7 Copyright © Acronis International GmbH, 2002-2015
9.6.1 Acronis PXE Server Installation ................................................................................................................... 265
9.6.2 Setting up a machine to boot from PXE .................................................................................................... 265
9.6.3 Work across subnets ................................................................................................................................... 266
10 Disk management .................................................................................................. 267
10.1 Supported file systems ..........................................................................................................267
10.2 Basic precautions ...................................................................................................................267
10.3 Running Acronis Disk Director Lite ........................................................................................268
10.4 Choosing the operating system for disk management ..........................................................268
10.5 "Disk management" view ......................................................................................................269
10.6 Disk operations ......................................................................................................................269
10.6.1 Disk initialization .......................................................................................................................................... 270
10.6.2 Basic disk cloning ......................................................................................................................................... 270
10.6.3 Disk conversion: MBR to GPT ..................................................................................................................... 272
10.6.4 Disk conversion: GPT to MBR ..................................................................................................................... 273
10.6.5 Disk conversion: basic to dynamic ............................................................................................................. 273
10.6.6 Disk conversion: dynamic to basic ............................................................................................................. 274
10.6.7 Changing disk status .................................................................................................................................... 275
10.7 Volume operations ................................................................................................................275
10.7.1 Creating a volume ....................................................................................................................................... 275
10.7.2 Delete volume ............................................................................................................................................. 279
10.7.3 Set active volume ........................................................................................................................................ 280
10.7.4 Change volume letter ................................................................................................................................. 280
10.7.5 Change volume label ................................................................................................................................... 280
10.7.6 Format volume ............................................................................................................................................ 281
10.8 Pending operations ................................................................................................................282
11 Protecting applications with disk-level backup ........................................................ 283
11.1 Backing up an application server ...........................................................................................283
11.1.1 Locating database files ................................................................................................................................ 285
11.1.2 Truncating transaction logs ........................................................................................................................ 288
11.1.3 Best practices when backing up application servers ................................................................................ 290
11.2 Recovering SQL Server data ...................................................................................................292
11.2.1 Recovering SQL Server databases from a disk backup ............................................................................. 292
11.2.2 Accessing SQL Server databases from a disk backup ............................................................................... 293
11.2.3 Attaching SQL Server databases ................................................................................................................ 294
11.3 Recovering Exchange Server data ..........................................................................................294
11.3.1 Recovering Exchange Server database files from a disk backup ............................................................. 294
11.3.2 Mounting Exchange Server databases ...................................................................................................... 295
11.3.3 Granular recovery of mailboxes ................................................................................................................. 295
11.4 Recovering Active Directory data ..........................................................................................296
11.4.1 Recovering a domain controller (other DCs are available) ...................................................................... 296
11.4.2 Recovering a domain controller (no other DCs are available) ................................................................. 297
11.4.3 Restoring the Active Directory database ................................................................................................... 298
11.4.4 Restoring accidentally deleted information .............................................................................................. 299
11.4.5 Avoiding a USN rollback .............................................................................................................................. 299
11.5 Recovering SharePoint data ..................................................................................................301
11.5.1 Recovering a content database .................................................................................................................. 301
11.5.2 Recovering configuration and service databases ..................................................................................... 302
11.5.3 Recovering individual items........................................................................................................................ 303