624461
93
Verklein
Vergroot
Pagina terug
1/95
Pagina verder
User’s Guide
Acronis
®
True Image Server 9.1
for Windows
2 Copyright © Acronis, Inc., 2000-2007
Copyright © Acronis, Inc., 2000-2007. All rights reserved.
“Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery
Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc.
Linux is a registered trademark of Linus Torvalds.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the
explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained from the copyright
holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE
LEGALLY INVALID.
Copyright © Acronis, Inc., 2000-2007 3
END-USER LICENSE AGREEMENT
BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE
TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN
CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE
SOFTWARE.
Acronis® True Image Server (the Software) is Copyright © Acronis, Inc., 2000-2007. All
rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software
only, subject to the following restrictions and limitations.
1. The license is to the original purchaser only, and is not transferable without prior
written permission from Acronis.
2. The original purchaser can use the software on a single computer. You cannot use
the software on more than a single machine, even if you own or lease all of them, without
the written consent of Acronis.
3. The original purchaser cannot engage in, nor permit third parties to engage in, any of
the following:
A. Providing or permitting use of by, or transferring the software to, third parties.
B. Providing use of the software in a computer service business, network, timesharing or
multiple user arrangement to users who are not individually licensed by Acronis.
C. Making alterations or copies of any kind in the software (except as specifically
permitted above).
D. Attempting to unassemble, decompile or reverse-engineer the software in any way.
E. Granting sublicenses, leases, or other rights in the software to others.
F. Making copies, or verbal or media translations, of the users guide.
G. Making telecommunication data transmission of the software.
Acronis has the right to terminate this license if there is a violation of its terms or default by
the original purchaser. Upon termination for any reason, all copies of the software must be
immediately returned to Acronis, and the original purchaser shall be liable to Acronis for any
and all damages suffered as a result of the violation or default.
ENTIRE RISK
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH
YOU THE PURCHASER. Acronis DOES NOT WARRANT THAT THE SOFTWARE OR ITS
FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE
SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL BE
CORRECTED.
NO LIABILITY FOR CONSEQUENTIAL DAMAGES IN NO EVENT SHALL Acronis OR ITS
VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF
THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF Acronis HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
SOFTWARE USAGE TERMS AND CONDITIONS
Under current legislation, the «License Agreement» is considered a contract between you
and Acronis Inc. The contract is a legal document and its violation may result in legal action.
Illegal use and/or distribution of this software will be prosecuted.
4 Copyright © Acronis, Inc., 2000-2007
Table of Contents
Chapter 1. Introduction...........................................................................................
7
1.1 Acronis® True Image Server – a complete solution for corporate users.................................7
1.2 New in Acronis True Image 9.1 Server for Windows.............................................................8
1.3 System requirements and supported media.........................................................................9
1.3.1 Minimum system requirements ....................................................................................9
1.3.2 Supported operating systems.......................................................................................9
1.3.3 Supported file systems.............................................................................................. 10
1.3.4 Supported storage media ..........................................................................................10
1.4 Technical support............................................................................................................ 10
Chapter 2. Acronis True Image Server installation and starting ..........................12
2.1 Installing Acronis True Image Server ................................................................................ 12
2.1.1 Acronis Universal Restore installation.......................................................................... 13
2.2 Extracting Acronis True Image Server............................................................................... 13
2.3 Running Acronis True Image Server.................................................................................. 13
2.4 Removing Acronis True Image Server ............................................................................... 13
Chapter 3. General information and proprietary Acronis technologies ................14
3.1 The difference between file archives and disk/partition images ...........................................14
3.2 Full, incremental and differential backups..........................................................................14
3.3 Acronis Secure Zone........................................................................................................ 15
3.4 Acronis Startup Recovery Manager ................................................................................... 16
3.4.1 How it works............................................................................................................16
3.4.2 How to use .............................................................................................................. 16
3.5 Acronis Snap Restore....................................................................................................... 16
3.5.1 Limitations in using Acronis Snap Restore ................................................................... 16
3.5.2 How it works............................................................................................................17
3.5.3 How to use .............................................................................................................. 17
3.6 Acronis Universal Restore.................................................................................................17
3.6.1 Acronis Universal Restore purpose..............................................................................17
3.6.2 Acronis Universal Restore general principles................................................................ 18
3.6.3 Acronis Universal Restore and Microsoft Sysprep ......................................................... 18
3.6.4 Using Acronis Universal Restore in virtual environment ................................................19
3.6.5 Limitations in using Acronis Universal Restore ............................................................. 19
3.6.6 Getting Acronis Universal Restore............................................................................... 19
3.7 Using dynamic disks and volumes..................................................................................... 19
3.8 Backing up to tape drive..................................................................................................20
3.9 Viewing disk and partition information .............................................................................. 20
Chapter 4. Using Acronis True Image Server ........................................................22
4.1 Main program window..................................................................................................... 22
4.2 Available operations ........................................................................................................ 24
Chapter 5. Creating backup archives ....................................................................26
5.1 Backing up files and folders (file backup) .......................................................................... 26
5.2 Backing up disks and partitions (image backup).................................................................30
5.3 Setting backup options ....................................................................................................32
5.3.1 Archive protection..................................................................................................... 33
5.3.2 Source files exclusion................................................................................................ 33
5.3.3 Pre/post commands.................................................................................................. 33
5.3.4 Database support ..................................................................................................... 34
5.3.5 Compression level..................................................................................................... 35
5.3.6 Backup performance................................................................................................. 35
5.3.7 Fast incremental/differential backup........................................................................... 36
5.3.8 Archive splitting........................................................................................................ 36
Copyright © Acronis, Inc., 2000-2007 5
5.3.9 File-level security settings.......................................................................................... 37
5.3.10 Media components..................................................................................................37
5.3.11 Additional settings...................................................................................................38
Chapter 6. Restoring the backup data ..................................................................39
6.1 Restore under Windows or boot from CD?......................................................................... 39
6.1.1 Network settings in rescue mode ...............................................................................39
6.2 Restoring files and folders from file archives...................................................................... 40
6.3 Restoring disks/partitions or files from images................................................................... 42
6.3.1 Starting the Restore Data Wizard ............................................................................... 43
6.3.2 Archive selection.......................................................................................................43
6.3.3 Restoration type selection .........................................................................................44
6.3.4 Selecting a disk/partition to restore ............................................................................ 45
6.3.5 Selecting a target disk/partition..................................................................................45
6.3.6 Changing the restored partition type .......................................................................... 46
6.3.7 Changing the restored partition file system ................................................................. 47
6.3.8 Changing the restored partition size and location......................................................... 47
6.3.9 Assigning a letter to the restored partition .................................................................. 48
6.3.10 Restoring several disks or partitions at once.............................................................. 48
6.3.11 Using Acronis Universal Restore ............................................................................... 48
6.3.12 Setting restore options ............................................................................................ 49
6.3.13 Restoration summary and executing restoration ........................................................49
6.4 Setting restore options .................................................................................................... 50
6.4.1 Files to exclude from restoration ................................................................................ 50
6.4.2 Files overwriting mode..............................................................................................50
6.4.3 Pre/post commands.................................................................................................. 50
6.4.4 Restoration priority ................................................................................................... 51
6.4.5 File-level security settings.......................................................................................... 51
6.4.6 Specifying mass storage drivers ................................................................................. 51
6.4.7 Additional settings ....................................................................................................52
Chapter 7. Scheduling tasks..................................................................................53
7.1 Creating scheduled tasks ................................................................................................. 53
7.1.1 Setting up daily execution .........................................................................................54
7.1.2 Setting up weekly execution ...................................................................................... 55
7.1.3 Setting up monthly execution.....................................................................................56
7.1.4 Setting up one-time execution ...................................................................................56
7.2 Managing scheduled tasks ...............................................................................................57
Chapter 8. Managing Acronis Secure Zone ...........................................................58
8.1 Creating Acronis Secure Zone........................................................................................... 58
8.2 Resizing Acronis Secure Zone........................................................................................... 60
8.3 Changing the password for Acronis Secure Zone................................................................ 60
8.4 Deleting Acronis Secure Zone........................................................................................... 61
Chapter 9. Creating bootable media .....................................................................62
9.1 Creating Acronis rescue media .........................................................................................62
9.2 Creating Win PE ISO with Acronis True Image Server......................................................... 63
Chapter 10. Other operations................................................................................65
10.1 Validating backup archives.............................................................................................65
10.2 Operation results notification..........................................................................................65
10.2.1 Email notification .................................................................................................... 66
10.2.2 WinPopup notification..............................................................................................66
10.3 Viewing logs ................................................................................................................. 67
10.4 Event tracing ................................................................................................................68
10.4.1 Windows event log..................................................................................................68
10.4.2 SNMP notifications .................................................................................................. 69
6 Copyright © Acronis, Inc., 2000-2007
10.5 Managing System Restore..............................................................................................69
Chapter 11. Mounting an image as a virtual drive ................................................70
11.1 Mounting an image........................................................................................................ 70
11.2 Unmounting an image ...................................................................................................72
Chapter 12. Transferring the system to a new disk ..............................................73
12.1 General information....................................................................................................... 73
12.2 Security 73
12.3 Executing transfers........................................................................................................ 74
12.3.1 Selecting Clone mode.............................................................................................. 74
12.3.2 Selecting source disk............................................................................................... 74
12.3.3 Selecting destination disk ........................................................................................75
12.3.4 Partitioned destination disk......................................................................................76
12.3.5 Old and new disk partition layout ............................................................................. 76
12.3.6 Old disk data..........................................................................................................76
12.3.7 Destroying the old disk data.....................................................................................77
12.3.8 Selecting partition transfer method........................................................................... 78
12.3.9 Partitioning the old disk........................................................................................... 79
12.3.10 Old and new disk partition layouts.......................................................................... 79
12.3.11 Cloning summary.................................................................................................. 80
12.4 Cloning with manual partitioning.....................................................................................80
12.4.1 Old and new disk partition layouts............................................................................ 80
Chapter 13. Adding a new hard disk .....................................................................82
13.1 Selecting a hard disk ..................................................................................................... 82
13.2 Creating new partitions.................................................................................................. 82
13.3 Disk add summary......................................................................................................... 83
Chapter 14. Command-line mode and scripting....................................................84
14.1 Working in the command-line mode................................................................................ 84
14.1.1 Supported commands.............................................................................................. 84
14.1.2 Common options (options common for most trueimagecmd commands)...................... 86
14.1.3 Specific options (options specific for individual trueimagecmd commands)................... 87
14.1.4 trueimagecmd.exe usage examples .......................................................................... 91
14.1.5 Command-line mode usage under DOS..................................................................... 93
14.2 Scripting 93
14.2.1 Script execution parameters..................................................................................... 93
14.2.2 Script structure....................................................................................................... 93
14.2.3 Script usage examples.............................................................................................94
Copyright © Acronis, Inc., 2000-2007 7
Chapter 1. Introduction
1.1 Acronis® True Image Server – a complete solution for corporate
users
You have come to rely on your servers to run your business and retain key enterprise data.
Acronis True Image Server provides comprehensive, reliable, and cost-effective system
backup and recovery for corporate servers. With Acronis True Image Server you have peace
of mind knowing you are protected and can recover from any situation.
Minimizes downtime
Acronis True Image Server enables you to restore systems in minutes, not hours or days. An
entire system can be restored from an image that includes everything the system needs to
run: the operating system, applications, databases, and configurations. No reinstallation or
reconfiguration is required. Moreover, complete system restoration can be performed to an
existing system or to a new system with different hardware or to virtual machines. With the
new Acronis Snap Restore feature, users can access a system during restore, further
decreasing downtime. File-based backups provide you with the flexibility to only backup
specific critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be
implemented with minimal user training.
Automates Backup
With the scheduling capability in Acronis True Image Server, you simply create backup tasks,
tailored by group, at certain times or at certain events, automating backups.
To ensure that backups have occurred, or user intervention is required, you can request
notifications via email or pop-up. You can view Acronis events in Windows Application Events
Log or Acronis own log. Log messages can be automatically sent out to SNMP clients.
The product also supports the creation of custom commands before and after backups. For
example, users can automatically run anti-virus products before an image is created and
verify the validity of backups after they have been created.
Ensures 24 X 7 Uptime
With the Acronis Drive Snapshot, systems can be imaged while they are in use, supporting
24 by 7 availability. This technology enables the product to backup and image critical
operating system files, the master boot record and any partition-based boot records without
requiring a reboot. A CPU allocation feature allows you to limit the amount of CPU usage for
the application to maximize the CPU’s availability for mission critical applications. Moreover,
users can control hard disk drive writing speeds and control network bandwidth used during
backups, allowing minimal disruption of business operations.
A several-second database suspension is provided for correct backup of mission critical
applications such as Microsoft Exchange Server, Microsoft SQL Server and Oracle with
support VSS. If your database or operating system does not support VSS, Acronis True
Image Server will execute your custom commands to realize database suspension.
Supports Cutting Edge Technology
8 Copyright © Acronis, Inc., 2000-2007
Businesses today are moving to leverage the latest technologies, dual-core 64 bit processors
and 64 bit operating systems. With Acronis True Image Server, you can protect these new
machines, as well as legacy ones, running one solution.
Leverages Existing Technology Investments
The product can leverage your current storage infrastructure by supporting a wide variety of
storage media, so you can avoid costly hardware purchases to implement the solution. The
product supports key storage technologies such as: Direct Attached Storage (DAS), Network
Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of Independent
Disks (RAID) devices, tapes, USB and IEEE-1394 (FireWire) compliant storage devices, CDs,
DVDs, removable drives (Floppy, Zip, etc.) and shared storage. Moreover, the product
ensures that you maximize the space on these resources with four levels of compression.
Disk cloning and new disk deployment
Acronis True Image Server can be used to clone an image onto multiple servers. For
example, a company purchased several servers and needs similar environments on each of
them. Traditionally, an IT manager should install the operating system and programs on
every server. With Acronis True Image Server, the IT manager can create a disk image of
the first system deployed. That image can then be duplicated onto multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image Server simplifies the
task to few mouse clicks creating the exact copy of your old disk to a new one and adjusting
partitions size to fit a new hard disk.
1.2 New in Acronis True Image 9.1 Server for Windows
Support for Windows XP Professional x64 Edition, Windows Server 2003 x64
Editions
Direct backup to DVD and bootable DVD creation
Support for GPT hard disks (disks with GUID partition table)
Backup to/restore from FTP servers
Acronis Snap Restore – A user can start working in seconds while the system is still
being restored
Acronis Universal Restore (optional) – Hardware-independent live system restore
File-level backup and recovery, including files opened in exclusive usage mode - In
addition to an entire partition/system backup
Differential backup – Backup only the changes made since the full backup
Fast incremental/differential backup – Users can choose to compare files with their
archived copies by date/size (fast process) or by file contents (precise, but time-
consuming process)
Files and folders backup/restore filtering – Saves space when creating file backups
by only backing up files of the types the users want to keep. Similarly, a user can tell the
program not to restore certain files from the file archive
Microsoft Volume Shadow Copy Service (VSS) support (for Windows 2003 Server
and higher) – Easily backup VSS compatible databases (Exchange, Oracle, SQL Server)
without taking databases offline and ensuring data consistency
Pre/post backup/restore commands – Users can specify their own commands which
will be executed before and after the backup or restore process. For example, one might
Copyright © Acronis, Inc., 2000-2007 9
want to remove some temporary files from the disk before starting a backup or configure
a third party antivirus product to be started each time before the backup starts
User-editable default backup options – Users can configure and save backup
parameters, such as backup performance (hard disk writing speed, network bandwidth
during backups), validate backup archive after backup completion, file-level security
settings (preserving files’ security settings in the archive, storing encrypted files in
encrypted or decrypted state)
User-editable default restore options – Users can configure and save restore
parameters, such as files overwriting mode, the original or current date and time for
restored files etc.
Read-write mode of mounting images
Bootable backup media – When backing up to removable media, users can make this
media bootable in the same manner as a rescue CD, so separate recover media is not
required
Bootable disks ISOs and RIS packages – In addition to burning a bootable rescue
disk, users can save its ISO image for burning later, or create a RIS package for remote
boot of Acronis True Image Server
Windows Event Log and SNMP support – Store event log messages, issued by
Acronis True Image Server, to Windows Event Log or send them to SNMP clients
Manage System Restore tool (for Windows 2003 Server and higher) – Turn on/off the
Windows native System Restore tool directly from Acronis True Image Server
Context Help
1.3 System requirements and supported media
1.3.1 Minimum system requirements
Acronis True Image Server requires the following hardware:
Pentium processor or higher
256MB RAM
FDD or CD-RW drive for bootable media creation
Mouse (recommended).
1.3.2 Supported operating systems
Acronis True Image Server
Windows NT 4.0 Workstation SP6/2000 Professional SP4/XP Professional SP2
Windows NT 4.0 Server SP6/2000 Server/2000 Advanced Server/2003 Server
Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions
Windows Vista all Editions (except for the Acronis Snap Restore feature)
Acronis Universal Restore (optional)
Windows 2000 Professional SP4/XP Professional SP2
Windows 2000 Server/2000 Advanced Server/2003 Server
Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions
10 Copyright © Acronis, Inc., 2000-2007
Windows Vista all Editions
Acronis True Image Server also enables creating a bootable diskette or CD-R/W that can
back-up and restore a disk/partition on a computer running any PC-based operating system
including Linux®.
1.3.3 Supported file systems
FAT16/32
NTFS
Ext2/Ext3
ReiserFS
Reiser4
Linux SWAP
XFS
JFS
If a file system is not supported or is corrupted, Acronis True Image Server can copy data
using a sector-by-sector approach.
For XFS and JFS file systems the partition resizing feature is not supported.
1.3.4 Supported storage media
Hard disk drives
Networked storage devices such as Storage Area Networks (SANs) and Network Attached
Storage (NAS)
SCSI tape drives
IDE and SCSI RAID controllers of any level
FTP-servers*
CD-R/RW, DVD-R/RW, DVD+R (including double-layer DVD+R), DVD+RW, DVD-RAM**
USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices
ZIP®, Jaz® and other removable media
* - an FTP-server must allow passive mode for file transfers. Data recovery directly from
FTP-server requires the archive to consist of files no more than 2GB in size. It is
recommended that you change the source computer firewall settings to open ports 20 and
21 for both TCP and UDP protocols and disable the Routing and Remote Access Windows
service.
** - Burned write-once discs cannot be read in Windows NT 4 without third-party software.
Burned rewritable discs cannot be read in Linux without kernel patch.
1.4 Technical support
Users of legally purchased copies of Acronis True Image Server are entitled to free technical
support from Acronis. If you experience problems installing or using Acronis products that
you can’t solve yourself by using this guide, then please contact Acronis Technical Support.
Copyright © Acronis, Inc., 2000-2007 93
7. Clone
trueimagecmd /clone /harddisk:2 /target_harddisk:3
Clone hard disk 2 to hard disk 3.
8. Explore image
trueimagecmd /explore /filename:\\myserver\backup\mybackup.tib
/net_user:john /net_password:qwerty
This will connect all images, stored in file mybackup.tib on the network drive, as virtual
drives.
14.1.5 Command-line mode usage under DOS
For use in the MS-DOS compatible environments Acronis True Image Server includes the
TrueImageCmdDos.exe utility. It is located in a folder where Acronis True Image Server
has been installed, by default it is C:\Program Files\Acronis\TrueImageServer.
14.2 Scripting
14.2.1 Script execution parameters
Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True
Image Server installation folder (i.e. C:\Program Files\Acronis\TrueImageServer). This utility
is also used to monitor backup progress.
TrueImageTerminal execution parameters:
TrueImageTerminal.exe [arguments]
Arguments include the following:
/help – outputs help information about TrueImageTerminal.exe parameters.
/progress – outputs progress of backup operations run either from Acronis True Image
Server graphics user interface, or from the script.
/execute: [script file name] – executes a script. If there are several scripts to be
executed, they are queued. An example for executing MyBackup.tis script:
TrueImageTerminal.exe /execute:C:\MyBackup.tis
/nowait – an optional script execution argument. Enables to terminate TrueImageTerminal
before backup is finished. Example:
TrueImageTerminal /execute:C:\MyBackup.tis /nowait
By pressing Ctrl+C you can force backup progress output off and switch
TrueImageTerminal to background operation.
You can terminate backup operation executed by TrueImageTerminal by pressing Ctrl+B.
14.2.2 Script structure
Scripts are written in the XML language and you can use the following tags:
93

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Acronis True Image 9.1 Server for Windows bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Acronis True Image 9.1 Server for Windows in de taal/talen: Engels als bijlage per email.

De handleiding is 2,32 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Andere handleiding(en) van Acronis True Image 9.1 Server for Windows

Acronis True Image 9.1 Server for Windows Gebruiksaanwijzing - Deutsch - 113 pagina's


Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info