ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION manuals
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
- Table Of Contents
- Before installation
- Components for centralized management
- storage node
- license server
- Management Console
- System requirements
- Using Acronis License Server
- Local installation (Windows)
- Specifying credentials for Acronis services
- Specifying Microsoft SQL servers
- Registering components on the management server
- Remote installation (Windows)
- Unattended installation in Windows
- Configuration script parameters
- Installing the agent using Group Policy
- Setting up the Group Policy object
- Upgrading from trial to full product version
- Upgrading components for Windows
- Before the upgrade
- Upgrading Acronis True Image Echo agents and local versions
- Importing a task
- Local uninstallation in Windows
- Unattended uninstallation in Windows
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Getting started
- Using the management console
- operations with panes
- action pages
- components for centralized management
- Agent for Windows
- Components for centralized management
- storage node
- Management Console
- Acronis Wake-On-LAN Proxy
- System requirements
- Technical Support
- basic concepts
- Full, incremental and differential backups
- User privileges on a managed machine
- GFS backup scheme
- Tower of Hanoi backup scheme
- Retention rules
- Backing up dynamic volumes (Windows)
- recovering dynamic volumes
- Tape support
- Using a single tape drive
- Support for SNMP
- Proprietary Acronis technologies
- Acronis Startup Recovery Manager
- Acronis Active Restore
- how it works
- Understanding centralized management
- Setting up centralized data protection in a heterogeneous network
- protecting the servers
- protecting the workstations
- Grouping the registered machines
- a policy on a machine or a group
- inheritance of policies
- Backup policy's state and statuses
- policy status on a machine
- policy deployment state on a group
- Deduplication
- how deduplication works
- when deduplication is most effective
- deduplication best practices
- deduplication restrictions
- Privileges for centralized management
- acronis security groups
- user privileges on a storage node
- management server administrator rights
- secure communication
- client and server applications
- network port configuration
- Options
- Time-based alerts
- Management server options
- Event tracing
- Domain access credentials
- Online backup proxy
- Machine options
- Log cleanup rules
- Default backup and recovery options
- archive protection
- source files exclusion
- volume shadow copy service
- compression level
- backup performance
- network connection speed
- windows event log
- backup splitting
- media components
- error handling
- dual destination
- task failure handling
- additional settings
- Default recovery options
- recovery priority
- Vaults
- Centralized vaults
- Actions on centralized vaults
- creating a managed centralized vault
- vault encryption
- creating an unmanaged centralized vault
- Tape libraries
- rsm media pools
- getting started with a tape library
- actions on a tape library vault
- recovering from tape library
- tape rotation
- choosing a backup scheme
- case to analyze
- tape planning
- Personal vaults
- Actions on personal vaults
- Common operations
- Operations with backups
- Deleting archives and backups
- Filtering and sorting archives
- Scheduling
- Daily schedule
- Weekly schedule
- Monthly schedule
- Advanced scheduling settings
- At Windows Event Log event
- When an ADRM alert is received
- User is idle
- Fits time interval
- Time since last backup
- Direct management
- Backup plans and tasks
- understanding states and statuses
- task states
- task statuses
- working with backup plans and tasks
- filtering and sorting backup plans and tasks
- run backup plan
- backup plan details
- actions on log entries
- filtering and sorting log entries
- Creating a backup plan
- archive validation
- Why is the program asking for the password
- Items to back up
- Access credentials for source
- Exclusions
- Archive
- Simplified naming of backup files
- usage examples
- Access credentials for archive location
- Backup schemes
- simple scheme
- tower of hanoi scheme
- custom backup scheme
- Archive validation
- Recovering data
- when to recover
- Task credentials
- Data type
- Access credentials for location
- Destination selection
- disk destination
- mbr destination
- virtual machine settings
- file destination
- recovery exclusions
- Access credentials for destination
- How to convert a disk backup to a virtual machine
- Bootability troubleshooting
- Recovering a vast number of files from a file backup
- Recovering the storage node
- Validating vaults, archives and backups
- Archive selection
- Backup selection
- When to validate
- Mounting an image
- Access credentials
- Managing mounted images
- Location selection
- Acronis Secure Zone
- acronis secure zone size
- Managing Acronis Secure Zone
- Bootable media
- How to create bootable media
- kernel parameters
- network settings
- network port
- Connecting to a machine booted from media
- Working under bootable media
- List of commands and utilities available in Linux-based bootable media
- Recovering MD devices and logical volumes
- creating the volume structure manually
- Acronis PXE Server
- acronis pxe server installation
- Disk management
- Running Acronis Disk Director Lite
- Disk operations
- basic disk cloning
- cloning method and advanced options
- Volume operations
- types of dynamic volumes
- create volume wizard
- set the volume size
- delete volume
- change volume letter
- Pending operations
- Collecting system information
- Centralized management
- Backup policies
- backup policy deployment states
- actions on backup policies
- machines selection
- policy details
- Physical machines
- actions on machines
- applying policies
- importing machines from active directory
- synchronizing machines with a text file
- importing machines from a text file
- moving a machine to another group
- filtering and sorting machines
- actions on groups
- creating a custom static or dynamic group
- organizational unit criterion
- move one group to another
- Virtual machines
- virtual machines on a management server
- Storage nodes
- actions on storage nodes
- adding a storage node
- storage node details
- Tasks
- filtering and sorting tasks
- centralized log entry details
- Reporting
- report about the backup policies
- report about the backup plans
- report about the archives and backups
- report about the task activities
- Parameters set through administrative template
- connection parameters
- Parameters set through GUI
- Parameters set through Windows registry
- Creating a backup policy
- Policy credentials
- files to back up selection rules
- Backup scheme selection
- Online backup
- What data can I back up and recover
- How long will my backups be kept in the online storage
- Backup and recovery FAQ
- Initial Seeding FAQ
- what types of hard drive can i use for initial seeding
- how to package a hard drive for shipment
- how do i track an initial seeding order status
- Large Scale Recovery FAQ
- is large scale recovery a paid service
- Subscription lifecycle FAQ
- what happens when my subscription expires
- Where do I start
- Activating online backup subscriptions
- Reassigning an activated subscription
- Configuring proxy settings
- Limitations of the online storage
- Terminology reference
- Glossary
- backup operation
- backup scheme
- centralized backup plan
- deduplicating vault
- disk group
- dynamic disk
- dynamic volume
- full backup
- managed vault
- recovery point
- tower of hanoi
- unmanaged vault
- virtual machine
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
- Table Of Contents
- Before installation
- Bootable components and media builder
- management server
- storage node
- Management Console
- Supported operating systems
- License policy
- Local installation (Windows)
- Installation procedure
- Specifying Microsoft SQL servers
- Specifying users allowed to connect remotely
- Remote installation (Windows)
- Unattended installation in Windows
- Configuration script parameters
- general parameters
- Installing components using Group Policy
- Setting up the Group Policy object
- Upgrading from trial to full product version
- Upgrading components for Windows
- before the upgrade
- Installing or upgrading the Acronis License Server
- Upgrading Acronis True Image Echo agents and local versions
- Importing a task
- Index
- Table Of Contents
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- acronis backup & recovery 10 overview
- Getting started
- Using the management console
- operations with panes
- action pages
- Agent for Windows
- Components for centralized management
- storage node
- pxe server
- Management Console
- Supported operating systems
- System requirements
- basic concepts
- Full, incremental and differential backups
- User privileges on a managed machine
- GFS backup scheme
- Tower of Hanoi backup scheme
- Retention rules
- Backing up dynamic volumes (Windows)
- recovering dynamic volumes
- Tape support
- Using a single tape drive
- Proprietary Acronis technologies
- Acronis Startup Recovery Manager
- Acronis Active Restore
- usage scenarios
- Understanding centralized management
- Setting up centralized data protection in a heterogeneous network
- protecting the servers
- protecting the workstations
- Grouping the registered machines
- a policy on a machine or a group
- operations with a machine
- inheritance of policies
- Backup policy's state and statuses
- policy status on a machine
- policy deployment state on a group
- Deduplication
- how deduplication works
- when deduplication is most effective
- deduplication ratio
- Privileges for centralized management
- remote connection
- user privileges on a storage node
- management server administrator rights
- rights for acronis services
- secure communication
- configuring communication settings
- network port configuration
- ssl certificates
- Options
- Time-based alerts
- Management server options
- Event tracing
- Domain access credentials
- Machine options
- Machine management
- snmp notifications
- Log cleanup rules
- Customer Experience Program
- archive protection
- source files exclusion
- post-backup command
- pre-data capture command
- file-level backup snapshot
- compression level
- backup performance
- network connection speed
- windows event log
- fast incremental/differential backup
- media components
- dual destination
- task start conditions
- task failure handling
- additional settings
- Default recovery options
- pre-recovery command
- post-recovery command
- error handling
- Vaults
- Centralized vaults
- Actions on centralized vaults
- creating a managed centralized vault
- vault encryption
- attaching a managed vault
- Tape libraries
- rsm media pools
- getting started with a tape library
- tape library as a managed vault
- actions with archives on tapes in a library
- managing a tape library
- tape rotation
- criteria of the choice
- tape planning
- Personal vaults
- Actions on personal vaults
- creating a personal vault
- Common operations
- Operations with backups
- Deleting archives and backups
- Scheduling
- Daily schedule
- Weekly schedule
- Monthly schedule
- Advanced scheduling settings
- At Windows Event Log event
- Conditions
- User is idle
- Fits time interval
- User logged off
- Direct management
- Backup plans and tasks
- understanding states and statuses
- task states
- task statuses
- working with backup plans and tasks
- filtering and sorting backup plans and tasks
- run backup plan
- backup plan details
- actions on log entries
- filtering and sorting log entries
- Creating a backup plan
- archive validation
- Why is the program asking for the password
- Source type
- selecting disks and volumes
- Access credentials for source
- Archive
- Access credentials for archive location
- Backup schemes
- simple scheme
- tower of hanoi scheme
- custom backup scheme
- Archive validation
- Recovering data
- when to recover
- Task credentials
- Data type
- Access credentials for location
- Destination selection
- disk destination
- mbr destination
- volume properties
- virtual machine settings
- file destination
- Access credentials for destination
- Universal Restore
- How to convert a disk backup to a virtual machine
- Bootability troubleshooting
- Recovering a vast number of files from a file backup
- Recovering the storage node
- Validating vaults, archives and backups
- Archive selection
- Backup selection
- When to validate
- Access credentials
- Volume selection
- Location selection
- Acronis Secure Zone
- acronis secure zone size
- Managing Acronis Secure Zone
- Bootable media
- How to create bootable media
- kernel parameters
- network settings
- network port
- adding the acronis plug-in to winpe 1.x
- Connecting to a machine booted from media
- setting up a display mode
- List of commands and utilities available in Linux-based bootable media
- Recovering MD devices and logical volumes
- creating the volume structure manually
- Acronis PXE Server
- Disk management
- Basic precautions
- Choosing the operating system for disk management
- Disk operations
- selecting source and target disks
- Volume operations
- creating a volume
- create volume wizard
- set the volume size
- delete volume
- set active volume
- change volume label
- Pending operations
- Centralized management
- Backup policies
- backup policy deployment states
- actions on backup policies
- machines selection
- policy details
- Physical machines
- actions on machines
- applying policies
- importing machines from active directory
- importing machines from a text file
- machine details
- filtering and sorting machines
- creating a custom static or dynamic group
- organizational unit criterion
- listed in txt/csv file criterion
- group details
- Virtual machines
- virtual machines on a management server
- support for vcenter clusters
- Storage nodes
- adding a storage node
- Tasks
- filtering and sorting tasks
- Reporting
- generating reports
- report about the backup policies
- report about the tasks
- report about the archives and backups
- report about the task activities
- Parameters set through administrative template
- connection parameters
- Parameters set through GUI
- Parameters set through Windows registry
- Policy credentials
- Items to back up
- files to back up selection rules
- Exclusions
- Backup scheme selection
- Glossary
- agent-side cleanup
- backup plan (plan)
- backup scheme
- centralized backup plan
- deduplicating vault
- disk group
- dynamic disk
- dynamic volume
- gfs (grandfather-father-son)
- media builder
- recovery point
- storage node-side validation
- unmanaged vault
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
Related products
BACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITIONBACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION - COMMAND LINEBACKUP RECOVERY 10 ADVANCED SERVER -Backup & Recovery 10 Advanced EditionsBACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3BACKUP AND RECOVERY 10 - ADVANCED WORKSTATION-SERVER-SERVER VIRTUAL EDITIONBACKUP RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - COMMAND LINEBACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - COMMAND LINE REFERENCE UPDATE 3BACKUP RECOVERY 10 ADVANCED SERVER - COMMAND LINEBackup & Recovery 10 Advanced WorkstationACRONIS categories
More ACRONIS categoriesmanualsdatabase
Your AI-powered manual search engine