D-Link DNS-1250-04 Acronis Backup Software User Manual for DNS-1250-04 - Page 4

Acronis Startup Recovery Manager, Direct management

Page 4 highlights

5 Direct management ...59 5.1 Administering a managed machine 59 5.1.1 Dashboard...60 5.1.2 Backup plans and tasks ...62 5.1.3 Log ...71 5.2 Creating a backup plan ...74 5.2.1 Why is the program asking for the password 75 5.2.2 Backup plan's credentials ...75 5.2.3 Source type ...75 5.2.4 Items to back up ...76 5.2.5 Access credentials for source ...76 5.2.6 Archive ...77 5.2.7 Access credentials for archive location...78 5.2.8 Backup schemes ...78 5.2.9 Archive validation...80 5.3 Recovering data ...81 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5 5.3.6 5.3.7 5.3.8 5.3.9 5.3.10 Task credentials ...82 Archive selection ...83 Data type...83 Content selection ...83 Access credentials for location ...84 Destination selection ...85 Access credentials for destination ...89 When to recover ...89 Universal Restore ...90 Bootability troubleshooting...91 5.4 Validating vaults, archives and backups 92 5.4.1 Task credentials ...93 5.4.2 Archive selection ...93 5.4.3 Backup selection...94 5.4.4 Location selection...94 5.4.5 Access credentials for source ...94 5.4.6 When to validate ...95 5.5 Mounting an image...95 5.5.1 Archive selection ...96 5.5.2 Backup selection...96 5.5.3 Access credentials ...97 5.5.4 Volume selection...97 5.6 Managing mounted images ...97 5.7 Acronis Startup Recovery Manager 98 5.8 Bootable media...98 5.8.1 How to create bootable media ...99 5.8.2 Working under bootable media...102 5.8.3 Recovering MD devices and logical volumes 104 5.9 Disk management ...106 5.9.1 Supported file systems...107 5.9.2 Basic precautions...107 5.9.3 Running Acronis Disk Director Lite...107 5.9.4 Choosing the operating system for disk management 108 5.9.5 "Disk management" view ...108 5.9.6 Disk operations...109 5.9.7 Volume operations...115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153

5
Direct management
.............................................................................................................
59
5.1
Administering a managed machine
.........................................................................................
59
5.1.1
Dashboard
......................................................................................................................................................
60
5.1.2
Backup plans and tasks
.................................................................................................................................
62
5.1.3
Log
..................................................................................................................................................................
71
5.2
Creating a backup plan
............................................................................................................
74
5.2.1
Why is the program asking for the password?
...........................................................................................
75
5.2.2
Backup plan's credentials
.............................................................................................................................
75
5.2.3
Source type
....................................................................................................................................................
75
5.2.4
Items to back up
............................................................................................................................................
76
5.2.5
Access credentials for source
.......................................................................................................................
76
5.2.6
Archive
...........................................................................................................................................................
77
5.2.7
Access credentials for archive location
........................................................................................................
78
5.2.8
Backup schemes
............................................................................................................................................
78
5.2.9
Archive validation
..........................................................................................................................................
80
5.3
Recovering data
.......................................................................................................................
81
5.3.1
Task credentials
.............................................................................................................................................
82
5.3.2
Archive selection
...........................................................................................................................................
83
5.3.3
Data type
........................................................................................................................................................
83
5.3.4
Content selection
..........................................................................................................................................
83
5.3.5
Access credentials for location
.....................................................................................................................
84
5.3.6
Destination selection
....................................................................................................................................
85
5.3.7
Access credentials for destination
...............................................................................................................
89
5.3.8
When to recover
...........................................................................................................................................
89
5.3.9
Universal Restore
..........................................................................................................................................
90
5.3.10
Bootability troubleshooting
..........................................................................................................................
91
5.4
Validating vaults, archives and backups
..................................................................................
92
5.4.1
Task credentials
.............................................................................................................................................
93
5.4.2
Archive selection
...........................................................................................................................................
93
5.4.3
Backup selection
............................................................................................................................................
94
5.4.4
Location selection
..........................................................................................................................................
94
5.4.5
Access credentials for source
.......................................................................................................................
94
5.4.6
When to validate
...........................................................................................................................................
95
5.5
Mounting an image
..................................................................................................................
95
5.5.1
Archive selection
...........................................................................................................................................
96
5.5.2
Backup selection
............................................................................................................................................
96
5.5.3
Access credentials
.........................................................................................................................................
97
5.5.4
Volume selection
...........................................................................................................................................
97
5.6
Managing mounted images
.....................................................................................................
97
5.7
Acronis Startup Recovery Manager
.........................................................................................
98
5.8
Bootable media
........................................................................................................................
98
5.8.1
How to create bootable media
....................................................................................................................
99
5.8.2
Working under bootable media
.................................................................................................................
102
5.8.3
Recovering MD devices and logical volumes
............................................................................................
104
5.9
Disk management
..................................................................................................................
106
5.9.1
Supported file systems
................................................................................................................................
107
5.9.2
Basic precautions
.........................................................................................................................................
107
5.9.3
Running Acronis Disk Director Lite
.............................................................................................................
107
5.9.4
Choosing the operating system for disk management
............................................................................
108
5.9.5
"Disk management" view
...........................................................................................................................
108
5.9.6
Disk operations
............................................................................................................................................
109
5.9.7
Volume operations
......................................................................................................................................
115