7 Copyright © Acronis International GmbH, 2002-2015
11 Protecting applications with disk-level backup ........................................................ 197
11.1 Backing up an application server ...........................................................................................197
11.1.1 Locating database files ................................................................................................................................ 199
11.1.2 Truncating transaction logs ........................................................................................................................ 202
11.1.3 Best practices when backing up application servers ................................................................................ 205
11.2 Recovering SQL Server data ...................................................................................................207
11.2.1 Recovering SQL Server databases from a disk backup ............................................................................. 207
11.2.2 Accessing SQL Server databases from a disk backup ............................................................................... 208
11.2.3 Attaching SQL Server databases ................................................................................................................ 209
11.3 Recovering Exchange Server data ..........................................................................................209
11.3.1 Recovering Exchange Server database files from a disk backup ............................................................. 209
11.3.2 Mounting Exchange Server databases ...................................................................................................... 210
11.3.3 Granular recovery of mailboxes ................................................................................................................. 210
11.4 Recovering Active Directory data ..........................................................................................211
11.4.1 Recovering a domain controller (other DCs are available) ...................................................................... 211
11.4.2 Recovering a domain controller (no other DCs are available) ................................................................. 212
11.4.3 Restoring the Active Directory database ................................................................................................... 213
11.4.4 Restoring accidentally deleted information .............................................................................................. 214
11.4.5 Avoiding a USN rollback .............................................................................................................................. 214
11.5 Recovering SharePoint data ..................................................................................................216
11.5.1 Recovering a content database .................................................................................................................. 216
11.5.2 Recovering configuration and service databases ..................................................................................... 217
11.5.3 Recovering individual items........................................................................................................................ 218
12 Administering a managed machine ......................................................................... 220
12.1 Backup plans and tasks ..........................................................................................................220
12.1.1 Actions on backup plans and tasks ............................................................................................................ 220
12.1.2 States and statuses of backup plans and tasks ......................................................................................... 222
12.1.3 Export and import of backup plans ............................................................................................................ 224
12.1.4 Deploying backup plans as files .................................................................................................................. 227
12.1.5 Backup plan details ..................................................................................................................................... 229
12.1.6 Task/activity details ..................................................................................................................................... 230
12.2 Log ..........................................................................................................................................230
12.2.1 Actions on log entries.................................................................................................................................. 230
12.2.2 Log entry details .......................................................................................................................................... 231
12.3 Alerts ......................................................................................................................................232
12.4 Changing a license .................................................................................................................233
12.5 Collecting system information ...............................................................................................233
12.6 Adjusting machine options ....................................................................................................234
12.6.1 Additional settings....................................................................................................................................... 234
12.6.2 Acronis Customer Experience Program ..................................................................................................... 234
12.6.3 Alerts ............................................................................................................................................................ 234
12.6.4 E-mail settings ............................................................................................................................................. 235
12.6.5 Event tracing ................................................................................................................................................ 236
12.6.6 Log cleanup rules ......................................................................................................................................... 238
12.6.7 Cloud backup proxy ..................................................................................................................................... 239
13 Cloud backup ......................................................................................................... 240
13.1 Introduction to Acronis Cloud Backup ...................................................................................240
13.1.1 What is Acronis Cloud Backup? .................................................................................................................. 240
13.1.2 What data can I back up and recover? ...................................................................................................... 240
13.1.3 How long will my backups be kept in the cloud storage? ........................................................................ 240