Avanquest Acronis True Image Echo Workstation Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Backup-Wiederherstellungssoftware Avanquest Acronis True Image Echo Workstation herunter. Avanquest Acronis True Image Echo Workstation Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 157
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Workstation

User’s Guide Acronis® True Image Echo Workstation

Seite 2

10 Copyright © Acronis, Inc., 2000-2009 Multi-volume snapshot for da

Seite 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 In the upper field, enter

Seite 4

101 Copyright © Acronis, Inc., 2000-2009 If the computer is off whe

Seite 5

102 Copyright © Acronis, Inc., 2000-2009 8.1.3 Setting up monthly e

Seite 6

103 Copyright © Acronis, Inc., 2000-2009 If the computer is off whe

Seite 7 - Chapter 1. Introduction

104 Copyright © Acronis, Inc., 2000-2009 There are two ways of chang

Seite 8

105 Copyright © Acronis, Inc., 2000-2009 Chapter 9. Managing the Ac

Seite 9

106 Copyright © Acronis, Inc., 2000-2009 4. In the next window, ent

Seite 10

107 Copyright © Acronis, Inc., 2000-2009 5. You can set a password t

Seite 11 - 1.5 License policy

108 Copyright © Acronis, Inc., 2000-2009 9.3 Changing the password

Seite 12 - 1.6 Technical support

109 Copyright © Acronis, Inc., 2000-2009 Chapter 10. Creating boota

Seite 13 - 2.1 System requirements

11 Copyright © Acronis, Inc., 2000-2009 1.4 Supported file systems

Seite 14 - 2.2 Security parameters

110 Copyright © Acronis, Inc., 2000-2009 The bootable version of Acr

Seite 15

111 Copyright © Acronis, Inc., 2000-2009 4. If you are creating a CD

Seite 16

112 Copyright © Acronis, Inc., 2000-2009 Chapter 11. Operations wit

Seite 17

113 Copyright © Acronis, Inc., 2000-2009 Both operations are perform

Seite 18 - 3.5 Acronis Backup

114 Copyright © Acronis, Inc., 2000-2009 If you added a comment to

Seite 19

115 Copyright © Acronis, Inc., 2000-2009 If you added a comment to

Seite 20

116 Copyright © Acronis, Inc., 2000-2009 5. Select whether you want

Seite 21

117 Copyright © Acronis, Inc., 2000-2009 2. Select the archive from

Seite 22

118 Copyright © Acronis, Inc., 2000-2009 The clone archive will con

Seite 23

119 Copyright © Acronis, Inc., 2000-2009 The resulting archive cont

Seite 24

12 Copyright © Acronis, Inc., 2000-2009 1.6 Technical support As pa

Seite 25

120 Copyright © Acronis, Inc., 2000-2009 Chapter 12. Notifications

Seite 26 - 3.4.2 How to use

121 Copyright © Acronis, Inc., 2000-2009 1. Enable the Messenger ser

Seite 27 - 3.5 Acronis Backup Server

122 Copyright © Acronis, Inc., 2000-2009 The left panel can contain

Seite 28

123 Copyright © Acronis, Inc., 2000-2009 An additional choice is ava

Seite 29 - 3.6 Acronis Active Restore

124 Copyright © Acronis, Inc., 2000-2009 This feature is available

Seite 30 - 3.6.3 How to use

125 Copyright © Acronis, Inc., 2000-2009 Chapter 13. Working with a

Seite 31

126 Copyright © Acronis, Inc., 2000-2009 The procedure is the same a

Seite 32

127 Copyright © Acronis, Inc., 2000-2009 This allows: • the fastes

Seite 33

128 Copyright © Acronis, Inc., 2000-2009 Connect the console to the

Seite 34 - 6.3.14 Additional settings

129 Copyright © Acronis, Inc., 2000-2009 Chapter 14. Transferring t

Seite 35

13 Copyright © Acronis, Inc., 2000-2009 Chapter 2. Acronis True Ima

Seite 36

130 Copyright © Acronis, Inc., 2000-2009 14.2 Security Please note

Seite 37

131 Copyright © Acronis, Inc., 2000-2009 You can determine the sour

Seite 38 - Management Console

132 Copyright © Acronis, Inc., 2000-2009 14.3.4 Partitioned destina

Seite 39

133 Copyright © Acronis, Inc., 2000-2009 • Keep data – leave the ol

Seite 40

134 Copyright © Acronis, Inc., 2000-2009 The second method takes mo

Seite 41

135 Copyright © Acronis, Inc., 2000-2009 If you elect to transfer in

Seite 42

136 Copyright © Acronis, Inc., 2000-2009 Along with the hard disk nu

Seite 43

137 Copyright © Acronis, Inc., 2000-2009 Along with the hard disk nu

Seite 44

138 Copyright © Acronis, Inc., 2000-2009 Chapter 15. Adding a new h

Seite 45

139 Copyright © Acronis, Inc., 2000-2009 You will be prompted to set

Seite 46

14 Copyright © Acronis, Inc., 2000-2009 2.2 Security parameters 2.2

Seite 47 - Chapter 8. Scheduling tasks

140 Copyright © Acronis, Inc., 2000-2009 Chapter 16. Command-line m

Seite 48 - 8.2 Managing scheduled tasks

141 Copyright © Acronis, Inc., 2000-2009 /incremental /differential

Seite 49 - 4.5 Managing backup server

142 Copyright © Acronis, Inc., 2000-2009 which will contain only the

Seite 50 - 4.5.1 Default settings

143 Copyright © Acronis, Inc., 2000-2009 generated file names asz_de

Seite 51

144 Copyright © Acronis, Inc., 2000-2009 server /ftp_password:[passw

Seite 52

145 Copyright © Acronis, Inc., 2000-2009 16.1.3 Specific options (o

Seite 53

146 Copyright © Acronis, Inc., 2000-2009 “my”. /exclude_masks:*.txt

Seite 54

147 Copyright © Acronis, Inc., 2000-2009 extracts the partition type

Seite 55

148 Copyright © Acronis, Inc., 2000-2009 consolidate /target_filenam

Seite 56 - 4.5.6 Managing Archives

149 Copyright © Acronis, Inc., 2000-2009 list /filename:[file_name]

Seite 57

15 Copyright © Acronis, Inc., 2000-2009 Once Acronis True Image Echo

Seite 58

150 Copyright © Acronis, Inc., 2000-2009 asz_delete /partition:[part

Seite 59 - Workstation (local version)

151 Copyright © Acronis, Inc., 2000-2009 2. Restore disks and partit

Seite 60

152 Copyright © Acronis, Inc., 2000-2009 5. Consolidate backups true

Seite 61

153 Copyright © Acronis, Inc., 2000-2009 In our example, the Acronis

Seite 62

154 Copyright © Acronis, Inc., 2000-2009 10. Acronis Secure Zone: de

Seite 63 - 12.5 Managing System Restore

155 Copyright © Acronis, Inc., 2000-2009 recovery, it should not be

Seite 64

156 Copyright © Acronis, Inc., 2000-2009 Source. Specifies the parti

Seite 65 - 3.2 Full, incremental and

157 Copyright © Acronis, Inc., 2000-2009 The script for backing up t

Seite 66 - 1.4.2 Supported storage

16 Copyright © Acronis, Inc., 2000-2009 Encryption Options • Server

Seite 67 - 6.3 Setting backup options

17 Copyright © Acronis, Inc., 2000-2009 Acronis True Image Echo Wor

Seite 68 - 6.3.6 Backup performance

18 Copyright © Acronis, Inc., 2000-2009 2.3.2 Installation of Acron

Seite 69

19 Copyright © Acronis, Inc., 2000-2009 4. Acronis Backup Server M

Seite 70

2 Copyright © Acronis, Inc., 2000-2009 Copyright © Acronis, Inc., 20

Seite 71 - 6.3.1 Archive protection

20 Copyright © Acronis, Inc., 2000-2009 Select from the local backu

Seite 72 - 6.3.4 Database support

21 Copyright © Acronis, Inc., 2000-2009 Click Set up Administrator p

Seite 73 - 6.3.5 Compression level

22 Copyright © Acronis, Inc., 2000-2009 2.3.4 Acronis Universal Res

Seite 74 - 6.3.8 Archive splitting

23 Copyright © Acronis, Inc., 2000-2009 True Image Echo Workstation

Seite 75 - 6.3.10 Media components

24 Copyright © Acronis, Inc., 2000-2009 Chapter 3. General informat

Seite 76 - 6.3.11 Error handling

25 Copyright © Acronis, Inc., 2000-2009 A standalone, full backup co

Seite 77 - 6.3.13 Wake On LAN

26 Copyright © Acronis, Inc., 2000-2009 You can back up data automat

Seite 78

27 Copyright © Acronis, Inc., 2000-2009 Recovery Manager" messa

Seite 79

28 Copyright © Acronis, Inc., 2000-2009 You can move, clear or delet

Seite 80 - Recovery Manager)

29 Copyright © Acronis, Inc., 2000-2009 Generally, there are two typ

Seite 81

3 Copyright © Acronis, Inc., 2000-2009 Table of Contents Chapter 1

Seite 82

30 Copyright © Acronis, Inc., 2000-2009 3. At the same time, Acronis

Seite 83 - 7.4 Setting

31 Copyright © Acronis, Inc., 2000-2009 Using Microsoft System Prepa

Seite 84

32 Copyright © Acronis, Inc., 2000-2009 3.7.4 Limitations in using

Seite 85 - 7.3.2 Archive selection

33 Copyright © Acronis, Inc., 2000-2009 1 U1 U1 UWorkstationWorkstat

Seite 86 - Active Restore

34 Copyright © Acronis, Inc., 2000-2009 When working with locally at

Seite 87 - Universal Restore

35 Copyright © Acronis, Inc., 2000-2009 new host RSM. This operation

Seite 88

36 Copyright © Acronis, Inc., 2000-2009 3.8.3 Backing up to a tape

Seite 89

37 Copyright © Acronis, Inc., 2000-2009 Implementation notice Due t

Seite 90

38 Copyright © Acronis, Inc., 2000-2009 Chapter 4. Using Acronis Tr

Seite 91 - 7.4 Setting restore options

39 Copyright © Acronis, Inc., 2000-2009 To install Acronis component

Seite 92 - 7.4.3 Pre/post commands

4 Copyright © Acronis, Inc., 2000-2009 3.7.4 Limitations in using A

Seite 93 - 7.4.4 Restoration priority

40 Copyright © Acronis, Inc., 2000-2009 If you do not specify cred

Seite 94 - 7.4.8 Error handling

41 Copyright © Acronis, Inc., 2000-2009 Otherwise the name will be i

Seite 95

42 Copyright © Acronis, Inc., 2000-2009 4.3.2 Backup and recovery t

Seite 96

43 Copyright © Acronis, Inc., 2000-2009 Scheduling Tasks Schedule

Seite 97

44 Copyright © Acronis, Inc., 2000-2009 4.4 Managing groups of comp

Seite 98

45 Copyright © Acronis, Inc., 2000-2009 for computers in the followi

Seite 99

46 Copyright © Acronis, Inc., 2000-2009 7. Create a group backup ta

Seite 100

47 Copyright © Acronis, Inc., 2000-2009 You should also provide the

Seite 101

48 Copyright © Acronis, Inc., 2000-2009 4.4.3 Group tasks managemen

Seite 102

49 Copyright © Acronis, Inc., 2000-2009 4.4.4 Acronis Group Server

Seite 103

5 Copyright © Acronis, Inc., 2000-2009 7.3 Restoring disks/partitio

Seite 104

50 Copyright © Acronis, Inc., 2000-2009 When connecting to a backu

Seite 105 - 3.3 Acronis Secure Zone

51 Copyright © Acronis, Inc., 2000-2009 The default quotas/time lim

Seite 106

52 Copyright © Acronis, Inc., 2000-2009 Please take note of the fac

Seite 107

53 Copyright © Acronis, Inc., 2000-2009 To change a computer backup

Seite 108

54 Copyright © Acronis, Inc., 2000-2009 If you opted for picking th

Seite 109

55 Copyright © Acronis, Inc., 2000-2009 backup location, quotas and

Seite 110

56 Copyright © Acronis, Inc., 2000-2009 To edit limitations for a b

Seite 111

57 Copyright © Acronis, Inc., 2000-2009 You can: 1. Sort the list b

Seite 112

58 Copyright © Acronis, Inc., 2000-2009 their task. They will be try

Seite 113 - 11.2.1 Exploring an archive

59 Copyright © Acronis, Inc., 2000-2009 Chapter 5. Using Acronis Tr

Seite 114 - 11.2.2 Mounting an image

6 Copyright © Acronis, Inc., 2000-2009 12.4.1 Windows event log ...

Seite 115

60 Copyright © Acronis, Inc., 2000-2009 • Explore and Validate Back

Seite 116 - 11.3 Consolidating backups

61 Copyright © Acronis, Inc., 2000-2009 Most of the operations are r

Seite 117

62 Copyright © Acronis, Inc., 2000-2009 Run, stop, edit, clone, rena

Seite 118

63 Copyright © Acronis, Inc., 2000-2009 Other Tools Create bootabl

Seite 119

64 Copyright © Acronis, Inc., 2000-2009 Chapter 6. Creating backup

Seite 120 - 12.1 Email notification

65 Copyright © Acronis, Inc., 2000-2009 You can also apply custom fi

Seite 121 - 12.3 Viewing logs

66 Copyright © Acronis, Inc., 2000-2009 The “farther” you store th

Seite 122 - 12.4 Event tracing

67 Copyright © Acronis, Inc., 2000-2009 7. Select the backup option

Seite 123 - 12.4.2 SNMP notifications

68 Copyright © Acronis, Inc., 2000-2009 You can adjust the backup

Seite 124

69 Copyright © Acronis, Inc., 2000-2009 4. Select the name and loca

Seite 125

7 Copyright © Acronis, Inc., 2000-2009 Chapter 1. Introduction 1.1

Seite 126 - Chapter 7. Restoring

70 Copyright © Acronis, Inc., 2000-2009 See notes and recommendatio

Seite 127 - 13.3.4 Converting workloads

71 Copyright © Acronis, Inc., 2000-2009 6.3.1 Archive protection

Seite 128

72 Copyright © Acronis, Inc., 2000-2009 This option is effective for

Seite 129 - 14.1 General information

73 Copyright © Acronis, Inc., 2000-2009 the entire backup procedure

Seite 130 - 14.3 Executing transfers

74 Copyright © Acronis, Inc., 2000-2009 Workstation to the desired l

Seite 131

75 Copyright © Acronis, Inc., 2000-2009 FAT16 and FAT32 file system

Seite 132 - 14.3.6 Old disk data

76 Copyright © Acronis, Inc., 2000-2009 Choose the basic components

Seite 133

77 Copyright © Acronis, Inc., 2000-2009 When the backup destination

Seite 134

78 Copyright © Acronis, Inc., 2000-2009 3. Find out the computer MAC

Seite 135

79 Copyright © Acronis, Inc., 2000-2009 With Reset archive bit enabl

Seite 136 - 14.3.11 Cloning summary

8 Copyright © Acronis, Inc., 2000-2009 availability for mission crit

Seite 137

80 Copyright © Acronis, Inc., 2000-2009 Chapter 7. Restoring the ba

Seite 138 - 15.1 Selecting a hard disk

81 Copyright © Acronis, Inc., 2000-2009 7.1.3 Recovering dynamic v

Seite 139 - 15.3 Disk add summary

82 Copyright © Acronis, Inc., 2000-2009 (see 11.2.2 Mounting an ima

Seite 140

83 Copyright © Acronis, Inc., 2000-2009 4. Select a folder on your

Seite 141

84 Copyright © Acronis, Inc., 2000-2009 7. Set filters for the speci

Seite 142

85 Copyright © Acronis, Inc., 2000-2009 not be blocked, close applic

Seite 143 - Access to archives

86 Copyright © Acronis, Inc., 2000-2009 7.3.3 Restoration type sele

Seite 144 - General options

87 Copyright © Acronis, Inc., 2000-2009 Finally, if you are not goin

Seite 145

88 Copyright © Acronis, Inc., 2000-2009 If there are partitions on

Seite 146 - /partition:DYN1

89 Copyright © Acronis, Inc., 2000-2009 Selecting Active for a part

Seite 147

9 Copyright © Acronis, Inc., 2000-2009 agents for the status of runn

Seite 148

90 Copyright © Acronis, Inc., 2000-2009 7.3.9 Assigning a letter to

Seite 149

91 Copyright © Acronis, Inc., 2000-2009 - the driver repository - a

Seite 150 - /target_harddisk:[disk

92 Copyright © Acronis, Inc., 2000-2009 You can edit the default (or

Seite 151

93 Copyright © Acronis, Inc., 2000-2009 The program does not support

Seite 152

94 Copyright © Acronis, Inc., 2000-2009 7.4.7 Additional settings 1

Seite 153

95 Copyright © Acronis, Inc., 2000-2009 When the backup location on

Seite 154 - *.txt file

96 Copyright © Acronis, Inc., 2000-2009 4. Select the type of dynam

Seite 155 - 16.2 Scripting

97 Copyright © Acronis, Inc., 2000-2009 On completion of operations,

Seite 156

98 Copyright © Acronis, Inc., 2000-2009 Chapter 8. Scheduling tasks

Seite 157

99 Copyright © Acronis, Inc., 2000-2009 • Manually later – the tas

Kommentare zu diesen Handbüchern

Keine Kommentare