Restore” and the Acronis logo are trademarks of Acronis, Inc.
Linux is a registered trademark of Linus Torvalds.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective
owners.
Distribution of substantively modified versions of this document is prohibited without t he
explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained fr om the copyright
holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE
LEGALLY INVALID.
1.1 Acronis® True Image Echo Server – a complete solution for
corporate users
Acronis True Image Echo Server is a comprehensive backup and recovery solution for a
Windows-based server.
Acronis True Image Echo Server creates a transportable image, independent of the
hardware platform that can be restored directly to and from any virtual or physical
environment.
Minimizes downtime
Acronis True Image Echo Server enables you to restore systems in minutes, not hours or
days. An entire system can be restored from an image that includes everything the
system needs to run: the operating system, applications, databases, and configurations. it
is not necessary to reinstall software or reconfigure your system or n etwork settings. The
complete system restoration can be performed to an existing system, to a new system
with different hardware, or to virtual machines. With the Acronis Active Restore feature,
users can access the server and begin working during the restore process, further
decreasing downtime. File-level backups provide you with the flexibility to only backup
specific, critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be
implemented with minimal user training.
Automates Backup
With the scheduling capability in Acronis True Image Echo Server, you simply create
backup tasks, tailored by group, or certain times or events.
To ensure that backups have occurred, or if user intervention is required, you can r equest
notifications via email or Windows Pop-up. You can view Acronis events in the Win dows
Application Events Log or Acronis own log files. Log messages can be automatically sent
out to SNMP clients.
The product also supports the creation of custom comman ds before and after backups.
For example, users can automatically run anti-virus products before an image is created
and verify the validity of backups after the image has been created. And because these
tasks can be scheduled, you need not recreate the script to run the pre- and post-event
tasks each time; you can set the scheduled events once and they will run each time
automatically.
Ensures 24 X 7 Uptime
With Acronis’ patented drive snapshot technology, systems can be imaged while they are
in use, ensuring 24-by-7 system availability. This technology enables the product to
backup and image critical operating system files, the master boot record and any
partition-based boot records without requiring a reboot. A CPU allocation feature allows
you to limit the amount of CPU usage for the application to maximize the CPU’s
availability for mission critical applications. Additionally, users can control hard disk drive
writing speeds and control network bandwidth used during backups, allowing minimal
disruption of business operations.
A feature that allows you to suspend database activity for several seconds is provided so
that you can create a valid image of mission-critical applications such as Microsoft
Exchange Server, Microsoft SQL Server and Oracle. This database suspension process
supports Microsoft’s Volume Shadow Copy Service (VSS). If your database or operating
system does not support VSS, Acronis True Image Echo Server will execute your custom
commands to execute database suspension.
Leverages Existing Technology Investments
The product can leverage your current storage infrastru cture by supporting a variety of
storage media, so you can avoid costly hardware purchases to implement the solution.
The product supports key storage technologies such as: Direct Attached Storage ( DAS),
Network Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of
Independent Disks (RAID), tapes, USB and IEEE-1394 (FireWire) compliant storage
devices, CDs, DVDs, removable drives (Floppy, Zip, etc.) and shared storage. Mor eover,
the product ensures that you maximize the space on these reso urces with four levels of
compression.
Disk cloning and new disk deployment
Acronis True Image Echo Server can be used to clone an im age onto m ultiple serve rs. Fo r
example, let’s say a company purchased several servers and needs similar environments
on each of them. Traditionally, the IT manager would install the operating system and
programs on every server. With Acronis True Image Echo Server, the IT manager would
configure a single server, then create a disk image of the sy stem. That i mage can th en b e
duplicated onto multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image Echo Server
simplifies the task to few mouse clicks creating the exact copy of your old disk to a new
one and adjusting partitions size to fit a new hard disk.
Volumes conversion
Acronis True Image Echo Server can back up and recover dynamic volumes.
Dynamic volume as is can be recovered over the same volume or unallocated space of a
dynamic group. Acronis True Image Echo Server has necessary tools for any-to-any disks
conversion in terms of basic disks and dynamic volumes of any type (simple, spanned,
striped, mirrored or RAID 5). The tools are available in bootable program version as well.
Having booted the Acronis environment, you can easily prepare the desired dynamic
group on bare metal or a computer with non-Windows operating system.
1.2 New in Acronis True Image Echo Server
Backup
Backup and restore of 2+TB volumes
Encrypting backups with industry-standard AES cryptographic algorithm (key size 128,
192, 256 bit)
Multi-volume snapshot for databases spread on several disks
Control network bandwidth usage when backing up to FTP
Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all e rrors)
Dual destination backup: local + network share
Support for VMware Consolidated backup
• USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices
®
• ZIP
, Jaz® and other removable media
* - Data recovery directly from an FTP-server will require the archive to consist of files no
more than 2GB in size, so please note this during the backup image creation. It is
recommended that you change the source computer firewall settings to disable the
Routing and Remote Access Windows service. The previous versions of the software
recommended for the target FTP-server the usage of passi ve mode for file transfers and
usage of ports 20 and 21 at the source computer for both TCP and UDP protocols. The
current version has no such limitations: you can use active or passive mode and any port,
changing the default settings at Options->Backup Options->Advanced settings.
** - Burned rewritable discs cannot be read in Linux without kernel patch.
1.4 Technical support
As part of a purchased annual Support charge you are entitled to Technical Support as
follows: to the extent that electronic services are available , you may electronically access
at no additional charge, Support services for the Software, which Acronis shall endeavor
to make available twenty four (24) hours a day, seven (7) days per week. Such electronic
services may include, but are not limited to: user forums; software-specifi c information;
hints and tips; bug fix retrieval via the internet; software maintenance and demonstration
code retrieval via a WAN-accessible FTP server; and access to a problem resolution
database via Acronis customer support system.
Support shall consist of supplying telephone or other electronic support to you in or der to
help you locate and, on its own, correct problems with the Software and supplying
patches, updates and other changes that Acronis, at its sole discretion, makes or adds to
the Software and which Acronis makes generally available, without additional charge, to
other licensees of the Software that are enrolled in Support.
Upon mutual agreement by both parties, Acronis shall:
(i) supply code corrections to you to correct Software malfunctions in order to bring such
Software into substantial conformity with the published operating specifications for the
most current version of the Software unless your unauthorized modifications prohibit or
hamper such corrections or cause the malfunction;
or (ii) supply code corrections to correct insubstantial problems at the next general
release of the Software.
More information about contacting Acronis Technical Support is available at the following
link: http://www.acronis.com/support/