D-Link DNS-1250-04 Acronis Backup Software User Manual for DNS-1250-04 - Page 96

Archive selection, Backup selection, Source

Page 96 highlights

 "Band aid" database recovery solution: mount up an image that contains an SQL database from a recently failed machine. This will give access to the database until the failed machine is recovered.  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable media and creates an image. Then, the administrator mounts this image, scans and cleans it with an antivirus program, and finally recovers the machine. To mount an image, perform the following steps. Source Archive Specify the path to the archive location and select the archive containing disk backups. Backup (p. 96) Select the backup. Access credentials [Optional] Provide credentials for the archive location. To access this option, select the Advanced view check box. 5.5.1 Archive selection To select an archive 1. Enter the full path to the location in the Path field, or select the desired folder in the folders tree.  To select a personal vault, expand the Personal group and click the appropriate vault.  To select a local folder (CD/DVD drive, or locally attached tape device), expand the Local folders group and click the required folder.  To select a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them.  To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 1. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. If the archive is password-protected, provide the password. 2. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 5.5.2 Backup selection To select a backup: 1. Select one of the backups by its creation date/time. 2. To assist you with choosing the right backup, the bottom table displays the volumes contained in the selected backup. To obtain information on a volume, right-click it and then click Information.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153

"Band aid" database recovery solution
: mount up an image that contains an SQL database from
a recently failed machine. This will give access to the database until the failed machine is
recovered.
Offline virus clean
: if a machine is attacked, the administrator shuts it down, boots with bootable
media and creates an image. Then, the administrator mounts this image, scans and cleans it with
an antivirus program, and finally recovers the machine.
To mount an image, perform the following steps.
Source
Archive
Specify the path to the archive location and select the archive containing disk backups.
Backup
(p. 96)
Select the backup.
Access credentials
[Optional] Provide credentials for the archive location. To access this option, select the
Advanced view
check box.
5.5.1
Archive selection
To select an archive
1.
Enter the full path to the location in the Path field, or select the desired folder in the folders tree.
To select a personal vault, expand the
Personal
group and click the appropriate vault.
To select a local folder
(CD/DVD drive, or locally attached tape device), expand the
Local folders
group and click the required folder.
To select a network share, expand the
Network folders
group, select the required networked
machine and then click the shared folder. If the network share requires access credentials, the
program will ask for them.
To select
FTP
or
SFTP
server, expand the corresponding group and click the appropriate folder on
the server.
According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.
1.
In the table to the right of the tree, select the archive. The table displays the names of the
archives contained in each vault/folder you select. If the archive is password-protected, provide
the password.
2.
While you are reviewing the location content, archives can be added, deleted or modified by
another user or by the program itself according to scheduled operations. Use the
Refresh
button
to refresh the list of archives.
3.
Click
OK
.
5.5.2
Backup selection
To select a backup:
1.
Select one of the backups by its creation date/time.
2.
To assist you with choosing the right backup, the bottom table displays the volumes contained in
the selected backup.
To obtain information on a volume, right-click it and then click
Information
.