ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER - manuals
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Command-line mode and scripting in Windows
- Common options
- backup options
- general options
- Specific options
- trueimagecmd.exe usage examples
- Storage node command-line utility
- Options
- Examples
- Exporting vaults and importing multiple archives
- Script structure
- Script usage examples
- Console mode in Linux
- trueimagecmd usage examples
- Automatic image creation using cron service
- Restoring files with trueimagemnt
- Trueimagemnt usage examples
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Table Of Contents
- Before installation
- Agent for Linux
- Components for centralized management
- storage node
- Management Console
- Acronis Wake-On-LAN Proxy
- System requirements
- Licensing policy
- Using Acronis License Server
- Local installation (Windows)
- Installation procedure
- Specifying credentials for Acronis services
- Registering components on the management server
- Specifying users allowed to connect remotely
- Unattended installation in Windows
- Configuration script parameters
- Installing the agent using Group Policy
- Preparing the agent's deployment
- Setting up the Group Policy object
- Installation in Linux
- Installation in the interactive mode
- Installation in the unattended mode
- Upgrading from trial to full product version
- Upgrading components for Windows
- Before the upgrade
- Installing or upgrading the Acronis License Server
- Upgrading Acronis True Image Echo agents and local versions
- Importing a task
- Local uninstallation in Windows
- Unattended uninstallation in Windows
- Uninstallation in Linux
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Getting started
- Using the management console
- operations with panes
- action pages
- Agent for Windows
- Agent for Linux
- Components for centralized management
- storage node
- Management Console
- Acronis Wake-On-LAN Proxy
- System requirements
- Technical Support
- Basic concepts
- User privileges on a managed machine
- Owners and credentials
- Full, incremental and differential backups
- GFS backup scheme
- Tower of Hanoi backup scheme
- Retention rules
- Backing up dynamic volumes (Windows)
- recovering dynamic volumes
- Backing up LVM volumes and MD devices (Linux)
- Backing up MD devices
- Saving the volume structure information
- Backing up hardware RAID arrays (Linux)
- Tape support
- Support for SNMP
- Proprietary Acronis technologies
- Acronis Startup Recovery Manager
- Acronis Active Restore
- Understanding centralized management
- Setting up centralized data protection in a heterogeneous network
- protecting the servers
- protecting the workstations
- Grouping the registered machines
- using custom groups
- Policies on machines and groups
- a policy on a machine or a group
- operations with a machine
- inheritance of policies
- Backup policy's state and statuses
- policy status on a machine
- policy deployment state on a group
- Deduplication
- how deduplication works
- when deduplication is most effective
- deduplication best practices
- deduplication restrictions
- Privileges for centralized management
- privileges for remote connection in linux
- acronis security groups
- management server administrator rights
- rights for acronis services
- secure communication
- client and server applications
- network port configuration
- Options
- Time-based alerts
- Management server options
- Event tracing
- Domain access credentials
- Online backup proxy
- Machine options
- Log cleanup rules
- Default backup and recovery options
- archive protection
- source files exclusion
- volume shadow copy service
- compression level
- backup performance
- network connection speed
- windows event log
- backup splitting
- media components
- error handling
- dual destination
- task failure handling
- additional settings
- Default recovery options
- recovery priority
- Vaults
- Centralized vaults
- Actions on centralized vaults
- creating a managed centralized vault
- vault encryption
- creating an unmanaged centralized vault
- Tape libraries
- rsm media pools
- getting started with a tape library
- actions on a tape library vault
- recovering from tape library
- tape rotation
- choosing a backup scheme
- case to analyze
- tape planning
- Personal vaults
- Actions on personal vaults
- Common operations
- Operations with backups
- Deleting archives and backups
- Filtering and sorting archives
- Scheduling
- Daily schedule
- Weekly schedule
- Monthly schedule
- At Windows Event Log event
- Advanced scheduling settings
- When an ADRM alert is received
- User is idle
- Fits time interval
- Time since last backup
- Direct management
- Backup plans and tasks
- understanding states and statuses
- task states
- task statuses
- working with backup plans and tasks
- filtering and sorting backup plans and tasks
- run backup plan
- backup plan details
- actions on log entries
- filtering and sorting log entries
- Creating a backup plan
- archive validation
- Why is the program asking for the password
- Items to back up
- Access credentials for source
- Exclusions
- Archive
- Simplified naming of backup files
- usage examples
- Access credentials for archive location
- Backup schemes
- simple scheme
- tower of hanoi scheme
- custom backup scheme
- Archive validation
- Recovering data
- when to recover
- Task credentials
- Data type
- Access credentials for location
- Destination selection
- disk destination
- mbr destination
- virtual machine settings
- file destination
- recovery exclusions
- Access credentials for destination
- How to convert a disk backup to a virtual machine
- Bootability troubleshooting
- Assembling MD devices for recovery (Linux)
- Recovering a vast number of files from a file backup
- Recovering the storage node
- Archive selection
- Backup selection
- When to validate
- Access credentials
- Volume selection
- Exporting archives and backups
- Location selection
- Acronis Secure Zone
- acronis secure zone disk
- Managing Acronis Secure Zone
- Bootable media
- How to create bootable media
- kernel parameters
- network settings
- network port
- Connecting to a machine booted from media
- setting up a display mode
- List of commands and utilities available in Linux-based bootable media
- Recovering MD devices and logical volumes
- creating the volume structure manually
- Acronis PXE Server
- setting up a machine to boot from pxe
- Disk management
- Choosing the operating system for disk management
- Disk operations
- basic disk cloning
- Volume operations
- create volume wizard
- select destination disks
- set the volume options
- delete volume
- change volume letter
- Pending operations
- Collecting system information
- Centralized management
- Backup policies
- backup policy deployment states
- actions on backup policies
- machines selection
- policy details
- Physical machines
- actions on machines
- applying policies
- importing machines from active directory
- synchronizing machines with a text file
- importing machines from a text file
- moving a machine to another group
- filtering and sorting machines
- actions on groups
- creating a custom static or dynamic group
- organizational unit criterion
- move one group to another
- Virtual machines
- virtual machines on a management server
- Storage nodes
- actions on storage nodes
- adding a storage node
- storage node details
- Tasks
- filtering and sorting tasks
- centralized log entry details
- Reporting
- report about the backup policies
- report about the backup plans
- report about the archives and backups
- report about the task activities
- Parameters set through administrative template
- connection parameters
- Parameters set through GUI
- Parameters set through Windows registry
- Creating a backup policy
- Policy credentials
- files to back up selection rules
- Backup scheme selection
- Online backup
- What data can I back up and recover
- How long will my backups be kept in the online storage
- Backup and recovery FAQ
- Initial Seeding FAQ
- what types of hard drive can i use for initial seeding
- how to package a hard drive for shipment
- how do i track an initial seeding order status
- Large Scale Recovery FAQ
- is large scale recovery a paid service
- Subscription lifecycle FAQ
- what happens when my subscription expires
- Where do I start
- Activating online backup subscriptions
- Reassigning an activated subscription
- Configuring proxy settings
- Limitations of the online storage
- Terminology reference
- Glossary
- backup operation
- backup scheme
- centralized backup plan
- deduplicating vault
- disk group
- dynamic disk
- dynamic volume
- full backup
- managed vault
- recovery point
- tower of hanoi
- unmanaged vault
- virtual machine
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Table Of Contents
- Before installation
- Agent for Linux
- Bootable components and media builder
- storage node
- license server
- Management Console
- Hardware requirements
- License policy
- Using Acronis License Server
- installation of acronis backup & recovery
- Preparation
- Specifying credentials for Acronis services
- Registering components on the management server
- Update
- Unattended installation in Windows
- Configuration script parameters
- Installing components using Group Policy
- Setting up the Group Policy object
- Installation in Linux
- Command-line parameters
- Uninstalling components
- Changing a license
- Upgrading components for Windows
- before the upgrade
- Installing or upgrading the Acronis License Server
- Upgrading Acronis True Image Echo agents and local versions
- Importing a task
- Index
- Table Of Contents
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Command-line mode and scripting in Windows
- Common options
- backup options
- Specific options
- trueimagecmd.exe usage examples
- Storage node command-line utility
- Options
- Examples
- Exporting vaults and importing multiple archives
- Script structure
- Script usage examples
- Console mode in Linux
- trueimagecmd usage examples
- Automatic image creation using cron service
- Restoring files with trueimagemnt
- Trueimagemnt usage examples
BACKUP RECOVERY 10 ADVANCED SERVER -
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- acronis backup & recovery 10 overview
- Getting started
- Using the management console
- operations with panes
- action pages
- components for centralized management
- Agent for Windows
- Agent for Linux
- storage node
- license server
- Management Console
- Supported operating systems
- System requirements
- Technical support
- basic concepts
- User privileges on a managed machine
- Owners and credentials
- Full, incremental and differential backups
- GFS backup scheme
- Tower of Hanoi backup scheme
- Retention rules
- Backing up dynamic volumes (Windows)
- recovering dynamic volumes
- Backing up LVM volumes (Linux)
- Backing up RAID arrays (Linux)
- Tape support
- Using a single tape drive
- Proprietary Acronis technologies
- Acronis Startup Recovery Manager
- Acronis Active Restore
- usage scenarios
- Understanding centralized management
- Setting up centralized data protection in a heterogeneous network
- protecting the servers
- protecting the workstations
- Grouping the registered machines
- Policies on machines and groups
- a policy on a machine or a group
- operations with a machine
- inheritance of policies
- Backup policy's state and statuses
- policy status on a machine
- policy deployment state on a group
- Deduplication
- how deduplication works
- when deduplication is most effective
- deduplication ratio
- Privileges for centralized management
- remote connection
- privileges for remote connection in linux
- acronis security groups
- management server administrator rights
- user privileges on a storage node
- rights for acronis services
- secure communication
- configuring communication settings
- network port configuration
- ssl certificates
- Options
- Time-based alerts
- Management server options
- Event tracing
- Domain access credentials
- Machine options
- Machine management
- snmp notifications
- Log cleanup rules
- Customer Experience Program
- archive protection
- source files exclusion
- post-backup command
- pre-data capture command
- file-level backup snapshot
- compression level
- backup performance
- network connection speed
- windows event log
- fast incremental/differential backup
- media components
- dual destination
- task start conditions
- task failure handling
- additional settings
- Default recovery options
- pre-recovery command
- post-recovery command
- error handling
- Vaults
- Centralized vaults
- Actions on centralized vaults
- creating a managed centralized vault
- vault encryption
- attaching a managed vault
- Tape libraries
- rsm media pools
- getting started with a tape library
- tape library as a managed vault
- actions with archives on tapes in a library
- managing a tape library
- tape rotation
- criteria of the choice
- tape planning
- Personal vaults
- Actions on personal vaults
- creating a personal vault
- Common operations
- Operations with backups
- Deleting archives and backups
- Scheduling
- Daily schedule
- Weekly schedule
- Monthly schedule
- At Windows Event Log event
- Advanced scheduling settings
- Conditions
- User is idle
- Fits time interval
- User logged off
- Direct management
- Backup plans and tasks
- understanding states and statuses
- task states
- task statuses
- working with backup plans and tasks
- filtering and sorting backup plans and tasks
- run backup plan
- backup plan details
- actions on log entries
- filtering and sorting log entries
- Creating a backup plan
- archive validation
- Why is the program asking for the password
- Source type
- selecting disks and volumes
- Access credentials for source
- Archive
- Access credentials for archive location
- Backup schemes
- simple scheme
- tower of hanoi scheme
- custom backup scheme
- Archive validation
- Recovering data
- when to recover
- Task credentials
- Data type
- Access credentials for location
- Destination selection
- disk destination
- mbr destination
- volume properties
- virtual machine settings
- file destination
- Access credentials for destination
- Universal Restore
- How to convert a disk backup to a virtual machine
- Bootability troubleshooting
- Recovering MD devices (Linux)
- Recovering a vast number of files from a file backup
- Recovering the storage node
- Archive selection
- Backup selection
- When to validate
- Access credentials
- Managing mounted images
- Location selection
- Acronis Secure Zone
- acronis secure zone disk
- Managing Acronis Secure Zone
- deleting acronis secure zone
- Bootable media
- How to create bootable media
- kernel parameters
- network settings
- network port
- Connecting to a machine booted from media
- List of commands and utilities available in Linux-based bootable media
- Recovering MD devices and logical volumes
- creating the volume structure manually
- Acronis PXE Server
- acronis pxe server installation
- Disk management
- Running Acronis Disk Director Lite
- Disk operations
- basic disk cloning
- cloning method and advanced options
- Volume operations
- types of dynamic volumes
- select the type of volume being created
- set the volume size
- delete volume
- change volume letter
- Pending operations
- Collecting system information
- Centralized management
- Backup policies
- backup policy deployment states
- actions on backup policies
- machines selection
- policy details
- Physical machines
- actions on machines
- applying policies
- importing machines from active directory
- importing machines from a text file
- machine details
- filtering and sorting machines
- actions on groups
- organizational unit criterion
- editing custom groups
- Virtual machines
- virtual machines on a management server
- support for vcenter clusters
- Storage nodes
- actions on storage nodes
- adding a storage node
- Tasks
- actions on tasks
- filtering and sorting tasks
- centralized log entry details
- Reporting
- report about the machines
- report about the backup plans
- report about the archives and backups
- report about the vaults' statistics
- column selection
- Parameters set through administrative template
- connection parameters
- Parameters set through GUI
- Creating a backup policy
- Policy credentials
- Items to back up
- files to back up selection rules
- Exclusions
- Backup scheme selection
- Glossary
- agent-side cleanup
- backup plan (plan)
- backup scheme
- centralized backup plan
- deduplicating vault
- disk group
- dynamic disk
- dynamic volume
- gfs (grandfather-father-son)
- media builder
- recovery point
- storage node-side validation
- unmanaged vault
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
Related products
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITIONBACKUP RECOVERY 10 ADVANCED SERVER - COMMAND LINEBACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITIONBackup & Recovery 10 Advanced EditionsBACKUP AND RECOVERY 10 ONLINE ADVANCEDBackup & Recovery Online AdvancedBackup & Recovery 10 Advanced WorkstationBACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION - COMMAND LINEBackup & Recovery Server OEMBACKUP AND RECOVERY 10 ADVANCED SERVER - INSTALLATION UPDATE 3ACRONIS categories
More ACRONIS categoriesmanualsdatabase
Your AI-powered manual search engine