Acronis True Image for MS SBS User Guide

User's Guide
Acronis
®
True Image
for Microsoft Small Business Server
Compute with confidence
Copyright © Acronis, Inc., 2000-2008. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Activ e
restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective
owners. Distribution of substantively modified versions of this document is prohibited without t he
explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for
commercial purposes is prohibited unless prior permission is obtained fr om the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
2 Copyright © Acronis, Inc., 2000-2008
ACRONIS, INC.
End User License Agreement (EULA)
BEFORE INSTALLING AND USING THE SOFTWARE PRODUCT WHICH EITHER YOU HAVE DOWNLOADED OR IS CONTAINED ON THESE DISKS (“SOFTWARE”) YOU SHOULD CAREFULLY READ THE FOLLOWING LICENSE AGREEMENT (“AGREEMENT”) THAT APPLIES TO THE SOFTWARE. CLICK “ACCEPT” IF YOU FULLY ACCEPT AND AGREE TO ALL OF THE PROVISIONS OF THIS AGREEMENT. OTHERWISE, CLICK “DO NOT ACCEPT.” CLICKING “ACCEPT” OR OTHERWISE DOWNLOADING, INSTALLING AND OR USING THE SOFTWARE ESTABLISHES A BINDING AGREEMENT BETWEEN YOU AS THE PERSON LICENSING THE SOFTWARE (THE "LICENSEE") AND ACRONIS, INC. LOCATED AT: ACRONIS INTERNATIONAL GMBH VERWALTUNG EURO HAUS RHEINWEG 5 SCHAFFHAUSEN, SWITZERLAND CH-8200, ("LICENSOR"). IF YOU DO NOT ACCEPT ALL OF THE TERMS OF THIS AGREEMENT, YOU SHALL HAVE NOT RIGHT TO DOWNLOAD, INSTALL AND/OR USE THE SOFTWARE AND MUST DELETE THE SOFTWARE AND ASSOCIATED FILES IMMEDIATELY.
This Agreement applies to the Software, whether licensed under a Software License and/or an Evaluation License, each as defined and described below:
purchase of a license to the Software, LICENSOR grants and LICENSEE accepts a nonexclusive, nontransferable,
Purchased License of Software
nonassignable license to use Software only for LICENSEE’s own internal use solely on the specific number of Hardware (as defined below) licensed owned, leased or otherwise controlled by LICENSEE. LICENSEE may make one copy of Software only for archival purposes, only in machine readable form, provided that such archival copy is only used for archival purposes and never in a production environment and is marked with every notice on the original Installation of Software is LICENSEE’s responsibility. The license described in this section shall be referred to as a “Software License”).
. Subject to the terms and conditions of this Agreement, upon
Evaluation License of Software: The LICENSEE has the right to evaluate the Software for a period of
time not to exceed fifteen (15) days (the “Evaluation Period’) unless extended by LICENSOR. Software licensed under this Evaluation License may not be used in a production environment. There will be no charge to the LICENSEE for said evaluation of the Software under this Evaluation License. At the conclusion of the Evaluation Period, unless a Software License to the Software is purchased, the LICENSEE will delete the Software from its systems and have no further license or other rights with respect to the Software except as to the rights and responsibilities in this Agreement. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, PUNITIVE, OR CONSEQUENTIAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER THE EVALUATION LICENSE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. The following sections of this Agreement also apply to Evaluation License(s) of the Software:
Limitations, Confidentiality Miscellaneous. The license described in this section shall be referred to as an “Evaluation License”).
, Disclaimer of Warranties, LICENSEE Indemnity, Law, Export Restrictions, and
Use Rights: Assigning the License
that license to one of your PCs or Servers (depending upon the license you have purchased or are evaluating and such purchase or evaluation is based upon the operating system on which that hardware operates, such PCs or Servers shall be referred to as the “Hardware”). That Hardware is the licensed Hardware for that particular Software license. You may assign other Software Licenses to the same Hardware, but you may not assign the same Software License to more than one Hardware except as identified herein.
You may reassign a Software License if you retire the licensed Hardware due to permanent Hardware failure. If you reassign a Software License, the Hardware to which you reassign the license becomes the new licensed Hardware for that particular Software License.
. Before you run any instance of the Software under a Software License, you must assign
Running Instances of the Hardware Software. You have the rights to run the Software on one piece of
Hardware as defined above. Every Hardware creating an image and every Hardware to which an image is either deployed to or restored from must have a valid license. In the case of Universal Deploy or Universal Restore, every time an image is deployed or restored (as appropriate to either Universal Restore or Universal Deploy), to Hardware that is dissimilar to the Hardware from which the image was originally created, a valid license of the Universal Deploy or Universal Restore is required.
You have the rights below for each Software License you assign:
Standard Software license. A standard Software License is the general license that is available to LICENSEE.
Unless the Virtual Edition Software is purchased, you have purchased the standard Software License and may run on the licensed Hardware, at any one time as follows:
Copyright © Acronis, Inc., 2000-2008 3
One (1) instance of the Hardware installed Software in one physical operating system environment; and
Up to four (4) instances of the Hardware installed Software in virtual operating system environments (only
one (1) instance per virtual operating system environment).
If you run all five (5) permitted instances at the same time, the instance of the Hardware installed Software running in the physical operating system environment may be used only to run hardware virtualization software and to manage and service operating system environments on the licensed Hardware.
Virtual Edition. Virtual Edition (as identified by the product name (for example, True Image Virtual Edition)) is
licensed by physical Hardware. You may run on the licensed Hardware, at any one time as follows:
One instance of the Hardware software in one physical operating system environment; and
As many instances of the Hardware software in virtual operating system environments.
Support. If LICENSEE is under a current support contract with LICENSOR with respect to the Software and is
current in paying all amounts due thereunder, LICENSOR shall make available to LICENSEE the support described in this paragraph (the “Support”) on a twenty four (24) hours a day, seven (7) days per week basis. Support shall consist of: (i) supplying telephone or other electronic support, as determined by LICENSOR in its sole discretion, to LICENSEE in order to help LICENSEE locate and, on its own, correct problems with the Software and (ii) supplying all extensions, enhancements and other changes that LICENSOR, at its sole discretion, makes or adds to the Software and which LICENSOR makes generally available, without additional charge, to other licensees of the Software that are enrolled in Support. Upon mutual written agreement by both parties, LICENSOR may, but shall not be required to: (i) supply code corrections to LICENSEE to correct Software malfunctions in order to bring such Software into substantial conformity with the published operating specifications for the most current version of the Software unless LICENSEE’s unauthorized modifications prohibit or hamper such corrections or cause the malfunction; or (ii) supply code corrections to correct insubstantial problems at the next general release of the Software.
Limitations. Notwithstanding any references to “purchase” , the Software is licensed and not sold pursuant to this
Agreement. This Agreement confers a limited license to the Software and does not constitute a transfer of title to or sale of all or a portion of the Software, and LICENSOR retains ownership of all copies of the Software. LICENSEE acknowledges that the Software contain trade secrets of LICENSOR, its suppliers or licensors, including but not limited to the specific internal design and structure of individual programs and associated interface information. Accordingly, except as otherwise expressly provided under this Agreement, LICENSEE shall have no right, and LICENSEE specifically agrees not to: (i) transfer, assign or sublicense its license rights to any other person or entity, or use the Software on ay equipment other than the Hardware, and LICENSEE acknowledges that any attempted transfer, assignment, sublicense or use shall be void; (ii) make error corrections to or otherwise modify or adapt the Software or create derivative works based upon the Software, or permit third parties to do the same; (iii) reverse engineer or decompile, decrypt, disassemble or otherwise reduce the Software to human-readable form, except to the extent otherwise expressly permitted under applicable law notwithstanding this restriction; (iv) use or permit the Software to be used to perform services for third parties, whether on a service bureau or time sharing basis or otherwise, without the express written authorization of LICENSEE; or (v) disclose, provide, or otherwise make available trade secrets contained within the Software in any form to any third party without the prior written consent of LICENSOR.
Confidentiality. The Software is a trade secret of LICENSOR and is proprietary to LICENSOR. LICENSEE shall
maintain Software in confidence and prevent disclosure of Software using at least the same degree of care it uses for its own similar proprietary information, but in no event less than a reasonable degree of care. LICENSEE shall not disclose Software or any part thereof to anyone for any purpose, other than to employees for the purpose of exercising the rights expressly granted under this Agreement. License shall not, and shall not allow any third party to, decompile, disassemble or otherwise, reverse engineer or attempt to reconstruct or discover any source code or underlying ideas, algorithms, file formats or programming or interoperability interfaces of Software or of any files contained or generated using Software by any means whatsoever. The obligations under this paragraph shall survive any termination of the Agreement.
Disclaimer of Warranties. THE SOFTWARE IS PROVIDED “AS IS” AND LICENSOR DISCLAIMS ALL
WARRANTIES, EXPRESSED OR IMPLIED WITH RESPECT TO SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT OF THIRD PARTIES’ RIGHTS, AND FITNESS FOR A PARTICULAR USE. WITHOUT LIMITING THE FOREGOING, LICENSOR DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN SOFTWARE WILL OPERATE IN THE COMBINATION LICENSEE SELECTS, THAT OPERATION OF SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE AND/OR THAT DEFECTS IN THE SOFTWARE WILL BE CORRECTED. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY LICENSEE. FURTHERMORE, LICENSOR DOES NOT WARRANT OR MAKE ANY RE PRESENTATIONS REGARDING THE U SE OR THE RESULT S OF THE USE OF THE SOFTWARE OR RELATED DOCUMENTATION IN TERMS OF THEIR CORRECTNESS, ACCURACY, RELIABILITY, CURRENTNESS, OR OTHERWISE. NO ORAL OR WR ITTEN INFORMATION OR ADVICE GIVEN
4 Copyright © Acronis, Inc., 2000-2008
BY LICENSOR SHALL CREATE A WARRANTY OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY.
Liability Limitations. LICENSOR SHALL NOT BE LIABLE FOR ANY SPECIAL, INDIRECT, PUNITIVE, OR
CONSEQUENTIAL DAMAGES RESULTING FROM USE OF SOFTWARE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY. LICENSOR’S CUMULATIVE LIAB ILIT Y FOR DAMAGE S HEREUNDER, WHETHER IN AN ACTION IN CONTRACT, WARRANTY, TORT, NEGLIGENCE, STRICT LIABILITY, INDEMNITY, OR OTHERWISE, SHALL IN NO EVENT EXCEED THE AMOUNT OF LICENSE FEES PAID BY THE LICENSEE FOR THE SOFTWARE LICENSED UNDER THIS AGREEMENT. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
LICENSEE Indemnity. LICENSEE agrees to indemnify and defend LICENSOR, and hold it harmless from all
costs, including attorney’s fees, arising from any claim that may be made against LICENSOR by any third party as a direct or indirect result of any use by LICENSEE of the Software,
Termination. This Agreement and the license may be terminated without fee reduction (i) by LICENSEE without
cause on thirty (30) days notice; (ii) by LICENSOR, in addition to other remedies, if LICENSEE is in default and fails to cure within ten (10) days following notice; (iii) on notice by either party hereto if the other party ceases to do business in the normal course, becomes insolvent, or becomes subject to any bankruptcy, insolvency, or equivalent proceedings. Upon termination for any reason, LICENSEE shall immediately return Software and all copies to LICENSOR and delete all Software and all copies from the Hardware.
Law. This Agreement shall be governed by the laws of the Commonwealth of Massachusetts, exclusive of its
conflicts of laws provisions and without regard to the United Nations Convention on Contracts for the International Sale of Goods, and any suit under this Agreement shall exclusively be brought in a federal or state court in Massachusetts. Any action against LICENSOR under this Agreement must be commenced within one year after such cause of action accrues.
Government End Users. This provision applies to all Software acquired directly or indirectly by or on behalf of the
United States Government. The Software is a commercial product, licensed on the open market at market prices, and was developed entirely at private expense and without the use of any U.S. Government funds. If the Software is supplied to the Department of Defense, the U.S. Government acquires only the license rights customarily provided to the public and specified in this Agreement. If the Software is supplied to any unit or agency of the U.S. Government other than the Department of Defense, the license to the U.S. Government is granted only with restricted rights. Use, duplication, or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c) of the Commercial Computer Software Restricted Rights clause of FAR 52.227-19.
Export Restriction. LICENSEE will not remove or export from the United States or the country originally shipped
to by LICENSOR (or re-export from anywhere) any part of the Software or any direct product thereof except in compliance with applicable export laws and regulations, including without limitation, those of the U.S. Department of Commerce.
Miscellaneous. This Agreement contains the entire understanding of the parties and supersedes all other
agreements, oral or written, including purchase orders submitted by LICENSEE, with respect to the subject matter covered in this Agreement The delay or failure of either party to exercise any right provided in the Agreement shall not be deemed a waiver. All notices must be in writing and shall be delivered by hand (effective when received) or mailed by registered or certified mail (effective on the third day following the date of mailing). The notices addressed to LICENSOR shall be sent to its address set out above. If any provision is held invalid, all others shall remain in force. LICENSEE may not assign, pledge, or otherwise transfer this agreement, nor any rights or obligations hereunder in whole or in part to any entity. Paragraph headings are for convenience and shall have no effect on interpretation. In the event that it is necessary to undertake legal action to collect any amounts payable or to protect or to defend against the unauthorized use, disclosure, distribution, of the Software hereunder and/or other violation of this Agreement, LICENSOR shall be entitled to recover its costs and expenses including, without limitation,
reasonable attorneys' fees
.
Copyright © Acronis, Inc., 2000-2008 5
Table of Contents
Chapter 1. Introduction ........................................................................................10
1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for
corporate users......................................................................................................................10
1.2 Acronis True Image for Microsoft Small Business Server components...................................12
1.3 New in Acronis for Microsoft Small Business Server.............................................................12
1.4 Supported file systems and storage media.........................................................................14
1.4.1 Supported file systems ..............................................................................................14
1.4.2 Supported storage media...........................................................................................14
1.5 License policy..................................................................................................................15
1.6 Technical support............................................................................................................15
Chapter 2. Acronis True Image for Microsoft Small Business Server installation
and startup .............................................................................................................16
2.1 System requirements.......................................................................................................16
2.1.1 Minimum hardware requirements ...............................................................................16
2.1.2 Supported operating systems.....................................................................................16
2.2 Security parameters.........................................................................................................16
2.2.1 Credentials...............................................................................................................16
2.2.2 Firewall setup...........................................................................................................17
2.2.3 Encrypted communication..........................................................................................17
2.2.4 Security parameters in Acronis Administrative Template...............................................18
2.3 Installing Acronis True Image for Microsoft Small Business Server components.....................19
2.3.1 Installation of Acronis True Image for Microsoft Small Business Server local version and
Acronis True Image Agent for Windows................................................................................20
2.3.2 Installation of Acronis Group Server............................................................................21
2.3.3 Acronis Backup Server installation and setup...............................................................21
2.3.4 Acronis Universal Restore installation..........................................................................25
2.4 Extracting Acronis True Image for Microsoft Small Business Server components....................25
2.5 Running Acronis True Image for Microsoft Small Business Server components......................25
2.5.1 Running Acronis True Image for Microsoft Small Business Server (local version).............25
2.5.2 Running Acronis True Image Management Console......................................................26
2.5.3 Running other Acronis components.............................................................................26
2.6 Removing Acronis True Image for Microsoft Small Business Server components....................26
Chapter 3. General information and proprietary Acronis technologies ................ 27
3.1 The difference between file archives and disk/partition images............................................27
3.2 Full, incremental and differential backups..........................................................................27
3.3 Acronis Secure Zone®......................................................................................................28
3.4 Acronis Startup Recovery Manager....................................................................................29
3.4.1 How it works ............................................................................................................29
3.4.2 How to use...............................................................................................................29
3.5 Acronis Backup Server .....................................................................................................30
3.5.1 Backup locations.......................................................................................................30
3.5.2 Quotas and time limits for computers and users...........................................................31
3.5.3 Administrators and Users...........................................................................................31
3.5.4 Operations with archives............................................................................................32
3.6 Acronis Active restore......................................................................................................32
3.6.1 Limitations in using Acronis Active restore...................................................................32
3.6.2 How it works ............................................................................................................32
3.6.3 How to use...............................................................................................................33
3.7 Acronis Universal Restore.................................................................................................33
3.7.1 Acronis Universal Restore purpose..............................................................................33
3.7.2 Acronis Universal Restore general principles................................................................34
3.7.3 Acronis Universal Restore and Microsoft Sysprep..........................................................34
3.7.4 Limitations in using Acronis Universal Restore..............................................................35
6 Copyright © Acronis, Inc., 2000-2008
3.7.5 Getting Acronis Universal Restore...............................................................................35
3.8 Backing up to tape libraries and tape drives.......................................................................35
3.8.1 Understanding backup to tape devices........................................................................36
3.8.2 Backing up to a tape device through Acronis Backup Server..........................................38
3.8.3 Backing up to a locally attached tape device................................................................38
3.8.4 Restoring data from archives located on tape devices...................................................39
3.9 Viewing disk and partition information...............................................................................39
Chapter 4. Using Acronis True Image Management Console................................ 40
4.1 General information.........................................................................................................40
4.2 Installing/updating Acronis components on remote machines..............................................40
4.3 Managing a single remote computer..................................................................................43
4.3.1 Connecting to a remote computer ..............................................................................43
4.3.2 Backup and recovery tasks.........................................................................................44
4.4 Managing groups of computers.........................................................................................46
4.4.1 Group status display..................................................................................................46
4.4.2 Creating new group tasks ..........................................................................................48
4.4.3 Group tasks management..........................................................................................50
4.4.4 Acronis Group Server options.....................................................................................51
4.5 Managing backup server ..................................................................................................51
4.5.1 Default settings.........................................................................................................52
4.5.2 Set up Administrator profiles......................................................................................54
4.5.3 Adding Users and Administrators to the Acronis Backup Server database.......................55
4.5.4 Changing User profiles...............................................................................................57
4.5.5 Configuring Backup Locations.....................................................................................57
4.5.6 Managing Archives....................................................................................................58
4.5.7 Limiting access to Acronis Backup Server ....................................................................59
Chapter 5. Using Acronis True Image for Microsoft Small Business Server (local
version) ..................................................................................................................61
5.1 Main program window .....................................................................................................61
5.2 Managing a local computer...............................................................................................63
Chapter 6. Creating backup archives .................................................................... 66
6.1 Backing up files and folders (file backup)...........................................................................66
6.2 Backing up disks and partitions (image backup).................................................................70
6.3 Setting backup options.....................................................................................................72
6.3.1 Archive protection.....................................................................................................73
6.3.2 Source files exclusion ................................................................................................73
6.3.3 Pre/post commands ..................................................................................................74
6.3.4 Database support......................................................................................................74
6.3.5 Compression level.....................................................................................................75
6.3.6 Backup performance .................................................................................................76
6.3.7 Fast incremental/differential backup ...........................................................................77
6.3.8 Archive splitting........................................................................................................77
6.3.9 File-level security settings..........................................................................................77
6.3.10 Media components..................................................................................................78
6.3.11 Error handling.........................................................................................................79
6.3.12 Dual destination backup...........................................................................................79
6.3.13 Wake On LAN .........................................................................................................80
6.3.14 Additional settings...................................................................................................80
Chapter 7. Restoring the backup data ..................................................................82
7.1 Considerations before recovery.........................................................................................82
7.1.1 Restore under Windows or boot from CD?...................................................................82
7.1.2 Network settings in rescue mode................................................................................82
7.1.3 Recovering dynamic volumes.....................................................................................83
7.2 Restoring files and folders from file archives......................................................................84
Copyright © Acronis, Inc., 2000-2008 7
7.3 Restoring disks/partitions or files from images ...................................................................86
7.3.1 Starting the Restore Data Wizard................................................................................87
7.3.2 Archive selection.......................................................................................................87
7.3.3 Restoration type selection..........................................................................................88
7.3.4 Selecting a disk/partition to restore ............................................................................89
7.3.5 Selecting a target disk/partition..................................................................................89
7.3.6 Changing the restored partition type...........................................................................90
7.3.7 Changing the restored partition file system..................................................................91
7.3.8 Changing the restored partition size and location.........................................................91
7.3.9 Assigning a letter to the restored partition...................................................................92
7.3.10 Restoring several disks or partitions at once..............................................................92
7.3.11 Using Acronis Universal Restore................................................................................92
7.3.12 Setting restore options.............................................................................................93
7.3.13 Restoration summary and executing restoration.........................................................93
7.4 Setting restore options.....................................................................................................93
7.4.1 Files to exclude from restoration.................................................................................94
7.4.2 Files overwriting mode...............................................................................................94
7.4.3 Pre/post commands ..................................................................................................94
7.4.4 Restoration priority....................................................................................................95
7.4.5 File-level security settings..........................................................................................95
7.4.6 Specifying mass storage drivers..................................................................................95
7.4.7 Additional settings.....................................................................................................96
7.4.8 Error handling...........................................................................................................96
7.5 Creating dynamic disks and volumes.................................................................................97
7.5.1 Creating dynamic volumes.........................................................................................97
Chapter 8. Scheduling tasks................................................................................100
8.1 Creating scheduled tasks................................................................................................100
8.1.1 Setting up daily execution........................................................................................102
8.1.2 Setting up weekly execution.....................................................................................103
8.1.3 Setting up monthly execution...................................................................................104
8.1.4 Setting up one-time execution..................................................................................104
8.1.5 Setting up event-driven execution ............................................................................105
8.2 Managing scheduled tasks..............................................................................................105
Chapter 9. Managing the Acronis Secure Zone ...................................................106
9.1 Creating Acronis Secure Zone......................................................................................... 106
9.2 Resizing the Acronis Secure Zone....................................................................................108
9.3 Changing the password for Acronis Secure Zone..............................................................109
9.4 Deleting Acronis Secure Zone.........................................................................................109
Chapter 10. Creating bootable media ................................................................. 110
10.1 Creating Acronis rescue media...................................................................................... 110
10.2 Creating a Win PE ISO with Acronis True Image for Microsoft Small Business Server .........112
Chapter 11. Operations with archives.................................................................114
11.1 Validating backup archives ...........................................................................................114
11.2 Exploring archives and mounting images ....................................................................... 114
11.2.1 Exploring an archive..............................................................................................115
11.2.2 Mounting an image................................................................................................116
11.2.3 Unmounting an image ...........................................................................................118
11.3 Consolidating backups..................................................................................................118
Chapter 12. Notifications and event tracing .......................................................122
12.1 Email notification.........................................................................................................122
12.2 WinPopup notification..................................................................................................123
12.3 Viewing logs................................................................................................................123
12.4 Event tracing...............................................................................................................124
8 Copyright © Acronis, Inc., 2000-2008
12.4.1 Windows event log................................................................................................124
12.4.2 SNMP notifications.................................................................................................125
12.5 Managing System Restore............................................................................................125
Chapter 13. Working with a virtual environment ...............................................127
13.1 Backing up data on virtual machines .............................................................................127
13.2 Recovering data on virtual machines.............................................................................127
13.3 Using the disk conversion feature..................................................................................128
13.3.1 Recover data on the VM.........................................................................................128
13.3.2 Recover both data and the VM ...............................................................................128
13.3.3 Physical to virtual migration ...................................................................................128
13.3.4 Converting workloads............................................................................................129
13. 4 Converting disk images to virtual disks ......................................................................... 129
Chapter 14. Transferring the system to a new disk............................................131
14.1 General information.....................................................................................................131
14.2 Security......................................................................................................................132
14.3 Executing transfers......................................................................................................132
14.3.1 Selecting Clone mode............................................................................................ 132
14.3.2 Selecting source disk.............................................................................................132
14.3.3 Selecting destination disk.......................................................................................133
14.3.4 Partitioned destination disk ....................................................................................134
14.3.5 Old and new disk partition layout............................................................................134
14.3.6 Old disk data ........................................................................................................134
14.3.7 Destroying the old disk data...................................................................................135
14.3.8 Selecting partition transfer method.........................................................................136
14.3.9 Partitioning the old disk .........................................................................................137
14.3.10 Old and new disk partition layouts ........................................................................137
14.3.11 Cloning summary.................................................................................................138
14.4 Cloning with manual partitioning...................................................................................138
14.4.1 Old and new disk partition layouts..........................................................................138
Chapter 15. Adding a new hard disk ...................................................................140
15.1 Selecting a hard disk....................................................................................................140
15.2 Creating new partitions................................................................................................140
15.3 Disk add summary....................................................................................................... 141
Chapter 16. Command-line mode and scripting .................................................142
16.1 Working in the command-line mode..............................................................................142
16.1.1 Supported commands............................................................................................142
16.1.2 Common options (options common for most trueimagecmd commands) ....................145
16.1.3 Specific options (options specific for individual trueimagecmd commands)..................146
16.1.4 trueimagecmd.exe usage examples.........................................................................151
16.1.5 Command-line mode usage under DOS...................................................................155
16.2 Scripting.....................................................................................................................156
16.2.1 Script execution parameters...................................................................................156
16.2.2 Script structure .....................................................................................................156
16.2.3 Script usage examples...........................................................................................157
Copyright © Acronis, Inc., 2000-2008 9

Chapter 1. Introduction

1.1 Acronis® True Image for Microsoft Small Business Server – a complete solution for corporate users

Acronis True Image for Microsoft Small Business Server is a comprehensive backup and recovery solution for heterogeneous computer infrastructure that may include any combination of physical and virtual, networked and standalone, Windows- and Linux­based servers.
Acronis True Image for Microsoft Small Business Server creates a transportable image, independent of the hardware platform that can be restored directly to and from any virtual or physical environment.
Minimizes downtime
Acronis True Image for Microsoft Small Business Server enables you to restore systems in minutes, not hours or days. An entire system can be restored from an image that includes everything the system needs to run: the operating system , applications, databases, and configurations. it is not necessary to reinstall software or reconfigure your system or network settings. The complete system restoration can be performed to an existing system, to a new system with different hardware, or to virtual machines. With the Acronis Active restore feature, users can access the server and be gin working during the restore process, further decreasing downtime. File-level backups provide you with the flexibility to only backup specific, critical files.
Eases Administration
Wizards guide users through backup and recovery tasks, ensuring the product can be implemented with minimal user training. A central management console provides remote administration, ensuring that all systems in the network, regardless of the domain or workgroup structure, can be managed from one location. Complete, unattended restores from remote locations are supported with a remote bootable agent.
Automates Backup
With the scheduling capability in Acronis True Image for Microsoft Small Business Server, you simply create backup tasks, tailored by group, or certain times or events.
To ensure that backups have occurred, or if user intervention is required, you can r equest notifications via email or Windows Pop-up. You can view Acronis events in the Win dows Application Events Log or Acronis own log files. Log messages can be automatically sent out to SNMP clients.
The product also supports the creation of custom comman ds before and after backups. For example, users can automatically run anti-virus products before an image is created and verify the validity of backups after the image has been created. And because these tasks can be scheduled, you need not recreate the script to run the pre- and post-event tasks each time; you can set the scheduled events once and they will run each time automatically.
Ensures 24 X 7 Uptime
With Acronis’ patented drive snapshot technology, systems can be imaged while they are in use, ensuring 24-by-7 system availability. This technology enables the product to backup and image critical operating system files, the master boot record and any partition-based boot records without requiring a reboot. A CPU allocation feature allows
10 Copyright © Acronis, Inc., 2000-2008
you to limit the amount of CPU usage for the application to maximize the CPU’s availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used during backups, allowing minimal disruption of business operations.
A feature that allows you to suspend database activity for several seconds is provided so that you can create a valid image of mission-critical applications such as Microsoft Exchange Server, Microsoft SQL Server and Oracle. This database suspension process supports Microsoft’s Volume Shadow Copy Service (VSS). If your database or operating system does not support VSS, Acronis True Image for Microsoft Small Business Server will execute your custom commands to execute database suspension.
Supports Leading Edge Technology
Businesses today are moving to leverage the latest technologies, includ ing dual-core, 64­bit processors and 64-bit operating systems. With Acronis True Image for Microsoft Small Business Server, you can protect these new machines, as well as legacy servers, running a single application with a common interface.
Leverages Existing Technology Investments
The product can leverage your current storage infrastru cture by supporting a variety of storage media, so you can avoid costly hardware purchases to implement the solution. The product supports key storage technologies such as: Direct Attached Storage ( DAS), Network Attached Storage (NAS), Storage Area Networks (SAN), Redundant Arrays of Independent Disks (RAID), tapes, USB and IEEE-1394 (FireWire) compliant storage devices, CDs, DVDs, removable drives (Floppy, Zip, etc.) and shared storage. Mor eover, the product ensures that you maximize the space on these reso urces with four levels of compression.
Disk cloning and new disk deployment
Acronis True Image for Microsoft Small Business Server can be used to clone an image onto multiple servers. For example, let’s say a company purchased several servers and needs similar environments on each of them. Traditionally, the IT manager would install the operating system and programs on every server. With Acronis True Image for Microsoft Small Business Server, the IT manager would configure a single server, then create a disk image of the system. That image can then be duplicated onto multiple servers.
If you need to upgrade the server hard disk drive, Acronis True Image for Microsoft Small Business Server simplifies the task to few mouse clicks creating the exact copy of your old disk to a new one and adjusting partitions size to fit a new hard disk.
Volumes conversion
Acronis True Image for Microsoft Small Business Server can back up and recover dynamic volumes.
Dynamic volume as is can be recovered over the same volume or unallocated space of a dynamic group. Acronis True Image for Microsoft Small Business Server has necessary tools for any-to-any disks conversion in terms of basic disks and dynamic volumes of any type (simple, spanned, striped, mirrored or RAID 5). The tools are available in bootable program version as well. Having booted the Acronis environment, you can easily prepare the desired dynamic group on bare metal or a computer with non-Windows operating system.
Copyright © Acronis, Inc., 2000-2008 11

1.2 Acronis True Image for Microsoft Small Business Server components

Acronis True Image for Microsoft Small Business Server includes the following components.
1. Acronis True Image Management Console is a tool for remote access to Acroni s components. Administrator uses the console to install, configure and control the components from remote.
2. Acronis True Image Agent is an application that resides on client computers and performs Acronis operations such as data backup or restore.
3. Acronis Group Server is a management tool that provides ability to schedule, monitor and manage group backup tasks. It deploys group tasks to the ag ents, polls the agents for the status of running tasks and provides the administrator with the summary tasks state display over the network.
4. Acronis Backup Server is an application for centralized storage and management of enterprise backup archives.
The administrator can set space quotas and backup schemes, schedule check tasks that consolidate backups in case of quota violati on, perform one-time backups consolidation. This ensures optimal usage of the storage capacity . Acronis Backup Server also enables users to access a tape library, connected to the server.
5. Acronis True Image for Microsoft Small Business Server (local version) is a locally controlled server management tool with additional functionality as compared to Acronis True Image Agent. The local version supports, besides backup and recovery operations, exploring archives, mounting images as virtual drives, cloning hard disk s data and formatting partitions on new hard disks, creating dynamic volumes, command-line mode and scripts execution.
6. Acronis Universal Restore is an add-on to Acronis True Image for Microsoft Small Business Server that automatically configures Windows drivers in a system, recovered on dissimilar hardware. This enables the seamless system start and operation.
7. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or the RIS package thus enabling data recovery over bare metal, non-Windows or corrupted operating systems.

1.3 New in Acronis for Microsoft Small Business Server

Management console
Reconnect (last connect) option Centralized installation and update of Acronis components on multiple computers
Group server
Import and export computers through txt/csv files Run, stop, restart, edit, check group tasks Group validation tasks Set how often to check the computers state (status refresh rate) Wake on LAN for backup
12 Copyright © Acronis, Inc., 2000-2008
Backup server
Import/export archives from external locations Limit number of connections Limit bandwidth used per connection Access to tape library for every user
Backup
Backup and restore of 2+TB volumes Encrypting backups with industry-standard AES cryptographic algorithm (key size 128,
192, 256 bit) Multi-volume snapshot for databases spread on several disks Control network bandwidth usage when backing up to FTP Error handling: ignore bad sectors, silent mode (no pop-ups, continue on all errors) Dual destination backup: Acronis Secure Zone + network share Support for VMware Consolidated backup Archive bit reset (file-level backup only) Generating time-based names for bac kup files
Recovery
Recovery of dynamic volumes Recovery of system dynamic volumes on dissimilar hardware using Acronis Universal
Restore or Acronis Active restore
Scheduling
Schedule archive validation Start every N hours within daily schedule Start on free disk space change by the specified amount Cloning a task
Notification via e-mail
Multiple e-mail addresses From and Subject fields Logon to incoming mail server
Operations with archives
Convert disk images to virtual disks for VMware, Microsoft, XenServer and Parallels virtual machines
Consolidate backup files (create a consistent copy of archive while deleting selected backups)
Explore archives (open in read-only mode any image or file-level backup)
Operations with hard disks
Convert basic disk to dynamic
Copyright © Acronis, Inc., 2000-2008 13
Create dynamic volumes
CLI features
MBR restore Backup to FTP server Allow logs on net share Merge unallocated space by moving partitions and create Acronis Secure Zone on the
space
Security
Encrypted (SSL) communication between Acronis True Image for Microsoft Small Business Server components

1.4 Supported file systems and storage media

1.4.1 Supported file systems

FAT16/32 NTFS Ext2/Ext3 ReiserFS Reiser4 Linux SWAP XFS JFS DFS If a file system is not supported or is corrupted, Acronis True Image for Microsoft Small
Business Server can copy data using a sector-by-sector approach.
For XFS and JFS file systems the partition resizing feature is not supported.

1.4.2 Supported storage media

Hard disk drives Networked storage devices such as Storage Area Networks (SANs) and Network Attached
Storage (NAS) Tape libraries, autoloaders, SCSI tape drives IDE and SCSI RAID controllers of any level FTP-servers* CD-R/RW, DVD-R/RW, DVD+R (including double-layer DVD+R), DVD+RW, DVD-RAM** USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices
®
ZIP
, Jaz® and other removable media
14 Copyright © Acronis, Inc., 2000-2008
* - an FTP-server must allow passive mode for file transfers. Data recovery directly from FTP-server requires the archive to consist of files no more than 2GB in size. It is recommended that you change the source computer firewall settings to open ports 20 and 21 for both TCP and UDP protocols and disable the Routing and Remote Access Windows service.
** - Burned rewritable discs cannot be read in Linux without kernel patch.

1.5 License policy

Acronis True Image for Microsoft Small Business Server licensing is based on number of servers on which Acronis True Image Agent and/or Acronis True Image for Microsoft Small Business Server local version are to be installed. This means you need one license for each server you are going to backup, whether you will control it on-site (with the local program version) or remotely (using Acronis True Image Agent), or use both ways of control. The number of Acronis True Image Management Console, Acr onis Group Server and Acronis Backup Server installations is not counted.
Acronis Universal Restore is an option to Acronis True Image for Microsoft Small Business Server and has its own serial number.

1.6 Technical support

As part of a purchased annual Support charge you are entitled to Technical Support as follows: to the extent that electronic services are available , you may electronically access at no additional charge, Support services for the Software, which Acronis shall endeavor to make available twenty four (24) hours a day, seven (7) days per week. Such electronic services may include, but are not limited to: user forums; software-specifi c information; hints and tips; bug fix retrieval via the internet; software maintenance and demonstration code retrieval via a WAN-accessible FTP server; and access to a problem resolution database via Acronis customer support system.
Support shall consist of supplying telephone or other electronic support to you in or der to help you locate and, on its own, correct problems with the Software and supplying patches, updates and other changes that Acronis, at its sole discretion, makes or adds to the Software and which Acronis makes generally available , without additional char ge, to other licensees of the Software that are enrolled in Support. Upon mutual agre ement by both parties, Acronis shall: (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into substantial conformity with the published operating specifications for the most current version of the Software unless your unauthorized modifications prohibit or hamper such corrections or cause the malfunction; or (ii) supply code corrections to correct insubstantial problems at the next general release of the Software.
More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.com/enterprise/support/
Copyright © Acronis, Inc., 2000-2008 15

Chapter 2. Acronis True Image for Microsoft Small Business Server installation and startup

2.1 System requirements

2.1.1 Minimum hardware requirements

Acronis True Image for Microsoft Small Business Server requires the following hardware: Pentium processor or higher 256MB RAM FDD or CD-RW drive for bootable media creation Mouse (recommended).

2.1.2 Supported operating systems

Acronis True Image Management Console
Windows Small Business Server 2003 Windows Professional 2000 SP4/XP Professional SP2 Windows Server 2000/Advanced Server 2000/Server 2003 Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions Windows Vista all Editions (except for installation of Acronis components on remote
machines running Vista)
Acronis True Image Agent for Windows
Acronis True Image for Microsoft Small Business Server
Acronis Backup Server
Acronis Group Server
Acronis Universal Restore (optional)
Windows Small Business Server 2003 Acronis True Image for Microsoft Small Business Server bootable version enables disk-
level backup and recovery on a computer running any PC-based operating system.

2.2 Security parameters

2.2.1 Credentials

Acronis True Image for Microsoft Small Business Server fully supports all security standards used in Windows.
To install Acronis components on a computer, the user must be a member of the Administrators group on the computer.
To get access to Acronis True Image Agent, installed on a computer, the user must be a member of the Administrators or Backup operators group on the computer.
16 Copyright © Acronis, Inc., 2000-2008
The Acronis Group Server uses administrator’s credentials to perform data backup tasks on the computers. You will be asked for the credentials during the Acronis Group Server installation. The credentials you provide will be used for running the Acronis Group Server service and also applied to all networked computers.
Therefore, it is recommended that you have a uniform account for all computers where the Acronis True Image Agent is installed. Domain administrators can use the domain administrator account. In a workgroup, it would make sense to create identical accounts in the Administrators group on each computer with Acronis True Image Agent.
If you do not wish to create a uniform account, provide credentials for each computer after Acronis Group Server installation as described in point 4 of
display
You can combine both methods, for example, to set up a uniform account for domain members and set individual accounts for members of a workgroup.
.
4.4.1 Group status

2.2.2 Firewall setup

Acronis True Image for Microsoft Small Business Server uses the following ports and I P addresses for remote operation:
server (Acronis True Image Agent) UDP port: 9876 server (Acronis True Image Agent) TCP port: 9876, if busy choose a port at random client (Acronis True Image Management Console) UDP port: 9877, if busy choose a port
at random IPv4 multicast address: 239.255.219.45 IPv6 multicast address: FF05::fAA5:741E. You might have to set the appropriate firewall access options. Options for the Win dows
Firewall, included in Windows XP Service Pack 2 and Windows 2003 Server, are set automatically during Acronis True Image for Microsoft Small Business Server components installation. However, make sure that the option File and Printer Sharing in the Control panel -> Windows Firewall -> Exceptions is enabled on the remote computer, before the remote operation starts.

2.2.3 Encrypted communication

Acronis True Image for Microsoft Small Business Server provides capability to secure all data transferred between Acronis components within local net and through DMZ, including the backup stream.
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred on the next steps (including data required for client authentication) is encrypted.
Once Acronis True Image for Microsoft Small Business Server components are installed, encrypted communication between the components is enabled automati cally.
The earlier versions of Acronis True Image Enterprise Server did not support encrypted communication, therefore connection to such components, if they present on the network, will not be encrypted. You have an option to completely disable non-encrypted communication with some or all Acronis True Image for Microsoft Small Business Server components. In this case, the components will not be able to communicate with components of earlier versions. For how to disable non -encr ypted comm unication , s ee the next section.
Copyright © Acronis, Inc., 2000-2008 17
The earlier versions of Acronis True Image Management Console cannot communicate with Acronis True Image for Microsoft Small Business Server agents. The console must be upgraded to the Acronis True Image for Microsoft Small Business Server console.
Encryption is provided with Secure Socket Layer mechanism. There ar e two stakeholders of the encryption operation:
Client application – the application that tries to establish (initiates) connection. This
could be the Acronis True Image Management Console or Acronis Group Server.
Acronis True Image for Microsoft Small Business Server local version can also be a
client when it performs backup to Acronis Backup Server. Server application – the application to which the client tries to connect. This could be
Acronis True Image Agent, Acronis Group Server, Acronis Backup Server.

2.2.4 Security parameters in Acronis Administrative Template

As stated above, encryption generally does not require setting up. However, connecti on to Acronis components of earlier versions will not be encrypted. To completely disable non­encrypted communication with some or all Acronis True Image for Microsoft Small Business Server components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template (\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.
For detailed information about Windows GPO Editor please see:
http://msdn2.microsoft.com/en-us/library/aa374163.aspx
For detailed information about Group Policies please see:
http://msdn2.microsoft.com/en-us/library/aa374177.aspx
The Acronis Administrative Template contains the following settings.
18 Copyright © Acronis, Inc., 2000-2008
Encryption Options
Server Requires Encryption This option defines the server behavior in case the client does not support encryption.
When enabled, connection to the client will be terminated. When disabled, the client will be allowed to establish non-encrypted connection.
Client Requires Encryption When connecting to server applications, the Acronis client applications always attempt to
establish an encrypted connection. The Client Requires Encryption option defines the client behavior in case the server does not support encryption. When disabled, the non­encrypted connection will be established. When enabled, the connection will be terminated.
After applying the template or editing the encryption options, you should restart the Remote Agent(s).

2.3 Installing Acronis True Image for Microsoft Small Business Server components

To install Acronis True Image for Microsoft Small Business Server components, run the Acronis True Image for Microsoft Small Business Server setup file.
If you have the trial version of Acronis True Image for Microsoft Small Business Server installed on your system, you must uninstall it before installing the commercial version of the product.
Select the program to install and follow instructions on the screen.
Copyright © Acronis, Inc., 2000-2008 19
Acronis True Image for Microsoft Small Business Server Install Window
It is recommended that you install Acronis True Image Management Console first. After that you will be able to install Acronis True Image for Microsoft Small Business Server (local version) and Acronis True Image Agent for Windows remotely to networked computers.

2.3.1 Installation of Acronis True Image for Microsoft Small Business Server local version and Acronis True Image Agent for Windows

For Acronis True Image for Microsoft Small Business Server and Acronis True Image Agent for Windows, Typical, Custom and Complete installation is available. Having pressed Custom, you can choose to install, besides the main component, Rescue Media Builder and Bart PE plug-in for Acronis True Image for Microsoft Small Business Server, or Acronis Secure Zone manager for Acronis True Image Agent.
With Rescue Media Builder you can create bootable rescue disks or RIS packages (see details in
Chapter 10. Creating bootable media
Builder will allow you to create bootable media, its ISO image or a bootable RIS package at any time from the main program window or running Bootable Rescue Media Builder on its own.
The widely used Bart PE utility provides a Windows-like operating environment invoked via removable bootable media. Applications are installed into Bart PE in the form of plug­ins. Choosing Bart PE plug-in installation (disabled by default) provides the ability to include Acronis True Image for Microsoft Small Business Server into a Bart PE pl ug-in tab. The plug-in files will be placed into the component installation folder along with other program files.
). Installing the Bootable Rescue Media
Acronis Secure Zone manager lets you create, delete and resize a special hidden partition for storing backup archives (see
When installed, Acronis True Image for Microsoft Small Business Server (local version) creates a new device in the Device Manager list (Control Panel -> System ->
Hardware -> Device Manager -> Acronis Devices -> Acronis TrueImage
Backup Archive Explorer). Do not disable or uninstall this device, as it is necessary for
20 Copyright © Acronis, Inc., 2000-2008
3.3 Acronis Secure Zone
).
connecting image backups as virtual disks (see
11.2.2 Mounting an image
).

2.3.2 Installation of Acronis Group Server

The Acronis Group Server only can be installed locally on a computer by running the setup program.
When installing Acronis Group Server, you will be asked for credentials. The credentials you provide are used for running the Acronis Group Server service and also appli ed to all networked computers.
Enter the uniform account information discussed in
2.2.1 Credentials
. If you do not use a uniform account, provide credentials for each computer after the Acronis Group Server installation as described in point 4 of
4.4.1 Group status display
.

2.3.3 Acronis Backup Server installation and setup

The Acronis Backup Server only can be installed locally on a computer by running the setup program.
Before starting installation of this component, please read section
Server
to get understanding of this component functionality and define the storage policy
advantageous to your network. We suggest that you start using Acronis Backup Server as follows:
3.5 Acronis Backup
1. Set up a server with a system drive and a high capacity storage drive.
2. Install Acronis Backup Server on the system drive. Reboot on prompt.
In Windows XP SP2 or Windows 2003 Server, the option Control panel -> Windows Firewall -> Exceptions -> File and Printer Sharing must be enabled. Otherwise remote users will not be able to back up on the backup server.
3. Connect the console to Acronis Backup Server.
When connecting to a backup server inside a domain, mind whether your domain or local account is saved on the backup server. If you used your local account to install the backup server, and then logged in Windows on the console computer using your domain account, enter the local user name along with the backup server name (for example, Server1\username). Otherwise the name will be identified as a domain one.
Copyright © Acronis, Inc., 2000-2008 21
4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can create a f older for the backup location on the storage drive. To see the folder in the tree and add it to the path , collapse and expand the drive.
5. Click Back -> Configure Backup Locations -> make sure that the new default location is created and delete the location in \Documents and Settings.
6. Set limitations to disk space and storage period for the location, if needed, according to the selected policy.
To do so, select Configure Backup Locations -> select location -> Quotas and time limits. The maximum backup location size can be set to the storage drive capacity minus the estimated size of the largest backup (some space must be reserved for the temporary file created at consolidation).
7. Set the default limitations for users/computers, if needed, according to the selected policy.
To do so, select Acronis Backup Server Management -> Specify Default Settings
-> Set Quotas and time limits. The maximum disk space allowed for a user/computer can be set as the max location size divided by total number of users and computers. Generally, value of this setting can reach the maximum location size.
8. Read about administrators and users profiles in
3.5.3 Administrators and Users
. Define if you need more than one administrator on the backup server. If yes, add administrators as follows:
Add the person’s local or domain account to the AcronisBackupServerUsers group on the backup server.
Click Set up User profiles -> Add. Choose the user name.
22 Copyright © Acronis, Inc., 2000-2008
Select from the local backup server users or the domain users
Choose Create user with administrator’s rights. Click Proceed.
User or administrator?
9. Define which users will be allowed to back up data on the backup server. Add the users as follows:
Add the person’s local or domain account to the AcronisBackupServerUsers group on the backup server.
Click Set up User profiles -> Add. Choose the user name. Choose Use default settings. Click Proceed.
Copyright © Acronis, Inc., 2000-2008 23
10. Define the computers which administrators will back up using Acronis True Image Agents. Add the computers as follows.
Click Set up Administrator profiles -> Add. Choose the computer or enter its name. Choose Use default settings. Click Proceed.
Adding a computer to the administrator profile
11. Schedule a check for exceeding the quotas and time limits, if needed according to the selected policy.
To do so, select Acronis Backup Server Management -> Specify Default Settings
-> Schedule automatic consolidation and backup management. Choose Periodically. Choose Weekly. Schedule check to be performed once a week during off-peak time. Click Proceed. The backup server is ready to work. To perform backup using the Administrator profile,
connect the console to the agent on a remote computer and create a standard backup task while selecting Acronis Backup Servers -> backup server name -> Personal Backup Location as backup destination. Or create a group task for several computers with the same destination.
Users can back up their data with local program versions while selecting the same destination.
24 Copyright © Acronis, Inc., 2000-2008

2.3.4 Acronis Universal Restore installation

Acronis Universal Restore is an option for Acronis True Image for Microsoft Small Business Server. It is included at no extra charge with Acronis True Image for Microsoft Small Business Server and installed from a separate setup file. Acronis Universal Restore has its own serial number that is required at installation.
Acronis Universal Restore can only be installed on a computer where at least one of the following Acronis components is installed:
Acronis True Image Agent for Windows Acronis True Image for Microsoft Small Business Server (local version) Bootable Media Builder. Acronis Universal Restore can be installed on a networked computer either locally, by
running the setup program, or remotely, using one of remote installation services such as Systems Management Server (a component of Microsoft Windows NT BackOffice progra m package). Remote installation of Acronis Universal Restore with Acronis True Image Management Console is not supported.
After installation, Acronis Universal Restore automatically plugs in one or more of abov e program components. Acronis True Image for Microsoft Small Business Server (local version) name, displayed in its main window, changes to Acronis True Image for Microsoft Small Business Server with Universal Restore.

2.4 Extracting Acronis True Image for Microsoft Small Business Server components

During Acronis True Image Management Console installation, all Acronis True Image for Microsoft Small Business Server components’ setup (.msi) files will be placed to C:\Program Files\Common Files\Acronis\RemoteInstall folder. Thus, you will be able to remotely install, modify or repair the components using Acronis True Image Management Console or msiexec.exe utility.
When installing Acronis True Image for Microsoft Small Business Server components on a local computer, you can save setup files for each Acronis True Image for Microsoft Smal l Business Server component separately on a local or network drive. This will help when modifying or recovering the existing component installation on a local computer.
To save a component’s setup file: run the Acronis True Image for Microsoft Small Business Server setup file in the Install Menu, right-click on the component name and select Extract select a location for the setup file and click Save.

2.5 Running Acronis True Image for Microsoft Small Business Server components

2.5.1 Running Acronis True Image for Microsoft Small Business Server (local version)

You can run Acronis True Image for Microsoft Small Business Server in Windows by selecting Start -> Programs -> Acronis -> Acronis True Image for Microsoft
Small Business Server -> Acronis True Image for Microsoft Small Business
Server or clicking the appropriate shortcut on the desktop.
Copyright © Acronis, Inc., 2000-2008 25
If your operating system fails to load, you can run Acronis Startup Recovery Manager.
prior
However, this must be activated to learn more about this procedure. To run the program, press F11 during the server bootup when you see a corresponding message that tells you to press that key. Acronis True Image for Microsoft Small Business Server will be run in the standalone mode, allowing you to recover the damaged partitions.
If your disk data is totally corrupted and you cannot boot (or if you have not activated Acronis Startup Recovery Manager), load the standalone Acronis True Image for Microsoft Small Business Server version from the bootable media (created by you using Rescue Media Builder) or RIS-server. Then you will be able to restore the disk from a previously created image.
to use; see
3.4 Acronis Startup Recovery Manager

2.5.2 Running Acronis True Image Management Console

To run Acronis True Image Management Console, select Start -> Programs -> Acronis
-> Acronis True Image Management Console -> Acronis True Image
Management Console.

2.5.3 Running other Acronis components

Acronis True Image Agents, Acronis Backup Server and Acronis Group Server run as services immediately after installation and the consequent system re boot (if the latter is required). Later on they will automatically launch at every system restart. You can stop and start these programs in the same way as other services.

2.6 Removing Acronis True Image for Microsoft Small Business Server components

You can remove any Acronis True Image for Microsoft Small Business Server component separately by selecting Control panel -> Add or remove programs -> <The component name> -> Remove. Then follow instructions on the screen. You may have to reboot your computer afterwards to complete the task.
In case you remove Acronis True Image Agent or Acronis True Image for Microsoft Small Business Server local version from the system, there is an option to keep the Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone.
26 Copyright © Acronis, Inc., 2000-2008

Chapter 3. General information and proprietary Acronis technologies

3.1 The difference between file archives and disk/partition images

A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions.
When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
Backing up disks and partitions is performed in a different way: A cronis True Image for Microsoft Small Business Server saves a sector-based snapshot of the disk, which includes the operating system, registry, drivers, software applications and data files, as well as system areas hidden from the user. This procedure is calle d “creating a disk image,” and the resulting backup archive is often called a disk/partitio n image.
Acronis True Image for Microsoft Small Business Server stores only those hard disk parts that contain data (for supported file systems). Further, it does not back up swap file information (pagefile.sys) and hiberfil.sys (a file that keeps RAM contents when the computer goes into hibernation). This reduces image size and speeds up image creation and restoration.
A partition image includes all files and folders independent of their attributes (including hidden and system files), boot record, FAT (file allocation table), root and the zero track of the hard disk with master boot record (MBR).
A disk image includes images of all disk partitions as well as the zero track with the master boot record (MBR).
All Acronis True Image for Microsoft Small Business Server archives files have a “.tib” extension by default.
It is important to note that you can restore files and folders not only from file archives, but from disk/partition images, too. To do so, mount the image as a virtual disk (see
11.2.2 Mounting an image
files or folders.
) or start the image restoration and select Restore specified

3.2 Full, incremental and differential backups

Acronis True Image for Microsoft Small Business Server can create full , incremental and differential backups.
A full backup contains all data at the moment of backup creation. It forms a base for further incremental or differential backup or is used as a standalone archive. A full backup has the shortest restore time as compared to incremental or differential ones.
An incremental backup only contains data changed since the last full or incremental backup creation. Therefore, it is smaller and takes less time to create. However, since it
all
does not contain all data needed to restore an image,
and
backups
the initial full backup are required for restoration.
the previous incremental
A differential backup creates an independent file containing all changes since the last full archive. Generally, data from a differential backup will be restored faster than an
Copyright © Acronis, Inc., 2000-2008 27
incremental backup, as it does not have to process through a long chain of previous backups.
A standalone, full backup could be an optimal solution if you often roll back the system to the initial state (for example, systems in a gaming club or Interne t café where you need to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial and the restore time will be minimal.
Alternatively, if you are interested in saving only the most current data state to be able t o restore it in case of system failure, consider the differential backup. It is particularly effective if your data changes tend to be little as compared to the full data volume.
An incremental backup is most useful when you need frequent back ups and possibility to roll back to any one of multiple stored states. For example, let’s say you create a full backup once a month. If you then crea te an incremental backup each day of a month, you will get the same result as if you created full backups every day. However, the cost in time and disk space (or removable media usage) will be as little as one tenth as much.
It is important to note that the above arguments are just examples for your information. Feel free to make up your own backup policy in accordance with your specific tasks and conditions. Acronis True Image for Microsoft Small Business Server is flexible enough to meet any real-life demands.
An incremental or differential backup created after a disk is defragmented might be considerably larger than usual. This is because the defragmentation program changes file locations on disk and the backups reflect these changes. Therefore, it is recommended that you re-create a full backup after disk defragmentation.

3.3 Acronis Secure Zone®

The Acronis Secure Zone is a special, hidden partition for storing archives on the computer system itself. For archive security purposes, ordinary applicati ons cannot access it. In the Acronis True Image for Microsoft Small Business Server Wizards’ windows the zone is listed along with all partitions available for storing archives. Acronis Secure Zone is necessary for using Acronis Startup Recovery Manager and Acronis Active restore features (see below). The three features, in combination, instantly make operational a system that fails to boot.
A consistent external copy of archives, saved on Acronis Secure Zone, can be created on a network share using dual destination backup feature. See details in
destination backup
.
Acronis Secure Zone is always available for archive creation as long as there is space for the backup file. If there is not enough space, older archives will be deleted to create space.
Acronis True Image for Microsoft Small Business Server uses the following approaches to clear space in the Acronis Secure Zone:
6.3.12 Dual
If there is not enough free space in the zone to create a backup, t he program deletes the
oldest full backup with all subsequent incremental/differential backups.
If there is only one full backup (with subsequent incremental/differential backups) left and
a full backup is in progress, then the old full backup and incremental/differential backups are deleted.
If there is only one full backup left, and an incremental or differential backup is in
progress, you will get an error message telling you there is a lack of available space.
28 Copyright © Acronis, Inc., 2000-2008
In that case, you will have to either re-create the full backup or increase the size of the Acronis Secure Zone.
You can back up data automatically on a schedule (see
Chapter 8. Scheduling tasks
), and not worry about zone overflow issues. However, if you keep long chains of incremental backups, it is a good practice to check the zone free space periodically. To do so, star t the Manage Acronis Secure Zone wizard and see the zone free space that is displayed on the wizard’s second page.
For information on how to create, resize or delete Acronis Secure Zone using this wizard,
Chapter 9. Managing the Acronis Secure Zone
see
.
In case you remove Acronis True Image Agent or Acronis True Image for Microsoft Small Business Server local version from the system, there is an option to keep Acronis Secure Zone along with its contents (which will enable data recovery on booting from bootable media) or remove Acronis Secure Zone.
The Acronis Secure Zone should not be the only location where a backup is stored. Should the disk have a physical failure, the Acronis Secure Zone could be lost. This is particularly critical for backups of servers; the Acronis Secure Zone should only be one part of an overall backup strategy.

3.4 Acronis Startup Recovery Manager

3.4.1 How it works

The Acronis Startup Recovery Manager enables starting Acronis True Image for Micros oft Small Business Server on a local computer without loading the operating system. If the operating system won't load, you can run Acronis True Image for Microsoft Small Business Server by itself to restore damaged partitions. Unlike booting from the A cronis removable media or RIS server, you will not need a separate media or network connection to start Acronis True Image for Microsoft Small Business Server. It is especially handy for mobile users who need to run a server operating system on their laptop.

3.4.2 How to use

To be able to use Acronis Startup Recovery Manager at boot time, prepare as follows (you can do it either locally, using Acronis True Image for Microsoft Small Business Server local version, or remotely, using Acronis True Image Management Console):
1. Install Acronis True Image for Microsoft Small Business Server local version or Acronis True Image Agent on a computer.
2. Create Acronis Secure Zone on the computer hard disk (see
Acronis Secure Zone
).
3. Activate Acronis Startup Recovery Manager. To do so, click Activate Acronis Startup Recovery Manager and follow the Wizard’s instructions.
If you try to activate Acronis Startup Recovery Manager while Acronis Secure Zone is missing from the system, you will be prompted to create the zone, Recovery Manager will be activated. Otherwise, Acronis Startup Recovery Manager will be activated immediately.
When Acronis Startup Recovery Manager is activated, it overwrites the master boot record (MBR) with its own boot code. If you have any third-party boot managers installed, you will have to reactivate them after activating the Startup Recovery Manager. For Linux loaders (e.g. LiLo and GRUB), you might consider installing them to a Linux root (or boot) partition boot record instead of MBR before activating Acronis Startup
Chapter 9. Managing the
then Acronis Startup
Copyright © Acronis, Inc., 2000-2008 29
Recovery Manager.
Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you see the "Press F11 for Acronis Startup Recovery Manager" message. This will run a standalone version of Acronis True Image for Microsoft Small Business Server that only slightly differs from the complete version. For information on restoring damaged partitions, see
Be careful! Disk letters in standalone Acronis True Image for Microsoft Small Business Server might sometimes differ from the way Windows identifies drives. For example, the D: drive identified in the standalone Acronis True Image might correspond to the E: drive in Windows.
Chapter 7. Restoring the backup data
.

3.5 Acronis Backup Server

Acronis Backup Server is an application for centralized storage and management of enterprise backup archives in accordance with the policies, set by an administrator. It ensures optimal usage of storage resources us ed for backup archives. Outdated archives will be automatically deleted; at the same time, the latest data recovery is always possible. In addition, Acronis Backup Server facilitates creation and executing group backup tasks.
For information on how to install and set up Acronis Backup Server, see
Backup Server installation and setup
Server, see
4.5 Managing backup server
. For information on how to manage Acronis Backup
.
2.3.3 Acronis

3.5.1 Backup locations

Backup server is a networked computer where Acronis Backup Server is installed. A backup location is a storage area for backups on a local backup server hard drive.
At installation, Acronis Backup Server creates one (default) backup location. The location has the following properties:
Path: C:\Documents and Settings\All Users\Application Data\Acronis\BackupServer\ Backups
Maximum backup location size: Unlimited Maximum storage period (days): Unlimited
All backup data destined to the backup server will be saved in the default backup location. Because it may not be practical or efficient for you to store all backup data in one
location, the backup server allows you to cr ea te as many locations as you need, each with its own properties. The three basic rules are:
any location, except for the default one, must be assigned to at least one user or
computer only one location can be assigned to a user or computer the default location may not be assigned to a u ser or computer. There must be a default
backup location on a backup server though. You can create a separate location for each user or comp uter while adding them to the
backup server, distribute the users/computers between several locations, or assign the same location to all users/computers.
Maintaining multiple small backup locations on a single disk does not allow for tracking changes in total disk space usage. At the same time, manual management of thousands
30 Copyright © Acronis, Inc., 2000-2008
Loading...
+ 127 hidden pages