Acronis TRUE IMAGE ENTERPRISE SERVER 8.0 User Manual

User's Guide
Acronis True Image
Enterprise Server
Compute with confidence
www.acronis.com
Copyright © Acronis, Inc., 2000-2005. All rights reserved. Linux is a registered trademark of Linus Torvalds.
OS/2 is a registered trademark of IBM Corporation. UNIX is a registered trademark of The Open Group. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective
owners. Distribution of substantively modified versions of this document is prohibited
without the explicit permission of the copyright holder. Distribution of this work or derivative work in a ny standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
2 Copyright © Acronis, Inc., 2000-2005

END-USER LICENSE AGREEMENT

BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS YOU MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE.
The Acronis True Image Enterprise Server (the Software) is Copyright © Acronis, Inc., 2000-
2005. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations.
1. The license is to the original purchaser only, and is not transferable without prior written Permission from Acronis.
2. The Original Purchaser may use the Software on a single computer owned or leased by the Original Purchaser. You may not use the Software on more than a single machine even if you own or lease all of them without the written consent of Acronis.
3. The Original Purchaser may not engage in, nor permit third parties to engage in, any of the following:
A. Providing or permitting use of or disclosing the Software to third parties. B. Providing use of the Software in a computer service business, network, timesharing or
multiple user arrangement to users who are not individually licensed by Acronis.
C. Making alterations or copies of any kind in the Software (except as specifically permitted
above).
D. Attempting to un-assemble, de-compile or reverse engineer the Software in any way. E. Granting sublicenses, leases, or other rights in the Software to others. F. Making copies, or verbal or media translations, of the users guide.
G. Making telecommunication data transmission of the software. Acronis has the right to terminate this license if there is a violation of its terms or default by
the Original Purchaser. Upon termination for any reason, all copies of the Software must be immediately returned to Acronis, and the Original Purchaser shall be liable to Acronis for any and all damages suffered as a result of the violation or default.
ENTIRE RISK
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH YOU THE PURCHASER. ACRONIS DOES NOT WARRANT THAT THE SOFTWARE OR ITS FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL BE CORRECTED. NO LIABILITY FOR CONSEQUENTIAL DAMAGES - IN NO EVENT SHALL ACRONIS OR ITS VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ACRONIS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Copyright © Acronis, Inc., 2000-2005
3
Contents
Table of Contents
CHAPTER 1. INTRODUCTION. GENERAL INFORMATION.............................................................. 7
1.1 ACRONIS TRUE IMAGE ENTERPRISE SERVER - COMPLETE SOLUTION FOR CORPORATE USERS ................... 7
1.2 ACRONIS TRUE IMAGE ENTERPRISE SERVER KEY FEATURES..................................................................... 8
1.3 ACRONIS TRUE IMAGE ENTERPRISE SERVER ARCHITECTURE ................................................................... 9
1.4 SUPPORTED SECURITY STANDARDS ......................................................................................................... 10
1.5 SOFTWARE USAGE TERMS AND CONDITIONS............................................................................................ 10
CHAPTER 2. INSTALLATION AND RUNNING.................................................................................... 11
2.1 SYSTEM REQUIREMENTS.......................................................................................................................... 11
2.2 SUPPORTED OPERATING SYSTEMS............................................................................................................ 11
2.3 SUPPORTED FILE SYSTEMS AND MEDIA .................................................................................................... 12
2.3.1 Supported file systems ........................................................................................................................ 12
2.3.2 Supported media.................................................................................................................................. 12
2.4 LICENSE POLICY ...................................................................................................................................... 12
2.5 ACRONIS TRUE IMAGE ENTERPRISE SERVER INSTALLATION ................................................................... 13
2.5.1 Installing Acronis True Image Enterprise Server components............................................................ 13
2.5.2 Extracting Acronis True Image Enterprise Server components.......................................................... 15
2.6 USING LICENSE SERVER MANAGEMENT TOOL........................................................................................ 15
2.7 SETTING UP SECURITY PARAMETERS FOR ACRONIS TRUE IMAGE ENTERPRISE SERVER........................... 16
2.7.1 Usernames and passwords................................................................................................................... 16
2.7.2 Firewall setup...................................................................................................................................... 16
2.7 RUNNING ACRONIS TRUE IMAGE ENTERPRISE SERVER COMPONENTS..................................................... 17
2.7.1 Running Acronis True Image.............................................................................................................. 17
2.7.2 Running Acronis True Image Management Console.......................................................................... 17
2.8 REMOVING ACRONIS TRUE IMAGE ENTERPRISE SERVER COMPONENTS .................................................. 17
CHAPTER 3. USING ACRONIS TRUE IMAGE MANAGEMENT CONSOLE.................................. 18
3.1 GENERAL INFORMATION.......................................................................................................................... 18
3.2 INSTALLING ACRONIS COMPONENTS ONTO A REMOTE MACHINE ............................................................. 19
3.3 CONNECTING TO A REMOTE PC ............................................................................................................... 20
3.4 CREATING PARTITION/DISK IMAGES ON A REMOTE PC............................................................................. 21
3.5 CHECKING IMAGE INTEGRITY .................................................................................................................. 22
3.6 REMOTE IMAGE RESTORING..................................................................................................................... 22
3.7 ACRONIS SECURE ZONE REMOTE MANAGING .......................................................................................... 23
3.8 SCHEDULING IMAGE CREATION ............................................................................................................... 23
3.9 SCHEDULING GROUP BACKUP TASKS ....................................................................................................... 23
3.10 BROWSING LOGS.................................................................................................................................. 25
3.11 OPERATION RESULTS NOTIFICATION .................................................................................................... 26
3.12 STOPPING AND LAUNCHING WINDOWS NT SP6/2000/XP SERVICES DURING AN IMAGE FILE CREATION 27
3.13 UPDATING ACRONIS TRUE IMAGE AGENT ........................................................................................... 27
3.14 CREATING BOOTABLE MEDIA USING ACRONIS TRUE IMAGE MANAGEMENT CONSOLE........................ 27
CHAPTER 4. RUNNING ACRONIS TRUE IMAGE (LOCALE CONSOLE)...................................... 29
4.1 MAIN PROGRAM WINDOW ........................................................................................................................ 29
4.2 ACRONIS SECURE ZONE .......................................................................................................................... 31
4.2.1 Creating Acronis Secure Zone............................................................................................................ 32
4.2.2 Resizing Acronis Secure Zone............................................................................................................ 33
4.2.3 Deleting the images in Acronis Secure Zone......................................................................................33
4.2.4 Deleting Acronis Secure Zone............................................................................................................ 34
4.3 ACRONIS STARTUP RECOVERY MANAGER .............................................................................................. 35
4.4 USING DYNAMIC DISKS AND VOLUMES .................................................................................................... 35
4.5 BACKING UP TO TAPE DRIVE .................................................................................................................... 36
CHAPTER 5. CREATING A PARTITION (DISK) IMAGE................................................................... 37
5.1 SELECTING PARTITIONS ........................................................................................................................... 37
4
Copyright © Acronis, Inc., 2000-2005
Contents
5.2
SELECTING IMAGE LOCATION .................................................................................................................. 37
5.3 SELECTING IMAGE MODE ......................................................................................................................... 38
5.3.1 Creating an incremental image............................................................................................................ 39
5.4 SELECTING IMAGE FILE SIZE .................................................................................................................... 40
5.5 SELECTING DATA COMPRESSION LEVEL................................................................................................... 41
5.6 PROTECTING IMAGES WITH PASSWORDS .................................................................................................. 42
5.7 PROVIDING COMMENTS ........................................................................................................................... 42
5.8 IMAGE CREATION SCRIPT ......................................................................................................................... 43
5.9 SELECTING IMAGE CREATION PRIORITY................................................................................................... 44
5.10 OPERATION RESULTS NOTIFICATION .................................................................................................... 44
5.10.1 Email notification............................................................................................................................ 44
5.10.2 WinPopup notification..................................................................................................................... 45
5.11 STOPPING AND LAUNCHING THE SERVICES IN WINDOWS NT SP6/2000/XP DURING AN IMAGE FILE
CREATION
........................................................................................................................................................... 46
CHAPTER 6. RESTORING A DISK (PARTITION) FROM AN IMAGE............................................. 47
6.1 SELECTING AN IMAGE TO RESTORE FROM ................................................................................................ 47
6.2 CHECKING IMAGE INTEGRITY BEFORE RESTORATION .............................................................................. 48
6.3 SELECTING A PARTITION TO RESTORE...................................................................................................... 49
6.4 SELECTING A LOCATION TO RESTORE TO ................................................................................................. 50
6.5 SELECTING PARTITION TYPE .................................................................................................................... 50
6.6 SELECTING A FILE SYSTEM ...................................................................................................................... 51
6.7 SELECTING RESTORED PARTITION SIZE .................................................................................................... 52
6.8 ASSIGNING A LETTER TO A PARTITION..................................................................................................... 53
6.9 CHECKING FILE SYSTEM INTEGRITY......................................................................................................... 54
6.10 RESTORING SEVERAL PARTITIONS AT ONCE ......................................................................................... 55
6.11 RESTORATION SCRIPT .......................................................................................................................... 55
CHAPTER 7. BROWSING AND RESTORING PARTICULAR FILES................................................ 57
7.1 CONNECTING A VIRTUAL DISK................................................................................................................. 57
7.1.1 Selecting an image.............................................................................................................................. 57
7.1.2 Selecting partitions to connect and letter assignment.......................................................................... 58
7.2 UNPLUGGING A VIRTUAL DISK................................................................................................................. 59
CHAPTER 8. TRANSFERRING SYSTEM TO A NEW DISK............................................................... 60
8.1 GENERAL INFORMATION.......................................................................................................................... 60
8.2 SECURITY ................................................................................................................................................ 61
8.3 EXECUTING TRANSFERS........................................................................................................................... 61
8.3.1 Selecting transfer mode....................................................................................................................... 61
8.3.2 Selecting source disk........................................................................................................................... 62
8.3.3 Selecting destination disk.................................................................................................................... 62
8.3.4 Partitioned destination disk................................................................................................................. 63
8.3.5 Old and new disk partition layout....................................................................................................... 63
8.3.6 Old disk data ....................................................................................................................................... 64
8.3.7 Destroying the old disk data................................................................................................................ 65
8.3.8 Selecting partition transfer method..................................................................................................... 65
8.3.9 Partitioning the old disk...................................................................................................................... 66
8.3.10 Old and new disk partition layouts.................................................................................................. 67
8.3.11 Cloning script .................................................................................................................................. 67
8.4 CLONING WITH MANUAL PARTITIONING .................................................................................................. 68
8.4.1 Old and new disk partition layouts...................................................................................................... 68
CHAPTER 9. ADDING A NEW HARD DISK .......................................................................................... 70
9.1 SELECTING A HARD DISK ......................................................................................................................... 70
9.2 CREATING A NEW PARTITION................................................................................................................... 70
9.3 DISK ADDING SCRIPT ............................................................................................................................... 71
CHAPTER 10. SCHEDULING......................................................................................................................72
10.1 CREATING SCHEDULED TASKS ............................................................................................................. 72
10.1.1 Selecting partitions.......................................................................................................................... 72
Copyright © Acronis, Inc., 2000-2005
5
Contents
10.1.2
Selecting task periodicity................................................................................................................. 73
10.1.3 Setting up daily execution ............................................................................................................... 74
10.1.4 Setting up weekly execution............................................................................................................ 74
10.1.5 Setting up monthly execution.......................................................................................................... 75
10.1.6 Setting up one time execution.......................................................................................................... 76
10.1.7 Entering user name.......................................................................................................................... 77
10.1.8 Task scheduled successfully............................................................................................................ 77
10.2 MANAGING SCHEDULED TASKS............................................................................................................ 77
CHAPTER 11. COMMAND-LINE MODE AND SCRIPTING................................................................. 79
11.1 WORKING IN THE COMMAND-LINE MODE ............................................................................................. 79
11.1.1 Supported commands ...................................................................................................................... 79
11.1.2 TrueImageCmd.exe usage examples............................................................................................... 87
11.1.1 Command-line mode usage under DOS.......................................................................................... 88
11.2 SCRIPTING............................................................................................................................................ 88
11.2.1 Script execution parameters............................................................................................................. 88
11.2.2 Script structure................................................................................................................................. 89
11.2.3 Script usage examples ..................................................................................................................... 90
CHAPTER 12. OTHER OPERATIONS....................................................................................................... 91
12.1 CHECKING IMAGES............................................................................................................................... 91
12.1.1 Selecting image for checking........................................................................................................... 91
12.2 CREATING BOOTABLE MEDIA............................................................................................................... 92
12.3 VIEWING LOGS..................................................................................................................................... 92
CHAPTER 13. TROUBLESHOOTING....................................................................................................... 94
13.1 RECOVERING ACRONIS TRUE IMAGE ENTERPRISE SERVER.................................................................. 94
13.2 FREQUENTLY ASKED QUESTIONS ......................................................................................................... 94
13.3 TECHNICAL SUPPORT ........................................................................................................................... 97
6
Copyright © Acronis, Inc., 2000-2005
Introduction

Chapter 1. Introduction. General information

1.1 Acronis True Image Enterprise Server - complete solution for

corporate users
Acronis True Image Enterprise Server creates an exact disk image of your server for a complete backup, providing the most comprehensive and cost-effective server protection solution.
The disk image file includes all of the server disk data, including the operating system, programs, databases, configuration files, preferences, updates, security patches, and the like. After a fatal failure, you can restore the complete server drive contents to a known, working state or simply replace lost or corrupted files and folders.
Based on the exclusive Acronis Drive Snapshot technology, Acronis True Image Enterprise Server creates interrupting server operations.
With the Acronis True Image Management Console, you can manage image archives creation both locally and remotely, irrespective of the location of the server you want to image.
Acronis True Image Storage Server provides disk image creation on the tape drives connected to workstations and servers, where the Storage Server component has been installed.
live
server disk image without shutting down a server and
live
Fastest recovery
Acronis True Image Enterprise Server dramatically reduces server and workstations downtime in your network. Unlike traditional file-by-file backup solutions, Acronis True Image Enterprise Server disk imaging approach provides you with the fastest, bare-metal server recovery without time-consuming software reinstallations and reconfigurations.
Rapid ROI
Is server downtime costing you thousands dollars an hour? Acronis True Image Enterprise Server dramatically reduces IT costs by providing an easy, fast, and reliable way to return your server to its original state in minutes or to restore lost or damaged files and folders.
Copyright © Acronis, Inc., 2000-2005
7
Introduction
Disk cloning and new disk deployment
Acronis True Image Enterprise Server can be used to clone an image onto multiple servers. For example, let’s say a company purchased s everal servers and needs the same environment on each of them. Traditionally, the IT manager would install th e operating system and all programs on each system, th en configure the systems one at a time. Acronis True Image simplifies the process and saves time by creating a disk image of the first system. That image is then deployed onto the multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image Enterprise Server reduces the task to a few mouse clicks by duplicating an exact copy of the old disk onto a new one, adjusting partitions sizes automatically to fit the new hard disk.

1.2 Acronis True Image Enterprise Server key features

Acronis True Image Enterprise Server offers the following features:
Image creation and restoration without reboot in most cases Acronis True Image Enterprise Server images only the sectors that contain data,
so images are created in just a few minutes
Acronis True Image Enterprise Server supports a variety of IDE, SCSI, USB,
FireWire, and PC Card (formerly PCMCIA) storage media
Support for all hard disks, regardless of capacity Network tape drives support for images saving and restoring Full and incremental backups Support of basic and dynamic disk imaging Scheduled and periodical image creation Remote images creation Remote images restoring Remote images checking Remote scheduling of reserve image creation Scheduling group tasks for remote computers SCSI tape support Command-line mode support Logs viewing Databases work suspension for an image creation period Automatic or manual hard disk installation Partition relocation and resizing
8
Copyright © Acronis, Inc., 2000-2005
Introduction
Support for all Windows and Linux file systems, including FAT 16, FAT 32, NTFS,
Linux Ext2/Ext3, ReiserFS, Reiser4, Linux Swap, JFS, XFS; sector-based support for other operating systems
User-friendly Windows XP-like interface with full mouse support Comprehensive wizards simplify even the most complex operations Ability to create a hidden partition (the Acronis Secure Zone) where the IT
manager can store a copy of the disk image
Acronis Secure Zone remote managing Control of data compression levels, image volume splitting and password
protection
The ability to clone a disk drive so that multiple systems will have the exact
same base disk drive configuration and software
Adjustment of a priority for process of image creation Exception of paging/hibernate files from images in order to decrease th e image
file size
Partition/disk image integrity check before restoration Partition/disk file system integrity check after restoration E-mail or Windows Popup notification when backup is finished or if backup fails The ability to migrate data from one drive to another The ability to take an existing drive and prepare it to be redeployed as a new
system drive or a data drive
The ability to recover an entire disk, a specific partition, an individual folder or
an individual file
The ability to change a partition type, file system, size and location during
recovery
The ability to create a bootable diskette or CD as a system rescue disk OS-independent operation of Acronis True Image Enterprise Server from the
bootable diskette or CD.
Includes plug-in for Bart PE utility.

1.3 Acronis True Image Enterprise Server Architecture

Acronis True Image Enterprise Server includes the following components:
1. Acronis True Image Management Console — lets you install and manage the Acronis True Image Agent on a remote machine: cr eates partition/dis k backups, schedules data backup, etc.
2. Acronis License Server is designed to manage Acronis enterprise product licenses from a single location
Copyright © Acronis, Inc., 2000-2005
9
Introduction
3. Acronis True Image Agent — installs on a remote system to enable access from Acronis True Image Management Console
4. Acronis True Image Storage Server — allows you to get a remote access to data storage devices (especially tape drives) connected to the PC (workstation or server) with the Acronis True Image Storage Server component installed
5. Acronis True Image (local console) — creates backup copies of partitions/disks and restores data from them if needed
6. Acronis Bootable Rescue Media Builder — creates bootable discs (or diskettes) to enable partition/disk data restoration, even if t he operating system is corrupted.
Also Acronis True Image Enterprise Server includes the utilities for work in a command-line mode and for scripts creation and performance.

1.4 Supported security standards

Acronis True Image Enterprise Server fully supports all security standards used in both local and server versions of the Windows Operating System.
For more information on setting up security parameters for Acronis True Image Enterprise Server in your enterprise network, read section 2.7 of this Guide.

1.5 Software usage terms and conditions

The conditions for Acronis True Image Enterprise Server software usage are described in the «License Agreement» (page 3 of this manual). A set of unique serial keys, supplied with the product, is the confirmation of the legal purchase and use of the suite.
Under current legislation, the «License Agreement» is considered a contract between the user and software vendor. The contract is a legal document and its violation may result in legal action.
Illegal use and/or distribution of this software will be prosecuted.
10
Copyright © Acronis, Inc., 2000-2005
Chapter 2. Installation and running
2.1 System requirements
Acronis True Image Enterprise Server requires the following hardware:
Pentium processor or higher 128 Mb RAM FDD or CD-RW drive for bootable media creating
Mouse (recommended).

2.2 Supported operating systems

Acronis True Image:
Windows NT SP6/2000/XP

Installation and running

Windows NT 4.0 Server SP6/2000 Server/2000 Advanced Server/2003 Server
Acronis True Image Agent:
Windows 98/Me Windows NT SP6/2000/XP Windows NT 4.0 Server SP6/2000 Server/2000 Advanced Server/2003 Server
Acronis True Image Storage Server:
Windows NT SP6/2000/XP Windows NT 4.0 Server SP6/2000 Server/2000 Advanced Server/2003 Server
Acronis True Image Management Console:
Windows 98/Me Windows NT SP6/2000/XP Windows NT 4.0 Server SP6/2000 Server/2000 Advanced Server/2003 Server
Acronis Components remote installation and connection is not supported in MS Windows XP Home Edition through this operating system's limitations.
For more information about Acronis components remote installation see section 3.2 of this manual.
Copyright © Acronis, Inc., 2000-2005
11
Installation and running

2.3 Supported file systems and media

2.3.1 Supported file systems
Acronis True Image Enterprise Server supports the following file systems:
FAT16/32 NTFS Ext2/Ext3 ReiserFS Reiser4 Linux SWAP XFS JFS
If a file system is not supported or is corrupted, Acronis True Image Enterprise Server can copy data using a sector-by-sector approach.
For XFS, JFS and Reiser4 file systems partition resizing feature is not supported.
2.3.2 Supported media
Acronis True Image Enterprise Server supports any local, network and removable media, including:
Local and networked hard drives Tape drives Tape drives connected to the remote PC IDE and SCSI RAID controllers of any level CD-R/RW drives DVD+R/RW, DVD-RW (DVD burning software required) USB and FireWire (IEEE-1394) storage devices Magneto-optical media, Iomega ZIP/Jaz, etc.
2.4 License policy
12
Acronis True Image Enterprise Server licensing is based on the number of servers on which Acronis True Image Agent and/or Acronis True Image (local console) are to be installed. In other words, you need one license for ea ch server you are going to backup, whether you will control it on-site (with local console) or remotely (using Acronis True Image Agent), or use both ways of control. The number of Acronis
Copyright © Acronis, Inc., 2000-2005
Installation and running
True Image Management Console, Acronis License Server and Acronis True Image Storage Server installations is not counted.
To manage the corporate license information, you must install Acronis License Server and import the license data (serial keys) bundled with your Acronis True Image Enterprise Server copy (see 2.6 “Using License Server Management Tool”). If you buy more licenses, import the additional serial keys as well.
Acronis License Server can import multiple serial numbers from a .txt file, saving you from time-taking procedure of typing in serial keys.

2.5 Acronis True Image Enterprise Server installation

2.5.1 Installing Acronis True Image Enterprise Server components

To install Acronis True Image Enterprise Server components:
run the Acronis True Image Enterprise Server setup file in the Install Menu, select the program to install: Acronis True Image
Management Console, Acronis License Server, Acronis True Image Agent, Acronis True Image Storage Server or Acronis True Image Enterprise Server (here: a standalone component for a local server, called in this guide ‘local
console’ or ‘Acronis True Image’) follow the Install Wizard instructions on the screen. It is recommended that you install Acronis License Server first. You will not be able
to install Acronis True Image Agent or Acronis True Image Enterprise Server onto the current or remote computer until you impor t the serial key into Acronis License Server (see 2.6 “Using License Server Management Tool”).
When the Specify License Server window appears, specify the License Server for license validation. It can be found automatically on the local network or specified manually (type in the DNS-name of the computer with Acronis License Server installed, or its IP-address).
Copyright © Acronis, Inc., 2000-2005
13
Installation and running
When installing a component onto Windows 9x-based system, you may be prompted to install Microsoft Installer utility (the later Windows operating systems come with this utility built-in) . Choose Yes to install Microsoft Installer, included into Acronis True Image Enterprise Server pack.
Acronis True Image Enterprise Server Install Menu Window
For Acronis True Image Enterprise Server and Acronis True Image Agent, Typical, Custom and Complete installation is available. Having pressed Custom, you can choose to install, besides the main component, Rescue Media Builder and Bart PE plug-in for Acronis True Image Enterprise Server, or Acronis Secure Zone
manager for Acronis True Image Agent. With Rescue Media Builder you can create bootable rescue disks (see 12.2). Well-known Bart PE utility is used to boot Windows-like environment from CD.
Applications are installed into Bart PE in the form of plug-ins. Choosing Bart PE plug-in installation (disabled by default) provides the ability to include Acronis True Image Enterprise Server into Bart PE plug-in tab. The plug-in files will be placed into the component installation folder along with other program files.
Acronis Secure Zone manager lets you create, delete and resize a special hidden partition for storing disk and partition images (see 3.7).
When installing Acronis True Image Agent onto Windows 98/Me-based system, you must provide username and password, required for Acronis True Image Management Console remote access to this system. More about access control in
2.7.
14
Copyright © Acronis, Inc., 2000-2005
g
When installed, Acronis True Image (local console) creates a new device in the Device Manager list (Control Panel System Hardware Device Manager Acronis Devices Acronis TrueImage Backup Archive Explorer). Do not disable or uninstall this device, as it is necessary for connecting images as virtual disks (see Chapter 7 “Browsin and restoring particular files” of this manual).
Installation and running

2.5.2 Extracting Acronis True Image Enterprise Server components

You may want to save setup (.msi) files for each Acronis True Image Enterprise Server component separately on a local or network drive. Then you wi ll be able to install the components in the command-line mode using msiexec.exe utility. It also will help to modify or recover the existing component installation.
To save a setup file:
run the Acronis True Image Enterprise Server setup file; in the Install Menu, right-click on the component name and select Extract; select location for setup file and click Save.

2.6 Using License Server Management Tool

Acronis License Server includes special command-line utility LicenseServerCmdLine.exe for managing license information. Using this tool, you can look through and add information on available licenses.
After Acronis License Server installation LicenseServerCmdLine.exe is located in the installation folder, e. g. C:\Program Files\Acronis\LicenseServer.
LicenseServerCmdLine.exe uses the following syntax:
LicenseServerCmdLine [option] [parameter1] [parameter2]
LicenseServerCmdLine.exe supported options and usage:
--list
Displays the list of the License servers available in the local network.
--status [server name or server IP-address]
Displays specified License Server status.
--import [server name] [serial key]
Adds information about new license (new serial key). You can specify multiple serial numbers (space separated).
--import-file [server name] [filename]
Copyright © Acronis, Inc., 2000-2005
15
Installation and running
Imports license serial keys from .txt file.
--help
Shows help information.
2.7 Setting up security parameters for Acronis True Image Enterprise Server

2.7.1 Usernames and passwords

Acronis True Image Enterprise Server fully supports all security standards used in Windows:
1. If a remote PC has Windows NT SP6/2000/XP OS installed, the Acronis True Image Agent can be accessed according to the security policy set up in the local network. To have remote access to Acronis True Image Agent, the user must be a member of the Administrators or Backup operators group on this computer.
It is highly recommended that you create an administrator’s or backup operator’ s accounts with the same username and password on all networked computers for remote access to the Acronis True Image Agent.
2. If a remote PC has Windows 98/Me installed without its own security system, you will need to provide a username and password during installation of the Acronis True Image Agent that will be used by Acronis True Image Management Console.
2.7.2 Firewall setup
Acronis True Image Enterprise Server uses the following ports and IP addresses for remote operation:
server (Acronis True Image Agent) UDP port: 9876
server (Acronis True Image Agent) TCP port: 9876, if busy
chose port at random
client (Acronis True Image Management Console) UDP port:
9877, if busy chose port at random
IPv4 multicast address: 239.255.219.45
16
IPv6 multicast address: FF05::fAA5:741E.
You might have to set the appropriate firewall access options. Options for the Windows Firewall, included in Windows XP Service Pack 2, are set automatically during Acronis True Image Enterprise Server components installation. However, make sure that the option File and Printer Sharing in the Control panel
Copyright © Acronis, Inc., 2000-2005
Installation and running
Windows Firewall Exceptions is enabled on the remote computer, before th e remote operation starts.

2.7 Running Acronis True Image Enterprise Server components

2.7.1 Running Acronis True Image

To run Acronis True Image on a local computer, select Start Programs Acronis True Image Acronis True Image Enterprise Server or click on
the appropriate shortcut on the desktop
.

2.7.2 Running Acronis True Image Management Console

To run Acronis True Image Management Console, select Start → Programs
Acronis True Image Acronis True Image Management Console.

2.8 Removing Acronis True Image Enterprise Server components

You can remove any Acronis True Image Enterprise Server component separately by selecting Control panel Add or remove programs <The component name> Remove. Then follow the instructions on the screen.
Copyright © Acronis, Inc., 2000-2005
17

Using Acronis True Image Management Console

Chapter 3. Using Acronis True Image
Management Console
3.1 General information
Acronis True Image Management Console is the primary tool for managing data backups on remote computers with the Acronis True Image Agent installed.
Acronis True Image Management Console enables you to perform the following:
Connect to a remote PC that has the Acronis True Image Agent installed Create partition/disk images to be able to quickly restore OS and user data in
case of any software or hardware failures
Restore remote partition/disk (except system partitions) Manage Acronis Secure Zone on a remote PC Setup notifications receiving about results of backup operations on the remote
computer
Stop and Launch Windows NT SP6/2000/XP services during an image file
creation
Check image integrity independently wherever they reside, be it local, network
or removable media
Schedule backup operations Schedule group tasks for remote PCs Install, update or remove Acronis True Image Enterprise Server components on
remote PCs (requires appropriate access rights)
Browse logs of all problems arisen during Acronis True Image Agent operation Create bootable CD or diskettes to be able to restore images even if OS is
corrupted
18
Copyright © Acronis, Inc., 2000-2005
Acronis True Image Management Console main window
Using Acronis True Image Management Console

3.2 Installing Acronis components onto a remote machine

Acronis True Image Management Console allows you to install Acronis components onto remote computers, connected to the corporate network.
Using the Acronis True Image Management Console you can install remotely:
Acronis License Server Acronis True Image Agent Acronis True Image Acronis Storage Server
To install any Acronis component to a remote machine using the Acronis True Image Management Console you will need administrator rights on the target machine.
To install Acronis components: Select the Install Acronis components item in the central part of Acronis
True Image Management Console main window or a similar item on the Tools sidebar or the main menu
Select the installer location from the list (Registered Components, Search
removable media or Specify location)
Select the Acronis component and specify the componen t features you want to
install
If the Specify License Server window appears, specify the License Server for
license validation. It can be found automatically on the local network or specified
Copyright © Acronis, Inc., 2000-2005
19
Using Acronis True Image Management Console
g
manually (type in the DNS-name of the computer with Acronis License Server installed, or its IP-address)
Specify network name or IP address of the machine on which Acronis
component is to be installed. You can also select a PC from the list of available using Browse… button. At that point you will have to provide administrator username and password
The Acronis component then will be installed to the remote PC you specified If you checked Reboot the remote computer box during the Acronis True
Image Agent and Acronis True Image installation, the remote machine will reboot. Otherwise you will see the corresponding message.
Remote installation of Acronis True Image Agent
You can remotely install Acronis components only onto machines working under Windows NT SP6/2000/XP (includin installation of Acronis True Image Agent.
If the remote PC runs under Windows XP, make sure the option Use simple file sharing in the Con trol panel Folder options View is disabled before the remote installation starts.
If the remote PC runs under Windows XP with Service Pack 2 installed, make sure that the option File and Printer Sharing in the Control panel Windows Firewall Exceptions is enabled before the remote installation starts.
server versions). Windows 98/Me machines will require local

3.3 Connecting to a remote PC

After you install Acronis True Image Agent on a remote PC, you will see it in the list of machines to which you can connect from the Acronis True Image Management Console. Use View Computers to access this list.
To establish a remote connection, you will need to: Select New connection in the Remote management sidebar section of
Acronis True Image Management Console main window or the associated menu or toolbar items. You can also establish a connection using context menu
20
Copyright © Acronis, Inc., 2000-2005
Using Acronis True Image Management Console
invoked by right-clicking the desired machine name in t he View Computers list
Specify PC network name or select a PC using Browse… button Enter administrator or backup operator username and password After connection is established, in the central part of Acronis True Image
Management Console main window you will see a list of operations available:
Main window of Acronis True Image Management Console when connected to a
remote PC
If Windows 98/Me is running on a remote PC, while the PC user has not logged in the network, tasks, requiring network access, cannot be selected for this PC. For example, it is not possible to create the PC disk image on a network drive.
After you perform all necessary operations on the remote PC, click Disconnect in the Remote management sidebar section.
3.4 Creating partition/disk images on a remote PC
After establishing a connection with a remote PC, you can create images of any PC partitions/disks.
To perform this operation select Create image in the main window.
Copyright © Acronis, Inc., 2000-2005
21
Using Acronis True Image Management Console
g
g
Create Image Wizard Window
This is described in detail in Chapter 5 «Creating a partition (disk) image». You can keep an image file on the remote PC, any other networked PC, or on
removable media.
Install Acronis True Image Storage Server component if you are to create backup ima tape drive, connected to any networked (remote) PC.
Attention!!! When creating an image using Storage Server, always choose Incremental image creation, even if you need a full ima this tape, will be erased.
3.5 Checking image integrity
Having created an image, you can use Acronis True Image Agent to check its integrity. Here is the procedure:
1. Connect to a remote PC with Acronis True Image Agent installed
2. Run Check Image Wizard by selecting the respective item in the main
application window
3. Follow Wizard instructions. For more information on checking image integrity, see section 12.1 of this Guide.
3.6 Remote image restoring
With Acronis True Image Management Console you can restore partitions (logical drives) from images onto remote PCs.
e on a
e. Otherwise other computers images, stored on
For more information on restoring a disk (partition) from image files, see Chapter 6 of this guide.
Attention! Using Acronis True Image Management Console you can remotely restore any disk partition, except system partition.
22
Copyright © Acronis, Inc., 2000-2005
Using Acronis True Image Management Console

3.7 Acronis Secure Zone remote managing

With Acronis True Image Management Console you can operate (create, resize, delete) Acronis Secure Zone on a remote PC;
Acronis Secure Zone is a special hidden partition for storing disk and partition images. Usual applications can’t access it for image security purposes. It can be used to store both images, and data, considering its properties.
To manage Acronis Secure Zone on a remote PC you n eed:
Connect to remote PC Select Man age Acronis Secure Zone item and run Manage Acronis Secure
Zone Wizard.
Full information on operations with Acronis Secure Zone you can find in the section
4.2 of this guide.
3.8 Scheduling image creation
Using Acronis True Image Agent installed on a remote machine, you can schedule and edit backup tasks on it.
You will need to: Establish connection to the remote PC using Acronis True Image Management
Console
Select View Active tasks in the main menu. You will see a new window with
all scheduled backup tasks. If no tasks have been created, the list will be empty
Click Schedule Task in the Active Tasks section to invoke Schedule Task
Wizard
Follow Wizard instructions to create and set up new partition/disk backup task You can edit newly created tasks later: change partitions to backup or time to r un
the task at. For more information on scheduling partition/disk image creation see Chapter 10
«Scheduling» of this Guide.

3.9 Scheduling group backup tasks

You can create a backup task for several remote computers at once. Select New Group Task from Remote management sidebar section of
Acronis True Image Management Console main window. Create Group Task Wizard window appears to guide you through the task creation procedure.
Form a group for the current task: check computers in the list of remote
computers.
Select disks/partitions to backup. You can select any combination of hard disks
(by number, according to Windows numeration) and partitions (by letter); or All
Copyright © Acronis, Inc., 2000-2005
23
Using Acronis True Image Management Console
hard disks. This setting is applied to every computer in the group, so having a standard (similar) disks/partitions layout on remote computers would be a plus.
Select disk/partitions to image
Specify a path to backup image files. To place every image on its local
computer, input Local path or select Acronis Secure Zone, if there is such a zone on every remote computer. For more information about creating and managing Acronis Secure Zone see 3.7 «Acronis Secure Zone remote managing». To place images on network, check Network path and select the target folder. You should also provide image file name, unless the image is targeted to Acronis Secure Zone.
Specify a usual set of backup options: image mode (full or incremental), image
password, image file splitting, compression level and co mments.
Select when you would like this task to be started. The scheduling procedure is
almost the same for individual and group tasks, see Chapter 10 «Scheduling» for details.
If on any reason (traffic limitation, for example) you do not want the task to
start on all computers simultaneously, set Start time shift parameter. The task will start on all computers in turn, with time shift you specify. As soon as you select time shift, the resulting task start time for the first and the last comp uter will be displayed.
Now enter the username and password. It is suppos ed, that accounts with same
username and password exist on all computers of the group (computers, running Windows 98/Me, must get this username/password during Acronis True Image Agent installation). In this case, the task will be automatically distributed to computers. Otherwise, you will be asked for username/password to every computer in process of distribution.
24
At the final step, group task script is displayed. Until now, you may click Back to
make changes in the created task.
Copyright © Acronis, Inc., 2000-2005
Group task script
Using Acronis True Image Management Console
After you click Proceed, Acronis True Image Management Console con nects to
every computer of the group in turn to distribute the t ask. If a remote compute r is inaccessible (shut down, for example), a dialog box appears. In this box, choose Ignore to exclude the computer from th e group or Cancel to cancel the entire task.
When distribution is completed, you may connect to any computer to see its
individual task, based on the group task you successfully created.
You can see the group task list, edit or delete group tasks, using Edit Group Task and Delete Group Task options. When editing or d eleting a group task, enter the same username and password you entered when created the task.
3.10 Browsing logs
Using Acronis True Image Agent on a remote machine you can view results of image creation operations, both real-time and scheduled.
This is possible thanks to logs that can be accessed by clicking Show log in the main window after connection to a desired remote PC is established.
Copyright © Acronis, Inc., 2000-2005
25
Using Acronis True Image Management Console
Log Viewer window
The log window has two panels: log entries are listed on the left while selected log content is on the right.
The left panel can contain up to 50 lines. If there are more, you can browse the list using
Prev message and Next message buttons.
To delete an obsolete log entry, select it and click
Delete selected log entry.
If any operation stage finished with an error, this entry will be marked with a red circle with a white cross inside.
The right panel contains the list of performed operations that can be flexibly adjusted for your taste. You can filter messages, columns or sort operations by any column.
To sort messages by a column click its header (click again to reverse order) or click Arrange icons by… button and select the desired column.
To filter columns, right-click column header line or left-click
Choose Details...
button and select columns to view or deselect those to filter out. Three buttons to the left control message output: the one with a white cross in the
red circle shows/hides error messages, the one with an exclamation mark in the yellow triangle shows/hides warnings, while the button with an "i" in the blue circle controls information messages.
You can also adjust column width by dragging borders with mouse.
3.11 Operation results notification
26
Copyright © Acronis, Inc., 2000-2005
Sometimes the backup procedure on a remote PC can requir e 30 minutes or more. Acronis True Image Enterprise Server can notify you about backup results, when it’s finished, by using the WinPopup service or by sending you an email.
To set up Email notification, click Remote Computer Options in the main window. Options window will appear. Select Email from the tree menu.
To set up WinPopup notification, click Remote Computer Options in the main window. Options window will appear. Select Windows Messenger (WinPopup) from the tree menu.
Using Acronis True Image Management Console
3.12 Stopping and launching Windows NT SP6/2000/XP services during an image file creation
A number of services in Windows, including mail and database servers, such as MS Exchange or MS SQL Server, work with a plenty of constantly open fil es. Therefore many system administrators prefer to end working process of the given services at the backup moment (image file creation).
To solve this problem you have to create the batch files. Batch files help you to stop the chosen services and then automatically launch them agai n directly in the Acr oni s True Image Enterprise Server.
For more information on stopping and launching services see section 5.11 of this Guide.

3.13 Updating Acronis True Image Agent

Acronis True Image Management Console enables you to update Acronis True Image Agent on a remote PC.
To do this, connect to the desired PC and select Update Acronis remote agent in the main window and follow Wizard instructions.
This section allows you to re-install Acronis True Image Agent from selected PC. To update and re-install Acronis True Image Agent, you will need to connect to it
with administrator rights.
3.14 Creating bootable media using Acronis True Image Management Console
Acronis True Image Management Console also enables you to create bootable CDs or diskettes that can be used to restore images even if the OS is corrupted due to software or hardware failures.
To create bootable media:
Run Acronis True Image Management Console Select Create bootable rescue media from the Tools menu or the sidebar, or
click the appropriate button on the toolbar
Copyright © Acronis, Inc., 2000-2005
27
Using Acronis True Image Management Console
This will invoke Acronis Bootable Rescue Media Builder. In the process you will
be prompted to select the full or safe loader version. The latter does not include USB, PC Card (PCMCIA), or SCSI drivers and is meant for situations when the full version does not work
Having created a bootable disc or diskettes, identify it and keep in a safe place.
Acronis Bootable Rescue Media Builder
28
Copyright © Acronis, Inc., 2000-2005

Running Acronis True Image (locale console)

Chapter 4. Running Acronis True Image
(locale console)

4.1 Main program window

The main program window contains the menu, the toolbar, the sidebar, the main area and the Tasks area. The main area contains operation icons, the sidebar features Tools and Help panels.
Most of the operations are represented two or even three times in different window areas, providing several ways of their selection for more convenience.
For example, you can execute the necessary operation by clicking its icon in the main area or by selecting the same item from the Operations or the Tools menu.
The main window contains operation icons divided into two groups. The Task for Local Computer group contains disk image operations:
Create Image – create a disk (partition) image. Restore Image – restore a disk (partition) from a previously created image. Disk Clone – transfer OS, applications and data from the old disk to the new one.
Copyright © Acronis, Inc., 2000-2005
The main program window
29
Running Acronis True Image (locale console)
Add New Disk – add the new disk for data storage leaving OS and applications on the old one.
The Tools group contains the following items:
Explore Image – connect an image as a virtual drive. Unplug Image – disconnect connected virtual drive. Check Image – runs disk (partition) integrity checking procedure. Show Log – opens a window with logs. Manage Acronis Secure Zone – creates Acronis secure zone on a disk that is a
special hidden partition for storing disk (partition) images. Activate Acronis Startup Recovery Manager – activates the boot restoration
manager.
Program menu
The program menu line contains the Operations, View, Tools, and Help items. The Operations menu contains list of the available operations and scheduled tasks. The View menu contains items for managing the program window look:
Toolbars – contains commands that control toolbar icons. Common Task Bar – enables/disables common task panel in the left area. Active Tasks – shows/hides scheduled tasks window.
The Tools menu contains the following items: Manage Acronis Secure Zone – creates Acronis secure zone on a disk that is a
special hidden partition for storing disk (partition) images. Activate Acronis Startup Recovery Manager – activates the boot restoration
manager.
Check Image – runs disk (partition) integrity checking procedure. Show Log – opens a window with logs. Create Bootable Rescue Media – runs bootable media creation procedure. Options – font and email/WinPopup notification settings
The Help menu is used to invoke help and information about Acronis True Image Enterprise Server.
Status bar
In the bottom of the main window there is a status bar divided i nto two parts. The left part briefly describes the selected operation; the right one indicates image operations progress and results.
30
Copyright © Acronis, Inc., 2000-2005
Loading...
+ 67 hidden pages