624432
160
Verklein
Vergroot
Pagina terug
1/162
Pagina verder
User’s Guide
Acronis
®
True Image Echo
Enterprise Server
2 Copyright © Acronis, Inc., 2000-2009
Copyright © Acronis, Inc., 2000-2009. All rights reserved.
“Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc.
"Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active
Restore” and the Acronis logo are trademarks of Acronis, Inc.
Linux is a registered trademark of Linus Torvalds.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective
owners.
Distribution of substantively modified versions of this document is prohibited without the
explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained from the copyright
holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE
LEGALLY INVALID.
3 Copyright © Acronis, Inc., 2000-2009
Table of Contents
Chapter 1. Introduction ...................................................................................... 7
1.1 Acronis
®
True Image Echo Enterprise Server – a complete solution for corporate users ........... 7
1.2 Acronis True Image Echo Enterprise Server components ....................................................... 9
1.3 New in Acronis True Image Echo Enterprise Server .............................................................. 9
1.4 Supported file systems and storage media ......................................................................... 11
1.4.1 Supported file systems .............................................................................................. 11
1.4.2 Supported storage media ........................................................................................... 11
1.5 License policy .................................................................................................................. 12
1.6 Technical support ............................................................................................................ 12
Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
............................................................................................................................ 13
2.1 System requirements ....................................................................................................... 13
2.1.1 Minimum hardware requirements ............................................................................... 13
2.1.2 Supported operating systems ..................................................................................... 13
2.2 Security parameters ......................................................................................................... 14
2.2.1 Credentials ............................................................................................................... 14
2.2.2 Firewall setup ........................................................................................................... 14
2.2.3 Encrypted communication ........................................................................................... 15
2.2.4 Security parameters in Acronis Administrative Template ............................................... 15
2.3 Installing Acronis True Image Echo Enterprise Server components ....................................... 16
2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis
True Image Agent for Windows ........................................................................................... 17
2.3.2 Installation of Acronis True Image Agent for Linux ....................................................... 18
2.3.3 Installation of Acronis Group Server ............................................................................ 18
2.3.4 Acronis Backup Server installation and setup ............................................................... 18
2.3.5 Acronis Universal Restore installation .......................................................................... 22
2.4 Extracting Acronis True Image Echo Enterprise Server components ..................................... 22
2.5 Running Acronis True Image Echo Enterprise Server components ........................................ 22
2.5.1 Running Acronis True Image Echo Enterprise Server (local version) ............................... 22
2.5.2 Running Acronis True Image Management Console ...................................................... 23
2.5.3 Running other Acronis components ............................................................................. 23
2.6 Removing Acronis True Image Echo Enterprise Server components ...................................... 23
Chapter 3. General information and proprietary Acronis technologies ............ 24
3.1 The difference between file archives and disk/partition images ............................................ 24
3.2 Full, incremental and differential backups .......................................................................... 24
3.3 Acronis Secure Zone
®
...................................................................................................... 25
3.4 Acronis Startup Recovery Manager .................................................................................... 26
3.4.1 How it works ............................................................................................................ 26
3.4.2 How to use ............................................................................................................... 26
3.5 Acronis Backup Server ..................................................................................................... 27
3.5.1 Backup locations ....................................................................................................... 27
3.5.2 Quotas and time limits for computers and users ........................................................... 28
3.5.3 Administrators and Users ........................................................................................... 28
3.5.4 Operations with archives ............................................................................................ 29
3.6 Acronis Active Restore ..................................................................................................... 29
3.6.1 Limitations in using Acronis Active Restore .................................................................. 29
3.6.2 How it works ............................................................................................................ 29
3.6.3 How to use ............................................................................................................... 30
3.7 Acronis Universal Restore ................................................................................................. 31
3.7.1 Acronis Universal Restore purpose .............................................................................. 31
3.7.2 Acronis Universal Restore general principles ................................................................ 31
3.7.3 Acronis Universal Restore and Microsoft Sysprep .......................................................... 32
4 Copyright © Acronis, Inc., 2000-2009
3.7.4 Limitations in using Acronis Universal Restore .............................................................. 32
3.7.5 Getting Acronis Universal Restore ............................................................................... 32
3.8 Backing up to tape libraries and tape drives ....................................................................... 33
3.8.1 Backing up to a locally attached tape device ................................................................ 34
3.8.2 Understanding backup to tape devices attached to the Backup Server ........................... 34
3.8.3 Backing up to a tape device through Acronis Backup Server .......................................... 36
3.8.4 Restoring data from archives located on tape devices ................................................... 36
3.9 Viewing disk and partition information ............................................................................... 37
3.10 Changing Acronis temporary folder path .......................................................................... 37
Chapter 4. Using Acronis True Image Management Console ............................ 38
4.1 General information ......................................................................................................... 38
4.2 Installing/updating Acronis components on remote machines .............................................. 38
4.3 Managing a single remote computer .................................................................................. 41
4.3.1 Connecting to a remote computer .............................................................................. 41
4.3.2 Backup and recovery tasks ......................................................................................... 42
4.4 Managing groups of computers ......................................................................................... 46
4.4.1 Group status display .................................................................................................. 46
4.4.2 Creating new group tasks .......................................................................................... 48
4.4.3 Group tasks management .......................................................................................... 50
4.4.4 Acronis Group Server options ..................................................................................... 51
4.5 Managing backup server .................................................................................................. 52
4.5.1 Default settings ......................................................................................................... 53
4.5.2 Set up Administrator profiles ...................................................................................... 54
4.5.3 Adding Users and Administrators to the Acronis Backup Server database ....................... 55
4.5.4 Changing User profiles ............................................................................................... 57
4.5.5 Configuring Backup Locations ..................................................................................... 58
4.5.6 Managing Archives .................................................................................................... 59
4.5.7 Limiting access to Acronis Backup Server .................................................................... 60
Chapter 5. Using Acronis True Image Echo Enterprise Server (local version) . 61
5.1 Main program window ..................................................................................................... 61
5.2 Managing a local computer ............................................................................................... 63
Chapter 6. Creating backup archives ................................................................ 66
6.1 Backing up files and folders (file backup) ........................................................................... 66
6.2 Backing up disks and partitions (image backup) ................................................................. 70
6.3 Setting backup options ..................................................................................................... 72
6.3.1 Archive protection ..................................................................................................... 73
6.3.2 Source files exclusion ................................................................................................ 73
6.3.3 Pre/post commands .................................................................................................. 74
6.3.4 Database support ...................................................................................................... 74
6.3.5 Compression level ..................................................................................................... 75
6.3.6 Backup performance ................................................................................................. 75
6.3.7 Fast incremental/differential backup ............................................................................ 76
6.3.8 Archive splitting ........................................................................................................ 77
6.3.9 File-level security settings .......................................................................................... 77
6.3.10 Media components .................................................................................................. 78
6.3.11 Error handling ......................................................................................................... 78
6.3.12 Dual destination backup ........................................................................................... 79
6.3.13 Wake On LAN ......................................................................................................... 79
6.3.14 Additional settings ................................................................................................... 80
Chapter 7. Restoring the backup data .............................................................. 82
7.1 Considerations before recovery ......................................................................................... 82
7.1.1 Restore under Windows or boot from CD? ................................................................... 82
7.1.2 Network settings in rescue mode ................................................................................ 82
7.1.3 Recovering dynamic volumes ..................................................................................... 83
5 Copyright © Acronis, Inc., 2000-2009
7.2 Restoring files and folders from file archives ...................................................................... 83
7.3 Restoring disks/partitions or files from images ................................................................... 87
7.3.1 Starting the Restore Data Wizard ................................................................................ 87
7.3.2 Archive selection ....................................................................................................... 87
7.3.3 Restoration type selection .......................................................................................... 88
7.3.4 Selecting a disk/partition to restore ............................................................................ 90
7.3.5 Restoring NT disk signature ....................................................................................... 90
7.3.6 Selecting a target disk/partition .................................................................................. 91
7.3.7 Changing the restored partition type ........................................................................... 92
7.3.8 Changing the restored partition file system .................................................................. 92
7.3.9 Changing the restored partition size and location ......................................................... 93
7.3.10 Assigning a letter to the restored partition ................................................................. 93
7.3.11 Restoring several disks or partitions at once .............................................................. 93
7.3.12 Using Acronis Universal Restore ................................................................................ 93
7.3.13 Setting restore options ............................................................................................. 94
7.3.14 Restoration summary and executing restoration ......................................................... 95
7.4 Setting restore options ..................................................................................................... 95
7.4.1 Files to exclude from restoration ................................................................................. 96
7.4.2 Files overwriting mode ............................................................................................... 96
7.4.3 Pre/post commands .................................................................................................. 96
7.4.4 Restoration priority .................................................................................................... 97
7.4.5 File-level security settings .......................................................................................... 97
7.4.6 Specifying mass storage drivers .................................................................................. 97
7.4.7 Additional settings ..................................................................................................... 98
7.4.8 Error handling ........................................................................................................... 99
7.5 Creating dynamic disks and volumes ................................................................................. 99
7.5.1 Creating dynamic volumes ......................................................................................... 99
Chapter 8. Scheduling tasks ............................................................................ 102
8.1 Creating scheduled tasks ................................................................................................ 102
8.1.1 Setting up daily execution ........................................................................................ 104
8.1.2 Setting up weekly execution ..................................................................................... 105
8.1.3 Setting up monthly execution ................................................................................... 106
8.1.4 Setting up one-time execution .................................................................................. 106
8.1.5 Setting up event-driven execution ............................................................................ 107
8.2 Managing scheduled tasks .............................................................................................. 107
Chapter 9. Managing the Acronis Secure Zone ............................................... 108
9.1 Creating Acronis Secure Zone ......................................................................................... 108
9.2 Resizing the Acronis Secure Zone .................................................................................... 110
9.3 Changing the password for Acronis Secure Zone .............................................................. 110
9.4 Managing backups in Acronis Secure Zone ....................................................................... 111
9.5 Deleting Acronis Secure Zone ......................................................................................... 112
Chapter 10. Creating bootable media ............................................................. 113
10.1 Creating Acronis rescue media ...................................................................................... 113
10.2 Creating a Win PE ISO with Acronis True Image Echo Enterprise Server ........................... 115
Chapter 11. Operations with archives ............................................................. 117
11.1 Validating backup archives ........................................................................................... 117
11.2 Exploring archives and mounting images ....................................................................... 117
11.2.1 Exploring an archive .............................................................................................. 118
11.2.2 Mounting an image ................................................................................................ 119
11.2.3 Unmounting an image ........................................................................................... 121
11.3 Consolidating backups .................................................................................................. 121
12.1 Email notification ......................................................................................................... 125
12.2 WinPopup notification .................................................................................................. 125
12.3 Viewing logs ................................................................................................................ 126
6 Copyright © Acronis, Inc., 2000-2009
12.4 Event tracing ............................................................................................................... 127
12.4.1 Windows event log ................................................................................................ 127
12.4.2 SNMP notifications ................................................................................................. 128
12.5 Managing System Restore ............................................................................................ 128
Chapter 13. Working with a virtual environment ........................................... 130
13.1 Backing up data on virtual machines ............................................................................. 130
13.2 Recovering data on virtual machines ............................................................................. 130
13.3 Using the disk conversion feature .................................................................................. 131
13.3.1 Recover data on the VM ......................................................................................... 131
13.3.2 Recover both data and the VM ............................................................................... 131
13.3.3 Physical to virtual migration ................................................................................... 131
13.3.4 Converting workloads ............................................................................................ 132
13. 4 Converting disk images to virtual disks ......................................................................... 132
Chapter 14. Transferring the system to a new disk ........................................ 134
14.1 General information ..................................................................................................... 134
14.2 Security ...................................................................................................................... 135
14.3 Executing transfers ...................................................................................................... 135
14.3.1 Selecting Clone mode ............................................................................................ 135
14.3.2 Selecting source disk ............................................................................................. 135
14.3.3 Selecting destination disk ....................................................................................... 136
14.3.4 Partitioned destination disk .................................................................................... 137
14.3.5 Old and new disk partition layout ............................................................................ 137
14.3.6 Old disk data ........................................................................................................ 137
14.3.7 Destroying the old disk data ................................................................................... 138
14.3.8 Selecting partition transfer method ......................................................................... 139
14.3.9 Partitioning the old disk ......................................................................................... 140
14.3.10 Old and new disk partition layouts ........................................................................ 140
14.3.11 Cloning summary ................................................................................................. 141
14.4 Cloning with manual partitioning ................................................................................... 141
14.4.1 Old and new disk partition layouts .......................................................................... 141
Chapter 15. Adding a new hard disk ............................................................... 143
15.1 Selecting a hard disk .................................................................................................... 143
15.2 Creating new partitions ................................................................................................ 143
15.3 Disk add summary ....................................................................................................... 144
Chapter 16. Command-line mode and scripting ............................................. 145
16.1 Working in the command-line mode .............................................................................. 145
16.1.1 TrueImageCmd.exe supported commands ............................................................... 145
16.1.2 Common options (options common for most trueimagecmd commands) .................... 148
16.1.3 Specific options (options specific for individual trueimagecmd commands) .................. 149
16.1.4 Trueimagecmd.exe usage examples ........................................................................ 155
16.1.5 ICompGS.exe tool: adding machines to the group server out of a *.txt file .................. 159
16.1.6 Ebasrvdb.exe tool: generate an XML file with the backup mapping details ................... 159
16.1.7 Tdbrepair.exe tool: rescan tapes and add information to Acronis tape database ........... 159
16.1.9 Command-line mode usage under DOS ................................................................... 160
16.2 Scripting ..................................................................................................................... 160
16.2.1 Script execution parameters ................................................................................... 160
16.2.2 Script structure ..................................................................................................... 161
16.2.3 Script usage examples ........................................................................................... 162
7 Copyright © Acronis, Inc., 2000-2009
Chapter 1. Introduction
1.1 Acronis
®
True Image Echo Enterprise Server – a complete solution
for corporate users
Acronis True Image Echo Enterprise Server is a comprehensive backup and recovery
solution for heterogeneous computer infrastructure that may include any combination of
physical and virtual, networked and standalone, Windows- and Linux-based servers.
Acronis True Image Echo Enterprise Server creates a transportable image, independent of
the hardware platform that can be restored directly to and from any virtual or physical
environment.
Minimizes downtime
Acronis True Image Echo Enterprise Server enables you to restore systems in minutes,
not hours or days. An entire system can be restored from an image that includes
everything the system needs to run: the operating system, applications, databases, and
configurations. It is not necessary to reinstall software or reconfigure your system or
network settings. The complete system restoration can be performed to an existing
system, to a new system with different hardware, or to virtual machines. With the Acronis
Active Restore feature, users can access the server and begin working during the restore
process, further decreasing downtime. File-level backups provide you with the flexibility to
only backup specific, critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be
implemented with minimal user training. A central management console provides remote
administration, ensuring that all systems in the network, regardless of the domain or
workgroup structure, can be managed from one location. Complete, unattended restores
from remote locations are supported with a remote bootable agent.
Automates Backup
With the scheduling capability in Acronis True Image Echo Enterprise Server, you simply
create backup tasks, tailored by group, or certain times or events.
To ensure that backups have occurred, or if user intervention is required, you can request
notifications via email or Windows Pop-up. You can view Acronis events in the Windows
Application Events Log or Acronis own log files. Log messages can be automatically sent
out to SNMP clients.
The product also supports the creation of custom commands before and after backups.
For example, users can automatically run anti-virus products before an image is created
and verify the validity of backups after the image has been created. And because these
tasks can be scheduled, you need not recreate the script to run the pre- and post-event
tasks each time; you can set the scheduled events once and they will run each time
automatically.
Ensures 24 X 7 Uptime
With Acronis’ patented drive snapshot technology, systems can be imaged while they are
in use, ensuring 24-by-7 system availability. This technology enables the product to
backup and image critical operating system files, the master boot record and any
partition-based boot records without requiring a reboot. A CPU allocation feature allows
you to limit the amount of CPU usage for the application to maximize the CPU’s
8 Copyright © Acronis, Inc., 2000-2009
availability for mission critical applications. Additionally, users can control hard disk drive
writing speeds and control network bandwidth used during backups, allowing minimal
disruption of business operations.
A feature that allows you to suspend database activity for several seconds is provided so
that you can create a valid image of mission-critical applications such as Microsoft
Exchange Server, Microsoft SQL Server and Oracle. This database suspension process
supports Microsoft’s Volume Shadow Copy Service (VSS). If your database or operating
system does not support VSS, Acronis True Image Echo Enterprise Server will execute
your custom commands to execute database suspension.
Supports Leading Edge Technology
Businesses today are moving to leverage the latest technologies, including dual-core, 64-
bit processors and 64-bit operating systems. With Acronis True Image Echo Enterprise
Server, you can protect these new machines, as well as legacy servers, running a single
application with a common interface.
Leverages Existing Technology Investments
The product can leverage your current storage infrastructure by supporting a variety of
storage media, so you can avoid costly hardware purchases to implement the solution.
The product supports key storage technologies such as: Direct Attached Storage (DAS),
Network Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of
Independent Disks (RAID), tapes, USB and IEEE-1394 (FireWire) compliant storage
devices, CDs, DVDs, removable drives (Floppy, Zip, etc.) and shared storage. Moreover,
the product ensures that you maximize the space on these resources with four levels of
compression.
Disk cloning and new disk deployment
Acronis True Image Echo Enterprise Server can be used to clone an image onto multiple
servers. For example, let’s say a company purchased several servers and needs similar
environments on each of them. Traditionally, the IT manager would install the operating
system and programs on every server. With Acronis True Image Echo Enterprise Server,
the IT manager would configure a single server, then create a disk image of the system.
That image can then be duplicated onto multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image Echo Enterprise
Server simplifies the task to few mouse clicks creating the exact copy of your old disk to a
new one and adjusting partitions size to fit a new hard disk.
Volumes conversion
Acronis True Image Echo Enterprise Server can back up and recover dynamic volumes.
Dynamic volume as is can be recovered over the same volume or unallocated space of a
dynamic group. Acronis True Image Echo Enterprise Server has necessary tools for any-
to-any disks conversion in terms of basic disks and dynamic volumes of any type (simple,
spanned, striped, mirrored or RAID 5). The tools are available in bootable program
version as well. Having booted the Acronis environment, you can easily prepare the
desired dynamic group on bare metal or a computer with non-Windows operating system.
9 Copyright © Acronis, Inc., 2000-2009
1.2 Acronis True Image Echo Enterprise Server components
Acronis True Image Echo Enterprise Server includes the following components.
1. Acronis True Image Management Console is a tool for remote access to Acronis
components. Administrator uses the console to install, configure and control the
components from remote.
2. Acronis True Image Agent is an application that resides on client computers and
performs Acronis operations such as data backup or restore.
Acronis True Image Echo Enterprise Server includes Acronis True Image Agent for
Windows (to be installed on Windows-based systems) and Acronis True Image Agent
for Linux (to be installed on Linux platform). The agents operate in a similar way, the
only difference visible to user concerns the way of installation.
3. Acronis Group Server is a management tool that provides ability to schedule,
monitor and manage group backup tasks. It deploys group tasks to the agents, polls the
agents for the status of running tasks and provides the administrator with the summary
tasks state display over the network.
4. Acronis Backup Server is an application for centralized storage and management of
enterprise backup archives.
The administrator can set space quotas and backup schemes, schedule check tasks that
consolidate backups in case of quota violation, perform one-time backups consolidation.
This ensures optimal usage of the storage capacity. Acronis Backup Server also enables
users to access a tape library, connected to the server.
5. Acronis True Image Echo Enterprise Server (local version) is a locally controlled
server management tool with additional functionality as compared to Acronis True Image
Agent. The local version supports, besides backup and recovery operations, exploring
archives, mounting images as virtual drives, cloning hard disks data and formatting
partitions on new hard disks, creating dynamic volumes, command-line mode and scripts
execution.
6. Acronis Universal Restore is a separately sold add-on to Acronis True Image Echo
Enterprise Server that automatically configures Windows drivers in a system, recovered
on dissimilar hardware. This enables the seamless system start and operation.
7. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or
the RIS package thus enabling data recovery over bare metal, non-Windows or corrupted
operating systems.
1.3 New in Acronis True Image Echo Enterprise Server
Management console
Reconnect (last connect) option
Ability to connect to agent for Linux without “root” rights
Centralized installation and update of Acronis components on multiple computers
Group server
Import and export computers through txt/csv files (in the command-line mode - txt files)
Run, stop, restart, edit, check group tasks
Group validation tasks
10 Copyright © Acronis, Inc., 2000-2009
Set how often to check the computers state (status refresh rate)
Wake on LAN for backup
Backup server
Import/export archives from external locations
Limit number of connections
Limit bandwidth used per connection
Access to tape library for every user
Backup
Backup and restore of 2+TB volumes
Encrypting backups with industry-standard AES cryptographic algorithm (key size 128,
192, 256 bit)
Multi-volume snapshot for databases spread on several disks
Control network bandwidth usage when backing up to FTP
Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all errors)
Dual destination backup: local + network share
Support for VMware Consolidated backup
Archive bit reset (file-level backup only)
Generating time-based names for backup files
Recovery
Recovery of dynamic volumes
Recovery of system dynamic volumes on dissimilar hardware using Acronis Universal
Restore or Acronis Active Restore
Scheduling
Schedule archive validation
Start every N hours within daily schedule
Start on free disk space change by the specified amount
Cloning a task
Notification via e-mail
Multiple e-mail addresses
From and Subject fields
Logon to incoming mail server
Operations with archives
Convert disk images to virtual disks for VMware, Microsoft, XenServer and Parallels virtual
machines
Consolidate backup files (create a consistent copy of archive while deleting selected
backups)
Explore archives (open in read-only mode any image or file-level backup)
15 Copyright © Acronis, Inc., 2000-2009
2.2.3 Encrypted communication
Acronis True Image Echo Enterprise Server provides capability to secure all data
transferred between Acronis components within local net and through DMZ, including the
backup stream.
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred
on the next steps (including data required for client authentication) is encrypted.
Once Acronis True Image Echo Enterprise Server components are installed, encrypted
communication between the components is enabled automatically.
The earlier versions of Acronis True Image Enterprise Server did not support encrypted
communication, therefore connection to such components, if they present on the
network, will not be encrypted. You have an option to completely disable non-encrypted
communication with some or all Acronis True Image Echo Enterprise Server components.
In this case, the components will not be able to communicate with components of earlier
versions. For how to disable non-encrypted communication, see the next section.
The earlier versions of Acronis True Image Management Console cannot communicate
with Acronis True Image Echo Enterprise Server agents. The console must be upgraded
to the Acronis True Image Echo Enterprise Server console.
Encryption is provided with Secure Socket Layer mechanism. There are two stakeholders
of the encryption operation:
Client application – the application that tries to establish (initiates) connection. This
could be the Acronis True Image Management Console or Acronis Group Server. Acronis
True Image Echo Enterprise Server local version can also be a client when it performs
backup to Acronis Backup Server.
Server application – the application to which the client tries to connect. This could be
Acronis True Image Agent, Acronis Group Server, Acronis Backup Server.
2.2.4 Security parameters in Acronis Administrative Template
As stated above, encryption generally does not require setting up. However, connection to
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Enterprise Server
components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single
computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click
Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.
160 Copyright © Acronis, Inc., 2000-2009
The purpose of the Tdbrepair.exe tool is to rescan tapes and add tape information into
Acronis tape database. It is necessary when Acronis True Image Echo cannot recognize
any Acronis Tape Plugin backups on tapes, though the archive is mounted in the RSM
Import Media pool. The reason for this is when you are trying to restore\validate an
archive spanned over two or more tapes made by earlier versions of Acronis True Image
Echo (builds up to 8163) via Acronis Backup Server of the latest version. This may also
happen if Acronis tape database is corrupted or missing (after Windows reinstallation, for
example).
The tool establishes connection with RSM and mounts the tape. Then it rescans tapes one
by one and derives metadata from each tape. The metadata includes device ID, archive
type, creation time, program components that performed backup (Acronis True Image
agent, local version or the Backup Server), computer name, etc. After that, the tool adds
the received information to the Acronis database and sets up the correspondence
between tapes ID, the RSM GUID and Acronis tape database ID.
For more information about tape management see
3.8 Backing up to tape libraries and
tape drives.
16.1.8 Adv_report.exe: a report generation tool
Syntax:
adv_report.exe c:\<filename>.zip
The tool gathers system information and packs it into a zip archive. The collected
information will help Acronis Support to provide quick and efficient response.
Specify the file name and the path where the tool will save the generated report. If the
name and path are not specified, the AdvReport tool will save the report in C:\Program
Files\Common Files\Acronis\AdvReport\adv_report.zip
By default the tool is located in
C:\Program Files\Common Files\Acronis\AdvReport.
Adv_report.exe [arguments]
-help – outputs help information about Adv_report.exe commands.
16.1.9 Command-line mode usage under DOS
For use in the MS-DOS-compatible environments Acronis True Image Echo Enterprise
Server includes the TrueImageCmdDos.exe utility which is located in the folder where
Acronis True Image Echo Enterprise Server has been installed, by default it is
C:\Program Files\Acronis\TrueImageEchoEnterpriseServer.
16.2 Scripting
16.2.1 Script execution parameters
Scripts are executed by the TrueImageTerminal.exe utility located in the Acronis True
Image Echo Enterprise Server installation folder (i.e. C:\Program
Files\Acronis\TrueImageEchoEnterpriseServer). This utility is also used to monitor backup
progress.
TrueImageTerminal execution parameters:
TrueImageTerminal.exe [arguments]
160

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Acronis True Image Echo Enterprise Server bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Acronis True Image Echo Enterprise Server in de taal/talen: Engels als bijlage per email.

De handleiding is 3,88 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info