Acronis Recovery for Microsoft Exchange User Guide

Copyright © Acronis, Inc., 2008. All rights reserved. “Acronis”, “Acronis Compute with Confidence”, and the Acronis logo are trademarks of
Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective
owners. Distribution of substantively modified versions of this document is prohibited without
the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON­INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
2
ACRONIS, INC.
End User License Agreement (EULA)
BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE DOWNLOADED OR IS CONTAINED ON THESE DISKS (“SOFTWARE”) YOU SHOULD CAREFULLY READ THE FOLLOWING LICENSE AGREEMENT (“AGREEMENT”) THAT APPLIES TO THE SOFTWARE. CLICK “ACCEPT” IF YOU FULLY ACCEPT AND AGREE TO ALL OF THE PROVISIONS OF THIS AGREEMENT. OTHERWISE, CLICK “DO NOT ACCEPT.” CLICKING “ACCEPT” OR OTHERWISE DOWNLOADING, INSTALLING AND OR USING THE SOFTWARE ESTABLISHES A BINDING AGREEMENT BETWEEN YOU AS THE PERSON LICENSING THE SOFTWARE (THE "LICENSEE") AND ACRONIS, INC. LOCATED AT: ACRONIS INTERNATIONAL GMBH VERWALTUNG EURO HAUS RHEINWEG 5 SCHAFFHAUSEN, SWITZERLAND CH-8200, ("LICENSOR"). IF YOU DO NOT ACCEPT ALL OF THE TERMS OF THIS AGREEMENT, YOU SHALL HAVE NOT RIGHT TO DOWNLOAD, INSTALL AND/OR USE THE SOFTWARE AND MUST DELETE THE SOFTWARE AND ASSOCIATED FILES IMMEDIATELY.
This Agreement applies to the Software, whether licensed under a Software License and/or an Evaluation License, each as defined and described below:
purchase of a license to the Software, LICENSOR grants and LICENSEE accepts a nonexclusive,
Purchased License of Software
nontransferable, nonassignable license to use Software only for LICENSEE’s own internal use solely on the specific number of Hardware (as defined below) licensed owned, leased or otherwise controlled by LICENSEE. LICENSEE may make one copy of Software only for archival purposes, only in machine readable form, provided that such archival copy is only used for archival purposes and never in a production environment and is marked with every notice on the original Installation of Software is LICENSEE’s responsibility. The license described in this section shall be referred to as a “Software License”).
. Subject to the terms and conditions of this Agreement, upon
Evaluation License of Software: The LICENSEE has the right to evaluate the Software for a period
of time not to exceed fifteen (15) days (the “Evaluation Period’) unless extended by LICENSOR. Software licensed under this Evaluation License may not be used in a production environment. There will be no charge to the LICENSEE for said evaluation of the Software under this Evaluation License. At the conclusion of the Evaluation Period, unless a Software License to the Software is purchased, the LICENSEE will delete the Software from its systems and have no further license or other rights with respect to the Software except as to the rights and responsibilities in this Agreement. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, PUNITIVE, OR CONSEQUENT IAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER THE EVALUATION LICENSE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. The following sections of this Agreement also apply to Evaluation License(s) of the Software: Limitations, Confidentiality
, Export Restrictions, and Miscellaneous. The license described in this section shall be referred to as an
Law
“Evaluation License”).
Use Rights: Assigning the License
assign that license to one of your PCs or Servers (depending upon the license you have purchased or are evaluating and such purchase or evaluation is based upon the operating system on which that hardware operates, such PCs or Servers shall be referred to as the “Hardware”). That Hardware is the licensed Hardware for that particular Software license. You may assign other Software Licenses to the same Hardware, but you may not assign the same Software License to more than one Hardware except as identified herein.
You may reassign a Software License if you retire the licensed Hardware due to permanent Hardware failure. If you reassign a Software License, the Hardware to which you reassign the license becomes the new licensed Hardware for that particular Software License.
Running Instances of the Hardware Software
Hardware as defined above. Every Hardware creating an image and every Hardware to which an image is either deployed to or restored from must have a valid license. In the case of Universal Deploy or Universal Restore, every time an image is deployed or restored (as appropriate to either Universal Restore or Universal Deploy), to Hardware that is dissimilar to the Hardware from which the image was originally created, a valid license of the Universal Deploy or Universal Restore is required.
You have the rights below for each Software License you assign:
. Before you run any instance of the Software under a Software License, you must
, Disclaimer of Warranties, LICENSEE Indemnity,
. You have the rights to run the Software on one piece of
3
Standard Software license. A standard Software License is the general license that is available to LICENSEE. Unless the Virtual Edition Software is purchased, you have purchased the standard Software License and may run on the licensed Hardware, at any one time as follows:
One (1) instance of the Hardware installed Software in one physical operating system environment; and
Up to four (4) instances of the Hardware installed Software in virtual operating system environments
(only one (1) instance per virtual operating system environment).
If you run all five (5) permitted instances at the same time, the instance of the Hardware installed Software running in the physical operating system environment may be used only to run hardware virtualization software and to manage and service operating system environments on the licensed Hardware.
Virtual Edition
licensed by physical Hardware. You may run on the licensed Hardware, at any one time as follows:
One instance of the Hardware software in one physical operating system environment; and
As many instances of the Hardware software in virtual operating system environments.
. Virtual Edition (as identified by the product name (for example, True Image Virtual Edition)) is
Support. If LICENSEE is under a current support contract with LICENSOR with respect to the Software and is
current in paying all amounts due thereunder, LICENSOR shall make available to LICENSEE the support described in this paragraph (the “Support”) on a twenty four (24) hours a day, seven (7) days per week basis. Support shall consist of: (i) supplying telephone or other electronic support, as determined by LICENSOR in its sole discretion, to LICENSEE in order to help LICENSEE locate and, on its own, correct problems with the Software and (ii) supplying all extensions, enhancements and other changes that LICENSOR, at its sole discretion, makes or adds to the Software and which LICENSOR makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support. Upon mutual written agreement by both parties, LICENSOR may, but shall not be required to: (i) supply code corrections to LICENSEE to correct Software malfunctions in order to bring such Software into substantial conformity with the published operating specifications for the most current version of the Software unless LICENSEE’s unauthorized modifications prohibit or hamper such corrections or cause the malfunction; or (ii) supply code corrections to correct insubstantial problems at the next general release of the Software.
Limitations. Notwithstanding any references to “purchase” , the Software is licensed and not sold pursuant to
this Agreement. This Agreement confers a limited license to the Software and does not constitute a transfer of title to or sale of all or a portion of the Software, and LICENSOR retains ownership of all copies of the Software. LICENSEE acknowledges that the Software contain trade secrets of LICENSOR, its suppliers or licensors, including but not limited to the specific internal design and structure of individual programs and associated interface information. Accordingly, except as otherwise expressly provided under this Agreement, LICENSEE shall have no right, and LICENSEE specifically agrees not to: (i) transfer, assign or sublicense its license rights to any other person or entity, or use the Software on ay equipment other than the Hardware, and LICENSEE acknowledges that any attempted transfer, assignment, sublicense or use shall be void; (ii) make error corrections to or otherwise modify or adapt the Software or create derivative works based upon the Software, or permit third parties to do the same; (iii) reverse engineer or decompile, decrypt, disassemble or otherwise reduce the Software to human-readable form, except to the extent otherwise expressly permitted under applicable law notwithstanding this restriction; (iv) use or permit the Software to be used to perform services for third parties, whether on a service bureau or time sharing basis or otherwise, without the express written authorization of LICENSEE; or (v) disclose, provide, or otherwise make available trade secrets contained within the Software in any form to any third party without the prior written consent of LICENSOR.
Confidentiality. The Software is a trade secret of LICENSOR and is proprietary to LICENSOR. LICENSEE
shall maintain Software in confidence and prevent disclosure of Software using at least the same degree of care it uses for its own similar proprietary information, but in no event less than a reasonable degree of care. LICENSEE shall not disclose Software or any part thereof to anyone for any purpose, other than to employees for the purpose of exercising the rights expressly granted under this Agreement. License shall not, and shall not allow any third party to, decompile, disassemble or otherwise, reverse engineer or attempt to reconstruct or discover any source code or underlying ideas, algorithms, file formats or programming or interoperability interfaces of Software or of any files contained or generated using Software by any means whatsoever. The obligations under this paragraph shall survive any termination of the Agreement.
Disclaimer of Warranties. THE SOFTWARE IS PROVIDED “AS IS” AND LICENSOR DISCLAIMS ALL
WARRANTIES, EXPRESSED OR IMPLIED WITH RESPECT TO SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT OF THIRD PART IES’ RIGHTS, AND FITNESS FOR A PARTICULAR USE. WITHOUT LIMITING THE FOREGOING, LICENSOR DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN SOFTWARE WILL OPERATE IN THE COMBINATION LICENSEE SELECTS, THAT OPER ATION OF SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FRE E AND/OR THAT DEFECTS IN THE SOFTWARE WILL BE CORRECTED. THE ENTIRE RISK AS TO THE
4
RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY LICENSEE. FURTHERMORE, LICENSOR DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF THE SOFTWARE OR RELATED DOCUMENTATION IN TERMS OF THEIR CORRECTNESS, ACCURACY, RELIABILITY, CURRENTNESS, OR OTHERWISE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY.
Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, INDIRECT, PUNITIVE, OR
CONSEQUENTIAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY. LICENSOR’S CUMULATIVE LIABILITY FOR DAMAGES HEREUNDER, WHETHER IN AN ACTION IN CONTRACT, WARRANTY, TORT, NEGLIGENCE, STRICT LIABILITY, INDEMNITY, OR OTHERWISE, SHALL IN NO EVENT EXCEED THE AMOUNT OF LICENSE FEES PAID BY THE LICENSEE FOR THE SOFTWARE LICENSED UNDER THIS AGREEMENT. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
LICENSEE Indemnity. LICENSEE agrees to indemnify and defend LICENSOR, and hold it harmless from all
costs, including attorney’s fees, arising from any claim that may be made against LICENSOR by any third party as a direct or indirect result of any use by LICENSEE of the Software,
Termination. This Agreement and the license may be terminated without fee reduction (i) by LICENSEE
without cause on thirty (30) days notice; (ii) by LICENSOR, in addition to other remedies, if LICENSEE is in default and fails to cure within ten (10) days following notice; (iii) on notice by either party hereto if the other party ceases to do business in the normal course, becomes insolvent, or becomes subject to any bankruptcy, insolvency, or equivalent proceedings. Upon termination for any reason, LICENSEE shall immediately return Software and all copies to LICENSOR and delete all Software and all copies from the Hardware.
Law. This Agreement shall be governed by the laws of the Commonwealth of Massachusetts, exclusive of its
conflicts of laws provisions and without regard to the United Nations Convention on Contracts for the International Sale of Goods, and any suit under this Agreement shall exclusively be brought in a federal or state court in Massachusetts. Any action against LICENSOR under this Agreement must be commenced within one year after such cause of action accrues.
Government End Users. This provision applies to all Software acquired directly or indirectly by or on behalf of
the United States Government. The Software is a commercial product, licensed on the open market at market prices, and was developed entirely at private expense and without the use of any U.S. Government funds. If the Software is supplied to the Department of Defense, the U.S. Government acquires only the license rights customarily provided to the public and specified in this Agreement. If the Software is supplied to any unit or agency of the U.S. Government other than the Department of Defense, the license to the U.S. Government is granted only with restricted rights. Use, duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c) of the Commercial Computer Software Restricted Rights clause of FAR
52.227-19.
Export Restriction. LICENSEE will not remove or export from the United States or the country originally
shipped to by LICENSOR (or re-export from anywhere) any part of the Software or any direct product thereof except in compliance with applicable export laws and regulations, including without limitation, those of the U.S. Department of Commerce.
Miscellaneous. This Agreement contains the entire understanding of the parties and supersedes all other
agreements, oral or written, including purchase orders submitted by LICENSEE, with respect to the subject matter covered in this Agreement The delay or failure of either party to exercise any right provided in the Agreement shall not be deemed a waiver. All notices must be in writing and shall be delivered by hand (effective when received) or mailed by registered or certified mail (effective on the third day following the date of mailing). The notices addressed to LICENSOR shall be sent to its address set out above. If any provision is held invalid, all others shall remain in force. LICENSEE may not assign, pledge, or otherwise transfer this agreement, nor any rights or obligations hereunder in whole or in part to any entity. Paragraph headings are for convenience and shall have no effect on interpretation. In the event that it is necessary to undertake legal action to collect any amounts payable or to protect or to defend against the unauthorized use, disclosure, distribution, of the Software hereunder and/or other violation of this Agreement, LICENSOR shall be entitled to recover its costs and
expenses including, without limitation, reasonable attorneys' fees
.
5
Table of Contents
CHAPTER 1. INTRODUCING ACRONIS® RECOVERY FOR MS EXCHANGE................. 10
1.1 WHAT IS ACRONIS RECOVERY FOR MS EXCHANGE?................................................................ 10
1.2 WHY ACRONIS RECOVERY FOR MS EXCHANGE?...................................................................... 12
1.3 TWO ACRONIS RECOVERY FOR MS EXCHANGE EDITIONS ........................................................ 12
1.4 ADVANTAGES ........................................................................................................................... 12
1.5 KEY FEATURES ......................................................................................................................... 13
1.6 SUPPORTED MICROSOFT EXCHANGE VERSIONS ........................................................................ 14
1.7 SUPPORTED PLATFORMS........................................................................................................... 14
1.8 SUPPORTED OPERATING SYSTEMS FOR ACRONIS RECOVERY FOR MS EXCHANGE AGENT ....... 15
1.9 SUPPORTED OPERATING SYSTEMS FOR ACRONIS RECOVERY FOR MS EXCHANGE MANAGEMENT
CONSOLE................................................................................................................................................ 15
1.10 LICENSE POLICY ....................................................................................................................... 15
1.11 TECHNICAL SUPPORT................................................................................................................ 16
CHAPTER 2. UNDERSTANDING ACRONIS RECOVERY FOR MS EXCHANGE.............. 17
2.1 COMPONENTS............................................................................................................................ 17
2.1.1 Acronis Recovery for MS Exchange Management Console................................................. 17
2.1.2 Acronis Recovery for MS Exchange Agent .......................................................................... 17
2.2 COMPONENTS INTEGRATION........................................................................................................... 17
2.3 INTEGRATION WITH ACRONIS TRUE IMAGE ECHO ENTERPRISE SERVER ................................... 18
2.3.1 Starting Tasks from the Acronis True Image Echo Enterprise Server Management Console 18
2.3.2 Bare Metal Restore..............................................................................................................18
2.3.3 Fi l e s E x c l u s i o n........................................................................................................................19
CHAPTER 3. INSTALLATION OF ACRONIS RECOVERY FOR MS E XCHA N GE............ 20
3.1 MINIMUM SYSTEM REQUIREMENTS ................................................................................................ 20
3.2 SECURITY POLICY........................................................................................................................... 20
3.2.1 Credentials.............................................................................................................................. 20
3.2.2 Firewall Settings..................................................................................................................... 21
3.3 GENERAL RULES OF INSTALLATION ................................................................................................ 21
3.3.1 Installing Acronis Recovery for MS Exchange Components.................................................. 21
3.3.2 Installing Acronis Recovery for MS Exchange Agent Remotely .......................................... 22
3.3.3 Extracting Acronis Recovery for MS Exchange Components.............................................. 23
3.3.4 Removing Acronis Recovery for MS Exchange Components............................................... 23
CHAPTER 4. GETTING STARTED WITH ACRONIS RECOVERY FOR MS EXCHANGE24
4.1 RUNNING ACRONIS RECOVERY FOR MS EXCHANGE MANAGEMENT CONSOLE........................ 24
4.2 ACRONIS RECOVERY FOR MS EXCHANGE WORKSPACE ........................................................... 25
4.2.1 Main Area ................................................................................................................................ 25
4.2.2 Computers Pane................................................................................................................... 26
4.2.3 Program Menu......................................................................................................................... 26
4.2.4 Help Menu................................................................................................................................ 27
4.2.5 Status Bar................................................................................................................................. 27
4.3 NAVIGATION............................................................................................................................. 27
4.4 MANAGEMENT .......................................................................................................................... 27
4.5 DISCOVERING SERVERS ............................................................................................................ 28
4.6 ADDING SERVERS ..................................................................................................................... 28
4.7 CONNECTING TO A REMOTE MICROSOFT EXCHANGE SERVER .................................................. 28
4.8 REMOTE INSTALLATION OF ACRONIS RECOVERY FOR MS EXCHANGE AGENT ......................... 29
CHAPTER 5. CREATING BACKUP ARCHIVES........................................................................30
5.1 GENERAL INFORMATION.................................................................................................................. 30
5.1.1 What is a backup?.................................................................................................................... 30
5.1.2 Backup Types........................................................................................................................... 30
5.1.3 Which Backup Strategy to Choose?......................................................................................... 31
5.1.4 Server Roles............................................................................................................................. 32
5.1.5 Storage Groups and Information Stores .................................................................................. 32
5.1.6 Circular Logging...................................................................................................................... 33
5.1.7 Disaster Recovery Plan............................................................................................................ 33
5.1.8 Continuous Data Protection................................................................................................ 34
5.1.9 Backing up to Tape Libraries and Tape Drives................................................................... 34
5.2 BACKING UP DATABASES................................................................................................................ 35
5.2.1 Defining a Backup Strategy ..................................................................................................... 35
5.2.2 Specifying a Task Execution Account.......................................................................................36
5.2.3 Selecting Items to Back Up..................................................................................................... 36
5.2.4 Selecting a Backup Archive Location.....................................................................................37
5.2.5 Using Acronis Recovery for MS Exchange Assistant............................................................. 38
5.2.6 Setting Backup Scheduling Parameters................................................................................. 40
5.2.7 Backup Options...................................................................................................................... 40
5.2.8 Specifying a Task Name and Providing Comments................................................................ 40
5.2.9 Backup Summary.................................................................................................................... 41
5.3 BACKING UP MAILBOXES ................................................................................................................. 41
5.3.1 Defining a Backup Strategy ..................................................................................................... 41
5.3.2 Specifying a Task Execution Account.......................................................................................41
5.3.3 Selecting Items to Back Up..................................................................................................... 42
5.3.4 Excluding Objects.................................................................................................................... 42
5.3.5 Selecting a Backup Archive Location.....................................................................................43
5.3.6 Using Acronis Recovery for MS Exchange Assistant............................................................. 44
5.3.7 Setting Backup Scheduling Parameters................................................................................. 44
5.3.8 Backup Options...................................................................................................................... 45
5.3.9 Specifying a Task Name and Providing Comments................................................................ 45
5.3.10 Backup Summary.................................................................................................................. 45
5.4 SETTING DEFAULT BACKUP OPTIONS............................................................................................... 45
5.4.1 Pre/Post Commands................................................................................................................. 45
5.4.2 Compression Level................................................................................................................... 46
5.4.3 Backup Priority........................................................................................................................ 46
5.4.4 Backup Protection.................................................................................................................... 46
5.4.5 Backup Type Substitution......................................................................................................... 47
5.4.6 Bandwidth Throttling...............................................................................................................47
5.4.7 Additional Settings................................................................................................................... 47
CHAPTER 6. DISASTER RECOVERY PLAN............................................................................. 49
6.1 VIEWING A DISASTER RECOVERY PLAN IMMEDIATELY ............................................................ 49
6.2 SCHEDULING RECEIPT OF THE DISASTER RECOVERY PLAN ...................................................... 50
6.3 SUMMARY................................................................................................................................. 50
CHAPTER 7. BACKUP LOCATION CLEAN-UP........................................................................ 51
7.1 SPECIFYING A TASK EXECUTION ACCOUNT ..................................................................................... 51
7.2 SELECTING THE BACKUP ARCHIVE LOCATION ................................................................................. 51
7.3 PROVIDING A PASSWORD.................................................................................................................. 52
7.4 SPECIFYING CLEANING OPTIONS...................................................................................................... 52
7.4.1 GFS Scheme............................................................................................................................. 53
7.4.2 Simple Scheme.......................................................................................................................... 53
7.5 SCHEDULE CLEANING ...................................................................................................................... 53
7.6 BACKUP LOCATION CLEAN-UP SUMMARY ....................................................................................... 54
CHAPTER 8. RESTORING THE BACKUP DATA ..................................................................... 55
8.1 RESTORING INFORMATION STORES ........................................................................................... 55
8.1.1 Restoration Time Selection.................................................................................................. 55
8.1.2 Specifying a Task Execution Account .................................................................................. 55
8.1.3 Selecting a Backup Location................................................................................................ 55
8.1.4 Selecting a Backup Task ...................................................................................................... 56
8.1.5 Providing a Password.......................................................................................................... 56
8.1.6 Restore Point Selection........................................................................................................ 56
8.1.7 Content Selection................................................................................................................. 57
8.1.8 Restore Options.................................................................................................................... 58
7
8.1.9 Selecting Start Parameters................................................................................................... 58
8.1.10 Echo Task Selection......................................................................................................... 58
8.1.11 Restore Summary............................................................................................................. 58
8.2 RESTORING MAILBOXES ........................................................................................................... 58
8.2.1 Restoration Time Selection.................................................................................................. 59
8.2.2 Specifying a Task Execution Account .................................................................................. 59
8.2.3 Selecting a Backup Location................................................................................................ 59
8.2.4 Selecting a Backup Task ...................................................................................................... 59
8.2.5 Providing a Password.......................................................................................................... 60
8.2.6 Restore Point Selection........................................................................................................ 60
8.2.7 Content Selection................................................................................................................. 60
8.2.8 Restore Options.................................................................................................................... 61
8.2.9 Selecting Start Parameters................................................................................................... 61
8.2.10 Restore Summary............................................................................................................. 61
8.3 RESTORING INDIVIDUAL E-MAILS............................................................................................. 62
8.3.1 Selecting a Backup Location................................................................................................ 62
8.3.2 Selecting a Backup Task and Point to Restore..................................................................... 62
8.3.3 Setting Additional Search Options....................................................................................... 63
8.3.4 Selecting E-mail Exporting parameters................................................................................... 63
8.4 SETTING DEFAULT RESTORE OPTIONS ............................................................................................. 63
8.4.1 Pre/Post Commands................................................................................................................. 64
8.4.2 Restoration Priority ................................................................................................................. 64
8.4.3 Additional Settings................................................................................................................... 65
8.5 ACRONIS ACTIVE RESTORE OR DIAL TONE RECOVERY?.................................................................. 65
CHAPTER 9. SCHEDULING TASKS............................................................................................ 67
9.1 WHAT IS A TASK? ............................................................................................................................. 67
9.2 SETTING SCHEDULE PARAMETERS ................................................................................................... 67
CHAPTER 10. MANAGING TASKS................................................................................................ 71
10.1 EDITING A TASK............................................................................................................................. 71
10.2 DELETING A TASK .......................................................................................................................... 71
10.3 STARTING A TASK .......................................................................................................................... 71
10.4 VIEWING A DISASTER RECOVERY PLAN......................................................................................... 71
CHAPTER 11. NOTIFICATIONS .................................................................................................... 72
11.1 E-MAIL NOTIFICATIONS.................................................................................................................. 72
11.2 SNMP............................................................................................................................................ 73
11.3 WINDOWS EVENT LOG .................................................................................................................... 73
CHAPTER 12. VIEWING LOGS...................................................................................................... 74
CHAPTER 13. COMMAND-LINE MODE......................................................................................75
13.1 LIST COMMAND ........................................................................................................................ 75
13.1.1 Description of Options...........................................................................................................75
13.1.2 Usage Examples..................................................................................................................... 76
13.2 INFO OPTIONS................................................................................................................................. 76
13.2.1 Descriptions of Options.......................................................................................................... 76
13.2.2 Usage examples...................................................................................................................... 77
13.3 BACKUP OPTIONS........................................................................................................................... 77
13.3.1 Description of Options...........................................................................................................77
13.3.2 Usage Examples..................................................................................................................... 78
13.4 RESTORE OPTIONS.......................................................................................................................... 78
13.4.1 Description of Options...........................................................................................................78
13.4.2 Usage Examples..................................................................................................................... 79
APPENDIX A. ACRONIS RECOVERY FOR MS EXCHANGE: BEST PRACTICES.................. 80
A.1 PROTECT YOUR SERVER FROM HARDWARE FAILURE, USER ERRORS AND VIRUSES ........................... 80
Scenario ............................................................................................................................................ 80
Acronis solution ................................................................................................................................ 80
A.2 PROTECT YOUR SERVER TO GUARANTEE MINIMAL DATA LOSS ........................................................ 82
8
Scenario ............................................................................................................................................ 82
Acronis solution ................................................................................................................................ 82
A.3 BACKING UP SEVERAL DATABASES.................................................................................................. 83
Scenario ............................................................................................................................................ 83
Acronis solution ................................................................................................................................ 83
A.4 ENCRYPTING DATABASE ARCHIVES FOR STORAGE........................................................................... 83
Scenario ............................................................................................................................................ 83
Acronis solution ................................................................................................................................ 83
A.5 USING THE DISASTER RECOVERY PLAN TO RESTORE DATABASES................................................... 83
Scenario ............................................................................................................................................ 83
Acronis solution ................................................................................................................................ 83
A.6 MANUAL BACKUP (BEFORE CRUCIAL CHANGES IN DATABASES) ...................................................... 83
Scenario ............................................................................................................................................ 83
Acronis solution ................................................................................................................................ 84
APPENDIX B. INSTALLING ACRONIS RECOVERY FOR MS EXCHANGE FROM
COMMAND LINE .................................................................................................................................. 85
9
Chapter 1. Introducing Acronis®
Recovery for MS Exchange
This chapter provides general information about a new Acronis product - Acronis Recovery for MS Exchange – its features and advantages. You will learn about supported databases, operating systems and platforms.

1.1 What is Acronis Recovery for MS Exchange?

Acronis Recovery for MS Exchange offers a to protect your Microsoft Exchange data. It features a proven database backup technology that will drastically reduce disaster recovery time: you can be up and running again in minutes instead of hours. It also provides document level backup, providing incredible flexibility that allows backing up of only individual mailboxes/public folders and uses message filters to reduce both an archive size and duration of a backup process.
Acronis Recovery for MS Exchange is shipped in two editions – original Acronis Recovery for MS Exchange for larger organizations and Acronis Recovery for MS Exchange Small Business Edition (Acronis Recovery for MS Exchange SBE) for small and/or start-up businesses. See 1.3 “Difference Between Acronis Recovery for MS Exchange Editions” for more information.
One-step Recovery and Automated Recovery
and helps improve your organization’s Recovery Time Objective (RTO). Acronis Recovery for MS Exchange is an excellent complement to the award-winning
Acronis True Image suite of disaster recovery and system migration products that use patented disk-imaging technology. Together th ey deliver comprehensive server system backup and restore and also full Microsoft Exchange data base protection — a winning disaster recovery plan combination.
Ultimate Granularity
fast and reliable disaster recovery solution
to a Point-of-Failure reduce downtime
Acronis Recovery for MS Exchange provides the ultimate in granularity for backup and restore. Backup and restore operation can be applied to a whole information store, individual storage groups, mailboxes/public folders or even single emails.
10
With Acronis Recovery for MS Exchange you can restore your crucial mailboxes or single emails from different kinds of backup – not only from brick-level backups, but from a whole-database backup archive as well.
Smaller, more manageable archives
Award-winning Acronis technology provides superior image file optimization. Customizable compression rates reduce the amount of data to store and transfer, leading to direct cost savings in storage and labor.
High Speed
Acronis Recovery for MS Exchange provides proven database backup technology that maximizes backup speed.
With its ability to restore any data (mailboxes, public folders or individual emails) from a database level backup, Acronis eliminates the need for time­consuming brick-level backups.
Active Restore™
Active Restore™ mode provides full Microsoft Exchange Server function ality for users in minutes, while the system is still being restored. Using Active Restore™, combined with automated Dial-tone restore mode, y ou can limit downtime of your Microsoft Exchange 2007 Server to only seconds.
Continuous Data Protection
Continuously back up transactions to enable the complete restoration of Microsoft Exchange Server databases with minimum data loss.
Faster Disaster Recovery
One-step Recovery and Automated Recovery to the point-of-failure help organizations meet aggressive Recovery Time Objectives (RTO).
Encryption for Security
Protect companies' most valuable data with industry-standard encryption.
Centralized Management
The Acronis Recovery for MS Exchange Management Console automatically detects all database servers on the network. The servers are displayed clearly with status information, making it easy to manage enterprise-wide installations.
Resource Management
CPU and bandwidth throttling let you allocate resources during the backup process to ensure users remain productive.
Guided Disaster Recovery
Acronis database backup also provides you with a Disaster Recovery P lan, detailing step-by-step instructions to guide you or your team through a fast and complete recovery. Even non-technical staff members can follow these simple instructions to restore even the most sophisticated Microsoft Exchange server.
Integration with Acronis True Image Echo
Installed on the same computer, Acronis True Image Echo Update (build 8115 or later) and Acronis Recovery for MS Exchange can restore a whole
11
production server (operating system and whole information store) on bare metal from bootable CD or from a PXE.
Easy Administration
Intuitive wizard-driven GUI allows even non-DBAs to confidently configure and implement professional backup strategies.

1.2 Why Acronis Recovery for MS Exchange?

Comprehensive recovery requires more than just a backup of information stores. Your Microsoft Exchange mailbox server contains storage groups, logs, mailboxes, public folders, mails, and other components that structure the dat a. Using Acronis Recovery for MS Exchange, a cohesive and intuitive backup solution, is the critical step you can take to ensure a secure live Microsoft Exchange mailbox server backup that can be quickly recovered.
With Acronis Recovery for MS Exchange restoring individual emails became easier – you can do it from any kind of backup (both database and brick-level).
Recovery is now made easy with automated system restore to a point-of-failure. There is no need to walk through menus to get your system back online. This one-step process will return your database to the last known good state just before failure. Erroneous transactions will no longer cost you minutes or hours in recovery.
This powerful product includes an intuitive wizard-driven GUI that guides you through the scheduling process and reduces the possibility of errors. The Backup Strategy Assistant creates a Disaster Recovery Plan for your environment, delivering step-by­step instructions for recovery. Anyone, whether an experienced DBA or not, can schedule backup jobs and handle system restores rapidly. Acronis ev en provides FTP capability for storing your backup on any FTP server, worldwide.

1.3 Two Acronis Recovery for MS Exchange Editions

You can choose between two editions of Acronis Recovery for MS Exchange. Your choice is based on the size environment it will be installed in:
Acronis Recovery for MS Exchange, appropriate for larger businesses
Acronis Recovery for MS Exchange Small Business Edition (A cronis
Recovery for MS Exchange SBE). This less expensive alternative is tailored for small and/or start-up businesses. The agent can only be installed on Windows SBS 2003 and Windows SBS 2008 operating systems.
1.4 Advantages
With Acronis Recovery for MS Exchange you get the following advantages:
Hot Backup
Backup can be performed while the Microsoft Exchange service is online and serving clients allowing 24/7 availability
Restore Emails from Database Level Backup
Acronis Recovery for MS Exchange provides the ability to restore specific emails from database level backup
Tuning a Backup Strategy with Acronis Recovery for MS Exchange
Assistant
12
Acronis Recovery for MS Exchange Assistant provides an intuitive GUI for easy creation and implementation of a backup strategy, even without DBA experience
Disaster Recovery Plan
Automatically creates and e-mails Disaster Recovery Plans with step-by-step instructions on recovering databases. The guided process makes it possible for staff to restore databases quickly, even without DBA skills
Recovery to a Selected Point-in-Time
With transaction log backed up, Acronis Recovery for MS Exchange allows you to specify a date and time to restore your data from
1.5 Key Features
Database Backup (Fastest Method)
Acronis Recovery for MS Exchange provides the ability to backup all data at a database level. This is the fastest, but the least flexible backup method
Brick-Level Backup
Acronis Recovery for MS Exchange provides the ability to backup all data at a documents level (brick-level). This is not the fastest, but the most flexible backup method
Bare Metal Restore
The bare metal restore feature restores a whole production server (operating system and all databases) on bare metal from a bootable CD or from a PXE. This feature is available only if Acronis True Image Echo Update (build 8115 or later) and Acronis Recovery for MS Exchange are installed on the server
Automated recovery to point-of-failure
Automated recovery to point-of-failure allows easy one-step recovery to a point just before failure or disaster with no loss of data
Encryption
Protect backups with industry strength-standard encryption technology. AES (Advanced Encryption Standard) is available with three key lengths – 128, 192 and 256 bits to balance performance and protection as desired
Compression
Create backups up to 10 times smaller than the original uncompressed format. Three compression levels let you optimize for faster performance, smaller size, or a balance of both
Dial Tone Recovery
Acronis Recovery for MS Exchange can restore e-mail service more quickly to users (providing them with a basic "dial tone") and then restore users' previous data as it becomes available
Bandwidth Throttling
Control bandwidth usage to keep the backup process transparent to network users
13
Notifications
Configure notification via e-mail and SNMP
Automated recovery staging
Every restore scenario can be executed in one step. There is no need to manually restore from different archives keeping in mind the database state
Scheduling complete backup strategy
Schedule the complete backup strategy, including Full and Incremental backup in one action
Restore Mailboxes from Brick-Level Backup
The system provides the ability to restore mailboxes from brick-level backup
Restore Mailboxes from Database-Level Backup
The system provides the ability to restore mailboxes from database level backup
Restore Emails from Brick-Level Backup
Acronis Recovery for MS Exchange provides the ability to restore specific mails from brick-level backup
Command-Line Mode
The system provides command-line user interface

1.6 Supported Microsoft Exchange versions

Microsoft Exchange Server 2007 (Standard/Enterprise Editions)
Microsoft Exchange Server 2003 (Standard/Enterprise Editions)
Microsoft Exchange Server 2000 Server with post-Service Pack 3 rollup
(Standard/Enterprise Editions)
Important! Acronis Recovery for MS Exchange Agent is only guaranteed to work with Microsoft Exchange Server 2003 service packs installed. Note, to handle MAPI interfaces correctly, Service Pack 2 and hotfix kb908072 must be installed (see Microsoft website for details).
In case you are using Microsoft Exchange Server 2007, make sure Microsoft Messaging API and Collaboration Data Objects 1.2.1 are installed (they are included in Microsoft Exchange Server 2007 product, but will not be installed by default). Visit Microsoft website:
http://www.microsoft.com/downloads/details.aspx?FamilyID=94274318-27c4­4d8d-9bc5-3e6484286b1f&DisplayLang=en
Note, this version of the package is now compatible with Windows Vista and Windows Server 2008.
Please note, Acronis Recovery for MS Exchange is not a cluster-aware product.
1.7 Supported Platforms
x86 (for Microsoft Exchange Server 2000/2003)
14
x86-64
1.8 Supported Operating Systems for Acronis Recovery for MS Exchange Agent
For Acronis Recovery for MS Exchange:
Windows 2000 (SP4 Rollup 1)
Windows Server 2003 (both 32-bit and 64-bit versions)
Windows 2008 Server
For Acronis Recovery for MS Exchange Small Business Edition:
Windows SBS 2003
Windows SBS 2008
1.9 Supported Operating Systems for Acronis Recovery for MS Exchange Management Console
Windows XP (SP 1)
Windows Vista
Windows 2000 (SP4 Rollup 1)
Windows 2003
Windows 2008
1.10 License Policy
Acronis Recovery for MS Exchange licensing is based on the number of servers on which Acronis Recovery for MS Exchange Agent is to be installed. You will need a unique serial number to install every single Acronis Recovery for MS Exchange Agent.
Acronis Recovery for MS Exchange is provided with three types of licenses: Permanent – allows you to use the fully functional product without any time
limitations (permanent serial number is required) Trial - allows you to use the fully functional product for 14 days (trial s erial number is
required) Registered – used for customers, registered on the Acronis web site. It also allows
working with the fully functional product for 14 days (no serial number is required)

Obtaining Permanent Serial Numbers

Obtaining a permanent serial number depends on the way you purchase Acronis Recovery for MS Exchange:
you will find it in the CD box if you buy the licensed Acronis Recovery for MS Exchange CD
you can receive it after registering on the Acronis web site in case you download the product (also during installation of the product)
15

Trial Serial Numbers

Acronis allows you to have a trial serial number to be able to us e Acronis Recovery for MS Exchange for 14 days without buying the product. You may obtain the trial s erial number in one of the following ways:
in the CD box
contacting Acronis sales representatives. Visit
http://www.acronis.com/enterprise/products/ARExchange/gettrial/
You have to sign in (or register ) to obtain a trial serial number. If you downloaded a trial version of Acronis Recovery for MS Exchange from our web
site and want to buy a permanent licens e t o continue using th e pr odu ct, pl ease con tact our sales representatives. In this case you will not have to download the product again, but only enter a registered serial number during the installation.
Note, the Management Console should be connected to Acronis Recovery for MS Exchange, otherwise the Registration menu item will not be presented in the Help menu.
The number of Acronis Recovery for MS Exchange Management Console installations is not limited.
1.11 Technical Support
As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available, you may electronically access at no additional charge, Support services for the Software, which Acronis shall endeavor to make available twenty four (24) hours a day, seven (7) days per week. Such electronic services may include, but are not limited to: user forums; software­specific information; hints and tips; bug fix retrieval via the internet; software maintenance and demonstration code retrieval via a WAN-accessible FTP server; and access to a problem resolution database via Acronis customer support system.
Support shall consist of supplying telephone or other electr onic support to you in or der to help you locate and, on its own, correct problems with the Software and supplyin g patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available, without additional charge, to other licensees of the Software that are enrolled in Supp ort. Upon mutual agreement by both parties, Acronis shall: (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into substantial conformity with the published operating specifications for the most current version of the Software unless your unauthorized modifications prohibit or hamper such corrections or cause the malfunction; or (ii) supply code corrections to correct insubstantial pr oblems at the next general release of the Software.
More information about contacting Acronis Technical Support is available at the following link:
http://www.acronis.com/enterprise/support/
16
Chapter 2. Understanding Acronis
Recovery for MS Exchange
This chapter provides common information about working with Acronis Recovery for MS Exchange.
2.1 Components
Acronis Recovery for MS Exchange includes the following components:
Management Tools including Acronis Recovery for MS Exchange Management Console

Acronis Recovery for MS Exchange Agent

2.1.1 Acronis Recovery for MS Exchange Management Console

Acronis Recovery for MS Exchange Management Console is a tool for managing data backup/restore on the local network from a single location. Using it, you can install agents remotely, schedule tasks, recover data remotely, and set backup/restore options on remote Exchange servers.
2.1.2 Acronis Recovery for MS Exchange Agent
The Acronis Recovery for MS Exchange Agent is installed on the computers on which you want to backup/restore a Microsoft Exchange database.

2.2 Components Integration

Acronis Recovery for MS Exchange Management Console is installed on the computer from which you plan to manage operation processes on remote database servers.
After issuing a backup or restore command from the Management Console, Acronis Recovery for MS Exchange sends a request to the Acronis Recovery for MS Exchange Agent to retrieve the required storage group or mailbox from Microsoft Exchange and sends it to Acronis Recovery for MS Exchange, which backs up the selected data.
Below are diagrams describing interaction between Management Console and Agent.
Integration between Acronis Recovery for MS Exchange and Acronis Recovery for MS
Exchange Agents
2.3 Integration with Acronis True Image Echo Enterprise Server
Acronis Recovery products are integrated with Acronis True Image Echo Enterprise Server Update (build 8115 or later) that provides the ability to automatically execute preconfigured restore tasks in case of disaster.
There are three points of integration:
Ability to start Acronis Recovery for MS Exchange tasks from the Acronis True Image Echo Enterprise Server management console

Bare metal restore

Microsoft Exchange Server files exclusion while creating backup tasks with
Acronis True Image Echo Enterprise Server
2.3.1 Starting Tasks from the Acronis True Image Echo Enterprise Server Management Console
Integration allows accessing main Acronis Recovery for MS Exchange functions (wizards and tools) from the Acronis True Image Echo Enterprise Server management console in case if both consoles are installed on the same computer. The Acronis Recovery for MS Exchange Agent must be installed on the remote computer.
Clicking the corresponding button, user will launch the desired Acronis Recovery for MS Exchange wizard or tool directly. This functionality will be disabled if any of Acronis Recovery for MS Exchange Agent or Management Console is not installed.
2.3.2 Bare Metal Restore
Acronis Recovery for MS Exchange provides the ability to restore a whole production server on bare metal from a bootable CD or from the PXE. This functionality is provided by Acronis True Image Echo Enterprise Server.
18

Configuring Bare Metal Restore

To restore all necessary information stores on bare metal or to create a bootable media, you need a previously created archive with required information stores backed up.
After creating an archive, do the following:
1. Launch a Restore wizard to schedule a restore task and choose a Bare Metal
Restore option in the first step.
2. Specify a task execution account.
3. Choose an archive and point in time (point of failure), select the necessary storage
groups and set additional parameters (such as a password) for each archive.
4. Backup a partition with Acronis Recovery for MS Exchange installed using Acronis
True Image Echo Enterprise Server (see Acronis True Image Echo Enterprise Server User’s Guide for detailed information).

Restoring a Server from a Bootable Media

After hardware failure it is necessary to restore the whole system, including the operating system and databases, located on different hard drives. To restore partiti ons and storage groups/databases (to the last possible state), do the following:
1. Start the computer from a bootable media, previously created using Acronis True
Image Echo Enterprise Server.
2. Execute an Echo bare metal restore (see Acronis True Image Echo Enterprise Server
User’s Guide for detailed information). In case a company stores databases on external SAN/NAS, an d an administrator only
needs to restore an operating system, the following actions should be performed: start the computer from a bootable media, previously created using Acronis True Image Echo Enterprise Server, and then execute an Echo bare metal restore (see Acronis True Image Echo Enterprise Server User’s Guide for detailed information).
If databases are stored on SAN/NAS, while preparing for restoring, do not configure bare metal restore tasks, as described in section “Configuring Bare Metal Restore”.

Starting a Bare Metal Restore Task

In case of hardware failure you have to restore the lost partition using the Acronis True Image Echo Enterprise Server, and then start the Acronis Recovery for MS Exchange bare metal restore task. To start this task automatically , you need to select the Run Acronis Recovery for MS Exchange Bare Metal Restore after data recovery option in the final step of the Acronis True Image Echo Enterprise Server Restore Data wizard.
2.3.3 Files Exclusion
Integration allows users to exclude Microsoft Exchange Server files while backing up a partition with Acronis True Image Echo Enterprise Server.
To exclude Microsoft Exchange Server files Image Echo Enterprise Server Create Backup wizard at select the Exclude all MS Exchange databases files option.
19
(*.edb, * stm, * log *.pat
. . ,
Source Files Exclusion
), in Acronis True
step
Chapter 3. Installation of Acronis
Recovery for MS Exchange
From this chapter you will learn how to install Acronis Recovery for MS Exchange components both locally and remotely.

3.1 Minimum System Requirements

Acronis Recovery for MS Exchange requires the following hardware:
Pentium processor or higher
1024 MB RAM
Mouse (recommended)

3.2 Security Policy

3.2.1 Credentials

Acronis Recovery for MS Exchange obtains access to networked computers using two types of credentials.
1. Credentials with Guest Rights – used for access to configuration and status
data on each computer. The credentials you provide during Acronis Recovery for MS Exchange installation will be applied to all networked computers. This is convenient for domain administrators, who can create a domain user account with guest rights and remote access rights to every computer. In a workgroup, it would also make sense to create identical accounts with guest rig hts on each computer accessed by Acronis Recovery for MS Exchange.
If you do not wish to create a uniform account, you will need to provide guest credentials for each computer after the installation and ini tial network discovery via Manage Computer -> Set Credentials.
You can combine both methods. For example, set a uniform account for domain members and set individual accounts for members of a workgroup.
2. Administrator Credentials – used for performing migration, deployment or other
tasks which require such rights. These are entered during creation of tasks.
20
Naturally, you are free to use administrator credentials for both purposes. This will work, but make sure it conforms to the security policy set in your network.

3.2.2 Firewall Settings

Acronis Recovery for MS Exchange uses the following ports for remote operation:
server (Acronis Recovery for MS Exchange Agents) UDP port: 9876
server (Acronis Recovery for MS Exchange Agents) TCP port: 9876, if busy
choose a port at random
client (Acronis Recovery for MS Exchange) UDP port: 9877, if busy
choose a port at random
You might have to set the appropriate firewall access options. Options for th e Wind ows Firewall, included in Windows XP Service Pack 2, Windows 2003 Server and later Windows versions, are set automatically during installation of Acronis Recovery for MS Exchange components. However, make sure that the option File and Printer Sharing in the Control panel -> Windows Firewall -> Exceptions is enabled on the remote computer,
be ore
f
the remote operation starts.

3.3 General Rules of Installation

Acronis Recovery for MS Exchange components and their features can be installed in multiple configurations, in terms of distributing the components and features among the networked computers.
3.3.1 Installing Acronis Recovery for MS Exchange
Components
There are two ways to install Acronis Recovery for MS Exchange com ponents – local and remote.
To install Acronis Recovery for MS Exchange Management Console and Acronis Recovery for MS Exchange Agent locally:
run the Acronis Recovery for MS Exchange setup file
in the Install Menu, select the program to install: Acronis Recovery for MS
Exchange Management Tools or Acronis Recovery for MS Exchange Agent
follow the install wizard instructions on the screen
It is recommended that you install Acronis Recovery for MS Exchange Management Console first. This will allow you to install Acronis Recovery for MS Exchange Agent remotely from the Management Console to any networked computer (for information about the remote installation see 3.3.2 “Installing Acronis Recovery for MS Exchange Agent remotely”).
In addition, Acronis Recovery for MS Exchange supports the Microsoft Installer utility
msiexec.exe
( Exchange components from a command line. MSI installation command and options are listed in Appendix B.
) and its commands, so that you can install Acronis Recovery for MS
21
3.3.2 Installing Acronis Recovery for MS Exchange Agent Remotely
To install Acronis Recovery for MS Exchange Agent remotely on a database server, you first need Acronis Recovery for MS Exchange Management Console installed on the local computer. The remote system must meet the requirements described in 3.1 “Minimum System Requirements”.
Before remotely installing Acronis Recovery for MS Exchange Agent on Windows 2008 Server, open port 25001 for TCP protocols for an inbound connection.
Run Acronis Recovery for MS Exchange and click Install Acronis Recovery for MS Exchange Agent in the Pick a Tool pane.
1. Specify the location of installation files of the Acronis Component you want to install.
Select from the registered components (by default)
Search removable media for the required installation files
Search for the installer in the specified location (you will have to specify the
location by clicking Browse…)
Click Next to continue.
2. Select the program you want to install on the remote computer from the list (Acronis Recovery for MS Exchange Agent) and click Next.
3. Enter a serial number for the selected product. For information about obtaining a serial number, see section 1.8 “License Policy”. The Next button will not be active until you enter a serial number.
4. Select the computer in the Computer field: enter a computer name m anually or click Browse… and select the required computer from the tree. Enter a User name and password into the corresponding fields to access the selected computer. By selecting the Save password check-box you can save the password for future connections.
5. The summary page displays all operations, which will be performed. Click Proceed to install Acronis Recovery for MS Exchange Agent on the remote computer.
By connecting to a remote computer with Acronis Recovery for MS Exchange Agent installed, you can set up backup and recovery tasks, and browse logs.
22
3.3.3 Extracting Acronis Recovery for MS Exchange Components
To install Acronis Recovery for MS Exchange from the command line, you need to
prior
extract the .msi file extracting the file:
run the Acronis Recovery for MS Exchange setup file;
in the Install Menu, right-click on the component name and select Extract;
select a location for the setup file and click Save.
to starting the installation process. Here are the steps for

3.3.4 Removing Acronis Recovery for MS Exchange Components

You can remove any Acronis Recovery for MS Exchange component separately by selecting Control panel -> Add or Remove Programs -> <component name> - > Remove.
Component names are:
MS Exchange Agent
Follow instructions on the screen. You may need to reboot your computer to complete the uninstallation.
Acronis Recovery for MS Exchange
.
and
Acronis Recovery for
23
Chapter 4. Getting started with
Acronis Recovery for MS Exchange
This chapter will help you to start working with Acronis Recovery for MS Exchange, and will guide you through connecting to a remote server, and remote installation of Acronis Recovery for MS Exchange Agent.
4.1 Running Acronis Recovery for MS Exchange
Management Console
To run Acronis Recovery for MS Exchange Management Console, select Start -> Programs -> Acronis Recovery for MS Exchange Management Console -> Acronis Recovery for MS Exchange Management Console.
Important! Before starting managing the servers’ list (discovering, adding or
deleting servers), modifying the storage groups list for the Disaster Recovery Plan (see Chapter 6), or changing default options (while creating backup or restore tasks), make sure the required users have read/write permissions for the following files, located in
Data\Acronis
for MS Exchange Management Console, DisasterRecoveryPlans\dbaselist.dat and RecoveryMSExchangeAgent\settings.cfg for Acronis Recovery for MS Exchange Agent.
: DatabaseServersExtensions\serverslist.dat for Acronis Recovery
Documents and Settings\All Users\Application
Note, in case Acronis Recovery for MS Exchange Agent is installed on
Please be aware: Acronis Recovery for MS Exchange space on the system partition, and the softwar e does not send notices when there is no free space.
24
Microsoft Windows 2000, BackupUser/BackupGroup must be a member of
Domain Admins Administrative Tools
each of the following security policies: Domain Controller Security Settings, Domain Secirity Settings and Local Security Settings (
Rights Assignment Æ Act as a part of the operating system
group. To configure these settings, go to
. Then sequentially add the BackupUser/BackupGroup in
will not operate
Control Panel Æ
Local Policies Æ User
).
if there is no free
4.2 Acronis Recovery for MS Exchange Workspace
Acronis Recovery for MS Exchange workspace includes the Acronis Recovery for MS Exchange Management Console window - the primary tool for managing data backup/restore on local and remote computers where Acronis Recovery for MS Exchange Agent is installed.
The workspace consists of the main area with operation icons, as well as the menu, the toolbar, and the common tasks bar. On the left there is a sidebar featuring the Computers or Help panels.
Note, that the content shown in the main window will change depending on whether Acronis Recovery for MS Exchange Management Console is disconnected or connected to a remote server.

4.2.1 Main Area

The main area of Acronis Recovery for MS Exchange workspace contains Task and Tools groups.
Before you connect to an Exchange server where A cronis Recovery for MS Exchange Agent is installed, operation icons will appear in the main program window that will allow you to navigate and manage computers.
The Pick a Task group contains one operation:
Connect to a Remote Computer – connect to a remote server where
Acronis Recovery for MS Exchange Agent is already installed
If you select a server in the Computers pane, on which Acronis Recovery for MS Exchange Agent is not installed, Acronis Recovery for MS Exchange workspace will display two operation icons in the Pick a Tool group:
Add Servers – add a Microsoft Exchange server to the group
Install Acronis Agents – install Acronis Agents on remote computers
As soon as you are connected to a Microsoft Exchan ge server where Acronis Recovery for MS Exchange Agent is installed, your workspace will show operations you can execute on this server, such as backup or restore, managing tasks, etc.
In this case the main area contains operation icons divided into two groups. The Pick a Task group contains the following operations:
Back Up Information Store – create storage groups backup archive
Back Up Mailboxes – create mailboxes and public folders backup archive
Restore Information Store – restore storage groups from a previously
created archive
Restore Mailboxes – restore mailboxes and public folders from a
previously created archive
Backup Location Clean-up - clean database backup locations
The Pick a Tool group contains the following items:
25
Restore E-mails – restore separate e-mails from a previously created
archive
Manage Tasks – manage tasks scheduled on a computer
Logs – open the Log Viewer window
Disaster Recovery Plan – generate step-by-step instructions on how to
restore your databases in case of any kind of failure
4.2.2 Computers Pane
The Computers pane is located on the left side of the main program window. It displays computers (with their Microsoft Exchange servers identified) which hav e been discovered by the system or added manually.
Acronis Recovery for MS Exchange Management Console allows you to connect to a remote computer where Acronis Recovery for MS Exchange Agent is already installed, or to install Acronis Recovery for MS Exchange Agent remotely.
At the top of the Computers pane there is a toolbar with the following buttons:
Add server - opens the Add Server window, where you can specify a server to be added to the tree
Discover servers - automatically finds servers on the network and adds them to the tree
Delete server - removes the selected server from the tree

4.2.3 Program Menu

The program menu bar features the Tasks, Tools, View and Help items. The Operations menu contains five available operations:
Backup Information Store - create storage groups backup archive
Back Up Mailboxes – create mailboxes and public folders backup archive
Restore Information Store - restore storage groups from a previously
created archive
Restore Mailboxes – restore mailboxes and public folders from a previously created archive
Backup Location Clean-up - clean database backup locations
The Tools menu contains five available operations:
Restore E-mails – restore separate e-mails from a previously created archive
Manage Tasks – manage tasks scheduled on a computer
Logs – open the Log Viewer window
Disaster Recovery Plan – generate step-by-step instructions on how to
restore your databases in case of any kind of failure
26
Options – open a window for editing default backup/restore options, setting text appearance (fonts), configuring notifications etc
The View menu contains an item for managing the appearance of the program window:
Status Bar – enables/disables the status bar
Acronis Recovery for MS Exchange allows using shortcut keys to navigate through the program menu. To do this, hold down key (the underlined letter) of the required menu item. A selected item becomes active, and still holding down required command from the submenu.
<Al >
<Alt>
, press the access key of the
t
and press the access

4.2.4 Help Menu

The Help menu is used to in voke help and obtain information about Acronis Recovery for MS Exchange.
To view the Help panel, disable the Computers Tree option in the View menu.

4.2.5 Status Bar

At the bottom of the main window, there is a status bar divided into two parts. The left side briefly describes the selected operation; the right side indicates operation progr ess and results. If you double-click on the operation results, you will see the logs window.
4.3 Navigation
At the top on the Computers pane there are fou r buttons; clicking them allows you to add new servers to the tree manually, to start the discovering process, to delete a server from a tree if needed, or to refresh the Computers Tree.
Computers with Acronis Recovery for MS Exchange Agent already installed are marked with a green icon.
Select the required server from the tree to p erform th e r equired operati on (conn ectin g, installing Acronis Recovery for MS Exchange Agent remotely).
To hide the Computers pane and view Help topics, click on the Show or Hide button from the menu.
4.4 Management
Acronis Recovery for MS Exchange Management Console allows installation of Acronis Recovery for MS Exchange components on remote computers. To perform any of these operations you will need administrator rights on the target machine.
To connect to the server click Connect to a Remote Server in the Pick a Task pane (see 4.7 “Connecting to a Remote Database Server”). If Acronis Recovery for MS Exchange Agent is not installed on a server, click Install Acronis Agents in the Pick a Tool pane (see Chapter 3 “Installation”).
To add a new server to the tree pane, click Add Servers in the Pick a Tool pane (see
4.6 “Adding Servers”).
27
Loading...
+ 61 hidden pages