Acronis TRUE IMAGE User Manual

Page 1
User’s Guide
Acronis® True Image
for Microsoft
Windows
Small Business Server
Page 2
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Activ e
restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective
owners. Distribution of substantively modified versions of this document is prohibited without t he
explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained fr om the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
2 Copyright © Acronis, Inc., 2000-2009
Page 3
Table of Contents
Chapter 1. Introduction .......................................................................................... 7
1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users 7
1.2 Acronis True Image for Microsoft Small Business Server components ..................................... 9
1.3 New in Acronis for Microsoft Small Business Server............................................................... 9
1.4 Supported file systems and storage media ......................................................................... 11
1.4.1 Supported file systems .............................................................................................. 11
1.4.2 Supported storage media ........................................................................................... 11
1.5 License policy .................................................................................................................. 12
1.6 Technical support ............................................................................................................ 12
Chapter 2. Acronis True Image for Microsoft Small Business Server installation
and startup ............................................................................................................. 13
2.1 System requirements ....................................................................................................... 13
2.1.1 Minimum hardware requirements ............................................................................... 13
2.1.2 Supported operating systems ..................................................................................... 13
2.2 Security parameters ......................................................................................................... 13
2.2.1 Credentials ............................................................................................................... 13
2.2.2 Firewall setup ........................................................................................................... 14
2.2.3 Encrypted communication .......................................................................................... 14
2.2.4 Security parameters in Acronis Administrative Template ............................................... 15
2.3 Installing Acronis True Image for Microsoft Small Business Server components ..................... 16
2.3.1 Installation of Acronis True Image for Microsoft Small Business Server local version and
Acronis True Image Agent for Windows ................................................................................ 17
2.3.2 Installation of Acronis Group Server ............................................................................ 18
2.3.3 Acronis Backup Server installation and setup ............................................................... 18
2.3.4 Acronis Universal Restore installation .......................................................................... 22
2.4 Extracting Acronis True Image for Microsoft Small Business Server components .................... 22
2.5 Running Acronis True Image for Microsoft Small Business Server componen ts ...................... 22
2.5.1 Running Acronis True Image for Microsoft Small Business Server (local version) ............. 22
2.5.2 Running Acronis True Image Management Console ...................................................... 23
2.5.3 Running other Acronis components ............................................................................. 23
2.6 Removing Acronis True Image for Microsoft Small Business Server compon ents .................... 23
Chapter 3. General information and proprietary Acronis technologies ................ 24
3.1 The difference between file archives and disk/partition images ............................................ 24
3.2 Full, incremental and differential backups .......................................................................... 24
3.3 Acronis Secure Zone® ...................................................................................................... 25
3.4 Acronis Startup Recovery Manager .................................................................................... 26
3.4.1 How it works ............................................................................................................ 26
3.4.2 How to use ............................................................................................................... 26
3.5 Acronis Backup Server ..................................................................................................... 27
3.5.1 Backup locations ....................................................................................................... 27
3.5.2 Quotas and time limits for computers and users ........................................................... 28
3.5.3 Administrators and Users ........................................................................................... 29
3.5.4 Operations with archives ............................................................................................ 29
3.6 Acronis Active restore ...................................................................................................... 29
3.6.1 Limitations in using Acronis Active restore ................................................................... 29
3.6.2 How it works ............................................................................................................ 30
3.6.3 How to use ............................................................................................................... 30
3.7 Acronis Universal Restore ................................................................................................. 31
3.7.1 Acronis Universal Restore purpose .............................................................................. 31
3.7.2 Acronis Universal Restore general principles ................................................................ 31
3.7.3 Acronis Universal Restore and Microsoft Sysprep .......................................................... 32
3.7.4 Limitations in using Acronis Universal Restore .............................................................. 32
Copyright © Acronis, Inc., 2000-2009 3
Page 4
3.7.5 Getting Acronis Universal Restore ............................................................................... 32
3.8 Backing up to tape libraries and tape drives ....................................................................... 33
3.8.1 Backing up to a locally attached tape device ................................................................ 34
3.8.2 Understanding backup to tape devices attached to the Backup Server ........................... 35
3.8.3 Backing up to a tape device through Acronis Backup Server .......................................... 36
3.8.4 Restoring data from archives located on tape devices ................................................... 37
3.9 Viewing disk and partition information ............................................................................... 37
Chapter 4. Using Acronis True Image Management Console ................................ 39
4.1 General information ......................................................................................................... 39
4.2 Installing/updating Acronis components on remote machines .............................................. 39
4.3 Managing a single remote computer .................................................................................. 42
4.3.1 Connecting to a remote computer .............................................................................. 42
4.3.2 Backup and recovery tasks ......................................................................................... 43
4.4 Managing groups of computers ......................................................................................... 46
4.4.1 Group status display .................................................................................................. 46
4.4.2 Creating new group tasks .......................................................................................... 48
4.4.3 Group tasks management .......................................................................................... 50
4.4.4 Acronis Group Server options ..................................................................................... 51
4.5 Managing backup server .................................................................................................. 52
4.5.1 Default settings ......................................................................................................... 53
4.5.2 Set up Administrator profiles ...................................................................................... 54
4.5.3 Adding Users and Administrators to the Acronis Backup Server database ....................... 55
4.5.4 Changing User profiles ............................................................................................... 57
4.5.5 Configuring Backup Locations ..................................................................................... 58
4.5.6 Managing Archives .................................................................................................... 59
4.5.7 Limiting access to Acronis Backup Server .................................................................... 60
Chapter 5. Using Acronis True Image for Microsoft Small Business Server (local
version) .................................................................................................................. 61
5.1 Main program window ..................................................................................................... 61
5.2 Managing a local computer ............................................................................................... 63
Chapter 6. Creating backup archives .................................................................... 66
6.1 Backing up files and folders (file backup) ........................................................................... 66
6.2 Backing up disks and partitions (image backup) ................................................................. 70
6.3 Setting backup options ..................................................................................................... 72
6.3.1 Archive protection ..................................................................................................... 73
6.3.2 Source files exclusion ................................................................................................ 73
6.3.3 Pre/post commands .................................................................................................. 74
6.3.4 Database support ...................................................................................................... 74
6.3.5 Compression level ..................................................................................................... 75
6.3.6 Backup performance ................................................................................................. 76
6.3.7 Fast incremental/differential backup ........................................................................... 77
6.3.8 Archive splitting ........................................................................................................ 77
6.3.9 File-level security settings .......................................................................................... 77
6.3.10 Media components .................................................................................................. 78
6.3.11 Error handling ......................................................................................................... 79
6.3.12 Dual destination backup ........................................................................................... 79
6.3.13 Wake On LAN ......................................................................................................... 80
6.3.14 Additional settings ................................................................................................... 80
Chapter 7. Restoring the backup data .................................................................. 82
7.1 Considerations before recovery ......................................................................................... 82
7.1.1 Restore under Windows or boot from CD? ................................................................... 82
7.1.2 Network settings in rescue mode ................................................................................ 82
7.1.3 Recovering dynamic volumes ..................................................................................... 83
7.2 Restoring files and folders from file archives ...................................................................... 84
4 Copyright © Acronis, Inc., 2000-2009
Page 5
7.3 Restoring disks/partitions or files from images ................................................................... 86
7.3.1 Starting the Restore Data Wizard ................................................................................ 87
7.3.2 Archive selection ....................................................................................................... 87
7.3.3 Restoration type selection .......................................................................................... 88
7.3.4 Selecting a disk/partition to restore ............................................................................ 89
7.3.5 Selecting a target disk/partition .................................................................................. 90
7.3.6 Changing the restored partition type ........................................................................... 91
7.3.7 Changing the restored partition file system .................................................................. 92
7.3.8 Changing the restored partition size and location ......................................................... 92
7.3.9 Assigning a letter to the restored partition ................................................................... 93
7.3.10 Restoring several disks or partitions at once .............................................................. 93
7.3.11 Using Acronis Universal Restore ................................................................................ 93
7.3.12 Setting restore options ............................................................................................. 94
7.3.13 Restoration summary and executing restoration ......................................................... 94
7.4 Setting restore options ..................................................................................................... 94
7.4.1 Files to exclude from restoration ................................................................................. 95
7.4.2 Files overwriting mode ............................................................................................... 95
7.4.3 Pre/post commands .................................................................................................. 95
7.4.4 Restoration priority .................................................................................................... 96
7.4.5 File-level security settings .......................................................................................... 96
7.4.6 Specifying mass storage drivers .................................................................................. 96
7.4.7 Additional settings ..................................................................................................... 97
7.4.8 Error handling ........................................................................................................... 98
7.5 Creating dynamic disks and volumes ................................................................................. 98
7.5.1 Creating dynamic volumes ......................................................................................... 98
Chapter 8. Scheduling tasks ................................................................................ 101
8.1 Creating scheduled tasks ................................................................................................ 101
8.1.1 Setting up daily execution ........................................................................................ 103
8.1.2 Setting up weekly execution ..................................................................................... 104
8.1.3 Setting up monthly execution ................................................................................... 105
8.1.4 Setting up one-time execution .................................................................................. 105
8.1.5 Setting up event-driven execution ............................................................................ 106
8.2 Managing scheduled tasks .............................................................................................. 106
Chapter 9. Managing the Acronis Secure Zone ................................................... 107
9.1 Creating Acronis Secure Zone ......................................................................................... 107
9.2 Resizing the Acronis Secure Zone .................................................................................... 109
9.3 Changing the password for Acronis Secure Zone .............................................................. 110
9.4 Deleting Acronis Secure Zone ......................................................................................... 111
Chapter 10. Creating bootable media ................................................................. 112
10.1 Creating Acronis rescue media ...................................................................................... 112
10.2 Creating a Win PE ISO with Acronis True Image for Microsoft Small Business Server ......... 114
Chapter 11. Operations with archives ................................................................. 115
11.1 Validating backup archives ........................................................................................... 115
11.2 Exploring archives and mounting images ....................................................................... 115
11.2.1 Exploring an archive .............................................................................................. 116
11.2.2 Mounting an image ................................................................................................ 117
11.2.3 Unmounting an image ........................................................................................... 119
11.3 Consolidating backups .................................................................................................. 119
Chapter 12. Notifications and event tracing ....................................................... 123
12.1 Email notification ......................................................................................................... 123
12.2 WinPopup notification .................................................................................................. 124
12.3 Viewing logs ................................................................................................................ 124
12.4 Event tracing ............................................................................................................... 125
Copyright © Acronis, Inc., 2000-2009 5
Page 6
12.4.1 Windows event log ................................................................................................ 125
12.4.2 SNMP notifications ................................................................................................. 126
12.5 Managing System Restore ............................................................................................ 126
Chapter 13. Working with a virtual environment ............................................... 128
13.1 Backing up data on virtual machines ............................................................................. 128
13.2 Recovering data on virtual machines ............................................................................. 128
13.3 Using the disk conversion feature .................................................................................. 129
13.3.1 Recover data on the VM ......................................................................................... 129
13.3.2 Recover both data and the VM ............................................................................... 129
13.3.3 Physical to virtual migration ................................................................................... 129
13.3.4 Converting workloads ............................................................................................ 130
13. 4 Converting disk images to virtual disks ......................................................................... 130
Chapter 14. Transferring the system to a new disk ............................................ 132
14.1 General information ..................................................................................................... 132
14.2 Security ...................................................................................................................... 133
14.3 Executing transfers ...................................................................................................... 133
14.3.1 Selecting Clone mode ............................................................................................ 133
14.3.2 Selecting source disk ............................................................................................. 133
14.3.3 Selecting destination disk ....................................................................................... 134
14.3.4 Partitioned destination disk .................................................................................... 135
14.3.5 Old and new disk partition layout ............................................................................ 135
14.3.6 Old disk data ........................................................................................................ 135
14.3.7 Destroying the old disk data ................................................................................... 136
14.3.8 Selecting partition transfer method ......................................................................... 137
14.3.9 Partitioning the old disk ......................................................................................... 138
14.3.10 Old and new disk partition layouts ........................................................................ 138
14.3.11 Cloning summary ................................................................................................. 139
14.4 Cloning with manual partitioning ................................................................................... 139
14.4.1 Old and new disk partition layouts .......................................................................... 139
Chapter 15. Adding a new hard disk ................................................................... 141
15.1 Selecting a hard disk .................................................................................................... 141
15.2 Creating new partitions ................................................................................................ 141
15.3 Disk add summary ....................................................................................................... 142
Chapter 16. Command-line mode and scripting ................................................. 143
16.1 Working in the command-line mode .............................................................................. 143
16.1.1 Supported commands ............................................................................................ 143
16.1.2 Common options (options common for most trueimagecmd commands) .................... 146
16.1.3 Specific options (options specific for individual trueimagecmd commands) .................. 147
16.1.4 trueimagecmd.exe usage examples ......................................................................... 152
16.1.5 Command-line mode usage under DOS ................................................................... 158
16.2 Scripting ..................................................................................................................... 158
16.2.1 Script execution parameters ................................................................................... 158
16.2.2 Script structure ..................................................................................................... 159
16.2.3 Script usage examples ........................................................................................... 160
6 Copyright © Acronis, Inc., 2000-2009
Page 7

Chapter 1. Introduction

1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users

Acronis True Image for Microsoft Small Business Server is a comprehensive backup and recovery solution for heterogeneous computer infrastructure that may include any combination of physical and virtual, networked and standalone, Windows- and Linux­based servers.
Acronis True Image for Microsoft Small Business Server creates a transportable image, independent of the hardware platform that can be restored directly to and from any virtual or physical environment.
Minimizes downtime
Acronis True Image for Microsoft Small Business Server enables you to restore systems in minutes, not hours or days. An entire system can be restored from an image that includes everything the system needs to run: the operating system , applications, databases, and configurations. it is not necessary to reinstall software or reconfigure your system or network settings. The complete system restoration can be performed to an existing system, to a new system with different hardware, or to virtual machines. With the Acronis Active restore feature, users can access the server and be gin working during the restore process, further decreasing downtime. File-level backups provide you with the flexibility to only backup specific, critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be implemented with minimal user training. A central management console provides remote administration, ensuring that all systems in the network, regardless of the domain or workgroup structure, can be managed from one location. Complete, unattended restores from remote locations are supported with a remote bootable agent.
Automates Backup
With the scheduling capability in Acronis True Image for Microsoft Small Business Server, you simply create backup tasks, tailored by group, or certain times or events.
To ensure that backups have occurred, or if user intervention is required, you can r equest notifications via email or Windows Pop-up. You can view Acronis events in the Win dows Application Events Log or Acronis own log files. Log messages can be automatically sent out to SNMP clients.
The product also supports the creation of custom comman ds before and after backups. For example, users can automatically run anti-virus products before an image is created and verify the validity of backups after the image has been created. And because these tasks can be scheduled, you need not recreate the script to run the pre- and post-event tasks each time; you can set the scheduled events once and they will run each time automatically.
Ensures 24 X 7 Uptime
With Acronis’ patented drive snapshot technology, systems can be imaged while they are in use, ensuring 24-by-7 system availability. This technology enables the product to backup and image critical operating system files, the master boot record and any partition-based boot records without requiring a reboot. A CPU allocation feature allows
Copyright © Acronis, Inc., 2000-2009 7
Page 8
you to limit the amount of CPU usage for the application to maximize the CPU’s availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used during backups, allowing minimal disruption of business operations.
A feature that allows you to suspend database activity for several seconds is provided so that you can create a valid image of mission-critical applications such as Microsoft Exchange Server, Microsoft SQL Server and Oracle. This database suspension process supports Microsoft’s Volume Shadow Copy Service (VSS). If your database or operating system does not support VSS, Acronis True Image for Microsoft Small Business Server will execute your custom commands to execute database suspension.
Supports Leading Edge Technology
Businesses today are moving to leverage the latest technologies, includ ing dual-core, 64­bit processors and 64-bit operating systems. With Acronis True Image for Microsoft Small Business Server, you can protect these new machines, as well as legacy servers, running a single application with a common interface.
Leverages Existing Technology Investments
The product can leverage your current storage infrastru cture by supporting a variety of storage media, so you can avoid costly hardware purchases to implement the solution. The product supports key storage technologies such as: Direct Attached Storage ( DAS), Network Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of Independent Disks (RAID), tapes, USB and IEEE-1394 (FireWire) compliant storage devices, CDs, DVDs, removable drives (Floppy, Zip, etc.) and shared storage. Mor eover, the product ensures that you maximize the space on these reso urces with four levels of compression.
Disk cloning and new disk deployment
Acronis True Image for Microsoft Small Business Server can be used to clone an image onto multiple servers. For example, let’s say a company purchased several servers and needs similar environments on each of them. Traditionally, the IT manager would install the operating system and programs on every server. With Acronis True Image for Microsoft Small Business Server, the IT manager would configure a single server, then create a disk image of the system. That image can then be duplicated onto multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image for Microsoft Small Business Server simplifies the task to few mouse clicks creating the exact copy of your old disk to a new one and adjusting partitions size to fit a new hard disk.
Volumes conversion
Acronis True Image for Microsoft Small Business Server can back up and recover dynamic volumes.
Dynamic volume as is can be recovered over the same volume or unallocated space of a dynamic group. Acronis True Image for Microsoft Small Business Server has necessary tools for any-to-any disks conversion in terms of basic disks and dynamic volumes of any type (simple, spanned, striped, mirrored or RAID 5). The tools are available in bootable program version as well. Having booted the Acronis environment, you can easily prepare the desired dynamic group on bare metal or a computer with non-Windows operating system.
8 Copyright © Acronis, Inc., 2000-2009
Page 9

1.2 Acronis True Image for Microsoft Small Business Server components

Acronis True Image for Microsoft Small Business Server includes the following components.
1. Acronis True Image Management Console is a tool for remote access to Acroni s components. Administrator uses the console to install, configure and control the components from remote.
2. Acronis True Image Agent is an application that resides on client computers and performs Acronis operations such as data backup or restore.
3. Acronis Group Server is a management tool that provides ability to schedule, monitor and manage group backup tasks. It deploys group tasks to the ag ents, polls the agents for the status of running tasks and provides the administrator with the summary tasks state display over the network.
4. Acronis Backup Server is an application for centralized storage and management of enterprise backup archives.
The administrator can set space quotas and backup schemes, schedule check tasks that consolidate backups in case of quota violati on, perform one-time backups consolidation. This ensures optimal usage of the storage capacity . Acronis Backup Server also enables users to access a tape library, connected to the server.
5. Acronis True Image for Microsoft Small Business Server (local version) is a locally controlled server management tool with additional functionality as compared to Acronis True Image Agent. The local version supports, besides backup and recovery operations, exploring archives, mounting images as virtual drives, cloning hard disk s data and formatting partitions on new hard disks, creating dynamic volumes, command-line mode and scripts execution.
6. Acronis Universal Restore is an add-on to Acronis True Image for Microsoft Small Business Server that automatically configures Windows drivers in a system, recovered on dissimilar hardware. This enables the seamless system start and operation.
7. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or the RIS package thus enabling data recovery over bare metal, non-Windows or corrupted operating systems.

1.3 New in Acronis for Microsoft Small Business Server

Management console
Reconnect (last connect) option Centralized installation and update of Acronis components on multiple computers
Group server
Import and export computers through txt/csv files Run, stop, restart, edit, check group tasks Group validation tasks Set how often to check the computers state (status refresh rate) Wake on LAN for backup
Copyright © Acronis, Inc., 2000-2009 9
Page 10
Backup server
Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library for every user
Backup
Backup and restore of 2+TB volumes Encrypting backups with industry-standard AES cryptographic algorithm (key size 128,
192, 256 bit) Multi-volume snapshot for databases spread on several disks Control network bandwidth usage when backing up to FTP Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all e rrors) Dual destination backup: Acronis Secure Zone + network share Support for VMware Consolidated backup Archive bit reset (file-level backup only) Generating time-based names for bac kup files
Recovery
Recovery of dynamic volumes Recovery of system dynamic volumes on dissimilar hardware using Acronis Universal
Restore or Acronis Active restore
Scheduling
Schedule archive validation Start every N hours within daily schedule Start on free disk space change by the specified amount Cloning a task
Notification via e-mail
Multiple e-mail addresses From and Subject fields Logon to incoming mail server
Operations with archives
Convert disk images to virtual disks for VMware, Microsoft, XenServer and Parallels virtual machines
Consolidate backup files (create a consistent copy of archive while deleting selected backups)
Explore archives (open in read-only mode any image or file-level backup)
Operations with hard disks
Convert basic disk to dynamic
10 Copyright © Acronis, Inc., 2000-2009
Page 11
Create dynamic volumes
CLI features
MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create Acronis Secure Zone on the
space
Security
Encrypted (SSL) communication between Acronis True Image for Microsoft Small Business Server components

1.4 Supported file systems and storage media

1.4.1 Supported file systems

FAT16/32 NTFS Ext2/Ext3 ReiserFS Reiser4 Linux SWAP XFS JFS DFS If a file system is not supported or is corrupted, Acronis True Image for Microsoft Small
Business Server can copy data using a sector-by-sector approach.
For XFS and JFS file systems the partition resizing feature is not supported.

1.4.2 Supported storage media

Hard disk drives Networked storage devices such as Storage Area Networks (SANs) and Network Attached
Storage (NAS) Tape libraries, autoloaders, SCSI tape drives IDE and SCSI RAID controllers of any level FTP-servers* CD-R/RW, DVD-R/RW, DVD+R (including double-layer DVD+R), DVD+RW, DVD-RAM** USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices
®
ZIP
, Jaz® and other removable media
Copyright © Acronis, Inc., 2000-2009 11
Page 12
* - an FTP-server must allow passive mode for file transfers. Data recovery directly from FTP-server requires the archive to consist of files no more than 2GB in size. It is recommended that you change the source computer firewall settings to open ports 20 and 21 for both TCP and UDP protocols and disable the Routing and Remote Access Windows service.
** - Burned rewritable discs cannot be read in Linux without kernel patch.

1.5 License policy

Acronis True Image for Microsoft Small Business Server licensing is based on number of servers on which Acronis True Image Agent and/or Acronis True Image for Microsoft Small Business Server local version are to be installed. This means you need one license for each server you are going to backup, whether you will control it on-site (with the local program version) or remotely (using Acronis True Image Agent), or use both ways of control. The number of Acronis True Image Management Console, Acr onis Group Server and Acronis Backup Server installations is not counted.
Acronis Universal Restore is an option to Acronis True Image for Microsoft Small Business Server and has its own serial number.

1.6 Technical support

As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available , you may electronically access at no additional charge, Support services for the Software, which Acronis shall endeavor to make available twenty four (24) hours a day, seven (7) days per week. Such electronic services may include, but are not limited to: user forums; software-specifi c information; hints and tips; bug fix retrieval via the internet; software maintenance and demonstration code retrieval via a WAN-accessible FTP server; and access to a problem resolution database via Acronis customer support system.
Support shall consist of supplying telephone or other electronic support to you in or der to help you locate and, on its own, correct problems with the Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available , without additional char ge, to other licensees of the Software that are enrolled in Support. Upon mutual agre ement by both parties, Acronis shall: (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into substantial conformity with the published operating specifications for the most current version of the Software unless your unauthorized modifications prohibit or hamper such corrections or cause the malfunction; or (ii) supply code corrections to correct insubstantial problems at the next general release of the Software.
More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.com/support/
12 Copyright © Acronis, Inc., 2000-2009
Loading...