Acronis Acronis Backup AND Recovery 10 Server For Linux
1 server - 10-24 licenses
Part Number: TILXFSENS12
Here you can find all about Acronis Acronis Backup AND Recovery 10 Server For Linux, for example manual and review. You can also write a review. [ Report abuse or wrong photo | Share your Acronis Acronis Backup AND Recovery 10 Server For Linux photo ]
Acronis Acronis Backup AND Recovery 10 Server For Linux
Acronis Backup and Recovery 10 FREE DOWNLOAD
User reviews and opinions
|peterschneider||9:42am on Monday, October 11th, 2010|
|Fast reliable seller I live in Eastern Europe, the The condition of the product as listed. Factory seal. The delivery. The best for what it is, BUT DONT BUY FROM AMAZON.|
|Alfred||6:12pm on Wednesday, September 8th, 2010|
|I came into Vanns on a whim on the iPads launch day not really expecting to see any there still available. I replaced my first-gen iPod Touch, which I had since they first came out a few years ago, with this new beast of a device. First of all.|
|snake35||2:44pm on Saturday, August 28th, 2010|
|Bought the 16G WiFi for my wife. She enjoys playing games, surfing the web, reading books, reading email and catching up on her Soaps at ABC.com. Awesome game player, and has replaced my laptop but I do not have to need for business and so I do not know about how those work. Great for traveling,...|
|Tha||7:25am on Saturday, August 28th, 2010|
|you will love the 9 inches screen. You will enjoy the touchscreen experience with iPad Fast, Lightweight, Compact The iPad is exactly what I expected, easy to use, very well executed so long as you understand that it is mainly a device to consume media.|
|nefnef||3:00pm on Friday, July 30th, 2010|
|My Company uses Citrix, so I am able to run Windows Applications, SAP, even flash and all my GO TO corporate applications on the device. Does this device have any real flaws? Lets address some real shortcomingsÂ of the iPad.|
Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.
The machine options define the general behavior of all Acronis Backup & Recovery 10 agents operating on the managed machine, and so the options are considered machine-specific. To access the machine options, connect the console to the managed machine and then select Options > Machine options from the top menu.
It is possible to send log events generated by the agent(s), operating on the managed machine, to the specified SNMP managers. If you do not modify the event tracing options anywhere except for here, your settings will be effective for each local backup plan and each task created on the machine. You can override the settings set here, exclusively for the events occurred during backup or during recovery (see Default backup and recovery options (p. 44).) In this case, the settings set here will be effective for operations other than backup and recovery, such as archive validation or cleanup. You can further override the settings set in the default backup and recovery options, when creating a backup plan or a recovery task. The settings you obtain in this case will be plan-specific or taskspecific.
This option is effective for both Windows and Linux operating systems. This option is not available when operating under the bootable media. The option defines whether the agent(s) operating on the managed machine have to send the log events to the specified Simple Network Management Protocol (SNMP) managers. You can choose the types of events to be sent. You can override the settings set here, exclusively for the events that occur during backup or during recovery, in the Default backup and recovery options (p. 44). In this case, the settings set here will be effective for operations other than backup and recovery, such as archive validation or cleanup. You can further override the settings set in the default backup and recovery options, when creating a backup plan or a recovery task. The settings you obtain in this case will be plan-specific or taskspecific. Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects to SNMP management applications: 126.96.36.199.4.1.247188.8.131.52.0 - string identifying the type of event (Information, Warning, Error)
184.108.40.206.4.1.247220.127.116.11.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup & Recovery 10 in its log). The preset is: Disabled.
To set up sending SNMP messages
1. Select the Send messages to SNMP server check box. 2. Specify the appropriate options as follows:
Reset archive bit
The option is effective only for file-level backup in Windows operating systems and in bootable media. The preset is: Disabled. In Windows operating systems, each file has the File is ready for archiving attribute, available by selecting File -> Properties -> General -> Advanced -> Archive and Index attributes. This attribute, also known as the archive bit, is set by the operating system each time the file is changed and can be reset by backup applications each time they include the file in a backup. The archive bit value is used by various applications such as databases. When the Reset archive bit check box is selected, Acronis Backup & Recovery 10 will reset the archive bits of all files being backed up. Acronis Backup & Recovery 10 itself does not use the archive bit value. When performing incremental or differential backup, it determines whether a file has changed by the file size and the date/time when the file was last saved.
Restart the machine automatically after backup is finished
This option is available only when operating under bootable media. The preset is: Disabled. When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the machine boots from a hard disk drive by default and you select this check box, the machine will be restarted and the operating system will start as soon as the bootable agent has finished creating the backup.
Deduplicate backup only after transferring it to the vault (do not deduplicate at source)
This option is available only in advanced editions of Acronis Backup & Recovery 10. This option is effective for Windows and Linux operating systems and bootable media, when the backup destination is a deduplicating vault. The preset is: Disabled. Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performed by Acronis Backup & Recovery 10 Storage Node after the backup is saved to the vault (this is called deduplication at target). Turning off deduplication at source may lead to faster backup processes but greater network traffic and heavier load of the storage node. The eventual size of the backup in the vault is independent of whether deduplication at source is turned on. Deduplication at source and deduplication at target are described in Deduplication overview.
The user can stop a running task or a task that needs interaction. The task changes to the Stopping state and then to the Idle state. A waiting task can also be stopped. In this case, since the task is not running, "stop" means removing it from the queue.
Task state diagram
A task can have one of the following statuses: Error; Warning; OK. A task status is derived from the result of the last run of the task.
Status 1 Error How it is determined Last result is "Failed" How to handle Identify the failed task -> Check the task log to find out the reason of the failure, then do one or more of the following:
Remove the reason of the failure -> [optionally] Start the
failed task manually
Edit the failed task to prevent its future failure Edit the local plan to prevent its future failure in case a
Edit the backup policy on the management server in case a
centralized plan has failed Warning OK Last result is "Succeeded View the log to read the warnings -> [optionally] Perform with warning" actions to prevent the future warnings or failure. Last result is "Succeeded", "-", or "Stopped" No action is required. The "-" state means that the task has never been started or has been started, but has not finished yet and so its result is not available.
Working with backup plans and tasks
Actions on backup plans and tasks
The following is a guideline for you to perform operations with backup plans and tasks.
To Create a new backup plan, or a task Do Click New, then select one of the following:
Backup plan (p. 102) Recovery task (p. 118) Validation task (p. 130)
View details of a plan/task
Backup plan View details. Click In the Plan Details (p. 99) window, review the plan details. Task View details. Click In the Task Details (p. 97) window, review the task details.
View plan's/task's log
Backup plan Click View log.
You will be taken to the Log (p. 100) view containing the list of the plan-related log entries. Task Click View log.
The backup plan is currently running.
Editing of the currently running backup plan is impossible.
Without the Administrator privileges on the machine, a user cannot edit plans owned by other users.
The backup plan has a centralized origin.
Direct editing of centralized backup plans is not possible. You need to edit the original backup policy. Task Click Edit.
Why can't I edit the task?
Task belongs to a backup plan
Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing. When you need to modify a task belonging to a local backup plan, edit the backup plan. A task belonging to a centralized backup plan can be modified by editing the centralized policy that spawned the plan. Only the management server administrator can do so.
Without the Administrator privileges on the machine, a user cannot modify tasks owned by other users.
Delete a plan/task
Backup plan Click Delete.
What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can't I delete the backup plan?
The backup plan is in the "Running" state
A backup plan cannot be deleted, if at least one of its tasks is running.
Without the Administrator's privileges on the machine, a user cannot delete plans owned by other users.
A centralized plan can be deleted by the management server administrator by revoking the backup policy that produced the plan. Task Click Delete.
Why can't I delete the task?
A task belonging to a backup plan cannot be deleted separately from the plan. Edit the plan to remove the task or delete the entire plan.
Without the Administrator privileges on the machine, a user cannot delete tasks owned by other users. Refresh table Click Refresh.
The management console will update the list of backup plans and tasks existing on the machine with the most recent information. Though the list is refreshed automatically based on events, the data may not be retrieved immediately from the managed machine, due to some latency. Manual refresh guarantees that the most recent data is displayed.
Task name Backup (disk) Backup (file) Backup (virtual machine) Recovery (disk) Description Backing up disks and volumes Backing up files and folders Backing up an entire virtual machine or its volumes Disk backup recovery
Recovery (file) Recovery (volume) Recovery (MBR) Recovery (disk to existing VM) Recovery (disk to new VM) Recovery (existing VM) Recovery (new VM) Validation (archive) Validation (backup) Validation (vault) Cleanup ASZ creation ASZ management Disk management Compacting Indexing
File and folder recovery Recovery of volumes from a disk backup Master boot record recovery Recovery of a disk/volume backup to an existing virtual machine Recovery of a disk/volume backup to a new virtual machine Recovery of a virtual machine backup to an existing virtual machine Recovery of a virtual machine backup to a new virtual machine Validation of a single archive Validation of backups Validation of all archives stored in a vault Deleting backups from a backup archive in accordance with retention rules Creating Acronis Secure Zone Resizing, changing password, deleting Acronis Secure Zone Disk management operations Service task performed on a storage node Deduplication task performed by the storage node in the vault after a backup is completed
Depending on the type of task and whether it is running or not, a combination of the following tabs will appear:
The Task tab is common for all types of tasks. It provides general information on the selected task.
The Archive tab is available for backup, archive validation and cleanup tasks. Provides information on the archive: its name, type, size, where it is stored, etc.
The Backup tab is available for recovery, backup validation, and export tasks. Provides details on the selected backup: when it was created, its type (full, incremental, differential), information on the archive and the vault the backup is stored in.
The Settings tab displays information on scheduling and the options changed against the default values.
The Progress tab is available while the task is running. It is common for all types of tasks. The tab provides information about task progress, elapsed time and other parameters.
3. In the opened window, specify a path and a name for the file. Save all the log entries to a file 1. Make sure, that the filters are not set. 2. Click Save All to File.
3. In the opened window, specify a path and a name for the file. Save all the filtered log entries to a file 1. Set filters to get a list of the log entries that satisfy the filtering criteria. 2. Click Save All to File.
3. In the opened window, specify a path and a name for the file. As a result, the log entries of that list will be saved. Delete all the log entries Click Clear Log.
All the log entries will be deleted from the log, and a new log entry will be created. It will contain information about who deleted the entries and when.
Filtering and sorting log entries
Do 1. In the From field, select the date starting from which to display the log entries. 2. In the To field, select the date up to which to display the log entries.
The following is a guideline for you to filter and sort log entries.
Display log entries for a given time period
Filter log entries by type Press or release the following toolbar buttons: to filter error messages to filter warning messages to filter information messages Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed entity type) column header, select the backup plan or the type of managed entity from the list.
Filter log entries by task, Type the required value (task name, machine name, owner name, etc.) in the field managed entity, below the respective column header. machine, code, owner As a result you will see that the list of log entries fully or just partly coincide with the entered value. Sort log entries by date and time Click the column's header to sort the log entries in ascending order. Click it once again to sort the log entries in descending order.
Configuring the log table
By default, the table has seven columns that are displayed, others are hidden. If required, you can hide the shown columns and show the hidden ones.
Log entry details
Displays detailed information on the log entry you have selected and lets you copy the details to the clipboard. To copy the details, click the Copy to clipboard button.
Log entry data fields
A local log entry contains the following data fields:
Type - type of event (Error; Warning; Information) Date - date and time of the event occurrence Backup plan - the backup plan the event relates to (if any) Task - the task the event relates to (if any) Code - the program code of the event. Every type of event in the program has its own code. A code is an integer number that may be used by Acronis support service to solve the problem. Module - number of the program module where the event has occurred. It is an integer number that may be used by Acronis support service to solve the problem. Owner - user name of the backup plan owner (only under operating system) Message - a text description of the event.
After you complete all the required steps, click OK to create the commit creating of the recovery task.
Provide credentials for the account under which the task will run.
Run under the current user The task will run under the credentials with which the user who starts the tasks is logged on. If the task has to run on schedule, you will be asked for the current user's password on completing the task creation. Use the following credentials The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify:
Password. The password for the account. 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials (p. 23) section. To learn more about operations available depending on the user privileges, see the User privileges on a managed machine (p. 23) section.
Selecting the archive
1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
If the archive is stored in a centralized vault, expand the Centralized group and click the vault. If the archive is stored in a personal vault, expand the Personal group and click the vault. If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder.
If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the discs in order starting from the first one when the program prompts.
If the archive is stored on a network share, expand the Network folders group, then select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them.
If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials.
If the archive is stored on a locally attached tape device, expand the Tape drives group, then click the required device. 2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK.
What to validate
Validate Choose an object to validate: Archive (p. 132) - in that case, you need to specify the archive. Backup (p. 133) - specify the archive first, and then select the desired backup in this archive. Vault (p. 133) - select a vault (or other location), which archives to validate. Access Credentials (p. 133) [Optional] Provide credentials for accessing the source if the task account does not have enough privileges to access it. To access this option, select the check box for Advanced view.
When to validate
Validate (p. 134) Specify when and how often to perform validation. After you configure all the required settings, click OK to create the validation task.
If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. Click the appropriate folder on the server. You can access the server as an anonymous user if the server enables such access. To do so, click Use anonymous access instead of entering credentials.
To specify a backup to validate
1. In the upper pane, select a backup by its creation date/time. The bottom part of the window displays the selected backup content, assisting you to find the right backup. 2. Click OK.
To select a location
Enter the full path to the location in the Path field or select the desired location in the folders tree.
To select a centralized vault, expand the Centralized group and click the appropriate vault. To select a personal vault, expand the Personal group and click the appropriate vault. To select a local folder (CD/DVD drive, or locally attached tape device), expand the Local folders group and click the required folder. To select a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them. To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server.
Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible.
Sharing: mounted images can be easily shared to networked users.
"Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine. This will give access to the database until the failed machine is recovered. Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable media and creates an image. Then, the administrator mounts this image in read/write mode, scans and cleans it with an antivirus program, and finally recovers the machine. Error check: if recovery failed due to a disk error, mount the image in the read/write mode. Then, check the mounted disk for errors with the chkdsk /r command.
To mount an image, perform the following steps.
Archive (p. 135) Specify the path to the archive location and select the archive containing disk backups. Backup (p. 136) Select the backup. Access credentials (p. 136) [Optional] Provide credentials for the archive location. To access this option, select the Advanced view check box.
Volumes (p. 137) Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mount point, choose the read/write or read only access mode. When you complete all the required steps, click OK to mount the volumes.
If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
To select a backup:
1. Select one of the backups by its creation date/time. 2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup. To obtain information on a volume, right-click it and then click Information. 3. Click OK.
Use the current user credentials The program will access the location using the credentials of the current user. Use the following credentials The program will access the location using the credentials you specify. Use this option if the current user account does not have access permissions to the location. You might need to provide special credentials for a network share or a storage node vault. Specify:
Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows: 1. Select the check box for each volume you need to mount. 2. Click on the selected volume to set its mounting parameters.
To add an NDAS device
1. 2. 3. 4. 5. In a Linux-based bootable media, run the management console. Click Configure iSCSI/NDAS devices. In NDAS devices, click Add device. Specify the 20-character device ID. If you want to allow writing data onto the device, specify the five-character write key. Without this key, the device will be available in the read-only mode. 6. Click OK.
6.10.4 List of commands and utilities available in Linux-based bootable media
Linux-based bootable media contains the following commands and command line utilities, which you can use when running a command shell. To start the command shell, press CTRL+ALT+F2 while in the bootable media's management console.
Acronis command line utilities
acronis asamba lash restoreraids trueimagecmd trueimagemnt
Linux commands and utilities
busybox cat cdrecord chmod chown chroot cp dd df dmesg dmraid e2fsck e2label echo egrep fdisk fsck fxload gawk gpm grep growisofs grub gunzip halt ifconfig init insmod iscsiadm kill kpartx ln ls lspci lvm mdadm mkdir mke2fs mknod mkswap more mount mtx mv pccardctl ping pktsetup poweroff ps raidautorun rm rmmod route scp scsi_id sed sg_map26 sh sleep ssh sshd strace swapoff swapon sysinfo tar tune2fs udev udevinfo udevstart umount uuidgen vconfig vi zcat
6.10.5 Recovering MD devices and logical volumes
To recover Linux Software RAID devices, known as MD devices, and/or devices created by Logical Volume Manager (LVM), known as logical volumes, you need to create the corresponding volume structure before starting the recovery. You can create the volume structure in either of the following ways:
Automatically in Linux-based bootable media by using the management console or a scriptsee Creating the volume structure automatically (p. 155). Manually by using the lvm utilitysee Creating the volume structure manually (p. 156).
Creating the volume structure automatically
Suppose that you saved the volume structure to the /etc/Acronis directorysee Backing up LVM volumes (Linux) (p. 33)and that the volume with this directory is included in the archive. To recreate the volume structure in Linux-based bootable media, use either of the methods described below.
Caution: As a result of the following procedures, the current volume structure on the machine will be replaced with the one stored in the archive. This will destroy the data that is currently stored on some or all of the machine's hard disks.
built-in group except for deleting the machine from the management server. Virtual machines are deleted as a result of their host server deletion. A backup policy (p. 162) can be applied to a built-in group.
Centralized backup plan
A backup plan (p. 162) that appears on the managed machine (p. 169) as a result of deploying a backup policy (p. 162) from the management server (p. 170). Such plan can be modified only by editing the backup policy.
Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server (p. 170). The centralized management operations include:
creating, applying and managing backup policies (p. 162) creating and managing static (p. 171) and dynamic groups (p. 167) of machines (p. 169) managing the tasks (p. 172) existing on the machines creating and managing centralized vaults (p. 164) for storing archives managing storage nodes (p. 171) monitoring activities of the Acronis Backup & Recovery 10 components, viewing the centralized log and more.
A task (p. 172) belonging to a centralized backup plan (p. 164). Such task appears on the managed machine (p. 169) as a result of deploying a backup policy (p. 162) from the management server (p. 170) and can be modified only by editing the backup policy.
A networked location allotted by the management server (p. 170) administrator to serve as storage for the backup archives (p. 161). A centralized vault can be managed by a storage node (p. 171) or be unmanaged. The total number and size of archives stored in a centralized vault are limited by the storage size only. As soon as the management server administrator creates a centralized vault, the vault name and path to the vault are distributed to all machines registered (p. 171) on the server. The shortcut to the vault appears on the machines in the Centralized vaults list. Any backup plan (p. 162) existing on the machines, including local plans, can use the centralized vault. On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user's archives will be managed by the storage node as well as other archives stored in the vault.
Deleting backups (p. 161) from a backup archive (p. 161) in order to get rid of outdated backups or prevent the archive from exceeding the desired size.
operations are configured on the management server (p. 170) and propagated by the server to the managed machines). The direct management operations include:
creating and managing local backup plans (p. 169) creating and managing local tasks (p. 169), such as recovery tasks creating and managing personal vaults (p. 170) and archives stored there viewing the state, progress and properties of the centralized tasks (p. 164) existing on the machine viewing and managing the log of the agent's operations disk management operations, such as clone a disk, create volume, convert volume.
A kind of direct management is performed when using bootable media (p. 163). Some of the direct management operations can also be performed via the management server GUI. This presumes, however, either an explicit or an implicit direct connection to the selected machine.
Disk backup (Image)
A backup (p. 161) that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.
A number of dynamic disks (p. 166) that store the common configuration data in their LDM databases and therefore can be managed as a whole. Normally, all dynamic disks created within the same machine (p. 169) are members of the same disk group. As soon as the first dynamic disk is created by the LDM or another disk management tool, the disk group name can be found in the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmio\Boot Info\Primary Disk Group\Name. The next created or imported disks are added to the same disk group. The group exists until at least one of its members exists. Once the last dynamic disk is disconnected or converted to basic, the group is discontinued, though its name is kept in the above registry key. In case a dynamic disk is created or connected again, a disk group with an incremental name is created. When moved to another machine, a disk group is considered as foreign and cannot be used until imported into the existing disk group. The import updates the configuration data on both the local and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine. For more information about disk groups please refer to the following Microsoft knowledge base article: 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
HDD writing speed 45, 52 How to reactivate GRUB and change its configuration 129
Image 169 Increasing Acronis Secure Zone 146 Incremental backup 161, 163, 165, 169 Introducing Acronis Backup & Recovery Items to back up 103, 105
Kernel parameters 148, 149
Network connection speed 45, 52 Network port 149, 151 Network settings 149, 151 Notifications 53, 65 NT signature 123, 124 Number of tasks 41
Linux-based bootable media 148, 153 List of commands and utilities available in Linux-based bootable media 153, 158 Local backup plan 38, 166, 169 Local task 166, 169 Location selection 131, 133, 139, 142 Location's host is available 84 Log 93, 100 Log cleanup rules 43 Log entry details 100, 102
Operations with archives stored in a vault 70, 72, 74 Operations with backups 70, 72, 74 Operations with panes 10 Options 40 Overwriting 126
Owners and credentials 23, 71, 120, 132, 140
Selecting files and folders 106 Selection rule 162, 171 Setting up a display mode 152 Setting up SNMP services on the receiving machine 43 Simple scheme 110 SNMP notifications 42, 45, 54, 63, 67 Source files exclusion 44, 46 Source type 99, 103, 104, 105 Startup page 40 Static group 164, 171 Storage node (Acronis Backup & Recovery 10 Storage Node) 164, 165, 168, 169, 170, 171, 172 Storage node-side cleanup 170, 171 Storage node-side validation 170, 171, 172 Supported file systems 14 Supported operating systems 14 System requirements 15
Password for Acronis Secure Zone 144, 145 Personal vault 160, 166, 170 Personal vaults 39, 71 Physical machine 163, 170 Plan 170 Policy 170 Pop-up messages 40 Post-backup command 48 Post-data capture command 50 Post-recovery command 64 Pre/Post commands 44, 47, 49, 62, 63 Pre/Post data capture commands 44, 48 Pre-backup command 48 Pre-data capture command 49 Pre-recovery command 64 Proprietary Acronis technologies 38
Tape compatibility table 36 Tape support 36 Task 17, 162, 164, 169, 172 Task credentials 120, 131, 139, 140 Task details 89, 90, 93, 97 Task failure handling 45, 59 Task start conditions 45, 58, 77, 84, 91 Task states 89, 91 Task statuses 89, 92 Tasks need interaction 89 Technical support 15 Temporarily disabling a backup plan 73, 97 Time since last backup 86 Time-based alerts 41 Tower of Hanoi 163, 172 Tower of Hanoi backup scheme 28, 172
Recovering data 75, 93, 118 Recovering MD devices (Linux) 36, 127 Recovering MD devices and logical volumes 34, 36, 62, 118, 128, 155 Recovery exclusions 126, 127 Recovery point 169, 171, 172 Recovery priority 63, 65 Registered machine 41, 164, 170, 171 Registration 171 Result confirmation 144, 145 Retention rules 30, 110, 115, 116, 117, 165 Run backup plan 93, 97
AW-850 Peugeot XR7 Log-LOG Z2100 Monitor BB420 AVN2227P ZWF1211W T 945 CDX-S11S 4340FCT KX-TCM420B KP-41S5B Convertible 2000 Dopod C730 SP0802N MF4690 FR142 DD148P2WM E 1312 DVD-A120 Syncmaster 151S Classe E TX1704 M55-S3314 Series Antec P180 Smart-SET Stylus D120 CT-S2000 Rummikub MP86ATV Simon 3 B2230 Powershot S200 Review Jet 505 LE40A552 Doro 914C SGH-T639 M310W Plantronics 220 HD253GJ GT-E1360M EDC5310 CDP-XE200 RSG5fups Yamaha AV-1 EW1077F 8300-6 128 Princeton 650 SC-HT885W DR7922W Turntable SA5125 Pathfinder-2002 Wolf Pbtf TX-SR800 Gr-d295 KX-TG5431S MY231X Copia 9020 HD160JJ EFC70700X Sunbeam H2O KDC-W7544U 42PF7320 10 RS55xkgns V-3900RTV RX-MDX85 PRO 9000 FA601 C250P SF-331P EX-Z19 Yzea 950 KF6000 Yamaha DMR8 MS-74MLA HTS3366 S23 M796 HI-545 ME AP-65R Lancia Musa Tower DR-MV1SEU PDA-V100HD PMD661 D-JIX 340 SR-L3616A VS2121 Fisheasy 2 4663 X MCI300 12 KX-TG1311SA KDL-37P3020 12DVA CDX-71 Sport S400 X-970T Triax C6
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101