Avanquest Acronis True Image Echo Workstation Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie do odzyskiwania kopii zapasowych Avanquest Acronis True Image Echo Workstation. Avanquest Acronis True Image Echo Workstation Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 157
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Workstation

User’s Guide Acronis® True Image Echo Workstation

Strona 2

10 Copyright © Acronis, Inc., 2000-2009 Multi-volume snapshot for da

Strona 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 In the upper field, enter

Strona 4

101 Copyright © Acronis, Inc., 2000-2009 If the computer is off whe

Strona 5

102 Copyright © Acronis, Inc., 2000-2009 8.1.3 Setting up monthly e

Strona 6

103 Copyright © Acronis, Inc., 2000-2009 If the computer is off whe

Strona 7 - Chapter 1. Introduction

104 Copyright © Acronis, Inc., 2000-2009 There are two ways of chang

Strona 8

105 Copyright © Acronis, Inc., 2000-2009 Chapter 9. Managing the Ac

Strona 9

106 Copyright © Acronis, Inc., 2000-2009 4. In the next window, ent

Strona 10

107 Copyright © Acronis, Inc., 2000-2009 5. You can set a password t

Strona 11 - 1.5 License policy

108 Copyright © Acronis, Inc., 2000-2009 9.3 Changing the password

Strona 12 - 1.6 Technical support

109 Copyright © Acronis, Inc., 2000-2009 Chapter 10. Creating boota

Strona 13 - 2.1 System requirements

11 Copyright © Acronis, Inc., 2000-2009 1.4 Supported file systems

Strona 14 - 2.2 Security parameters

110 Copyright © Acronis, Inc., 2000-2009 The bootable version of Acr

Strona 15

111 Copyright © Acronis, Inc., 2000-2009 4. If you are creating a CD

Strona 16

112 Copyright © Acronis, Inc., 2000-2009 Chapter 11. Operations wit

Strona 17

113 Copyright © Acronis, Inc., 2000-2009 Both operations are perform

Strona 18 - 3.5 Acronis Backup

114 Copyright © Acronis, Inc., 2000-2009 If you added a comment to

Strona 19

115 Copyright © Acronis, Inc., 2000-2009 If you added a comment to

Strona 20

116 Copyright © Acronis, Inc., 2000-2009 5. Select whether you want

Strona 21

117 Copyright © Acronis, Inc., 2000-2009 2. Select the archive from

Strona 22

118 Copyright © Acronis, Inc., 2000-2009 The clone archive will con

Strona 23

119 Copyright © Acronis, Inc., 2000-2009 The resulting archive cont

Strona 24

12 Copyright © Acronis, Inc., 2000-2009 1.6 Technical support As pa

Strona 25

120 Copyright © Acronis, Inc., 2000-2009 Chapter 12. Notifications

Strona 26 - 3.4.2 How to use

121 Copyright © Acronis, Inc., 2000-2009 1. Enable the Messenger ser

Strona 27 - 3.5 Acronis Backup Server

122 Copyright © Acronis, Inc., 2000-2009 The left panel can contain

Strona 28

123 Copyright © Acronis, Inc., 2000-2009 An additional choice is ava

Strona 29 - 3.6 Acronis Active Restore

124 Copyright © Acronis, Inc., 2000-2009 This feature is available

Strona 30 - 3.6.3 How to use

125 Copyright © Acronis, Inc., 2000-2009 Chapter 13. Working with a

Strona 31

126 Copyright © Acronis, Inc., 2000-2009 The procedure is the same a

Strona 32

127 Copyright © Acronis, Inc., 2000-2009 This allows: • the fastes

Strona 33

128 Copyright © Acronis, Inc., 2000-2009 Connect the console to the

Strona 34 - 6.3.14 Additional settings

129 Copyright © Acronis, Inc., 2000-2009 Chapter 14. Transferring t

Strona 35

13 Copyright © Acronis, Inc., 2000-2009 Chapter 2. Acronis True Ima

Strona 36

130 Copyright © Acronis, Inc., 2000-2009 14.2 Security Please note

Strona 37

131 Copyright © Acronis, Inc., 2000-2009 You can determine the sour

Strona 38 - Management Console

132 Copyright © Acronis, Inc., 2000-2009 14.3.4 Partitioned destina

Strona 39

133 Copyright © Acronis, Inc., 2000-2009 • Keep data – leave the ol

Strona 40

134 Copyright © Acronis, Inc., 2000-2009 The second method takes mo

Strona 41

135 Copyright © Acronis, Inc., 2000-2009 If you elect to transfer in

Strona 42

136 Copyright © Acronis, Inc., 2000-2009 Along with the hard disk nu

Strona 43

137 Copyright © Acronis, Inc., 2000-2009 Along with the hard disk nu

Strona 44

138 Copyright © Acronis, Inc., 2000-2009 Chapter 15. Adding a new h

Strona 45

139 Copyright © Acronis, Inc., 2000-2009 You will be prompted to set

Strona 46

14 Copyright © Acronis, Inc., 2000-2009 2.2 Security parameters 2.2

Strona 47 - Chapter 8. Scheduling tasks

140 Copyright © Acronis, Inc., 2000-2009 Chapter 16. Command-line m

Strona 48 - 8.2 Managing scheduled tasks

141 Copyright © Acronis, Inc., 2000-2009 /incremental /differential

Strona 49 - 4.5 Managing backup server

142 Copyright © Acronis, Inc., 2000-2009 which will contain only the

Strona 50 - 4.5.1 Default settings

143 Copyright © Acronis, Inc., 2000-2009 generated file names asz_de

Strona 51

144 Copyright © Acronis, Inc., 2000-2009 server /ftp_password:[passw

Strona 52

145 Copyright © Acronis, Inc., 2000-2009 16.1.3 Specific options (o

Strona 53

146 Copyright © Acronis, Inc., 2000-2009 “my”. /exclude_masks:*.txt

Strona 54

147 Copyright © Acronis, Inc., 2000-2009 extracts the partition type

Strona 55

148 Copyright © Acronis, Inc., 2000-2009 consolidate /target_filenam

Strona 56 - 4.5.6 Managing Archives

149 Copyright © Acronis, Inc., 2000-2009 list /filename:[file_name]

Strona 57

15 Copyright © Acronis, Inc., 2000-2009 Once Acronis True Image Echo

Strona 58

150 Copyright © Acronis, Inc., 2000-2009 asz_delete /partition:[part

Strona 59 - Workstation (local version)

151 Copyright © Acronis, Inc., 2000-2009 2. Restore disks and partit

Strona 60

152 Copyright © Acronis, Inc., 2000-2009 5. Consolidate backups true

Strona 61

153 Copyright © Acronis, Inc., 2000-2009 In our example, the Acronis

Strona 62

154 Copyright © Acronis, Inc., 2000-2009 10. Acronis Secure Zone: de

Strona 63 - 12.5 Managing System Restore

155 Copyright © Acronis, Inc., 2000-2009 recovery, it should not be

Strona 64

156 Copyright © Acronis, Inc., 2000-2009 Source. Specifies the parti

Strona 65 - 3.2 Full, incremental and

157 Copyright © Acronis, Inc., 2000-2009 The script for backing up t

Strona 66 - 1.4.2 Supported storage

16 Copyright © Acronis, Inc., 2000-2009 Encryption Options • Server

Strona 67 - 6.3 Setting backup options

17 Copyright © Acronis, Inc., 2000-2009 Acronis True Image Echo Wor

Strona 68 - 6.3.6 Backup performance

18 Copyright © Acronis, Inc., 2000-2009 2.3.2 Installation of Acron

Strona 69

19 Copyright © Acronis, Inc., 2000-2009 4. Acronis Backup Server M

Strona 70

2 Copyright © Acronis, Inc., 2000-2009 Copyright © Acronis, Inc., 20

Strona 71 - 6.3.1 Archive protection

20 Copyright © Acronis, Inc., 2000-2009 Select from the local backu

Strona 72 - 6.3.4 Database support

21 Copyright © Acronis, Inc., 2000-2009 Click Set up Administrator p

Strona 73 - 6.3.5 Compression level

22 Copyright © Acronis, Inc., 2000-2009 2.3.4 Acronis Universal Res

Strona 74 - 6.3.8 Archive splitting

23 Copyright © Acronis, Inc., 2000-2009 True Image Echo Workstation

Strona 75 - 6.3.10 Media components

24 Copyright © Acronis, Inc., 2000-2009 Chapter 3. General informat

Strona 76 - 6.3.11 Error handling

25 Copyright © Acronis, Inc., 2000-2009 A standalone, full backup co

Strona 77 - 6.3.13 Wake On LAN

26 Copyright © Acronis, Inc., 2000-2009 You can back up data automat

Strona 78

27 Copyright © Acronis, Inc., 2000-2009 Recovery Manager" messa

Strona 79

28 Copyright © Acronis, Inc., 2000-2009 You can move, clear or delet

Strona 80 - Recovery Manager)

29 Copyright © Acronis, Inc., 2000-2009 Generally, there are two typ

Strona 81

3 Copyright © Acronis, Inc., 2000-2009 Table of Contents Chapter 1

Strona 82

30 Copyright © Acronis, Inc., 2000-2009 3. At the same time, Acronis

Strona 83 - 7.4 Setting

31 Copyright © Acronis, Inc., 2000-2009 Using Microsoft System Prepa

Strona 84

32 Copyright © Acronis, Inc., 2000-2009 3.7.4 Limitations in using

Strona 85 - 7.3.2 Archive selection

33 Copyright © Acronis, Inc., 2000-2009 1 U1 U1 UWorkstationWorkstat

Strona 86 - Active Restore

34 Copyright © Acronis, Inc., 2000-2009 When working with locally at

Strona 87 - Universal Restore

35 Copyright © Acronis, Inc., 2000-2009 new host RSM. This operation

Strona 88

36 Copyright © Acronis, Inc., 2000-2009 3.8.3 Backing up to a tape

Strona 89

37 Copyright © Acronis, Inc., 2000-2009 Implementation notice Due t

Strona 90

38 Copyright © Acronis, Inc., 2000-2009 Chapter 4. Using Acronis Tr

Strona 91 - 7.4 Setting restore options

39 Copyright © Acronis, Inc., 2000-2009 To install Acronis component

Strona 92 - 7.4.3 Pre/post commands

4 Copyright © Acronis, Inc., 2000-2009 3.7.4 Limitations in using A

Strona 93 - 7.4.4 Restoration priority

40 Copyright © Acronis, Inc., 2000-2009 If you do not specify cred

Strona 94 - 7.4.8 Error handling

41 Copyright © Acronis, Inc., 2000-2009 Otherwise the name will be i

Strona 95

42 Copyright © Acronis, Inc., 2000-2009 4.3.2 Backup and recovery t

Strona 96

43 Copyright © Acronis, Inc., 2000-2009 Scheduling Tasks Schedule

Strona 97

44 Copyright © Acronis, Inc., 2000-2009 4.4 Managing groups of comp

Strona 98

45 Copyright © Acronis, Inc., 2000-2009 for computers in the followi

Strona 99

46 Copyright © Acronis, Inc., 2000-2009 7. Create a group backup ta

Strona 100

47 Copyright © Acronis, Inc., 2000-2009 You should also provide the

Strona 101

48 Copyright © Acronis, Inc., 2000-2009 4.4.3 Group tasks managemen

Strona 102

49 Copyright © Acronis, Inc., 2000-2009 4.4.4 Acronis Group Server

Strona 103

5 Copyright © Acronis, Inc., 2000-2009 7.3 Restoring disks/partitio

Strona 104

50 Copyright © Acronis, Inc., 2000-2009 When connecting to a backu

Strona 105 - 3.3 Acronis Secure Zone

51 Copyright © Acronis, Inc., 2000-2009 The default quotas/time lim

Strona 106

52 Copyright © Acronis, Inc., 2000-2009 Please take note of the fac

Strona 107

53 Copyright © Acronis, Inc., 2000-2009 To change a computer backup

Strona 108

54 Copyright © Acronis, Inc., 2000-2009 If you opted for picking th

Strona 109

55 Copyright © Acronis, Inc., 2000-2009 backup location, quotas and

Strona 110

56 Copyright © Acronis, Inc., 2000-2009 To edit limitations for a b

Strona 111

57 Copyright © Acronis, Inc., 2000-2009 You can: 1. Sort the list b

Strona 112

58 Copyright © Acronis, Inc., 2000-2009 their task. They will be try

Strona 113 - 11.2.1 Exploring an archive

59 Copyright © Acronis, Inc., 2000-2009 Chapter 5. Using Acronis Tr

Strona 114 - 11.2.2 Mounting an image

6 Copyright © Acronis, Inc., 2000-2009 12.4.1 Windows event log ...

Strona 115

60 Copyright © Acronis, Inc., 2000-2009 • Explore and Validate Back

Strona 116 - 11.3 Consolidating backups

61 Copyright © Acronis, Inc., 2000-2009 Most of the operations are r

Strona 117

62 Copyright © Acronis, Inc., 2000-2009 Run, stop, edit, clone, rena

Strona 118

63 Copyright © Acronis, Inc., 2000-2009 Other Tools Create bootabl

Strona 119

64 Copyright © Acronis, Inc., 2000-2009 Chapter 6. Creating backup

Strona 120 - 12.1 Email notification

65 Copyright © Acronis, Inc., 2000-2009 You can also apply custom fi

Strona 121 - 12.3 Viewing logs

66 Copyright © Acronis, Inc., 2000-2009 The “farther” you store th

Strona 122 - 12.4 Event tracing

67 Copyright © Acronis, Inc., 2000-2009 7. Select the backup option

Strona 123 - 12.4.2 SNMP notifications

68 Copyright © Acronis, Inc., 2000-2009 You can adjust the backup

Strona 124

69 Copyright © Acronis, Inc., 2000-2009 4. Select the name and loca

Strona 125

7 Copyright © Acronis, Inc., 2000-2009 Chapter 1. Introduction 1.1

Strona 126 - Chapter 7. Restoring

70 Copyright © Acronis, Inc., 2000-2009 See notes and recommendatio

Strona 127 - 13.3.4 Converting workloads

71 Copyright © Acronis, Inc., 2000-2009 6.3.1 Archive protection

Strona 128

72 Copyright © Acronis, Inc., 2000-2009 This option is effective for

Strona 129 - 14.1 General information

73 Copyright © Acronis, Inc., 2000-2009 the entire backup procedure

Strona 130 - 14.3 Executing transfers

74 Copyright © Acronis, Inc., 2000-2009 Workstation to the desired l

Strona 131

75 Copyright © Acronis, Inc., 2000-2009 FAT16 and FAT32 file system

Strona 132 - 14.3.6 Old disk data

76 Copyright © Acronis, Inc., 2000-2009 Choose the basic components

Strona 133

77 Copyright © Acronis, Inc., 2000-2009 When the backup destination

Strona 134

78 Copyright © Acronis, Inc., 2000-2009 3. Find out the computer MAC

Strona 135

79 Copyright © Acronis, Inc., 2000-2009 With Reset archive bit enabl

Strona 136 - 14.3.11 Cloning summary

8 Copyright © Acronis, Inc., 2000-2009 availability for mission crit

Strona 137

80 Copyright © Acronis, Inc., 2000-2009 Chapter 7. Restoring the ba

Strona 138 - 15.1 Selecting a hard disk

81 Copyright © Acronis, Inc., 2000-2009 7.1.3 Recovering dynamic v

Strona 139 - 15.3 Disk add summary

82 Copyright © Acronis, Inc., 2000-2009 (see 11.2.2 Mounting an ima

Strona 140

83 Copyright © Acronis, Inc., 2000-2009 4. Select a folder on your

Strona 141

84 Copyright © Acronis, Inc., 2000-2009 7. Set filters for the speci

Strona 142

85 Copyright © Acronis, Inc., 2000-2009 not be blocked, close applic

Strona 143 - Access to archives

86 Copyright © Acronis, Inc., 2000-2009 7.3.3 Restoration type sele

Strona 144 - General options

87 Copyright © Acronis, Inc., 2000-2009 Finally, if you are not goin

Strona 145

88 Copyright © Acronis, Inc., 2000-2009 If there are partitions on

Strona 146 - /partition:DYN1

89 Copyright © Acronis, Inc., 2000-2009 Selecting Active for a part

Strona 147

9 Copyright © Acronis, Inc., 2000-2009 agents for the status of runn

Strona 148

90 Copyright © Acronis, Inc., 2000-2009 7.3.9 Assigning a letter to

Strona 149

91 Copyright © Acronis, Inc., 2000-2009 - the driver repository - a

Strona 150 - /target_harddisk:[disk

92 Copyright © Acronis, Inc., 2000-2009 You can edit the default (or

Strona 151

93 Copyright © Acronis, Inc., 2000-2009 The program does not support

Strona 152

94 Copyright © Acronis, Inc., 2000-2009 7.4.7 Additional settings 1

Strona 153

95 Copyright © Acronis, Inc., 2000-2009 When the backup location on

Strona 154 - *.txt file

96 Copyright © Acronis, Inc., 2000-2009 4. Select the type of dynam

Strona 155 - 16.2 Scripting

97 Copyright © Acronis, Inc., 2000-2009 On completion of operations,

Strona 156

98 Copyright © Acronis, Inc., 2000-2009 Chapter 8. Scheduling tasks

Strona 157

99 Copyright © Acronis, Inc., 2000-2009 • Manually later – the tas

Komentarze do niniejszej Instrukcji

Brak uwag