot. This, in
turn, ensures the consistent state of the databases in the resulting backup.
Acronis Backup can use various VSS providers. For Microsoft products, Microsoft Software Shadow
Copy Provider is the best choice.
On a physical machine, using VSS is configurable. This also applies to a virtual machine that is backed
up from inside the guest OS. You may need to enable using VSS manually if the factory preset was
changed from the default value.
You also need to make sure that VSS writers for the respective application are turned on. In Windows
Small Business Server 2003, the Exchange writer is turned off by default. For instructions on how to
turn it on, see the following Microsoft Knowledge Base article
http://support.microsoft.com/kb/838183/.
To enable using VSS by default in any backup plan created on a machine:
1. Connect the console to the machine.
2. On the top menu, select Options > Default backup and recovery options > Default backup
options > Volume Shadow Copy Service.
3. Click Use Volume Shadow Copy Service.
4. In the Snapshot provider list, click Software - System provider.
When the console is connected to the management server, you can set the same default setting for
all of the registered machines.
When backing up a virtual machine at a hypervisor level, using VSS is not configurable.
VSS is always used for Hyper-V virtual machines if Hyper-V Integration Services are installed in the
guest system.
VSS is never used for VMware ESX(i) virtual machines. If you want to back up databases in a
consistent state, install Agent for Windows in the guest system and enable the Volume Shadow Copy
Service option as you do on a physical machine.
We recommend that you find out the database file paths and store them in a safe place. This will
save you time and effort when you will recover the application data.
Exchange 2010
Execute the following commands by using Exchange Management Shell:
Get-MailboxDatabase | Format-List -Property Name, EdbFilePath, LogFolderPath
Exchange 2007
Execute the following commands by using Exchange Management Shell:
To obtain database file paths:
Get-MailboxDatabase | Format-List -Property Name, EdbFilePath, StorageGroup
To obtain log file paths:
Get-MailboxDatabase | ForEach { Get-StorageGroup $_.StorageGroupName | Format-List
-Property Name, LogFolderPath }
Exchange 2003
1. Start Exchange System Manager.
2. Click Administrative Groups.
Note: If Administrative Groups does not appear, it may not be turned on. To turn on Administrative Groups,
right-click Exchange Organization, and then click Properties. Click to select the Display Administrative
Groups check box.
To determine the current location of the database files and transaction logs, examine the DSA
Database file and Database log files path values in the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
The recommendations for SQL servers also apply to SQL servers included in a Microsoft SharePoint
farm. Active Directory databases normally use circular logging, so they do not need log truncation.
11.1.2.1 Transaction log truncation and log file shrinking for SQL Server
Acronis Backup does not truncate transaction logs after creating a disk backup. If you do not use the
native backup engine of Microsoft SQL Server or any other third-party backup solution that
automatically manages transaction logs, you can manage logs by using the following methods.
Transaction log truncation. Log truncation frees inactive virtual log files (that contain only
inactive log records) for reuse by new log records. Truncation may prevent a physical log file
from growing but does not reduce its size.
For more information about truncation refer to the following article:
http://technet.microsoft.com/en-us/library/ms189085(v=sql.105)
For more information about Transact-SQL and sqlcmd refer to the following articles:
Using Transact-SQL: http://technet.microsoft.com/en-us/library/ms189826(v=sql.90)
Using the sqlcmd utility: http://technet.microsoft.com/en-us/library/ms170572(SQL.90).aspx
To automate transaction log truncation and shrinking for an SQL instance
1. Using the following template, create a script that will truncate and shrink the log files for the
databases of the instance:
USE database_name
ALTER DATABASE database_name SET RECOVERY SIMPLE;
DBCC SHRINKFILE(logfile_name);
ALTER DATABASE database_name SET RECOVERY FULL;
In the last string, the SET RECOVERY value depends on the original recovery model of the
particular database and could be FULL or BULK_LOGGED.
Example for an instance having two databases (TestDB1 and TestDB2):
USE TestDB1;
ALTER DATABASE TestDB1 SET RECOVERY SIMPLE;
DBCC SHRINKFILE(TestDB1_log);
ALTER DATABASE TestDB1 SET RECOVERY FULL;
USE TestDB2;
ALTER DATABASE TestDB2 SET RECOVERY SIMPLE;
DBCC SHRINKFILE(TestDB2_log);
ALTER DATABASE TestDB2 SET RECOVERY BULK_LOGGED;
2. Add the following sqlcmd command to the Post-backup command (p. 123):
sqlcmd -S myServer\instanceName -i C:\myScript.sql
If log files are not deleted, they will eventually consume all the available disk space and the Exchange
databases will be taken offline until the log files are purged from the disk. Using circular logging is not
a best practice for a production environment. When circular logging is enabled, Exchange overwrites
the first log file after its data has been committed to the database, and you can recover data only up
until the last backup.
We recommend that you delete the log files after backing up an Exchange server, because log files
are backed up along with other files. Therefore, after a recovery you will be able to roll the database
back or forward.
If enabling this option is undesirable (for example, you need to keep logs of another VSS-aware
application running on the machine), follow the recommendations below.
This method assumes that you have scripting skills and are familiar with Acronis Backup
command-line utility (acrocmd). For detailed information about acrocmd see the Command-Line
Reference.
In Exchange, consistency check is performed by running Eseutil /K. It verifies the page-level
integrity of all Exchange databases and checksums of all database pages and log files. The process of
verification can be time consuming. For information about using Eseutil /K, see:
http://technet.microsoft.com/en-us/library/bb123956(v=exchg.80).
Volumes to back up
To back up Active Directory, back up the following volumes of a domain controller:
The system volume and the boot volume
A front-end Web server is a host where SharePoint services are running. Some front-end Web servers
may be identical to each other (for example, the front-end Web servers that run a Web server). You
do not have to back up all identical front-end Web servers but only unique ones.
To protect SharePoint databases, you need to back up all of the Microsoft SQL servers and all of the
unique Web Front End servers belonging to the farm. The backups should be done with the same
schedule. This is needed because the configuration database must be synchronized with other
databases. For example, if the content database contains the data about a site while the latest
backup of the configuration database does not, the site will be orphaned after the configuration
database is recovered.
If you have Acronis Backup Advanced, the easiest way to back up a SharePoint farm is to create a
centralized backup plan as described in the "Creating a centralized backup plan" (p. 354) section, or
use the Back up now feature as described in the "Back up now" (p. 353) section. In Acronis Backup,
you must specify the identical schedule when creating a backup plan (p. 55) for every server
belonging to the farm.
If you only need temporary access to the backed-up databases for data mining or data extraction,
mount a disk backup and access the required data. For details, see "Accessing SQL Server databases
from a disk backup" (p. 294).
For the instructions how to find out the database paths, refer to "SQL Server database files" (p. 285).
To recover SQL Server databases
1. Connect the console to the machine on which you are going to perform the operation.
2. Navigate to the vault containing the disk backup with the SQL Server database files.
3. Click the Data view tab. In the Show list, click Folders/files.
4. Select the required SQL Server database files and click Recover. By default, the data will be
reverted to the state of the latest backup. If you need to select another point in time to revert
the data to, use the Versions list.
5. On the recovery page under What to recover section:
a. In Data paths, select Custom.
b. In Browse, specify a folder where the files will be recovered to.
Note: We recommend that you recover the SQL server database files to a folder local to the SQL Server,
since all of the SQL Server versions earlier than SQL Server 2012 do not support databases located on
network shares.
c. Leave the rest of the settings "as is" and click OK to proceed with recovery.
6. After the recovery is complete, attach the databases according to the instructions described in
the "Attaching SQL Server databases" (p. 295) section.
Details. If for any reason you did not recover all of the SQL Server database files, you will not be
able to attach the database. However, the Microsoft SQL Server Management Studio will inform
you about all the paths and names of the missing files and it will help you to identify what
particular files the database consists of.
You can mount volumes if the disk backup is stored in a local folder (except optical media such as CD,
DVD, or Blu-ray Discs), Acronis Secure Zone, or on a network share.
To attach databases contained in a disk backup to SQL Server
1. Connect the console to the SQL Server where Agent for Windows is installed.
2. In the main menu, select Actions > Mount image.
3. In the What to mount section, select the source archive and specify the backup.
4. In the Mount settings section:
a. In Mount for, select All users that share this machine.
Attaching a database requires any of the following permissions: CREATE DATABASE, CREATE ANY
DATABASE, or ALTER ANY DATABASE. Normally, these permissions are granted to the sysadmin role
of the instance.
To attach a database
1. Run Microsoft SQL Server Management Studio.
2. Connect to the required SQL Server instance, and then expand the instance.
3. Right click Databases and click Attach.
4. Click Add.
5. In the Locate Database Files dialog box, find and select the .mdf file of the database.
6. In the Database Details section, make sure that the rest of database files (.ndf and .ldf files) are
found.
Details. SQL Server database files may not be found automatically, if:
They are not in the default location, or they are not in the same folder as the primary
database file (.mdf). Solution: Specify the path to the required files manually in the Current
File Path column.
You have recovered an incomplete set of files that make up the database. Solution: Recover
the missing SQL Server database files from the backup.
7. When all of the files are found, click OK.
If you need to perform granular recovery of individual mailboxes or their items, mount the restored
database either as a recovery database (RDB) in Exchange 2010, or to a recovery storage group (RSG)
in Exchange 2003/2007. For details, see "Granular recovery of mailboxes" (p. 297).
For instructions on how to find out the database paths, refer to "Exchange Server database files" (p.
286).
To recover Exchange Server databases
1. Connect the console to the machine on which you are going to perform the operation.
2. Navigate to the vault containing the disk backup with the Exchange data files.
3. Click the Data view tab. In the Show list, click Folders/files.
4. Select the required Exchange database files and click Recover. By default, the data will be
reverted to the state of the latest backup. If you need to select another point in time to revert
the data to, use the Versions list.
5. On the recovery page under What to recover section:
a. In Data paths, select Custom.
b. In Browse, specify a folder where the database files will be recovered to.
6. Leave the rest of the settings "as is" and click OK to proceed with recovery.
The recovered databases will be in a Dirty Shutdown state. A database that is in a Dirty Shutdown
state can be mounted by the system if it is recovered to its original location (that is, information
about the original database is present in Active Directory). When recovering a database to an
alternate location (such as a new database or as the recovery database), the database cannot be
mounted until you bring it to a Clean Shutdown state by using the Eseutil /r <Enn> command.
<Enn> specifies the log file prefix for the database (or storage group that contains the database) into
which you need to apply the transaction log files.
The account you use to attach a database must be delegated an Exchange Server Administrator role
and a local Administrators group for the target server.
For details about how to mount databases, see the following articles:
Exchange 2013: http://technet.microsoft.com/en-us/library/aa998871.aspx
Exchange 2010: http://technet.microsoft.com/en-us/library/aa998871(v=EXCHG.141).aspx
Exchange 2007: http://technet.microsoft.com/en-us/library/aa998871(v=EXCHG.80).aspx
Exchange 2003: http://technet.microsoft.com/en-us/library/bb124040.aspx
For more information about RDB and RSG, refer to the following articles:
Exchange 2010: http://technet.microsoft.com/en-us/library/dd876954
Exchange 2007: http://technet.microsoft.com/en-us/library/bb124039(v=exchg.80)
Exchange 2003: http://technet.microsoft.com/en-us/library/bb123631(v=exchg.65)
To recover a mailbox
1. If a RDB/RSG does not exist, create it as described in the following articles:
Exchange 2010: http://technet.microsoft.com/en-us/library/ee332321
Exchange 2007: http://technet.microsoft.com/en-us/library/aa997694(v=exchg.80)
Exchange 2003: http://technet.microsoft.com/en-us/library/bb124427(v=exchg.65)
2. Recover the database files to the RDB/RSG folder structure. For information about recovering
database files, see "Recovering Exchange Server database files from a disk backup" (p. 296).
3. Mount the recovery database. For information about mounting databases, see "Mounting
Exchange Server databases" (p. 296).
4. Proceed as described in the following articles:
Exchange 2010: http://technet.microsoft.com/en-us/library/ee332351
Exchange 2007: http://technet.microsoft.com/en-us/library/aa997694(v=exchg.80)
Exchange 2003: http://technet.microsoft.com/en-us/library/aa998109(v=exchg.65)
Before recreating a domain controller that held the PDC Emulator role, you must seize that role.
Otherwise, you will not be able to add the recreated domain controller to the domain. After
recreating the domain controller, you can transfer this role back. For information about how to seize
and transfer FSMO roles, see Microsoft Help and Support article
http://support.microsoft.com/kb/255504.
To view which FSMO roles are assigned to which domain controller, you can connect to any live
domain controller by using the Ntdsutil tool as described in Microsoft Help and Support article
http://support.microsoft.com/kb/234790. Follow the steps in the “Using the NTDSUTIL Tool” section
of that article:
For the Windows 2000 Server and Windows Server 2003 operating systems, follow all steps as
they are given.
For the Windows Server 2008 operating systems, in the step asking you to type
domain management, type roles instead. Follow other steps as they are given.
To restore the database, use the Dcpromo tool to demote the domain controller with the corrupted
database, and then to promote that domain controller again.
dcpromo /adv
To restore the database, recover the Active Directory database files (p. 287). In addition, if you have
made any changes to Group Policy Objects (GPOs) since backup, you also need to recover the SYSVOL
folder (p. 292).
To recover the Active Directory database from a backup
1. Restart the domain controller and press F8 during startup.
2. On the Advanced Boot Options screen, select Directory Services Restore Mode.
3. [Optional] Create a copy of the current Active Directory database files in case the changes need
to be undone.
4. Change the original account of the Acronis agent service to the Directory Services Restore Mode
(DSRM) Administrator account:
a. Open the Services snap-in.
b. In the list of services, double-click Acronis Managed Machine Service.
c. On the Log On tab, in This account, specify the user name and password that you use to log
on to Directory Services Restore Mode, and then click Apply.
To track object versions, Active Directory uses numbers called Update Sequence Numbers (USNs).
Newer versions of Active Directory objects correspond to higher USNs. Each domain controller keeps
the USNs of all other domain controllers.
USN rollback
After you perform a nonauthoritative restore of a domain controller or of its database, the current
USN of that domain controller is replaced by the old (lower) USN from the backup. But the other
domain controllers are not aware of this change. They still keep the latest known (higher) USN of that
domain controller.
The recovery to a non-original farm is a more complicated procedure. Its steps vary depending on the
farm configuration and other parameters of the production environment.
In SharePoint 2007:
stsadm -url <web application url> –o deletecontentdb –databasename <database>
2. Recover the database files as described in "Recovering SQL Server databases from a disk backup"
(p. 294), including the database attachment step.
3. Attach the recovered database to the SharePoint farm. To do this, run the following command on
a front-end Web server:
In SharePoint 2010 or later:
Mount-SPContentDatabase <database> -DatabaseServer <database server>
-WebApplication <site url>
In SharePoint 2007:
The configuration database contains hostnames of the farm's servers. Therefore, you can recover the
configuration database only to the original SharePoint farm. Service databases can be recovered to a
non-original farm.
To recover the configuration database
1. On the server that is running the Central Administration site, in the Services snap-in, stop the
services listed in the table below.
2. On the server that is running the Central Administration site, run the following command:
iisreset /stop
3. Recover the database files as described in "Recovering SQL Server databases from a disk backup"
(p. 294).
4. Start the SharePoint services that were stopped earlier.
SharePoint 2007 services SharePoint 2010 serivces SharePoint 2013 services
Windows SharePoint Services SharePoint 2010 VSS Writer World Wide Web Publishing
Administration Service
World Wide Web Publishing
Windows SharePoint Services Service SharePoint Server Search
Search
SharePoint Server Search 14
Windows SharePoint Services
Timer SharePoint Foundation Search
V4
Windows SharePoint Services
Tracing Web Analytics Data Processing
Service
Windows SharePoint Services VSS
Writer Web Analytics Web Service
A single-pass backup operation creates an application-aware disk backup which enables browsing
and recovery of the backed-up application data without recovering the entire disk or volume. The
disk or volume can also be recovered as a whole. This means that a single solution and a single
backup plan can be used for both the disaster recovery and data protection purposes. The
application logs can be truncated after the backup, if necessary.
The single-pass backup functionality becomes available by installing Acronis Backup Agent for SQL.
Without this agent, you can protect your SQL Server data by using disk-level backup. For a detailed
description of this method, see the "Protecting applications with disk-level backup" (p. 283) section.
A Microsoft SharePoint farm consists of front-end Web servers and machines with Microsoft SQL
Server. This means that the information presented in this section also applies to protecting Microsoft
SharePoint data.
For the recommendations specific to backing up the machines with SharePoint data, see the
"SharePoint data backup" (p. 293) section.
For information about recovering SharePoint data, see the "Recovering SharePoint data" (p. 302)
section.
Backup
During a disk backup, Agent for SQL adds Microsoft SQL Server metadata to the resulting backup file.
By using this metadata, Acronis Backup detects and catalogues SQL Server databases. After the
backup is successfully completed, the agent truncates the SQL Server transaction log if the
corresponding option in the backup plan has been set.
Recovery
The agent enables you to recover SQL databases directly to a running SQL Server instance. You can
make a database available to users immediately, or perform additional operations before making it
available.
The agent can also extract database files from a single-pass backup to a folder on a file system. These
files can be used for data mining or auditing. In case of emergency, you can attach these database
files to a SQL Server instance that is not managed by the agent.
Also, this account must be granted the sysadmin role on each of the instances installed on the
machine.
If you create a backup plan while you are logged on as a regular user, such as a member of the Users
group, you need to specify the credentials for the account that has the above privileges. To access
this setting, click Plan's credentials on the Create backup plan (p. 55) page.
A backup plan created by a member of the Administrators group runs under the agent service
account by default. The same applies to a centralized backup plan deployed from the management
server. That's why it is advisable to assign the agent the permissions required for single-pass backup.
To grant the agent the sysadmin role in SQL Server, you are asked to specify the sysadmin
credentials for each Microsoft SQL instance installed on the machine. If you do not specify the
credentials during installation, you can grant the agent the sysadmin role later in any of the following
ways:
By clicking Tools > Provide SQL Server credentials when Acronis Backup Management Console is
connected to the machine.
By using SQL Server Management Studio.
By running a T-SQL script.
You must also grant explicitly the agent the sysadmin role after a new Microsoft SQL Server instance
is installed on the machine.
To grant the agent service account the sysadmin role on an instance by means of a T-SQL script
1. Create a text file with the following contents:
Create Login [<machine name>\Acronis Agent User] From Windows
Exec master..sp_addsrvrolemember @loginame = '<machine name>\Acronis Agent
User',@rolename = 'sysadmin'
Acronis Agent User is the account created for the agent by default. If you specified an
existing account during the agent installation, replace Acronis Agent User with the user name
of the existing account.
The file can have any extension.
2. At the command prompt, run the following command:
sqlcmd -S <machine name>\<instance name> -i <full path to T-SQL script file>
If you do not want to grant the sysadmin role to the agent, you must specify credentials in every
backup plan as described at the beginning of this section.
The agent is installed with Agent for Windows (p. 17) or on a machine where Agent for Windows is
already installed.
Licenses required
Agent for SQL requires one of the following licenses:
Acronis Backup Advanced for SQL
Acronis Backup Advanced for SharePoint
Acronis Backup for Windows Server Essentials
Acronis Backup Advanced for VMware / Hyper-V / RHEV / Citrix XenServer / Oracle VM
Acronis Backup Advanced Universal License
Each of these licenses enables you to install Agent for Windows on the same machine. If Agent for
Windows is already installed, you can install Agent for SQL by using one of the add-on licenses:
Acronis Backup Advanced for SQL Add-On
Acronis Backup Advanced for SharePoint Add-On.
To use the product in the trial mode, you do not need licenses.
Installation
Install the agent in the same way as Agent for Windows. For detailed step-by-step instructions, refer
to the "Interactive installation of Acronis Backup Advanced" section of the installation
documentation.
You can skip entering the credentials and grant the agent the sysadmin role later in any of the
following ways:
By clicking Tools > Provide SQL Server credentials when Acronis Backup Management Console is
connected to the machine.
By using SQL Server Management Studio.
By running a T-SQL script.
For more information, see "Permissions for SQL Server backup and recovery" (p. 308) in the product
Help or the User Guide.
System databases are recovered in the same way as user databases. When recovering the master
database, the software automatically restarts the destination instance in the single-user mode. After
the recovery completes, the software restarts the instance and recovers other databases (if any).
Other things to consider when recovering a system database:
A system database can only be recovered to an instance of the same version as the original
instance.
A system database is always recovered in the "ready to use" state.
Because the master database records information about all databases of the instance, you may
need to perform additional actions after the database is recovered. For details, see "Actions after
a master database recovery" (p. 313).
To recover databases to instances
On the Recover data page:
1. Under What to recover, click Select data and select the databases.
2. If the console is connected to the management server, select the registered machine where you
want to recover the databases. Otherwise, skip this step.
3. Select Recover the databases to instances.
4. Acronis Backup tries to specify the target instances for the selected databases by taking the
original paths from the backup. If the target instance is not selected for some database or if you
want to recover the database to another instance, specify the target instance manually.
If your current account does not have enough privileges to access the target SQL Server instance,
you will be asked to provide the credentials.
5. If the target instance contains a database that has the same name as the one being recovered,
the software displays a warning: The target database already exists. You have the following
options:
Overwrite existing database
This is the default setting that fits most situations. The database in the target instance will be
overwritten with the database from the backup.
After recovering the master database, you may need to do the following:
Databases that have appeared in the instance after the backup was done are not visible by the
instance. To bring these databases back to production, attach them to the instance manually. For
instructions on how to do this by using SQL Server Management Studio, see the "Attaching SQL
Server databases" (p. 295) section.
Databases that have been deleted after the backup was done are displayed as offline in the
instance. Delete these databases by using SQL Server Management Studio.
Mounting databases comes in handy when you need any of the following:
To granularly restore individual database objects, such as tables, records, stored procedures.
Mount the database and use third-party tools to get the necessary information from it.
To quickly access historical information. Recovery of a large database may take a long time. If you
mount the database, you do not have to wait until the database is recovered.
To view the state of a database as of a certain point in time (for example, for data mining or
audit).
The mount operation is available when the console is connected to a machine where Agent for SQL is
installed. The single-pass backup must be stored in a local folder on that machine (except optical
disks), in Acronis Secure Zone, or on a network share. Other locations are not supported by the
mount operation.
In a Failover Cluster Instance, SQL databases are located on a shared storage. Because this storage
can only be accessed from the active node, SQL Server data is backed up only when the active node is
backed up. For the same reason, SQL databases can only be recovered onto an active node. If the
active node fails, a failover occurs and a different node becomes active.
In an availability group, each database replica resides on a different node. If the primary replica
becomes not available, a secondary replica residing on a different node is assigned the primary role.
Other solutions include database mirroring and log shipping. For more information about SQL Server
high-availability solutions refer to the Microsoft documentation:
http://msdn.microsoft.com/en-us/library/ms190202.aspx.
The single-pass backup functionality becomes available by installing Acronis Backup Agent for Active
Directory.
Without this agent, you can protect your Active Directory data by using disk-level backup. For a
detailed description of this method, see the "Protecting applications with disk-level backup" (p. 283)
section.
The agent enables you to extract Active Directory files from a single-pass backup without recovering
the entire disk or volume. After that, you can replace the corrupted files with the extracted ones.
The agent is installed with Agent for Windows (p. 17) or on a machine where Agent for Windows is
already installed.
Licenses required
Agent for Active Directory requires one of the following licenses:
Acronis Backup Advanced for Active Directory
To use the product in the trial mode, you do not need licenses.
Installation
Install the agent in the same way as Agent for Windows. When asked for credentials for the Acronis
Managed Machine Service, specify an existing domain user account that is included in the built-in
Administrators group of the domain controller. Otherwise, single-pass backups of Microsoft Active
Directory data will fail.
For detailed step-by-step instructions, refer to the "Interactive installation of Acronis Backup
Advanced" section of the installation documentation.
Follow the best practices described in the "Active Directory backup" (p. 292) section.
Ensure that the Volume Shadow Copy Service (p. 129) backup option is set to Use Volume Shadow
Copy Service and that the selected snapshot provider is not Software - Acronis VSS Provider. The
best choice is Software - System provider.
To recover Microsoft Active Directory, use the Dcpromo tool to demote the domain controller with
the corrupted data, and then to promote that domain controller again.
This section describes only the steps and settings that are specific for recovering Active Directory
data from a single-pass backup. The common settings of a recovery task are described in the
"Creating a recovery task" (p. 132) section.
To find out what a backup plan is currently doing on the machine, check the backup plan execution
state (p. 324). A backup plan execution state is a cumulative state of the plan's most recent activities.
The status of a backup plan (p. 325) helps you to estimate whether the data is successfully protected.
To keep track of a task's current progress, examine its state (p. 325). Check a task status (p. 326) to
ascertain the result of a task.
Typical workflow
Use filters to display the desired backup plans (tasks) in the backup plans table. By default, the
table displays all the plans of the managed machine sorted by name. You can also hide the
unneeded columns and show the hidden ones. For details, see "Sorting, filtering and configuring
table items" (p. 29).
In the backup table, select the backup plan (task).
Use the toolbar's buttons to take an action on the selected plan (task). For details, see "Actions
on backup plans and tasks" (p. 322).
To review detailed information on the selected plan (task), use the information panel at the
bottom of the window. The panel is collapsed by default. To expand the panel, click the arrow
mark ( ). The content of the panel is also duplicated in the Plan details (p. 331) and Task details
(p. 332) windows respectively.
Restrictions
Without the Administrator privileges on the machine, a user cannot run or modify plans or tasks
owned by other users.
It is not possible to modify or delete a currently running backup plan or task.
A centralized backup plan or task can be modified or deleted only on the management server
side.
To Do
Create a new backup plan Click New, then select one of the following:
or task
Backup plan (p. 55)
Recovery task (p. 132)
1. Click Run.
2. In the drop-down list, select the plan's task you need run.
Running the backup plan starts the selected task of that plan immediately in spite
of its schedule and conditions.
Task
Click Run.
The task will be executed immediately in spite of its schedule and conditions.
Stop a plan/task Click Stop.
Backup plan
Stopping the running backup plan stops all its tasks. Thus, all the task operations
will be aborted.
Task
Stopping a task aborts its operation (recovery, validation, exporting, conversion,
etc.). The task enters the Idle state. The task schedule, if created, remains valid.
To complete the operation you will have to run the task over again.
What will happen if I stop the recovery task?
Recovering disks: the aborted operation may cause changes in the target disk.
Depending on the time that has passed since the task run, the target disk may
not be initialized, or the disk space may be unallocated, or some volumes may
be recovered and others not. To recover the entire disk, run the task once
again.
Recovering volumes: the target volume will be deleted and its space
unallocated – the same result you will get if the recovery is unsuccessful. To
recover the “lost” volume, run the task once again.
Recovering files or folders: the aborted operation may cause changes in the
destination folder. Depending on the time that has passed since the task run,
some files may be recovered, but some not. To recover all the files, run the
task once again.
A backup plan status is derived from the results of the last run of the plans' tasks/activities.
Status How it is determined How to handle
1 Error At least one task has Identify the failed tasks -> Check the tasks log to find out
failed. the reason of the failure, then do one or more of the
following:
Otherwise, see 2
Remove the reason of the failure -> [optionally] Start
the failed task manually
Edit the local plan to prevent its future failure if a local
plan has failed
Edit the centralized backup plan on the management
server if a centralized plan has failed
2 Warning At least one task has View the log to read the warnings -> [optionally] Perform
succeeded with actions to prevent the future warnings or failure.
warnings.
Otherwise, see 3.
3 OK All the tasks are No action is required. Note that a backup plan can be OK if
completed successfully. none of the tasks has been started yet.
Running
A task changes to the Running state when the event specified by the schedule occurs AND all the
conditions set in the backup plan are met AND no other task that locks the necessary resources is
running. In this case, nothing prevents the task from running.
Waiting
A task changes to the Waiting state when the task is about to start, but another task using the
same resources is already running. In particular, more than one backup tasks cannot run
simultaneously on a machine. A backup task and a recovery task also cannot run simultaneously,
if they use the same resources. Once the other task unlocks the resource, the waiting task enters
the Running state.
A task may also change to the Waiting state when the event specified by the schedule occurs but
the condition set in the backup plan is not met. See Task start conditions (p. 128) for details.
Need interaction
Any running task can put itself into the Need interaction state when it needs human interaction
such as changing media or ignoring a read error. The next state may be Idle (if the user chooses
to stop the task) or Running (on selecting Ignore/Retry or another action, such as Reboot, that
can put the task to the Running state.)
A task status is derived from the result of the last run of the task.
Status How it is determined How to handle
1 Error Last result is "Failed" Identify the failed task -> Check the task log to find out the
reason of the failure, then do one or more of the following:
Remove the reason of the failure -> [optionally] Start the
failed task manually
Edit the failed task to prevent its future failure
2 Warning Last result is "Succeeded View the log to read the warnings -> [optionally] Perform
with warning" or the actions to prevent the future warnings or failure.
task has been stopped
3 OK Last result is "Not run yet" means that the task has never been started or
"Succeeded" or "Not run has been started, but has not finished yet and, therefore its
yet" result is not available. You may want to find out why the
task has not started so far.
Centralized backup plans can be exported from a management server and imported to a
management server only.
Usage examples
Agent reinstallation
Export the backup plans before reinstalling the agent and import them after reinstalling.
Deploying a backup plan to multiple machines
You have an environment where it is not possible to use Acronis Backup Management Server; for
example, because of security restrictions. Nevertheless, you want to use the same backup plan
on multiple machines. Export this plan from one of the machines and deploy it as a file (p. 330) to
the other machines.
Adjusting credentials
Before exporting a backup plan that will further be imported to a different machine, check the user
account under which the plan runs (Edit > Plan parameters > Show task credentials, comments,
label > Plan's credentials).
The plan will successfully run on a different machine if the Plan's credentials value is either Acronis
service credentials or Run as: ... (current user). If the Plan's credentials parameter contains a
specific user account, the plan will start only if there is an identical account on that machine.
Therefore, you may need to do one of the following:
Create an account with identical credentials on the machine where the plan will be imported.
Edit credentials in the export file before importing. For details, see Editing the export file (p. 327).
Edit credentials after importing the plan.
Steps to perform
To export a backup plan
1. Select a backup plan in the Backup plans and tasks view.
2. Click Export.
3. Specify the path and name of the export file.
4. Confirm your choice.
To import a backup plan
1. Click Import in the Backup plans and tasks view.
2. Specify the path and name of the export file.
3. Confirm your choice.
4. If you need to edit the newly imported backup plan, select it in the Backup plans and tasks view,
then click Edit. Make the necessary changes and click Save.
Example
To make the backup plan run under the agent's credentials, find the <login> tag in the
<plan><options><common_parameters> section. The tag looks like follows:
<login>
Administrator
</login>
<password encrypted="true">
XXXYYYZZZ888
</password>
Delete the value of the <login> tag, so that the tag looks like follows:
<login>
</login>
<password encrypted="true">
XXXYYYZZZ888
</password>
How to change items to back up
Replacing a directly specified item with another directly specified item
Inside the <plan><targets><inclusions> section:
How it works
A dedicated folder for storing deployed plans exists on every machine where an agent is installed.
The agent tracks changes in the dedicated folder. As soon as a new .xml file appears in the dedicated
folder, the agent imports the backup plan from that file. If you change (or delete) an .xml file in the
dedicated folder, the agent automatically changes (or deletes) the appropriate backup plan.
If you edit the file before the deployment, the changes will take effect on all the machines where the
plan will be deployed. You may want to change the direct specification of the item to backup (such as
C: or C:\Users) with a template (such as [SYSTEM] or [All Profiles Folder]). For more information
about templates see Selection rules for volumes (p. 358) and Selection rules for files and folders (p.
356).
The absence of the key means that the agent does not monitor the dedicated folder.
To change the path, edit the key. The change will be applied after a restart of Acronis Managed
Machine Service.
In Linux
The change will be applied after a restart of the agent. To restart the agent, run the following
command as the root user:
/etc/init.d/acronis_mms restart
The absence of the tag means that the agent does not monitor the dedicated folder.
The respective message will appear at the top of the tabs, if execution of the plan requires user
interaction. The message contains a brief description of the problem and action buttons that let you
select the appropriate action or stop the plan.
Details
The Backup plans and tasks tab provides the following general information on the selected plan:
Name - name of the backup plan
Origin - whether the plan was created directly on the machine (local origin), or deployed to the
machine from the management server (centralized origin).
Execution state - execution state (p. 324) of the backup plan.
Status - status (p. 325) of the backup plan.
Machine - name of the machine on which the backup plan exists (only for centralized backup
plans).
Schedule - whether the task is scheduled, or set to start manually.
Last start time - how much time has passed since the last plan or task start.
Deployment state - the deployment states of the backup plan (only for centralized backup
plans).
Last finish time - how much time has passed since the last plan or task end.
Last result - the result of the last plan or task run.
Type - backup plan or task type.
Owner - the name of the user who created or last modified the plan
Next start time - when the plan or task will start the next time.
Comments - description of the plan (if provided).
Tasks
The Tasks tab displays a list of all tasks of the selected backup plan. To view the selected task details,
click Details.
Progress
The Progress tab lists all the selected backup plan's activities that are currently running or waiting for
their turn to run.
What to back up
The Source tab provides the following information on the data selected for backup:
Source type - the type of data selected for backing up.
Items to back up - items selected to back up and their size.
Where to back up
The Destination tab provides the following information:
Name - name of the archive.
Location - name of the vault or path to the folder, where the archive is stored.
Archive comments - comments on the archive (if provided).
2nd, 3rd, 4th, 5th location - names of the locations to which the archive was copied or moved (if
specified in the backup plan).
Settings
The Settings tab displays the following information:
Backup scheme - the selected backup scheme and all its settings with schedules.
Validation - if specified, events before or after which the validation is performed, and validation
schedule. If the validation is not set, the Never value is displayed.
Backup options - backup options changed against the default values.
When a task or activity requires user interaction, a message and action buttons appear above the
tabs. The message contains a brief description of the problem. The buttons allow you to retry or stop
the task or the activity.
14.2 Log
The local event log stores the history of operations performed by Acronis Backup on the machine.
To view a plain list of log entries, select Events in the Display drop-down list; to view log entries
grouped by activities, select Activities. The details of the selected log entry or activity are shown in
the Information panel at the bottom of the Log view.
Use filters to display the desired activities and log entries in the table. You can also hide the
unneeded columns and show the hidden ones. For details, see "Sorting, filtering and configuring
table items" (p. 29).
Select the activity or log entry to take an action on log entries. For details, see "Actions on log
entries" (p. 333) and "Log entry details" (p. 333).
14.3 Alerts
An alert is a message that warns about actual or potential problems. The Alerts view lets you rapidly
identify and solve the problems by monitoring the current alerts and view the alerts history.
Optionally, you can click View details to get more information about the alert you select.
Accepting alerts
By default, the Current alerts table lists both active and inactive alerts until they are not accepted. To
accept an alert, select it and then click Accept. By accepting an alert you acknowledge the alert and
agree to takeresponsibility for it. The accepted alerts are then moved to the Accepted alerts table,
with the alert state unchanged.
The Accepted alerts table stores the history of the accepted alerts. Here, you can find out who
accepted the alert and when it happen. The accepted alerts of both states can be removed from the
table either manually, by using Delete and Delete all buttons, or automatically (see "Configuring
alerts" later in this section).
Configuring alerts
Use the following options at the top of the Alerts view to configure alerts:
Show/hide alerts (p. 31) - specify the alert types to display in the Alerts view.
Notifications (p. 339) - set up e-mail notifications about alerts.
Settings (p. 337) - specify whether to move inactive alerts to the Accepted alerts table
automatically; set how long to keep the accepted alerts in the Accepted alerts table.
Backing up to the cloud After backing up to the cloud storage only, you decided to buy a license to
storage* > Full obtain greater functionality.
Trial > Backing up to the cloud After trying the product, you decided to back up to the cloud storage only.
storage*
*Some types of data (such as Exchange databases) cannot be backed up to the cloud storage. Prior to
backing up to the cloud storage, you need to activate a subscription for the cloud backup service on
the machine(s) you want to back up. For more information refer to the "Cloud backup" (p. 412)
section.
In this window, you can also change a license server used by a machine. This operation is possible
only if the machine is not registered on the management server. For registered machines, the
management server determines which license server they use. See "Changing the license server used
by the management server" (p. 381) for details.
This option is available under bootable media and for machines where Agent for Windows, Agent for
Linux or Acronis Backup Management Server is installed.
To collect system information
1. In the management console, select from the top menu Help > Collect system information from
'machine name'.
2. Specify where to save the file with system information.
To access the machine options, connect the console to the managed machine and then select
Options > Machine options from the top menu.
If you select Stop running tasks and shut down, all of the running Acronis Backup tasks will be
aborted.
If you select Wait for task completion, all of the running Acronis Backup tasks will be completed.
This option defines whether the machine will participate in the Acronis Customer Experience
Program (CEP).
If you choose Yes, I want to participate in the CEP, information about the hardware configuration,
the most and least used features and about any problems will be automatically collected from the
machine and sent to Acronis on a regular basis. The end results are intended to provide software
improvements and enhanced functionality to better meet the needs of Acronis customers.
Acronis does not collect any personal data. To learn more about the CEP, read the terms of
participation on the Acronis website or in the product GUI.
Initially the option is configured during the Acronis Backup agent installation. This setting can be
changed at any time using the product GUI (Options > Machine options > Customer Experience
Program). The option can also be configured using the Group Policy infrastructure (p. 398). A setting
defined by a Group Policy cannot be changed using the product GUI unless the Group Policy is
disabled on the machine.
14.6.3 Alerts
14.6.3.1 Alert management
Remove from "Accepted alerts" items older than
This option defines whether to delete the accepted alerts from the Accepted alerts table.
When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts older
than this period will be deleted from the table automatically.
When enabled, you can specify the alert types to apply this option to.
The option defines whether to alert if no backup was performed on a given machine for a period of
time. You can configure the time period that is considered critical for your business.
The preset is: alert if the last successful backup on a machine was completed more than 5 days ago.
The alert is displayed in the Alerts view of the Navigation pane. When the console is connected to
the management server, this setting will also control the color scheme of the Last backup column's
value for each machine.
Last connection
This option is effective when the console is connected to the management server or to a registered
machine (p. 444).
The option defines whether to alert if no connection was established between a registered machine
and the management server for a period of time so indicating that the machine might not be
centrally managed (for instance in the case of network connection failure to that machine). You can
configure the length of time that is considered critical.
The preset is: alert if the machine's last connection to the management server was more than 5 days
ago.
The alert is displayed in the Alerts view of the Navigation pane. When the console is connected to
the management server, this setting will also control the color scheme of the Last connect column's
value for each machine.
The notification schedule and the types of alerts to send are configured in Machine options > E-mail
settings > Alert notifications (p. 339).
When using this option, make sure that the e-mail settings are properly configured in Machine
options > E-mail settings (p. 338).
You can further override the settings set in the default backup and recovery options, when creating a
backup plan or a recovery task. The settings you obtain in this case will be plan-specific or
task-specific.
This option is not available when operating under the bootable media.
The option defines whether the agent(s) operating on the managed machine have to send the log
events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the
types of events to be sent.
You can override the settings set here, exclusively for the events that occur during backup or during
recovery, in the Default backup and recovery options. In this case, the settings set here will be
effective for operations other than backup and recovery, such as archive validation or cleanup.
You can further override the settings set in the default backup and recovery options, when creating a
backup plan or a recovery task. The settings you obtain in this case will be plan-specific or
task-specific.
For detailed information about using SNMP with Acronis Backup, please see "Support for SNMP (p.
53)".
The next section contains additional information about Setting up SNMP services on the receiving
machine (p. 340).
Linux
To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or the
snmpd (for Debian) package has to be installed.
SNMP can be configured using the snmpconf command. The default configuration files are located in
the /etc/snmp directory:
/etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent
/etc/snmp/snmptrapd.conf - configuration file for the Net-SNMP trap daemon.
This option is not available when operating under the bootable media.
This option defines whether the agent(s) operating on the managed machine have to log events in
the Application Event Log of Windows (to see this log, run eventvwr.exe or select Control Panel >
Administrative tools > Event Viewer). You can filter the events to be logged.
You can override the settings set here, exclusively for the events that occur during backup or during
recovery, in the Default backup and recovery options. In this case, the settings set here will be
effective for operations other than backup and recovery, such as archive validation or cleanup.
You can further override the settings set in the default backup and recovery options, when creating a
backup plan or a recovery task. The settings you obtain in this case will be plan-specific or
task-specific.
This option defines the maximum size of the agent log file. The file paths are as follows:
When the option is enabled, the program compares the actual log size with the maximum size after
every 100 log entries. Once the maximum log size is exceeded, the program deletes the oldest log
entries. You can select the amount of log entries to retain. The default 95% setting will keep most of
the log. With the minimum 1% setting, the log will be nearly cleared.
This parameter can also be set by using Acronis Administrative Template (p. 401).
To be able to use this option, you must be logged on as a member of the Administrators group on
the machine.
You have the opportunity to register the machine on the management server when installing an
Acronis Backup agent. If the machine is not registered, selecting Centralized management here will
initiate the registration (p. 445). Or, you can add the machine to the management server on the
server side. Any of the three registration methods require the server administrator privileges.
Selecting Stand-alone management on a registered machine will result in the machine stopping
communication with the server. On the management server, the machine appears as Withdrawn.
The management server administrator can delete the machine from the server or register the
machine once again.
This option defines whether the Acronis agent will connect to the Internet through a proxy server.
Note The proxy server must be configured to redirect both HTTP/HTTPS and TCP traffic.
Alternatively, you can try to take these settings from your Web browser’s configuration. This is how
to find them in three popular browsers.
Microsoft Internet Explorer. On the Tools menu, click Internet Options. On the Connections tab,
click LAN settings.
Mozilla Firefox. On the Tools menu, click Options and then click Advanced. On the Network tab,
under Connection, click Settings.
Google Chrome. In Settings, click Show advanced settings. Under Network, click Change proxy
settings.
What if you have to manage hundreds of machines? It takes time to create a backup plan on each
machine, while the plans may be quite similar – you need to back up, say, the system drive and the
users' documents. Tracking the plans' execution on each machine separately is also time-consuming.
To be able to propagate the management operations to multiple machines, you install Acronis
Backup Management Server (p. 444) and register (p. 445) the machines on the server. After that you
can create groups of machines and thus manage multiple machines as a whole. You can protect all of
them or your selection by setting up a centralized backup plan (p. 354).
Once you complete setting up a centralized backup plan on the management server, the server
deploys it to each of the machines included in the plan. The agents on the machines start executing
the plan. You are able to monitor the plan's status on a single screen and navigate, if required, to
each machine or activity to see their status and log entries. The management server also enables you
to monitor and manage the agent's locally originated activities.
Since you connect the console to the management server rather than to each machine and perform
all management operations through the central management unit, this way of management is called
centralized management (p. 437).
Centralized management does not rule out the direct management (p. 439) of each machine. You can
connect the console to each machine and perform any direct management operation. However,
centralized backup plans can be managed through the management server only, since a well-thought
out plan functions automatically and rarely requires human intervention.
Using the management server, you can create one or more centralized archive storages (centralized
vaults (p. 437)), which will be shared by the registered machines. A centralized vault can be used by
any backup plan, either centralized or created on the registered machines using direct management.
The storage node helps the agent deduplicate (p. 439) backups before transferring them to managed
vaults and deduplicates the backups already saved in the vaults. Deduplication results in reducing
backup traffic and saving storage space. The storage node also undertakes operations with archives
(such as validation and cleanup), which otherwise are performed by the agent, and thus relieves the
managed machines from unnecessary computing load. Last but not least, Acronis Backup Storage
Node enables using a tape library as a centralized vault for storing backup archives.
More than one storage node, each managing a number of vaults, can be set up and controlled
centrally from the Acronis Backup Management Server.
For more detailed information about storage nodes please refer to the "Storage nodes" (p. 216)
section.
Local connection
The local connection is established between Acronis Backup Management Console on a machine and
Acronis Backup Agent on the same machine.
To establish a local connection
On the toolbar, click Connect, then point to New connection, and then click Manage this
machine.
Remote connection
A remote connection is established between Acronis Backup Management Console on one machine
and Acronis Backup Agent on another machine.
Linux
Establishing a local connection on a machine running Linux, and managing such machine, requires
the root privileges on it.
To establish a local connection as the root user
1. If you are logged on as the root user, run the following command:
/usr/sbin/acronis_console
Otherwise, run the following command:
su -c /usr/sbin/acronis_console
2. Click Manage this machine.
To allow a non-root user to start the console
As a root user, add the name of the non-root user whom you want to allow to start the console,
to the file /etc/sudoers—for example, by using the visudo command.
Caution: As a result of this procedure, the non-root user will not only be allowed to start the console with the
root privileges, but also may be able to perform other actions as the root user.
After remote connection is established, the user has management rights on the remote machine as
described in "User privileges on a managed machine" (p. 36).
Note: On a remote machine running Windows Vista and later with enabled User Account Control (UAC)—and
which is not part of a domain—only the built-in Administrator user can back up data and perform disk
management operations. To overcome the restriction, include the machine into a domain or disable UAC (p.
346) on the machine (by default, UAC is enabled).
For information about Acronis security groups and their default members, see "Acronis security
groups" (p. 348).
For the authentication policies to work, we recommend installing the latest version of Linux-PAM for
your Linux distribution. The latest stable source code of Linux-PAM is available at Linux-PAM source
code Web page.
Example 1
This authentication policy uses the pam_succeed_if module and works with Linux distributions with
kernel version 2.6 or later. For an authentication policy which works with kernel version 2.4, see the
next example.
Example 2
The above authentication policy might not work on Linux distributions with kernel version
2.4—including Red Hat Linuх—because the pam_succeed_if.so module is not supported there.
These groups are created when Acronis Backup Agents or Acronis Backup Management Server are
being installed. During installation, you can specify what users to include in each group.
A user who is a member of this group can manage the machine remotely by using Acronis Backup
Management Console, according to the management rights described in Users' privileges on a
managed machine (p. 36).
Alternatively, when creating a centralized backup plan, the management server administrator has
the option to explicitly specify a user account under which the centralized backup plan will run on the
registered machines. In this case, the user account must exist on all the machines to which the
centralized backup plan will be deployed. This is not always efficient.
To be a management server administrator, the user must be a member of the Acronis Centralized
Admins group on the machine where the management server is installed.
There are two mechanisms which ensure secure communication between Acronis Backup
components:
Secure authentication provides secure transfer of certificates needed to establish a connection,
by using the Secure Sockets Layer (SSL) protocol.
Encrypted communication provides secure transfer of information between any two
components—for example, between Acronis Backup Agent and Acronis Backup Storage
Node—by encrypting the data being transferred.
For instructions on how to set up secure authentication and data encryption settings, see Configuring
communication options (p. 351).
For instructions on how to manage SSL certificates used for secure authentication, see SSL
certificates (p. 352).
Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family,
cannot connect to the Acronis Backup components, regardless of the secure authentication and data encryption
settings.
An Acronis component can act as a client application, a server application, or both, as shown in the
following table.
Component name Can be Can be
client server
When applied to a single machine, the administrative template defines the communication settings
for all the components on the machine; when applied to a domain or an organizational unit, it
defines the communication settings for all the components on the machines in that domain or
organizational unit.
To configure communication settings
1. Click Start, then click Run, and then type gpedit.msc
2. In the Group Policy console, expand Computer Configuration, then expand Administrative
Templates, and then click Acronis.
3. In the Acronis pane to the right, double-click a communication option that you want to configure.
The administrative template contains the following options (p. 398):
Remote Agent ports
Client Encryption options
Server Encryption options
4. For the new communication settings to take effect, restart all running Acronis
components—preferably, by restarting Windows. If restart is not possible, make sure you do the
following:
If Acronis Backup Management Console is running, close it and start it again.
If other Acronis components, such as Acronis Backup Agent for Windows or Acronis Backup
Management Server are running, restart their corresponding services from the Services
snap-in in Windows.
After installation, you can change the ports at any time to match your preferable values or for the
purpose of security. This operation requires the restart of Acronis Remote Agent (in Windows) or the
acronis_agent (in Linux) service.
After the port is changed on the server side, connect to the server using the <Server-IP>:<port> or
the <Server-hostname>:<port> URL notation.
Note: If you use network address translation (NAT), you can also configure the port by setting up port mapping.
To be able to change the ports' numbers, load and configure the Administrative Template, provided
by Acronis, as described in Configuring communication settings (p. 351), under "Remote Agent
ports".
Specify the port in the /etc/Acronis/Policies/Agent.config file. Restart the acronis_agent daemon.
SSL certificates for the components can be one of the two types:
Self-signed certificates, such as certificates automatically generated during the installation of an
Acronis component.
Non-self-signed certificates, such as certificates issued by a third-party Certificate Authority
(CA)—for example, by a public CA such as VeriSign® or Thawte™—or by your organization's CA.
Certificate path
All Acronis components installed on a machine, when acting as a server application, use an SSL
certificate called the server certificate.
In Windows, the certificate path and the server certificate's file name are specified in the registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Encryption\Server. The default path is:
For 32-bit versions of Windows: %CommonProgramFiles%\Acronis\Agent
For 64-bit versions of Windows: %CommonProgramFiles(x86)%\AcronisAgent
For self-signed certificates, the certificate thumbprint (also known as fingerprint or hash) is used for
future host identification: if a client has previously connected to a server by using a self-signed
certificate and tries to establish connection again, the server checks whether the certificate's
thumbprint is the same as the one used before.
Self-signed certificates
On machines running Windows, if the certificate location contains no server certificate, a self-signed
server certificate is automatically generated and installed during the installation of any Acronis
component except Acronis Backup Management Console.
If the machine is renamed after its self-signed certificate was generated, the certificate cannot be
used and you will need to generate a new one.
To generate a new self-signed certificate
1. Log on as a member of the Administrators group.
2. In the Start menu, click Run, and then type: cmd
3. Run the following command (note quotation marks):
When using a 32-bit version of Windows:
For a long-time backup strategy that includes schedules and conditions, timely deleting of backups or
moving them to different locations, consider creating a backup plan.
Configuring immediate backup is similar to creating a centralized backup plan (p. 354) except for the
following:
There are no options to schedule backups and to set up retention rules.
Conversion of a disk-level backup to a virtual machine is not available as a part of the backup
operation. You can convert the resulting backup afterwards.
After a backup task is configured, the software has 5 minutes to deploy the task to the specified
machines. If all the attempts to deploy the task on a machine during that period fail, this machine
will not be backed up.
If you run the same backup task again, it will back up only those machines that were backed up
during the first run.
Unlike a Back up now operation that is performed directly on a managed machine (p. 55), a Back up
now operation configured on the management server never uses the simplified naming of backup
files.
The steps required for the creating centralized backup plan are similar to creating a backup plan (p.
55) except the following:
When selecting what data to back up, you can either select items on the registered machines
directly or use the selection rules. For more information, see "Selecting data to back up" (p. 354).
When specifying where to store machines' archives, you can select to store:
All machines' archives in a single location.
Each machine's archive in the specified folder on the machine.
Each machine's archive in the machine's Acronis Secure Zone.
For more information, see "Location selection" (p. 360).
Simplified naming of backup files (p. 77) is not available.
Single-pass disk and application backup (p. 311) is always available for selection. However,
single-pass backup will be applied only to those machines where it is possible. For virtual
machines backed up by Agent for VMware or Agent for Hyper-V, and for other machines that do
not have licenses for single-pass backup, a regular disk-level backup will be created.
When setting up a daily, weekly, or monthly schedule, you can use the advanced scheduling
settings. For more information, see "Advanced scheduling settings" (p. 92).
Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, the
plan will back up this item on each machine where this exact path will be found.
To include In the Files and folders
column, type or select:
File Text.doc in folder D:\Work\Text.doc
D:\Work
Folder C:\Windows C:\Windows
Environment variables
You can use other environment variables or a combination of environment variables and text. For
example, to refer to the Acronis folder in the machines' Program Files folder,
type: %PROGRAMFILES%\Acronis
Templates
Linux
To include In the Files and folders
column, type or select:
Text file file.txt on the /dev/hda3/file.txt
volume /dev/hda3
or
mounted on
/home/usr/docs /home/usr/docs/file.txt
Home directory of the /home
common users
The root user's home /root
directory
Directory for all /usr
user-related programs
Directory for system /etc
configuration files
Operating systems starting with Windows 7 and Windows Server 2008 R2 create a dedicated system
volume called System Reserved. If you select [SYSTEM], only this dedicated volume will be backed up.
Always select both [SYSTEM] and [BOOT] when backing up machines running these operating
systems.
Because centralized backup plans usually include multiple machines with various operating systems,
Acronis recommends that you always select both the system and the boot volumes for backup. This
ensures the integrity of every operating system.
For example, it is possible to set up a centralized backup plan to back up volume C: on Windows
machines and partition /dev/hda1 on Linux machines.
Unlike Windows, there is no clear distinction between a volume (partition) and a folder (directory) in
Linux. Linux has the root partition (denoted as /) to which elements of various types—including hard
disks, directories, and system devices—are attached (mounted). This forms a tree similar to the file
and folder structure in Windows.
For example, let a Linux machine contain a hard disk which is split into three volumes, or partitions:
the first, second, and third partitions. These partitions are available in the tree as /dev/hda1,
/dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, you can
specify the rule /dev/hda3 in the Data to Back Up dialog box.
Furthermore, a Linux partition can be mounted anywhere inside the tree. For example, /dev/hda3,
can be mounted as a “subdirectory” inside the tree. Such a tree might be /home/usr/docs. In this
In general, when setting up a centralized backup plan to perform volume backups of Linux machines,
make sure that the paths entered in the selection rules for volumes correspond to partitions (such as
/dev/hda2 or /home/usr/docs in the previous example), and not to directories.
In general, the standard name for a Linux partition consists of three components:
Disk type: hd for IDE drives, sd for SCSI drives, md for software RAID drives (for example,
dynamic volumes)
Disk number: a for the first disk, b for the second disk, and so on
Partition number on the disk: 1 for the first partition, 2 for the second partition, and so on
To guarantee backing up selected disks regardless of their type, consider including three entries in
the Data to Back Up dialog box, one for each possible type. For example, to back up the first hard
disk of each Linux machine under a centralized backup plan, you may want to add the following rules:
/dev/hda1
/dev/sda1
/dev/mda1
For example, to back up two logical volumes, lv_root and lv_bin, both of which belong to the volume
group vg_mymachine, specify the following selection rules:
/dev/vg_mymachine/lv_root
/dev/vg_mymachine/lv_bin
To see the list of logical volumes on a machine, run the lvdisplay utility. In our example, the output
would be similar to the following:
--- Logical volume ---
LV Name /dev/vg_mymachine/lv_root
VG Name vg_mymachine
…
To store archives in a centralized vault, expand the Vaults group and click the vault.
To store archives on a network share, expand the Network folders group, then select the
required networked machine and then click the shared folder. If the network share requires
access credentials, the program will ask for them.
To store archives on an FTP or SFTP server, expand the corresponding group and reach the
appropriate server, then select the folder that will be used for storing archives.
According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.
Store each machine's archive in the specified folder on the machine with agent
Enter the full path to the folder in the Path field. You need to create this folder in advance on
each machine the centralized plan is created for.
Store each machine's archive in the machine's Acronis Secure Zone
You need to create Acronis Secure Zone in advance on each machine the centralized plan is
created for. For information on how to create Acronis Secure Zone, see the Creating Acronis
Secure Zone (p. 191) section.
2. Naming the archives
Data from each machine will be backed up to a separate archive.
The software generates a common name for the new archives and displays it in the Name field. The
name looks like [Machine Name]_Archive(N), where the [Machine Name] stands for the machine's
name (physical or virtual), and N is a sequence number. If you are not satisfied with the automatically
generated name, construct another name.
When selecting data to back up from multiple machines, the following variables can be used:
[Machine Name] - substitution for the machine's name. Use of this variable is mandatory.
[Plan name] - substitution for the centralized backup plan's name. Use this variable for additional
distinguishing of the archives by the backup plan names.
[Virtual Host Name] - substitution for the name of the virtual machine host. Use this variable in
cases, when two or more virtual machines from different hosts have the same names.
Example: You create the centralized backup plan, named for example, SYSTEMBACKUP, that will be
deployed to three machines (say, FINDEPT1, FINDEPT2, FINDEPT3). In the Name field you specify
[Machine Name]_[Plan name]_Archive(N). Thus, the following three archives will be created in the
location:
FINDEPT1_SYSTEMBACKUP_Archive(1)
FINDEPT2_SYSTEMBACKUP_Archive(1)
To learn more about operations available depending on the user privileges, see the User privileges on
a managed machine (p. 36) section.
15.3.6 What if a machine does not have data meeting the selection
rules
A centralized backup plan can be deployed to a machine that does not have data meeting the
selection rules. No error or warning will be logged during the plan deployment because it is assumed
that the data may appear in the future. A backup plan is created as usual and the plan state is
changed to Deployed.
If no data to back up is found at the time when the backup task starts, the task will fail and the plan
status will turn to Error. If at least one of the data items is found, the backup task will succeed with a
warning. The plan status will change accordingly.
The backup tasks will start on schedule as specified by the plan and produce a similar result until all
data items appear on the machine or the plan is edited to exclude the non-existent data items.
Examples
Assume the selection rule states that the plan has to back up volumes D: and F:. The plan is deployed
to both Linux and Windows machines. Once the first backup is started, the plan gets the Error status
on the Linux machines and on the Windows machines that do not have such volumes. The plan gets
the Warning status on Windows machines that have either a D: or F: volume, unless an event that
will result in an error occurs.
The plan that has to back up the [SYSTEM] and the /dev/sda1 volumes will get the Warning status on
the Windows machines (since /dev/sda is not found) and on the Linux machines that have the
15.4.1 Dashboard
Use the Dashboard view to estimate at a glance the health of data protection on the registered
machines. The dashboard displays the summary of Acronis Backup agents' activities, lets you check
for free space available in managed vaults, and rapidly identify and resolve any issues.
Recent alerts
The Recent alerts section draws your attention to issues that have occurred on the management
server, registered machines and in centralized vaults. It offers you ways of fixing or examining the
issues. By default, the section shows the five most recent alerts. Click the View all link to move to the
Alerts view and see all alerts. If no alerts or warnings have been fixed, the system displays "There are
no alerts".
Activity history
The stacked column chart in the Activity history section lets you explore the daily history of the
Acronis Backup agents' activities. The history is based on the log entries, collected from the
registered machines and from the management server. The chart shows the number of log entries of
each type (Succeeded, With warnings, Failed) for a particular day.
Statistics for the selected date are displayed to the right of the chart. All the statistics fields are
interactive; i.e. if you click any field, the Log view will be opened with the log entries pre-filtered by
this field.
At the top of the chart, you can select the activities to display depending on the presence and
severity of the errors. Click the View all link to display in the Log view all activities. They are sorted by
the start date. Right-click the particular day on the column chart to show the context menu and
move to the Log view for the selected date.
Information presented in the Machines, Backup plans, and Recovery tasks sections is refreshed
every time the management server synchronizes with the machines. Information in other sections is
refreshed every 10 minutes and every time you access the Dashboard.
Vaults
The Vaults section displays information about vaults space usage. In some cases information about
free space in a vault might be not available; for example, if the vault is located on a tape library. If the
vault itself is not available (offline), the "Vault is not available" message will be displayed.
The "No centralized vaults were created" message is displayed, if there are no vaults. To create a
new vault, select the Create now link and move to the Create vault page.
Add a machine (p. 368) to the management server using the machine's name or IP address, import
machines from Active Directory, or from text files. Once a machine is registered on the management
server, it becomes available for centralized backup (p. 354), for grouping and for monitoring the
activities related to data protection.
To estimate whether the data is successfully protected on a managed machine, check its status. A
machine's status is defined as the most severe status of all backup plans (p. 325) (both local and
centralized) existing on the machine. It can be "OK", "Warning" or "Error".
Typical workflow
Create a custom group and add machines to it. For more information, see "Machine groups" (p.
365).
Select a machine (or group) to perform actions on it. See "Actions on machines" (p. 366) and
"Actions on groups" (p. 372).
To view detailed information about the selected machine or group and perform additional
operations (such as run/stop tasks, import/export backup plans), use the information panel at
the bottom of the window. The panel is collapsed by default. To expand the panel, click the
arrow mark ( ).
Use filtering and sorting capabilities for easy browsing and examination of the required machines.
For more information, see "Sorting, filtering and configuring table items" (p. 29).
Built-in group
As soon as a machine is registered on the management server, the machine appears in the All
machines with agents built-in group. This group always exists on a management server and cannot
be edited or deleted. The built-in group cannot contain any nested groups.
To protect all the registered machines at once, create a centralized backup plan select the All
machines with agents group. Protecting all machines with a single backup plan may not be
satisfactory because of the different roles of the machines. The backed-up data is specific for each
department; some data has to be backed up frequently, other data is backed up twice a year.
Therefore, you may want to create various backup plans applicable to different sets of machines. In
this case, consider creating custom groups.
Custom groups
Custom groups are created by the management server administrator. Creating custom groups helps
the administrator to organize data protection by company departments, by Active Directory
organizational units, by various populations of users, by the site locations and so forth.
A custom group can contain one or more nested groups. Any custom group can be edited or deleted.
The administrator can create the following custom groups:
Static groups
The static groups contain the machines manually added by the administrator. The static group
content never changes unless the administrator explicitly adds or deletes a machine.
Example: You create custom group for the accounting department and manually add the
accountants' machines to this group. Once you create the centralized backup plan for the group,
the accountants' machines become protected. If a new accountant is hired, you will have to add
the new machine to the group manually.
Dynamic groups
The dynamic groups contain the machines added automatically according to the criteria specified
by the administrator. The dynamic group content changes automatically. A machine remains in
the group until it meets the specified criteria.
Example: The accounting department forms a separate Active Directory organizational unit (OU).
You simply specify the accounting OU as the group membership criterion and create the
centralized backup plan for it. If a new accountant is hired, the new machine will be added to the
group as soon as it is added to the OU, and thus will be protected automatically.
Tip. To make the best use of the AD OU criterion, consider reproducing the Active Directory
hierarchy in the management server.
For more information about operations with groups and machines, see the following sections:
Actions on groups (p. 372)
Actions on machines (p. 366)
Adding and importing actions are available when you select the Machines with agents view or
the All machines with agents group in the navigation tree.
To Do
The management console addresses to the agent and initiates the registration procedure. Because
registration requires the agent's participation, it cannot take place when the machine is offline.
An additional agent installed on a registered machine becomes registered on the same management
server automatically. Multiple agents are jointly registered and deregistered.
Grouping actions
To Do
Direct management
To Do
Other actions
To Do
User name. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username).
Password. The password for the account.
5. Click Next, and then click Proceed.
Initiating registration on the machine side
The registration procedure can be initiated on the machine side.
1. Connect the console to the machine where Acronis Backup agent is installed. If prompted for
credentials, specify credentials of a member of the Administrators group on the machine.
Example:
Machine_name_1
Machine_name_2
192.168.1.14
192.168.1.15
Specifying an empty file leads to deletion of all machines with agents from the management server.
A registered machine has to be specified by its registration address: that is, you need to provide exactly the
same host name, fully qualified domain name (FQDN), or IP address as was specified when the machine was
initially added to the management server. Otherwise, the machine will be deleted and added again as if it were
another machine. This means all centralized backup plans, both inherited and directly deployed, will be removed
from the machine and its static group membership will be lost.
The registration address of each machine can be found in the Registration address column in any
management server view that contains the machine (the column is hidden by default).
To avoid a discrepancy, you can initially import the machines from a text file. Modify this file later as
required, by adding and removing machines, but do not change the names/addresses of the
machines that have to remain registered.
To synchronize machines with a text file
1. In the Navigation tree, select Machines with agents, or All machines with agents.
2. Click Synchronize with file on the toolbar.
3. In the Path field, enter a path to the .txt or .csv file, or click Browse and select the file in the
Browse window.
4. Under Logon settings, specify the user name and password of a user who is a member of the
Administrators group on all machines that are listed in the file.
5. Click OK to start import.
Synchronization command-line tool
Acronis Backup Management Server has a command-line tool that enables you to create a batch file
and schedule the synchronization task using Windows scheduler.
Machine details
Four tabs accumulate all information on the selected machine and let the management server
administrator perform operations with the backup plans and tasks on the machine.
Operations
Filtering and sorting of the backup plans and task is performed as described in "Sorting, filtering and
configuring table items" (p. 29).
Member of
This tab appears only if the selected machine is added to one or more custom groups and displays a
list of the groups the machine is a member of.
Operations
To Do
Progress
The Progress tab lists all of the selected machine's activities and tasks that are currently running. The
tab provides information about task progress, elapsed time and other parameters.
You can create a dynamic group based on the list of the hosted virtual machines. To do this, click
Create a dynamic group. The created group will be accessible in the Virtual machines view.
Add a machine to the This action is enabled only for the Machines with agents view and for
management server
the All machines with agents group.
Custom groups can be created in the root folder ( Machines with agents),
or in other custom groups.
Add machines to the selected Click Add machines to group.
static group
In the Add machines to group (p. 370) window, select the machines that you
need to add.
Not applicable to dynamic groups.
Create a new backup plan for Click Create backup plan to create a backup plan for the selected group.
a group
This operation is described in depth in Creating a backup plan (p. 55).
View detailed information on Click Details.
a group
In the Group details (p. 376) window, examine information on the selected
group.
Rename a custom Click Rename.
group/subgroup
In the Name column, type a new name for the selected group.
Built-in groups cannot be renamed.
Edit a custom group Click Edit.
In the Edit group (p. 376) window, change the required parameters of the
group.
Move one custom group to Click Move to.
another
In the Move to group (p. 375) window, specify a group that will be a new
parent of the selected group.
Delete a custom group Click Delete.
Deletion of a parent group will delete its child groups as well. Centralized
backup plans created for the parent group and inherited by its child groups
will be removed from all members of the deleted groups. The backup plan
that are directly created for the members will remain.
Refresh a list of groups Click Refresh.
The management console will update the list of groups from the management
server with the most recent information. Though the list of groups is
refreshed automatically based on events, the data may not be retrieved
immediately from the management server due to some latency. Manual
Refresh guarantees that the most recent data is displayed.
Select an organizational unit from the Active Directory tree by clicking Browse, or typing it manually.
If the domain access credentials were not specified in the management server options, the program
will ask you to provide them. The credentials will be saved in the Domain access credentials (p. 392)
option.
For example, suppose that the domain us.corp.example.com has OU1 (which is in the root), OU1
has OU2, and OU2 has OU3. And you need to add the machines of OU3. So, the criterion will be:
OU=OU3, OU=OU2, OU=OU1
If OU3 has child containers and you also need to add the machines of those containers to the group,
select the Include child containers check box.
If you later modify the file, the contents of the group will change accordingly. The file is checked
every 15 minutes.
If you later delete the file or if it becomes unavailable, the contents of the group will correspond to
the list that was last stored in the file.
Example:
Machine_name_1
Machine_name_2
192.168.1.14
192.168.1.15
A registered machine has to be specified by its registration address, that is, you need to provide
exactly the same host name, fully qualified domain name (FQDN), or IP address as was specified
when the machine was initially added to the management server. Otherwise, the machine will not be
added to the group. The registration address of each machine can be found in the Registration
address column in any management server view that contains the machine (the column is hidden by
default).
Changing the type of group will result in its conversion. Any custom group can be converted to a
dynamic group if it was static, and vice versa.
When converting a static group to dynamic, provide grouping criteria. All the members that exist
in the static group that do not match the provided criteria will be removed from the dynamic
group.
When converting a dynamic group to static, two options are available – either to leave the
current content of the group or to empty the group.
Group details
Aggregates in two tabs all of the information on the selected group. This allows performing
operations with the centralized backup plans for the group.
Group
Displays the following information on the group:
Name - name of the selected group
Parent group (for subgroups only) - name of the parent group
Machines - number of machines in the group
Type - type of the group (static or dynamic)
Criteria (for dynamic groups only) - grouping criteria
Description - the group description (if specified)
Backup plans
Displays a list of centralized backup plans related to the group and allows performing the following
operations:
To Do
The centralized backup plan cannot be run manually, if at least one of the
machines included in the plan runs Acronis Backup & Recovery 10 agent.
Filtering and sorting of the backup plans and tasks is performed in the same way as for the Backup
plans and tasks view. For details, see Sorting, filtering and configuring table items (p. 29).
Install Acronis Backup Agent for Windows or Agent for Linux on the virtual machine and register (p.
368) it on the management server. The machine will be treated as a physical one. It will appear under
Machines with agents in the All machines with agents group.
On Acronis Backup Management Server, a machine is considered virtual if it can be backed up from
the virtualization host without installing an agent on the machine. This is possible when using Acronis
Backup Advanced for virtual environments.
There are several ways to add a virtual machine to the management server:
Enable integration of the management server with vCenter Server.
Result. The virtual machines managed by the vCenter Server appear under Virtual machines in
the All virtual machines group. The machines look as unmanageable (grayed out) but can be
backed up if automatic agent deployment was enabled during the integration.
To check whether the data is successfully protected on the machines the centralized plan is deployed
to, inspect the cumulative status of the plan.
To find out whether a centralized backup plan is currently being deployed, removed, or updated,
check the deployment state of the plan. In each of the states, the backup plan can have one of the
following statuses: Error; Warning; OK.
To keep track of a task's current progress, examine its state (p. 325). Check a task status (p. 326) to
ascertain the result of a task.
Typical workflow
Use filters to display the desired backup plans (tasks) in the backup plans table. By default, the
table displays all the plans of the managed machine sorted by name. Additionally, you can hide
the unneeded columns and show the hidden ones. For more information, see Sorting, filtering
and configuring table items (p. 29).
In the table, select the backup plan (task).
Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on
centralized backup plans and tasks (p. 378) section for details.
To review detailed information on the selected plan (task), use the information panel at the
bottom of the window. The panel is collapsed by default. To expand the panel, click the arrow
mark ( ). The content of the panel is also duplicated in the Plan details (p. 331) and Task details
(p. 332) windows respectively.
Clone a backup
Click Clone.
plan
The clone of the original backup plan will be created with default name "Clone of
<original_plan_name>". The cloned plan will be disabled immediately after cloning, so that it
does not run concurrently with the original plan. You can edit the cloned plan settings before
enabling it.
Enable a plan Click Enable.
The previously disabled backup plan will run again as scheduled.
Disable a plan Click Disable.
The backup plan will not run as scheduled. However, it can be started manually. After a
manual run, the plan will stay disabled. The plan will run as usual if you enable it again.
Storage nodes become available in the Storage nodes view after you install and register them on the
management server. For more information about operations with storage nodes, see "Storage
nodes" (p. 216).
15.4.6 Licenses
The Licenses view enables you to manage licenses stored on Acronis License Server. The license
server can be either integrated with Acronis Backup Management Server, or installed as a separate
component.
Right-click on the column headings bar to choose the details to display: License key, Expiration date,
Import date, and Total number of license keys, as well as how many of them are Available (i.e. free)
and Used.
To view information about each specific license key, expand the required product and then expand
the key. To obtain information about machines that use the license, click Show machines that use
the license.
Before changing the license server, make sure to export (p. 382) the licenses from the old license
server and then add (p. 381) them to the new one.
To change the license server
1. Connect the console to the management server.
2. In the Actions menu, select Change license server.
3. Specify the name or IP address of the machine with the license server.
4. Click OK.
After changing the license server, the management server deploys the new license server's IP
address to the registered machines and they start using the new license server.
15.4.7 Alerts
An alert is a message that warns about actual or potential problems. The Alerts view lets you rapidly
identify and solve the problems by monitoring the current alerts and view the alerts history.
Optionally, you can click View details to get more information about the alert you select.
Accepting alerts
By default, the Current alerts table lists both active and inactive alerts until they are not accepted. To
accept an alert, select it and then click Accept. By accepting an alert you acknowledge the alert and
agree to takeresponsibility for it. The accepted alerts are then moved to the Accepted alerts table,
with the alert state unchanged.
The Accepted alerts table stores the history of the accepted alerts. Here, you can find out who
accepted the alert and when it happen. The accepted alerts of both states can be removed from the
table either manually, by using Delete and Delete all buttons, or automatically (see "Configuring
alerts" later in this section).
To export entire table contents to a *.txt or *.csv file, click Save all to file.
To obtain information about machines associated with the group alert, click View details.
Configuring alerts
Use the following options at the top of the Alerts view to configure alerts:
Show/hide alerts (p. 31) - specify the alert types to display in the Alerts view.
Notifications (p. 394) - set up e-mail notifications about alerts.
Settings (p. 391) - specify whether to move inactive alerts to the Accepted alerts table
automatically; set how long to keep the accepted alerts in the Accepted alerts table.
15.4.8 Reporting
Reporting provides the management server administrator with detailed and well-structured
information concerning the enterprise data protection operations. Reports can be used as an
instrument for profound analysis of the whole backup infrastructure within a corporate network.
The management server generates reports using statistics and logs, which are collected from
registered machines and are stored in the dedicated databases.
Report templates
Reports are generated based on report templates. The templates define the information to be
included in the report and the way the information is represented.
Reports about vault statistics and task activities are interval-based and provide historical information
for the specified time interval that can last from days to years, depending on the amount of data kept
in the databases.
In a customizable report template, by using filters, you can specify which entries to include in the
report, how to group and sort them. To configure a report, select a report template in the Reports
view, click Configure on the toolbar, and then set Filters and Report view. Click OK to generate the
report.
A predefined report template is preset so that you can generate a report with one click. To start
generating a report, select a report template in the Reports view, and then click Generate on the
toolbar.
Filters
Under Filters, choose which machines to include in the report. Only the machines that meet all filter
criteria are included.
Machines: The list of machines. Select either machines with agents or virtual machines.
[Optional] Click Select to select particular machines or machines' groups.
Status: The machine statuses—OK, Warning, and/or Error.
Last connection (machines with agents only): The period within which the last connection
between the machines and the management server occurred.
Last successful backup: The period within which the last successful backup finished on each of
the machines.
Next backup: The period within which the next scheduled backup will start on each of the
machines.
Operating system: The operating systems that the machines run.
IP address (machines with agents only): The range for the latest-known IP addresses of the
machines.
Availability (machines with agents only): The types of the machines' availability—Online or
Offline.
With the default filter settings, the report includes all machines with agents.
Report view
Under Report view, choose how the report will look:
Select whether to show all items in a single table or to group them by a particular column.
Specify which table columns to show, and in which order.
Specify how to sort the table.
Filters
Under Filters, choose which backup plans to include in the report. Only the backup plans that meet
all filter criteria are included.
Origin: The types of origin of the backup plans—Local and/or Centralized.
Machines: The list of machines on which the backup plans exist.
Backed up data type: The types of backed up data—Machines/Disks/Volumes and/or Files.
Report view
Under Report view, choose how the report will look:
Select whether to show all items in a single table or to group them by a particular column.
Specify which table columns to show, and in which order.
Specify how to sort the table.
Filters
Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter criteria
are included.
Origin: The types of origin of the tasks—Centralized, Local, and/or Local without backup plan. A
centralized task belongs to a centralized backup plan. A local task might not belong to a backup
plan (for example, a recovery task).
Backup plans (centralized tasks only): The backup plans on which the tasks are based.
Machines: The list of machines on which the tasks exist.
Type: The task types—for example, disk backup tasks.
Execution state: The execution states of the tasks—for example, Running.
Last result: The last results of the tasks—Succeeded, Succeeded with warnings, Failed, Stopped,
or "-" (not resulted yet).
Schedule: The types of the tasks' schedules—Manual or Scheduled. Manual schedule means that
a task runs only when you start it manually.
Owner: The list of users who created the tasks.
Duration: The limits for the amount of time within which each of the tasks last ran.
With the default filter settings, the report includes all tasks from all machines.
Report view
Under Report view, choose how the report will look:
Select whether to show all items in a single table or to group them by a particular column.
Specify which table columns to show, and in which order.
Specify how to sort the table.
Filters
Under Filters, choose which archives to include in the report. Only the archives that meet all filter
criteria are included.
Vaults: The list of centralized managed vaults that store the archives.
Machines: The list of registered machines from which the archives were created.
Type: The archive types—disk-level archives and/or file-level archives.
Owner: The list of users who created the archives.
Creation time: The period within which the newest backup was created in each of the archives.
Occupied space: The limits for the space occupied by each of the archives.
Data backed up: The limits for the total size of data that is currently stored in each of the
archives. This size may differ from the occupied space because of compression or deduplication.
Number of backups: The limits for the number of backups that each of the archives contains.
With the default filter settings, the report includes all archives that are stored in the centralized
managed vaults.
Report view
Under Report view, choose how the report will look:
Select whether to show all items in a single table or to group them by a particular column.
Specify which table columns to show, and in which order.
Specify how to sort the table.
Report coverage
Under Report coverage, choose the time interval for which you want to generate the report. The
report will show the state of the selected vaults at the specified time on each day in the report
period.
Filters
Under Filters, select which centralized managed vaults to include in the report, and whether to
include information about the combined total of all the selected vaults.
A combined total is the total free and occupied space, total amount of backed up data, total number
of archives and backups, and average ratios across the selected vaults.
With the default filter settings, the report includes information about all centralized managed vaults
plus the combined total.
Report view
Under Report view, choose how the report will look:
The diagrams show how many times each task finished on a particular day with each of these results:
“Succeeded”, “Succeeded with warnings”, and “Failed”.
Report coverage
Under Report coverage, choose the time interval for which you want to generate the report.
Filters
Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter criteria
are included.
Origin: The types of origin of the tasks—Centralized, Local, and/or Local without backup plan. A
centralized task belongs to a centralized backup plan. A local task might not belong to a backup
plan (for example, a recovery task).
Backup plans (centralized tasks only): The backup plans on which the tasks are based. The
default setting means all backup plans that ever existed during the report period.
Machines: The list of machines on which the tasks exist.
Type: The task types—for example, disk backup tasks.
Owner: The list of users who created the tasks.
With the default filter settings, the report includes all tasks that existed on the registered machines
any time during the report period.
The tables in the report will contain columns, from left to right, as listed in Display in report. The
topmost column in the list will be the leftmost column in the report.
When choosing the columns to display, use the left arrow and right arrow buttons to include or
exclude columns, and the up arrow and down arrow buttons to change the order of columns.
Some columns—such as Machine name in a report about machines—cannot be excluded from the
list, or moved up or down in it.
15.4.9 Log
The centralized event log stores the history of operations performed by the management server, the
storage nodes, and the registered machines.
To view a plain list of log entries, select Events in the Display drop-down list; to view log entries
grouped by activities, select Activities. The details of the selected log entry or activity are shown in
the Information panel at the bottom of the Log view.
Use filters to display the desired activities and log entries in the table. You can also hide the
unneeded columns and show the hidden ones. For details, see Sorting, filtering and configuring table
items (p. 29). Having selected items in other administration views (Dashboard, Machines with agents,
Backup plans and tasks), you can open the Log view with already filtered log entries for the item in
question.
Select the activity or log entry to take an action on log entries. For details, see Actions on log entries
(p. 389) and Log entry details (p. 390).
Save the selected log 1. Display Activities and select activities or display Events and select log entries.
entries to a file
2. Click Save selected to file.
3. In the opened window, specify a path and a name for the file.
All log entries of the selected activities or selected log entries will be saved to the
specified file.
Save all the log entries 1. Make sure, that the filters are not set.
to a file
2. Click Save all to file.
3. In the opened window, specify a path and a name for the file. All log entries will
be saved to the specified file.
Save all the filtered log 1. Set filters to get a list of the log entries that satisfy the filtering criteria.
entries to a file
2. Click Save all to file.
3. In the opened window, specify a path and a name for the file.
All log entries in the list will be saved to the specified file.
Delete all the log entries Click Delete all.
All the log entries will be deleted from the log, and a new log entry will be created. It
will contain information about who deleted the log entries and when.
Set up the logging level Click Configure logging level.
In the Logging level (p. 395) window, specify event types to be collected from the
registered machines to the centralized log.
To view details of the next or the previous log entry, click the down arrow button or correspondingly
the up arrow button.
To access the management server options, connect the console to the management server and then
select Options > Management server options from the top menu.
When the scheduled operation is about to start, the management server sends out magic packets to
wake up the appropriate machines. (A magic packet is a packet that contains 16 contiguous copies of
the receiving NIC's MAC address). The Acronis WOL Proxy, installed in the other subnet, transfers the
packets to machines located in that subnet.
15.4.10.2 Alerts
Alert management
Remove from "Accepted alerts" items older than
This option defines whether to delete the accepted alerts from the Accepted alerts table.
When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts older
than this period will be deleted from the table automatically.
When enabled, you can specify the alert types to apply this option to.
Time-based alerts
Last backup
This option is effective when the console is connected to a managed machine (p. 443) or to the
management server (p. 444).
The option defines whether to alert if no backup was performed on a given machine for a period of
time. You can configure the time period that is considered critical for your business.
The preset is: alert if the last successful backup on a machine was completed more than 5 days ago.
The alert is displayed in the Alerts section of the Dashboard. When the console is connected to the
management server, this setting will also control the color scheme of the Last backup column's value
for each machine.
Last connection
This option is effective when the console is connected to the management server or to a registered
machine (p. 444).
The option defines whether to alert if no connection was established between a registered machine
and the management server for a period of time so indicating that the machine might not be
centrally managed (for instance in the case of network connection failure to that machine). You can
configure the length of time that is considered critical.
The preset is: alert if the machine's last connection to the management server was more than 5 days
ago.
The alert is displayed in the Alerts section of the Dashboard. When the console is connected to the
management server, this setting will also control the color scheme of the Last connect column's
value for each machine.
The management server needs domain access credentials when working with a dynamic group that is
based on the Organizational unit criterion (p. 375). When you are creating such group and no
It is sufficient to specify the credentials of a user who is a member of the Domain Users group on the
domain.
The notification schedule and the types of alerts to send are configured in Management server
options > E-mail settings > Alert notifications (p. 394).
When using this option, make sure that the e-mail settings are properly configured in Management
server options > E-mail settings (p. 393).
You can configure the management server to send Simple Network Management Protocol (SNMP)
objects to a specified SNMP manager.
SNMP notifications
This option defines whether the management server has to send its own log events to the specified
Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be
sent.
For detailed information about using SNMP with Acronis Backup, please see "Support for SNMP (p.
53)".
Use the Types of events to log combo-box to specify the types of events that will be collected:
All events - all events (information, warnings and errors) occurred on all the machines registered
on the management server will be recorded to the centralized log
Errors and warnings - warnings and errors will be recorded to the centralized log
Errors only - only errors will be recorded to the centralized log.
To disable collection of the log events, clear the Collect logs check box.
The preset is: Maximum log size: 1 GB. On cleanup, keep 95% of the maximum log size.
When the option is enabled, the program compares the actual log size with the maximum size after
every 100 log entries. Once the maximum log size is exceeded, the program deletes the oldest log
entries. You can select the amount of log entries to retain. The default 95% setting will keep most of
the log. With the minimum 1% setting, the log will be nearly cleared.
Even if you remove the log size limit, logging events to an SQL Server Express database will stop after the log
size reaches 4 GB, because SQL Express Edition has the 4 GB per database limit. Set the maximum log size to
approximately 3.8 GB if you want to use the maximum capacity of the SQL Express database.
This option defines whether the management server will connect to the Internet through a proxy
server.
Note The proxy server must be configured to redirect both HTTP/HTTPS and TCP traffic.
Proxy settings for the agent and the management server are configured separately, even if both are
installed on the same machine.
To set up proxy server settings
1. Select the Use a proxy server check box.
2. In Address, specify the network name or IP address of the proxy server—for example:
proxy.example.com or 192.168.0.1
3. In Port, specify the port number of the proxy server—for example: 80
4. If the proxy server requires authentication, specify the credentials in User name and Password.
5. To test the proxy server settings, click Test connection.
If the values of any of these parameters set through the administrative template differ from those
set through the graphical user interface, the template-based parameters take precedence and are
effective immediately; the parameters shown in the GUI will be changed accordingly.
The following subtopics describe each way of configuration and the parameters that can be
configured through it.
The administrative template contains the configuration parameters of Acronis Backup Agent, Acronis
Backup Management Server, Acronis Backup Storage Node, and common parameters of Acronis
Backup components.
The Acronis Backup Storage Node parameters are described in the "Storage nodes" (p. 222) section.
Other parameters are described in the correspondent subtopics.
http://msdn2.microsoft.com/en-us/library/aa374163.aspx
http://msdn2.microsoft.com/en-us/library/aa374177.aspx
Each event has a level from zero to five based on the event's severity, as shown in the following
table:
Level Name Description
0 Unknown Event whose level of severity is unknown or
not applicable
1 Debug Event used for debug purposes
Event tracing parameters are specified as the following settings in the administrative template:
Licensing
Specifies how often the agent checks its license on the license server, and how long it can work
without a license server.
License Check Interval (in days)
Description: Specifies how often, in days, to check for license availability on Acronis License
Server.
Possible values: Any integer number between 0 and 5
Default value: 1
Acronis Backup Agent periodically checks whether its license key is present on the license
server. The first check is performed every time that Acronis Backup Agent starts and
subsequent checks are performed once in the number of days given by
License Check Interval.
When the agent cannot connect to the license server, a warning is recorded into the agent's
log. You can view this warning in the Dashboard.
If the value is 0, no license check will be performed; without a license, Acronis Backup's
functionality will be disabled after the number of days given by
Maximum Time without License Server (see the next parameter).
See also License Server Connection Retry Interval later in this topic.
Maximum Time without License Server (in days)
Description: Specifies how long, in days, Acronis Backup will work as normal until its
functionality is disabled.
Possible values: Any integer number between 0 and 60
Default value: 30
If Acronis License Server is unavailable, Acronis Backup will continue working with full
functionality for the number of days specified in Maximum Time without License Server, as
counted from the moment of installation or from the last successful check.
License Server Connection Retry Interval (in hours)
Description: Specifies the interval, in hours, between connection attempts when Acronis
License Server is unavailable.
Possible values: Any integer number between 0 and 24
Default value: 1
Collecting Logs
Specifies when to collect log entries from machines managed by Acronis Backup Management
Server.
This parameter contains two settings:
Trace State
Description: Specifies whether to collect the log entries about the components' events from
the registered machines.
Possible values: Enabled or Disabled
Default value: Enabled
Trace Level
Description: Specifies the minimum level of severity of collected entries. Only entries of
levels greater than or equal to the value in Trace Level will be collected.
Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4
(Error), or 5 (Critical error)
Default value: 0 (all entries will be collected)
Log Cleanup Rules
Specifies how to clean up the centralized event log stored in the management server's reporting
database.
This parameter has the following settings:
Max Size
Description: Specifies the maximum size of the centralized event log, in kilobytes.
Possible values: Any integer number between 0 and 2147483647
Default value: 1048576 (that is, 1 GB)
Percentage to Keep
Description: Specifies the percentage of the maximum log size to keep on cleanup
Possible values: Any integer number between 0 and 100
Default value: 95
For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 395).
Use the following two parameters if the proxy server for connection to Acronis Cloud Storage
requires authentication.
User name
Description: Specifies the user name for authentication with the proxy server
Possible values: Any string 0 to 32765 characters long
Default value: Empty string
Password
Description: Specifies the password for authentication with the proxy server
Possible values: Any string 0 to 32765 characters long
Default value: Empty string
Important. The password can be viewed by any user who has access to the administrative
template, such as to an administrator of the machine.
Customer Experience Program
Description: Specifies whether the management server participates in the Customer Experience
Program.
Possible values: Enabled (participate) or Disabled (do not participate)
Default value: Enabled
The parameter is a string value that should be manually added to the corresponding Catalog key in
the registry. If this parameter is missing in the registry, cataloging is enabled on the management
server.
To enable or disable cataloging on Acronis Backup Storage Node, use the similar parameter described in the
"Configuring a storage node with Windows registry" (p. 227) section.
Enabled
Possible values: 0 (disables cataloging) or 1 (enables cataloging)
Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\AMS\Configuration\Catalog\Enabled
If cataloging is disabled, the management server will not catalog backups in unmanaged vaults.
Also, the Data view and Data catalog will not display any data when the management console is
connected to the management server.
To configure backup to the cloud storage or recovery from the storage, follow the regular steps
described in the corresponding sections:
The main difference is that you select the cloud storage as the backup destination.
Examples of subscriptions:
A 1 TB volume subscription means that you can back up data from an unlimited number of
physical and/or virtual machines, for a period of one year. The backups can occupy no more than
one terabyte.
A subscription for PC means that you can back up data from a machine running a non-server
Windows operating system, for a period of one year. The storage quota is unlimited.
For information about backing up virtual machines see "How do I back up virtual machines to the
cloud storage?" (p. 413)
Example
You might want to use the following backup strategy for a file server.
Back up the critical files twice a day on a schedule. Set the retention rule "Delete backups older
than" 7 days. This means that after every backup the software will check for backups older than 7
days and delete them automatically.
Run backup of the server's system volume manually as required. For example, after the operating
system updates. Manually delete the backups that you do not need.
In this approach, you install one or more Acronis agents onto the virtualization hosts. Each agent can
back up multiple virtual machines by using a single subscription for servers. Therefore, you need as
many subscriptions as the number of the agents. Alternatively, the agents can use a volume
subscription that can be shared with other virtual or physical machines.
You will be able to back up and recover entire virtual machines or individual disks and volumes. In
addition, you can recover individual files and folders to a network share, FTP or SFTP server. You
cannot recover files directly to a virtual machine’s file system.
Installing the software, backing up, and recovery are described in the "Backing up Virtual Machines"
document for Acronis Backup Advanced. When installing Acronis Backup for cloud backup only, you
do not need to enter a license key during installation.
Because ESX(i) machines may be automatically redistributed among the agents, you need to
manually bind the machines to their agents so that the machines always use the same subscription.
Installing the software, backing up, and recovery are the same as with a physical machine.
You can change the number of attempts and the interval between the attempts in the Error handling
> Re-attempt, if an error occurs option. Every backup plan or recovery task includes this option.
The cleanup task runs after every cloud backup, even if the backup has failed. The last successful
backup is always kept though. For more information about the retention rule please refer to "How
long will my backups be kept in the cloud storage?" (p. 412)
Normally, there is no need to start and stop the cleanup task manually. But it is possible to do so in
the Backup plans and tasks view.
To continue backing up the machine to the same subscription, reassign (p. 428) the subscription to
the machine. If you do this, the next machine's backup can be incremental. If you assign a new
subscription to the machine, the software will have to do a new full backup.
The hard disk drive is sent back to you but it is not possible to recover from it. However, recovery
from a locally attached device is possible with the Large scale recovery (p. 422) option.
16.1.8.4 What types of hard drive can I use for Initial Seeding?
Acronis accepts hard disk drives of the following interface types: IDE, ATA, SATA, USB connected
drives. SCSI drives are not accepted.
You can back up directly to the device or back up to a local or network folder and then copy the
backup to the device. Make sure that the device has only one volume and that the file system on that
volume is NTFS or FAT32.
16.1.8.5 Can I send more than one backup under a single Initial Seeding
license?
No. An Initial Seeding license allows you to create only one backup on the machine.
However, if you have made a mistake or have decided to create another backup for any reason, you
can cancel the initial seeding order. As a result, the license will become available again.
Having purchased a license from an Acronis partner, you receive a confirmation e-mail with a
registration code. Log in to your Acronis account and enter the registration code in the product
registration section. The registered license appears on the Initial Seeding / Recovery tab on your
account management webpage.
A license purchased from the Acronis online store appears on the Initial Seeding / Recovery tab
immediately after the payment is processed.
Packaging
If possible, use the original packaging. Otherwise, packaging materials can be obtained at any
shipping outlet or stationary store. You should also include all necessary cables or adapters to the
drive. Acronis will not be able to process your initial seeding request if there are no cables included.
The following are instructions about how to package your hard disk drive.
Step 1
Delicately remove your hard disk drive from the machine.
Step 2
Place the hard drive into an anti-static bag to protect the drive from electrostatic discharge. If you do
not have an anti-static bag, simply wrap the hard drive into aluminum foil.
Step 3
Use a sturdy box that is at least twice the size of the drive. Pack the drive with a bubble wrap around
all 6 sides so it can fit tight into the box and cannot be moved within.
DO NOT use Styrofoam peanuts for packing as they do not provide enough protection.
DO NOT send your media in jiffy bags
Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk
drive with all of the backups made from this machine. You can recover data directly from the disk or
copy the backups to a local or network folder.
Having purchased a license from an Acronis partner, you receive a confirmation e-mail with a
registration code. Log in to your Acronis account and enter the registration code in the product
registration section. The registered license appears on the Initial Seeding / Recovery tab on your
account management webpage.
A license purchased from the Acronis online store appears on the Initial Seeding / Recovery tab
immediately after the payment is processed.
Another way to register the subscriptions is to enter the registration codes during local installation of
Acronis Backup in Windows.
Subscriptions that are purchased from the Acronis website are available on this tab immediately.
The subscription period of a machine subscription begins as soon as the subscription is activated on a
machine.
If you do not renew the subscription, you will be able to back up data to the cloud storage for five
days following the expiration date. You will be able to recover data from the cloud storage for 30
days following the expiration date.
An expired subscription can be renewed within five days after expiration. In such cases, the new
subscription will be activated immediately.
To renew a volume subscription, you need a volume subscription. To renew a machine subscription,
you need a machine subscription of the same type or a volume subscription.
Volume subscriptions
To renew a volume subscription, go to the account management webpage, click Renew next to the
volume subscription, and then follow the on-screen instructions.
The new subscription will appear in the Next subscription column for the machine.
Make sure the new subscriptions are available on your account management webpage. Then click
Renew all. The confirmation window will summarize which subscriptions will be renewed. If identical
subscriptions are not found for some of the machines, you have the option to cancel automatic
renewal and renew each subscription individually.
If an identical subscription is not found, auto-renewal will not take place and your backups may fail.
No subscriptions will be bought automatically. Only those subscriptions available at the time of
auto-renewal can be used. You can select auto-renewal for each individual subscription or set up bulk
auto-renewal of all of the activated subscriptions you have.
If you purchased your subscriptions from an Acronis partner, register them manually using the Enter
new registration code link. The registration codes come with the purchase confirmation e-mail.
Next, install Acronis software (if not yet installed) and start backing up to Acronis Cloud Storage.
Machine subscriptions
A machine subscription enables you to back up either a single physical machine or all virtual
machines managed by one Agent for VMware or Agent for Hyper-V. The storage quota applies to this
physical machine or to all of the virtual machines managed by the agent. The subscription period
begins when the subscription is activated on the machine.
For a physical machine, choose the subscription for server or for PC based on the operating system
that the machine is running. If you doubt whether the machine is a server or a workstation, refer to
the list of the supported operating systems (p. 414).
For virtual machines managed by Agent for VMware or Agent for Hyper-V, use a server subscription.
In addition to backing up virtual machines, this subscription allows you to back up their physical host.
If your backups are likely to exceed the storage quota for the subscription, you may want to use a
server subscription on a workstation. The inverse usage is not possible. You cannot back up a server
by using a subscription for PC.
Trial subscriptions
You can obtain one free trial subscription per account. The trial subscription enables you to back up a
single machine. The subscription period is limited to one month.
Obtaining a trial subscription is possible until you buy a paid subscription. You can use a trial
subscription along with paid ones. The same expiration rules apply to trial and paid subscriptions.
To continue using the service after the trial subscription expires, buy a subscription, and then renew
the trial subscription specifying the paid subscription. Your backed up data will be kept. Regular
backups of your machines will continue uninterrupted. The service will not need to perform a new
full backup.
A volume subscription is activated automatically as soon as you start backing up the machine to
Acronis Cloud Storage.
A machine subscription (for Server or for PC) is also activated automatically if all subscriptions
available in your account are the same type and have the same storage quota. If various
subscriptions are available in your account, choose the one to be activated either when creating a
backup plan or by manual activation (described in this section). The subscription period of a machine
subscription starts at the moment of activation.
Important Before activating the first subscription for your account, check the country selected in your profile.
Depending on this country, the service determines the data center where your backups will be sent. Make sure
to select the country where all or most of the machines you want to back up to the cloud storage are located.
Otherwise, the data may unnecessarily travel a long way. Later, you will not be able to change the data center
even if you change the country in your profile. To access your profile, go to the Acronis website, log in to your
account, and then click Personal Profile.
If you need to back up ESX(i) virtual machines, bind them to Agent for VMware as described in the
"Agent for VMware binding" section of the "Backing up virtual machines" document. When activating
a subscription, select the machine where the agent is running.
To activate subscriptions
1. Connect the console to the management server.
2. On the Actions menu, click Activate cloud backup subscriptions.
3. Specify the credentials to log in to the cloud storage.
4. Select any number of machines from either the Workstations or the Servers list, and then click
Select subscription.
5. Select the type of subscriptions you want to activate for the machines. The number of the
subscriptions must be at least the same as the number of the selected machines.
6. Click Activate now.
7. Perform the previous three steps for other machines you want to activate subscriptions on.
Alternatively, you can activate a subscription when the console is connected to a machine instead of
the management server.
Depending on your settings, this backup will be either full or incremental. But its size is not likely to
be less than a full backup size. Therefore, it is not practical to reassign a subscription to a machine
whose first backup was done as an initial seeding. You will need to either redo the initial seeding
(which requires a new license) or to transfer the sizeable backup over the Internet.
Before reassigning
Delete backups from Subscription 1 using Machine 1 (if it is available and turned on). Delete backups
from Subscription 2 using Machine 2.
After reassigning
Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subscription 2,
unless you assign this subscription to any machine.
The management server connects to the Internet to retrieve information about cloud backup
subscriptions. The proxy settings for the management server also need to be configured.
Proxy settings for the agent and the management server are configured separately, even if both are
installed on the same machine.
To configure proxy settings for an agent
1. Connect the console to the machine for which you want to configure proxy settings.
2. On the Options menu, click Machine options.
3. Click Cloud backup proxy.
4. Enter the proxy server settings. For detailed information (p. 342) about the settings please refer
to the context-sensitive help.
5. Repeat steps 2–4 for all machines that connect to the Internet through a proxy server.
To configure proxy settings for the management server
1. Connect the console to the management server.
2. On the Options menu, click Management server options.
3. Click Cloud backup proxy.
4. Enter the proxy server settings. For detailed information (p. 396) about the settings please refer
to the context-sensitive help.
Operations
The following operations are not possible.
Backup operations:
Backing up from bootable media
Backing up with Agent for Exchange
Creating differential backups
Using the Custom backup scheme
Simplified naming of backup files
Simultaneous host-based backup of multiple virtual machines
By using the Backup performance > Network connection speed option, you can vary the transferring
speed as kilobytes per second, but not as a percentage.
Activate a subscription
Allow the machine to use the cloud storage according to the subscription.
Activated subscription
A subscription that is currently being used by a machine.
Assigned subscription
A subscription that has been assigned to a machine.
Available subscription
A subscription that is not assigned to any machine.
Extra service
A service that you can use in addition to cloud backup subscriptions.
Initial Seeding
An extra service that enables you to save an initial full backup locally and then send it to Acronis on a
hard disk drive. Acronis uploads the backup to the cloud storage. After that, you can add incremental
backups to this full backup, either manually or on a schedule.
The Initial Seeding service might be unavailable in your region. To find more information, click here:
http://kb.acronis.com/content/15118.
The Large Scale Recovery service might be unavailable in your region. To find more information, click
here: http://kb.acronis.com/content/15118.
License
Not to be confused with Acronis Backup product license.
You can buy Initial Seeding licenses and/or Large Scale Recovery licenses.
Reassign a subscription
Assign a subscription that is already activated, to a different machine.
Registration code
A character string for registering a subscription or license that was bought from an Acronis partner.
When you purchase such subscriptions or licenses, you receive a confirmation e-mail containing the
registration codes for each of them. You then enter the registration codes on the account
management webpage, and these subscriptions and licenses become available for use.
Renew a subscription
Assign a subscription of the same type and with the same or a larger storage quota as the current,
activated subscription.
This subscription will become activated as soon as the current subscription expires.
Storage quota
The amount of storage space that can be occupied according to the subscription.
Subscription
Permission for a machine or for multiple machines to use a specific amount of space in the cloud
storage, for a specific period of time.
Unassign a subscription
Make an assigned subscription available again.
Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user
reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and
performs data recovery in the same way as with ordinary bootable media.
Limitation: requires re-activation of loaders other than Windows loaders and GRUB.
The type of data that can be backed up depends on the agent type. Acronis Backup includes the
agents for backing up disks and files and the agents for backing up virtual machines residing on
virtualization servers.
Archive
See Backup archive (p. 435).
B
Backup
A backup is the result of a single backup operation (p. 435). Physically, it is a file or a tape record that
contains a copy of the backed-up data as of a specific date and time. Backup files created by Acronis
Backup have a TIB extension. The TIB files which are the result of a backup export (p. 442) or
consolidation (p. 438) are also called backups.
Backup operation
An operation that creates a copy of the data that exists on a machine's (p. 443) hard disk for the
purpose of recovering or reverting the data to a specified date and time.
Backup options
Configuration parameters of a backup operation (p. 435), such as pre/post backup commands,
maximum network bandwidth allotted for the backup stream or data compression level. Backup
options are a part of a backup plan (p. 435).
A backup plan can be created directly on the machine, imported from another machine (local plan)
or propagated to the machine from the management server (centralized plan (p. 437)).
Backup scheme
A part of the backup plan (p. 435) that includes the backup schedule and [optionally] the retention
rules and the cleanup (p. 438) schedule. For example, perform a full backup (p. 442) monthly on the
last day of the month at 10:00AM and an incremental backup (p. 442) on Sundays at 10:00PM.
Delete backups that are older than 3 months. Check for such backups every time the backup
operation is completed.
Acronis Backup provides the ability to use well-known optimized backup schemes such as GFS and
Tower of Hanoi, to create a custom backup scheme or to back up data once.
Bootable agent
A bootable rescue utility that includes most of the functionality of the Acronis Backup Agent (p. 435).
Bootable agent is based on Linux kernel. A machine (p. 443) can be booted into a bootable agent
using either bootable media (p. 436) or Acronis PXE Server. Operations can be configured and
controlled either locally through the GUI or remotely using the console (p. 438).
Bootable media
A physical media (CD, DVD, USB flash drive or other media supported by a machine (p. 443) as a boot
device) that contains the bootable agent (p. 436) or Windows Preinstallation Environment (WinPE) (p.
447) with the Acronis Plug-in for WinPE (p. 434). A machine can also be booted into the above
environments using the network boot from Acronis PXE Server or Windows Deployment Service
(WDS). These servers with uploaded bootable components can also be thought of as a kind of
bootable media.
Built-in group
A group of machines permanently located on a management server (p. 444).
Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups
cannot be created within built-in groups. There is no way to remove a machine from the built-in
group except by removing the machine from the management server.
C
Cataloging
Cataloging a backup (p. 435) adds the contents of the backup to the data catalog (p. 438). Backups
are cataloged automatically as soon as they are created. Backups stored on a storage node (p. 445)
are cataloged by the node. Backups stored anywhere else are cataloged by the agent (p. 435). In the
backup options (p. 435), a user can choose between full and fast cataloging. Full cataloging can also
be started manually.
Centralized management
Management of the Acronis Backup infrastructure through a central management unit known as
Acronis Backup Management Server (p. 444). The centralized management operations include:
creating centralized backup plans (p. 437) for the registered machines (p. 444) and groups of
machines
creating and managing static (p. 445) and dynamic groups (p. 441) of machines (p. 443)
managing the tasks (p. 446) existing on the machines
creating and managing centralized vaults (p. 437) for storing archives
managing storage nodes (p. 445)
monitoring activities of the Acronis Backup components, creating reports, viewing the centralized
log and more.
Centralized task
A task (p. 446) propagated to a machine from the management server (p. 444). Such task can be
modified only by editing the original task or centralized backup plan (p. 437) on the management
server.
As soon as the management server administrator creates a centralized vault, the vault name and
path to the vault are distributed to all machines registered (p. 444) on the server. The shortcut to the
vault appears on the machines in the Vaults list. Any backup plan (p. 435) existing on the machines,
including local plans, can use the centralized vault.
On a machine that is not registered on the management server, a user having the privilege to back up
to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the
user's archives will be managed by the storage node as well as other archives stored in the vault.
Cleanup
Deleting backups (p. 435) from a backup archive (p. 435) or moving them to a different location in
order to get rid of outdated backups or prevent the archive from exceeding the desired size.
Cleanup consists of applying retention rules (p. 445) to an archive. The retention rules are set by the
backup plan (p. 435) that produces the archive. Cleanup may or may not result in deleting or moving
backups depending on whether the retention rules are violated or not.
Having connected the console to the management server, the administrator sets up centralized
backup plans (p. 437) and accesses other management server functionality, that is, performs
centralized management (p. 437). Using the direct console-agent connection, the administrator
performs direct management (p. 439).
Consolidation
Combining two or more subsequent backups (p. 435) belonging to the same archive (p. 435) into a
single backup.
Consolidation might be needed when deleting backups, either manually or during cleanup (p. 438).
For example, the retention rules require to delete a full backup (p. 442) that has expired but retain
the next incremental (p. 442) one. The backups will be combined into a single full backup which will
be dated with the incremental backup's date. Since consolidation may take a lot of time and system
resources, retention rules provide an option to not delete backups with dependencies. In our
example, the full backup will be retained until the incremental one also becomes obsolete. Then both
backups will be deleted.
D
Data catalog
Allows a user to easily find the required version of data and select it for recovery. On a managed
machine (p. 443), users can view and search data in any vault (p. 446) accessible from this machine.
Physically, data catalog is stored in catalog files. Every vault uses its own set of catalog files which
normally are located directly in the vault. If this is not possible, such as for tape storages, the catalog
files are stored in the managed machine's or storage node's local folder. Also, a storage node locally
stores catalog files of its remote vaults, for the purpose of fast access.
Deduplicating vault
A managed vault (p. 443) in which deduplication (p. 439) is enabled.
Deduplication
A method of storing different duplicates of the same information only once.
Acronis Backup can apply the deduplication technology to backup archives (p. 435) stored on storage
nodes (p. 445). This minimizes storage space taken by the archives, backup traffic and network usage
during backup.
Differential backup
A differential backup stores changes to the data against the latest full backup (p. 442). You need
access to the corresponding full backup to recover the data from a differential backup.
Direct management
An operation that is performed on a managed machine (p. 443) using the direct console (p.
438)-agent (p. 435) connection (as opposed to centralized management (p. 437) when the operations
are configured on the management server (p. 444) and propagated by the server to the managed
machines).
If the corresponding backup option (p. 435) is enabled, a DRP is created after the first successful
backup is performed by the backup plan, and also after any change to the list of data items or the
DRP parameters. A DRP can be sent to the specified e-mail addresses or saved as a file to a local or
network folder.
Disk group
A number of dynamic disks (p. 440) that store the common configuration data in their LDM
databases and therefore can be managed as a whole. Normally, all dynamic disks created within the
same machine (p. 443) are members of the same disk group.
As soon as the first dynamic disk is created by the LDM or another disk management tool, the disk
group name can be found in the registry key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmio\Boot Info\Primary Disk
Group\Name.
The next created or imported disks are added to the same disk group. The group exists until at least
one of its members exists. Once the last dynamic disk is disconnected or converted to basic, the
group is discontinued, though its name is kept in the above registry key. In case a dynamic disk is
created or connected again, a disk group with an incremental name is created.
When moved to another machine, a disk group is considered as ‘foreign’ and cannot be used until
imported into the existing disk group. The import updates the configuration data on both the local
and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the
original name) if no disk group exists on the machine.
For more information about disk groups please refer to the following Microsoft knowledge base
article:
Dynamic disk
A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance,
better performance or larger volume size.
A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition
style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the
dynamic volumes' configuration. Each dynamic disk holds the complete information about all
dynamic volumes existing in the disk group which makes for better storage reliability. The database
occupies the last 1MB of an MBR disk. On a GPT disk, Windows creates the dedicated LDM Metadata
partition, taking space from the Microsoft Reserved Partition (MSR.)
1 MB
Disk 2 Protec-t GPT Microsoft LDM GPT
ive Reserved database
MBR Partition (MSR)
LDM Metadata
partition
1 MB
Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks.
For more information about dynamic disks please refer to the following Microsoft knowledge base
articles:
816307 Best practices for using dynamic disks on Windows Server 2003-based computers
http://support.microsoft.com/kb/816307
Dynamic group
A group of machines (p. 443) which is populated automatically by the management server (p. 444)
according to membership criteria specified by the administrator. Acronis Backup offers the following
membership criteria:
Operating system
Active Directory organizational unit
IP address range
Listed in txt/csv file.
A machine remains in a dynamic group as long as the machine meets the group's criteria. However,
the administrator can specify exclusions and not include certain machines in the dynamic group even
if they meet the criteria.
Dynamic volume
Any volume located on dynamic disks (p. 440), or more precisely, on a disk group (p. 440). Dynamic
volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired
goal:
to increase the volume size (a spanned volume)
to reduce the access time (a striped volume)
to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.)
Encrypted vault
A managed vault (p. 443) to which anything written is encrypted and anything read is decrypted
transparently by the storage node (p. 445), using a vault-specific encryption key stored on the node.
In case the storage medium is stolen or accessed by an unauthorized person, the malefactor will not
be able to decrypt the vault contents without access to the storage node. Encrypted archives (p. 441)
will be encrypted over the encryption performed by the agent (p. 435).
Export
An operation that creates a copy of an archive (p. 435) or a self-sufficient part copy of an archive in
the location you specify. The export operation can be applied to a single archive, a single backup (p.
435) or to your choice of backups belonging to the same archive. An entire vault (p. 446) can be
exported by using the command line interface.
F
Full backup
A self-sufficient backup (p. 435) containing all data chosen for backup. You do not need access to any
other backup to recover the data from a full backup.
G
GFS (Grandfather-Father-Son)
A popular backup scheme (p. 436) aimed to maintain the optimal balance between a backup archive
(p. 435) size and the number of recovery points (p. 444) available from the archive. GFS enables
recovering with daily resolution for the last several days, weekly resolution for the last several weeks
and monthly resolution for any time in the past.
For more information please refer to GFS backup scheme (p. 66).
I
Image
The same as Disk backup (p. 439).
Incremental backup
A backup (p. 435) that stores changes to the data against the latest backup. You need access to other
backups to recover data from an incremental backup.
L
Local backup plan
A backup plan (p. 435) created on a managed machine (p. 443) using direct management (p. 439).
Local task
A task (p. 446) created on a managed machine (p. 443) using direct management (p. 439).
Logical volume
This term has two meanings, depending on the context.
A volume, information about which is stored in the extended partition table. (In contrast to a
primary volume, information about which is stored in the Master Boot Record.)
A volume created using Logical Volume Manager (LVM) for Linux kernel. LVM gives an
administrator the flexibility to redistribute large storage space on demand, add new and take out
old physical disks without interrupting user service. Acronis Backup Agent (p. 435) for Linux can
access, back up and recover logical volumes when running in Linux with 2.6.x kernel or a
Linux-based bootable media (p. 436).
M
Machine
A physical or virtual computer uniquely identified by an operating system installation. Machines with
multiple operating systems (multi-boot systems) are considered as multiple machines.
Managed machine
A machine (p. 443), either physical or virtual, where at least one Acronis Backup Agent (p. 435) is
installed.
bsp://node_address/vault_name/archive_name/
Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the
storage node or on a tape library locally attached to the storage node. The storage node performs
cleanup (p. 438) and validation (p. 446) for each archive stored in the managed vault. An
administrator can specify additional operations that the storage node will perform (deduplication (p.
439), encryption).
Media builder
A dedicated tool for creating bootable media (p. 436).
P
Personal vault
A local or networked vault (p. 446) created using direct management (p. 439). Once a personal vault
is created, a shortcut to it appears on the managed machine in the Vaults list. Multiple machines can
use the same physical location; for example, a network share; as a personal vault.
Plan
See Backup plan (p. 435).
R
Recovery point
Date and time to which the backed-up data can be reverted.
Registration
A procedure that adds a managed machine (p. 443) to a management server (p. 444).
Registration sets up a trust relationship between the agent (p. 435) residing on the machine and the
server. During registration, the console retrieves the management server's client certificate and
passes it to the agent which uses it later to authenticate clients attempting to connect. This helps
prevent any attempts by network attackers from establishing a fake connection on behalf of a
trusted principal (the management server).
Replenishable pool
A tape pool that is allowed to take tapes from the Free tapes pool when required.
Replication
Copying a backup (p. 435) to another location. By default, the backup is copied immediately after
creation. A user has the option to postpone copying the backup by setting up replication inactivity
time.
This feature replaces and enhances the dual destination backup feature, which was available in
Acronis Backup & Recovery 10.
Retention rules
A part of backup plan (p. 435) that specifies when and how to delete or move the backups (p. 435)
created by the plan.
S
Single-pass backup
A single-pass backup (aka application-aware backup) is a disk backup containing metadata of
VSS-aware applications that are present on the disk. This metadata enables browsing and recovery of
the backed-up application data without recovering the entire disk or volume.
Static group
A group of machines which a management server (p. 444) administrator populates by manually
adding machines to the group. A machine remains in a static group until the administrator removes it
from the group or from the management server.
T
Task
A set of actions to be performed by Acronis Backup at a certain time or event. The actions are
described in a non human-readable service file. The time or event (schedule) is stored in the
protected registry keys (in Windows) or on the file system (in Linux).
Tower of Hanoi
A popular backup scheme (p. 436) aimed to maintain the optimal balance between a backup archive
(p. 435) size and the number of recovery points (p. 444) available from the archive. Unlike the GFS (p.
442) scheme that has only three levels of recovery resolution (daily, weekly, monthly resolution), the
Tower of Hanoi scheme continuously reduces the time interval between recovery points as the
backup age increases. This allows for very efficient usage of the backup storage.
For more information please refer to "Tower of Hanoi backup scheme (p. 72)".
U
Unmanaged vault
Any vault (p. 446) that is not a managed vault (p. 443).
V
Validation
An operation that checks the possibility of data recovery from a backup (p. 435).
Validation of a file backup imitates recovery of all files from the backup to a dummy destination.
Validation of a disk backup calculates a checksum for every data block saved in the backup. Both
procedures are resource-intensive.
While the successful validation means a high probability of successful recovery, it does not check all
factors that influence the recovery process. If you back up the operating system, only a test recovery
under the bootable media to a spare hard drive can guarantee successful recovery in the future.
Vault
A place for storing backup archives (p. 435). A vault can be organized on a local or networked drive or
detachable media, such as an external USB drive. There are no settings for limiting a vault size or the
number of backups in a vault. You can limit the size of each archive using cleanup (p. 438), but the
total size of archives stored in the vault is limited by the storage size only.
W
WinPE (Windows Preinstallation Environment)
A minimal Windows system commonly used by OEMs and corporations for deployment, test,
diagnostic and system repair purposes. A machine can be booted into WinPE via PXE, CD-ROM, USB
flash drive or hard disk. Acronis Plug-in for WinPE (p. 434) enables running the Acronis Backup Agent
(p. 435) in the preinstallation environment.