BACKUP OPERATIONS Performing backups and related operations Acronis - - PowerPoint PPT Presentation

backup operations
SMART_READER_LITE
LIVE PREVIEW

BACKUP OPERATIONS Performing backups and related operations Acronis - - PowerPoint PPT Presentation

BACKUP OPERATIONS Performing backups and related operations Acronis Training and Certification Authorized Use Only 1 Module Outline 1. Backup Plan 2. Planning for Backup 3. Configuring Backup Plans 4. Creating the Backup Plan 5. Backup


slide-1
SLIDE 1

1 Acronis Training and Certification – Authorized Use Only

BACKUP OPERATIONS

Performing backups and related operations

slide-2
SLIDE 2

2 Acronis Training and Certification – Authorized Use Only

Module Outline

  • 1. Backup Plan
  • 2. Planning for Backup
  • 3. Configuring Backup Plans
  • 4. Creating the Backup Plan
  • 5. Backup Options
  • 6. Other operations
  • 7. Initial Seeding and Large Scale Recovery
slide-3
SLIDE 3

3 Acronis Training and Certification – Authorized Use Only

Backup Plan

What is a Backup Plan

slide-4
SLIDE 4

5 Acronis Training and Certification – Authorized Use Only

  • 1. Backup Plan

Create Backup Plan

slide-5
SLIDE 5

6 Acronis Training and Certification – Authorized Use Only

  • 1. Backup Plan

‒ Backups in Acronis Backup and Acronis Backup Cloud are created via backup plans ‒ A backup plan is a set of rules that specify how the selected data will be protected on a machine ‒ A backup plan can be applied to multiple machines at the time of its creation

  • r later

‒ When applied to a machine, the backup plan is registered on the Management Server and the backup script is deployed to the Agent. After the script is deployed, the Agent will execute it according to the schedule

slide-6
SLIDE 6

7 Acronis Training and Certification – Authorized Use Only

Planning for Backup

How to plan for backup

slide-7
SLIDE 7

8 Acronis Training and Certification – Authorized Use Only

  • 2. Planning for Backup

‒ Understand your data environment and what needs to be backed up, e.g., for recovery and/or for archival

▪ Entire machine/disks/volumes/VMs or individual files/folders/databases? ▪ Application-aware backup and need for granular recovery? ▪ Regulatory/audit compliance? Legal obligations? ▪ Size of data and length of backup window?

‒ Determine the backup strategy (retention period and replication?) and most suitable type of storage for storing and retrieving the backup

▪ D2D2D (local or network folder) or D2D2C ▪ Local, network storage and/or cloud? Staging to cloud for replication or archival?

slide-8
SLIDE 8

9 Acronis Training and Certification – Authorized Use Only

  • 2. Planning for Backup

‒ Determine Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for each service/system to be backed up, use revenue or cost per hour as a guide

▪ RPO or frequency of backup is determined based on maximum acceptable loss of data in case of a service disruption or outage ▪ RTO or maximum time allowed for recovery is determined based on avoiding unacceptable consequences associated with a service disruption or outage

slide-9
SLIDE 9

10 Acronis Training and Certification – Authorized Use Only

  • 2. Planning for Backup

‒ Have multiple versions of your backup, follow the 3-2-1 rule:

▪ Eliminate single point of failure ▪ Leverage on different types of storage for maximizing capacity/performance vs. price

‒ Align with backup needs (recovery or archival), backup strategy and RTO/RPO requirements ‒ Formulate and document a disaster recovery plan for each service and an

  • verall business continuity plan and test often

1 2 3 3 2 1

slide-10
SLIDE 10

11 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Applications

‒ For Microsoft Exchange and Microsoft SQL servers, they can be protected in 2 ways:

▪ Database backup: File-level backup of the database and associated metadata ▪ Application-aware backup: Disk-level backup of the entire server and associated application metadata

‒ Both database and application-aware backup can be used for:

▪ Recover database to live application ▪ Recover database as files ▪ Granular recovery of application items ▪ For Microsoft Exchange 2010 SP1 and above, Mailbox backup is also possible, backed up mailboxes and mailbox items can be used to recover to live Exchange Server

slide-11
SLIDE 11

12 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Applications

‒ For SharePoint farms:

▪ Backup all of the database servers with application-aware backup and all of the unique front-end and application servers with normal disk-level backup ▪ Backups of all servers should be performed using the same schedule

‒ For domain controllers, application-aware backup can be used and if a domain contains more than 1 domain controller, a non-authoritative restore is performed and USN rollback will not occur after recovery

slide-12
SLIDE 12

13 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Applications

‒ Pre-requisites:

▪ For Microsoft SQL, ensure that:

  • At least 1 Microsoft SQL server instance is started
  • SQL Server Browser Service and TCP/IP protocol is enabled
  • SQL writer for VSS is turned on

▪ For Microsoft Exchange, ensure that:

  • Microsoft Exchange Information Store is started
  • Windows PowerShell is installed, for Exchange 2010 and above, PowerShell must be at least v2.0
  • Microsoft .NET framework is installed: For Exchange 2007, .NET must be at least v2.0, for Exchange 2010

and later, .NET must be at least v3.5

  • Exchange writer for VSS is turned on
slide-13
SLIDE 13

14 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Applications

‒ On a domain controller, ensure that:

▪ Active Directory writer for VSS is turned on

‒ Additionally, when creating a backup plan, ensure that for What to back up, Entire machine is selected as Application backup section will only show up if Entire machine is selected for backup

slide-14
SLIDE 14

15 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Applications

‒ Application-aware backup requires either:

▪ Agent for Windows + Agent for Exchange/SQL/Active Directory installed on the physical

  • r virtual machine, i.e., agent-based backup or guest-level backup

▪ Agent for VMware, i.e., agentless backup or hypervisor-level backup ▪ For VMs backed up by Agent for VMware:

  • VMs have to meet the requirements for application-consistent quiescing (refer to VMware KB)
  • VMware Tools is installed and up-to-date
  • UAC has to be disabled on Windows-based VMs, if not, a built-in domain administrator credentials have to

be specified when enabling application backup

‒ Exchange and SQL transaction logs are truncated after each successful backup

slide-15
SLIDE 15

17 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting VMs and Virtualization Hosts

‒ For VMware:

▪ ESXi configuration can be backed up which allows recovery of an ESXi host to bare metal ▪ Backup of ESXi configuration includes:

  • Bootloader and boot bank partitions of the host
  • Host state (configuration of virtual networking and storage, SSL keys, server network settings and local

user information)

  • Extensions and patches installed or staged on the host
  • Log files

▪ Pre-requisites:

  • SSH must be enabled in the Security Profile of the ESXi host configuration
  • Password for the “root” account on the ESXi host to be backed up
slide-16
SLIDE 16

18 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting VMs and Virtualization Hosts

‒ For Hyper-V:

▪ Entire Hyper-V server (including VMs) can be backed up with Agent for Windows via disk-level backup:

  • Requires Hyper-V Integration Services to be installed and updated on the VMs
  • Hyper-V VSS writers must be working (check using vssadmin list writers)

‒ For Citrix, RHEV, KVM, Parallels, Oracle VMs:

▪ VMs can be backed up from inside guest OS (agent-based/guest-level backup) the same as physical machines

‒ For Windows Azure and Amazon EC2:

▪ Azure and EC2 VMs can be backed up with Agent for Windows/Linux ▪ Backup and recovery operations are the same as physical machines

slide-17
SLIDE 17

19 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Office 365 Mailboxes
slide-18
SLIDE 18

20 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Office 365 Mailboxes

‒ Microsoft Office 365 mailboxes can be backed up to local and cloud storage which will include all mailbox content such as Email folders, Email messages, Calendar events, Tasks, Contacts, Journal entries and Notes ‒ Requires Agent for Office 365 and Global Administrator role credentials ‒ Limitations:

▪ Archive mailboxes (In-Place Archive) cannot be backed up ▪ Recovery to new mailbox is not possible, a new Office 365 user has to be created manually and items can be recovered to this user’s mailbox ▪ Recovery to different Microsoft Office 365 organization or to on-premise Microsoft Exchange Server is not supported

slide-19
SLIDE 19

21 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Mobile Devices

‒ What can be backed up:

▪ Contacts, Photos, Videos, Calendars ▪ Text messages (Android only) ▪ Reminders (iOS only)

‒ Mobile devices can be backed up to cloud storage

  • nly

‒ If SD card is present, data stored on the card is backed up as well ‒ Backed up data can be accessed and transferred to any mobile device with the app installed

slide-20
SLIDE 20

22 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Mobile Devices

‒ When the app is opened, a summary of data changes will be shown and a backup can be started manually ‒ Latest data can be recovered via the app, older versions can be recovered as files from the Backup Console ‒ Retention is not applied to mobile device backups,

  • lder backups have to be manually deleted if storage

quota is exceeded

slide-21
SLIDE 21

23 Acronis Training and Certification – Authorized Use Only

  • 2. Protecting Websites

‒ A website can be backed up via SFTP or SSH protocol (no Agent required):

▪ Website content files: All files accessible to the account specified for SFTP or SSH connection ▪ Linked databases (if any) hosted on MySQL servers: All databases accessible to the specified MySQL account ▪ Both website files and databases (if any) should be backed up to enable consistent recovery

‒ Limitations:

▪ Websites can only be backed up to cloud storage ▪ Each website must have its own Backup Plan (1 Backup Plan per 1 website) as a Backup Plan cannot be applied to multiple websites ▪ Backup options are not available

slide-22
SLIDE 22

24 Acronis Training and Certification – Authorized Use Only

  • 2. Deciding What to Back Up

What to back up What can be recovered

Entire machine ‒ Entire machine ‒ 1 or more disks and volumes ‒ 1 or more files and folders ‒ 1 or more database to live application server ‒ 1 or more database as files ‒ Granular recovery to live application server Disks/volumes ‒ 1 or more disks and volumes ‒ 1 or more files and folders Files/folders (physical machines only) ‒ 1 or more files and folders ESXi configurations (ESXi hosts only) ‒ ESXi configuration to bare metal Exchange mailboxes ‒ 1 or more mailbox to live Exchange server ‒ Granular recovery to live Exchange Office 365 mailboxes ‒ Granular recovery to live application ‒ Granular recovery as files

slide-23
SLIDE 23

25 Acronis Training and Certification – Authorized Use Only

  • 2. Deciding What to Back Up

Application What can be recovered From database backup From application-aware backup From disk-level backup

Microsoft Exchange Server

‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine ‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine

Microsoft SQL Server

‒ Database to live SQL instance ‒ Database as files ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Entire machine

Microsoft SharePoint database servers

‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine

Active Directory Domain Services

‒ Entire machine

slide-24
SLIDE 24

26 Acronis Training and Certification – Authorized Use Only

Configuring Backup Plans

Settings available in a Backup Plan

slide-25
SLIDE 25

28 Acronis Training and Certification – Authorized Use Only

  • 3. Configuring Backup Plans

Select from built-in group Select sub group Select machine to backup Configure Backup Plan

slide-26
SLIDE 26

29 Acronis Training and Certification – Authorized Use Only

  • 3. Configuring Backup Plans

‒ Determine which are the machine(s) with data to be backed up ‒ Ensure backup destination has sufficient free space ‒ Plan and decide:

▪ What to back up: Entire machines, disk/volumes, files/folders, ESXi configuration? ▪ Where to back up: Cloud, Local, Network storage? Initial Seeding? ▪ Schedule: Backup scheme – monthly, weekly, daily, hourly? ▪ How long to keep: Retention rule – By backup age, By number of copies? ▪ Replication: Enable replication? From where to where? ▪ Encryption: Turn on AES encryption for backups? ▪ Backup options: Email notification, Error handling, Pre/Post commands?

slide-27
SLIDE 27

31 Acronis Training and Certification – Authorized Use Only

  • 3. Configuring Backup Plans

Backup Plan Sections

slide-28
SLIDE 28

32 Acronis Training and Certification – Authorized Use Only

  • 3. What to back up

‒ Options available depends on the machine selected and installed Agent(s):

▪ Entire machine: All disks and volumes on the machine will be backed up with option of enabling application-aware backups ▪ Disks/volumes, Files/folders: Enables 1 or more disks/volumes or files/folders to be selected ▪ ESXi configuration: ESXi configuration will be backed up ▪ Exchange database, SQL database: Enables 1 or more Exchange or SQL database to be selected ▪ Exchange mailboxes: Enables 1 or more Exchange mailbox to be selected ▪ Office 365 mailboxes: Enables 1 or more O365 mailbox to be selected

slide-29
SLIDE 29

33 Acronis Training and Certification – Authorized Use Only

  • 3. What to back up

‒ When Entire machine is selected, APPLICATION BACKUP section becomes available ‒ Disabled by default, Enable to select desired application for application-aware backup:

▪ Additional credentials may be required ▪ Machine has to meet requirements for application-aware backups ▪ If any requirements are not met, error messages will be shown to assist in meeting the requirements

slide-30
SLIDE 30

34 Acronis Training and Certification – Authorized Use Only

  • 3. Selecting Data To Be Backed Up

What to back up Select machine from Required Agent Required Credentials

Entire machine Disks/volumes Files/folders DEVICES > All devices Agent for respective platform

Administrator or root credentials

ESXi configuration DEVICES > All devices Agent for VMware (Virtual Appliance) Agent for VMware (Windows)

Credentials of the “root” account on the ESXi host

Exchange databases Exchange mailboxes DEVICES > Microsoft Exchange Agent for Windows + Agent for Exchange

Member in Exchange Administrators role group

  • r Member in Organization Management group

SQL databases DEVICES > Microsoft SQL Agent for Windows + Agent for SQL

Credentials of an account belonging to Backup Operators or Administrators group and member

  • f sysadmin role for each SQL instance to be

backed up

Office 365 mailboxes DEVICES > Office 365 Agent for Office 365

Credentials of Global Administrator for Office 365

slide-31
SLIDE 31

35 Acronis Training and Certification – Authorized Use Only

  • 3. Selecting Data To Be Backed Up

‒ For Disks/volumes and Files/folders, data to be backed up can be selected either Directly or by Using policy rules:

▪ Directly: Tick items to be backed up, suitable for selecting multiple disparate items for backup ▪ Using policy rules: Rules are available to select items to be backed, suitable for selecting similar items across multiple machines for backup

‒ For Exchange databases, SQL databases and Office 365 mailboxes, data to be backed up can only be selected directly:

▪ Directly: Go to relevant DEVICE built-in group, e.g., DEVICE > Microsoft Exchange and tick items to be backed up

slide-32
SLIDE 32

36 Acronis Training and Certification – Authorized Use Only

  • 3. Selecting Data To Be Backed Up

‒ Select items directly:

▪ Disks/volumes: 1 or more disks or volumes can be selected ▪ Files/folders: 1 or more local or network files and folders can be selected ▪ ESXi configuration: 1 or more ESXi host can be selected ▪ Exchange and SQL database: 1 or more Exchange Storage groups or Databases or 1

  • r more SQL Instances or databases can be selected

▪ Exchange mailboxes: 1 or more Exchange mailboxes can be selected ▪ Office 365 mailboxes: 1 or more Office 365 mailboxes can be selected

slide-33
SLIDE 33

37 Acronis Training and Certification – Authorized Use Only

  • 3. Selecting Data To Be Backed Up

‒ Using policy rules:

▪ Disks/volumes: Conditional rules such as [All volumes], [Fixed volumes] for volumes

  • n SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays,

[BOOT+SYSTEM] for system and boot volumes, etc. and specific rules such as C:\, /dev/hda1, etc. ▪ Files/folders: Conditional rules such as [All Files], [All Profiles Folder] and %PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise type in a file/folder path such as /dev/hda1/file.txt

‒ When a backup plan using policy rules is applied to multiple machines and no data matches at least 1 of the rules, backup will fail on that particular machine

slide-34
SLIDE 34

38 Acronis Training and Certification – Authorized Use Only

  • 3. Where To Back Up

‒ Cloud Storage: Backups will be stored in Acronis or partner datacenter ‒ Local folders: Backups will be stored locally on the machine being backed up such as internal/external HDD or removable media ‒ Network folder, NFS share: Backups will be stored

  • n SMB or NFS shares accessible from the machine

being backed up ‒ Storage Node: Backups will be stored on managed locations ‒ Secure Zone: Backups will be stored in a secure partition on the local disk of the machine being backed up

slide-35
SLIDE 35

39 Acronis Training and Certification – Authorized Use Only

  • 3. Where To Back Up

‒ SFTP: Backups will be stored on a SFTP server ‒ Tapes: Backups will be stored on tapes in a tape pool

slide-36
SLIDE 36

40 Acronis Training and Certification – Authorized Use Only

  • 3. Secure Zone

‒ Secure Zone is a secure partition that can be created on a local disk of the machine being backed up:

▪ Offers a cost-effective and handy method for protecting data from software malfunction, virus attack and human error ▪ Eliminates the need for a separate media or network connection to backup/recover data ▪ Can be used as a “staging” storage prior to replication of backups

‒ Limitations:

▪ Cannot be created on a Mac ▪ Does not protect against physical failure of the local disk ▪ Does not support single-file backup format

slide-37
SLIDE 37

41 Acronis Training and Certification – Authorized Use Only

  • 3. Secure Zone

‒ To create a Secure Zone, perform the following steps:

1. Go to Details > Create Secure Zone and click Select to select a local disk on which to create the secure zone 2. Enter the Secure Zone size or drag the slider 3. [Optional] Enable Password protection switch and specify a password 4. Click Create

‒ Creating a Secure Zone will change the layout of the volumes on the disk and will require a reboot if space is taken from existing volumes:

▪ Secure Zone will always be created at the end of the disk and unallocated space will be used if any to create the new volume. If there isn’t any unallocated space or if it’s insufficient, free space from existing volumes will be taken instead to create the new volume resulting in existing volumes being resized

slide-38
SLIDE 38

45 Acronis Training and Certification – Authorized Use Only

  • 3. Schedule

‒ When backing up to cloud storage:

▪ Schedule by time: Choose from Hourly, Daily, Weekly, Monthly scheduling ▪ Schedule by events: Choose from an event to start the backup ▪ First backup will be full, subsequent backups will be incremental

‒ When backing up to local storage:

▪ Choice of Backup scheme: Always incremental (single-file), Always full, Weekly full, Daily incremental, Monthly full, Weekly differential, Daily incremental (GFS), Custom ▪ Schedule by time: Choose from Hourly, Daily, Weekly, Monthly scheduling or pre-defined, depending on the backup scheme chosen ▪ Schedule by event: Choose from an event to start the backup ▪ Start conditions: Choose from available conditions

slide-39
SLIDE 39

46 Acronis Training and Certification – Authorized Use Only

  • 3. Schedule

‒ Backup scheme:

▪ Always incremental (single-file): First backup full, subsequent backups incremental, uses new single-file format ▪ Always full: All backups are full ▪ Weekly full, daily incremental: Monday full (can be changed in Backup options), other days incremental ▪ Monthly full, Weekly differential, Daily incremental (GFS): Mondays to Fridays incremental, Saturdays differential, 1st day

  • f the month full

▪ Custom: Specify schedules for full, incremental and differential backup ▪ For Acronis Backup 12.5 on-premise management, depending

  • n backup location and whether the location contains backup

files from previous versions of Acronis Backup, backups may be stored as Version 12 (.tibx) or Version 11 (.tib) backup format

slide-40
SLIDE 40

47 Acronis Training and Certification – Authorized Use Only

  • 3. Schedule

‒ Schedule by time:

▪ Monthly: Run on a monthly recurring basis with choice of selecting days of month or days of week to perform backup ▪ Weekly: Run on a weekly recurring basis with choice of selecting days of week to perform backup ▪ Daily: Run on a daily recurring basis with choice of selecting every day or Monday to Friday to perform backup ▪ Hourly: Run on an hourly basis with choice of every x hours, range of time and days of week to perform backup ▪ A date range can be specified for all of the above types of schedule

slide-41
SLIDE 41

48 Acronis Training and Certification – Authorized Use Only

  • 3. Schedule

‒ Schedule by events:

▪ Upon time since last backup: Specify time since completion of last successful backup within the same backup plan ▪ When user logs on/logs off the system: By default, logging

  • n/off of any user will initiate the backup, can be changed to

specific user account ▪ On system startup, on system shutdown: Backup will be initiated upon system startup/shutdown ▪ On Windows Event Log event: Backup will be initiated upon specific Windows Event, Event Log, Source, Type and ID can be configured

slide-42
SLIDE 42

49 Acronis Training and Certification – Authorized Use Only

  • 3. Schedule

‒ Start conditions:

▪ User is idle: When screen saver is active or when machine is locked ▪ Users logged off: Enables putting backup on hold until all users have logged off from the machine ▪ Fits the time interval: Restricts backup to a specific interval ▪ Backup options > Backup start conditions can be configured to further define behavior of Start conditions such as, Wait until conditions from schedules are met, Start backup anyway after x hours or Skip the scheduled backup ▪ If more than 1 condition is selected, all selected conditions must be met simultaneous before backup will start

slide-43
SLIDE 43

50 Acronis Training and Certification – Authorized Use Only

  • 3. Types of Backup

‒ Full Backup

▪ Stores all data selected for the backup and forms the base for subsequent incremental and differential backups

‒ Incremental Backup

▪ Stores the changes to the data since the most recent backup ▪ Creates a “chain” of backups, requires the corresponding full + all subsequent incrementals to restore data

‒ Differential Backup

▪ Stores changes to the data since the most recent full backup ▪ Creates “links” to the full backup, requires corresponding full + differential to restore data

F F F F F I I I F D D D

slide-44
SLIDE 44

51 Acronis Training and Certification – Authorized Use Only

  • 3. How Long To Keep (Cleanup)

‒ By backup age (default)

▪ Specify how long to keep backups created by the backup plan

‒ By number of backups

▪ Specify the maximum number of copies to retain

‒ By total size of backup

▪ Specify maximum total size of backups to keep, not available with Always incremental (single-file) backup scheme

‒ Keep backup indefinitely

▪ Do not delete backups

‒ Start cleanup

▪ After backup or Before backup

slide-45
SLIDE 45

52 Acronis Training and Certification – Authorized Use Only

  • 3. How Long To Keep (Cleanup)

‒ For cleanup by backup age, by default, backups are grouped into monthly, weekly, daily and hourly sets:

▪ Monthly set: 1st backup created after a month starts ▪ Weekly set: 1st backup created on the day specified in Backup

  • ption > Weekly backup which by default is Monday

▪ Daily set: 1st backup created after a day starts ▪ Hourly set: 1st backup created after an hour starts ▪ E.g., Keep 6 months, 4 weeks, 7 days = keep 1st backup created every month for last 6 months including current month, keep Monday backup created every week for last 4 weeks including current week, keep the 1st backup created every day for last 7 days including current day ▪ If switched to single rule for all backup sets, backups will be retained based on Monthly, e.g., Keep 7 months = keep all backups created for last 7 months including current month

slide-46
SLIDE 46

53 Acronis Training and Certification – Authorized Use Only

  • 3. How Long To Keep (Cleanup)

‒ Depending on the backup format used, cleanup behavior will be different:

▪ For Version 11 backup format which stores backups as individual files, 1 .tib file for 1 backup, cleanup will delete outdated backups immediately unless there’s dependent backups:

  • Backup (typically a full backup) and subsequent dependent backups (incremental or differential) will be

marked for deletion as they become outdated and will be deleted at once when there’s no more dependencies

  • For single-file backups, backups are not deleted, instead the space taken up by outdated backup data will

be marked as free and will be overwritten by subsequent backups

▪ For Version 12 backup format which stores 1 chain of backup (full + all dependent incremental or differential) as a single file, 1 .tibx for 1 chain, cleanup will mark space taken up by outdated backup data as free (similar to single-file backups) if they reside in a single file and delete the single file when all backups in the single file becomes

  • utdated
slide-47
SLIDE 47

54 Acronis Training and Certification – Authorized Use Only

  • 3. How Long To Keep (Cleanup)

‒ The most recent backup will always be kept regardless of cleanup rules ‒ Backups stored on tapes are not deleted until the tape is overwritten ‒ Extra space for storage may have to be allocated as depending on cleanup behavior, outdated backups may not be deleted immediately

slide-48
SLIDE 48

55 Acronis Training and Certification – Authorized Use Only

  • 3. Encryption

‒ Encryption can be enabled to encrypt backups created by a Backup Plan with AES encryption ‒ Once enabled, Encryption setting cannot be modified and a new Backup Plan has to be created to use different encryption settings ‒ To enable, toggle the Encryption switch and specify a password and the AES algorithm to be used

slide-49
SLIDE 49

57 Acronis Training and Certification – Authorized Use Only

  • 3. Conversion to Virtual Machine

‒ Disk-level backups can be converted into a virtual machine as part of a Backup Plan ‒ Conversion can be configured after backup or after replication ‒ Requires Agent for VMware or Hyper-V and corresponding host:

▪ Agent for VMware/Hyper-V must be able to access the backup file, i.e., convert from backups stored on network locations such as network folders and managed locations or on storage local to the Agent

‒ To enable, toggle the Conversion switch and choose to convert to VMware ESXi or Hyper-V VM and specify the Host and other related settings such as Datastore path, Disk provisioning mode, etc.

slide-50
SLIDE 50

58 Acronis Training and Certification – Authorized Use Only

  • 3. Replication

‒ Up to 4 locations for replication is available in a Backup Plan ‒ Backups can be replicated from:

▪ Local folder, network folder, Secure Zone, SFTP, managed locations

‒ Backups can be replicated to:

▪ Local folder, network folder, cloud storage, SFTP, managed locations

‒ Replication from cloud storage and from tape is not supported ‒ Each replication location have its own retention and Convert to VM setting

slide-51
SLIDE 51

59 Acronis Training and Certification – Authorized Use Only

Creating the Backup Plan

Steps for creating a Backup Plan

slide-52
SLIDE 52

60 Acronis Training and Certification – Authorized Use Only

  • 4. Backup Plan Cheat Sheet

WHAT TO BACK UP ITEMS TO BACK UP Selection methods WHERE TO BACK UP SCHEDULE HOW TO KEEP

Disks/volumes (physical machines)

Direct selection Policy rules File filters Cloud Local folder Network folder SFTP server* NFS* Secure Zone* Managed location* Tape device* Always incremental (single-file)* Always full Weekly full, daily incremental Monthly full, Weekly differential, Daily incremental (GFS) Custom (F-D-I) By backup page By number of backups By total size of backups* Keep indefinitely

Disks/volumes (virtual machines)

Policy rules File filters Cloud Local folder Network folder SFTP server* NFS* Managed location* Tape device*

* Certain limitations applies, see Help file

slide-53
SLIDE 53

61 Acronis Training and Certification – Authorized Use Only

  • 4. Backup Plan Cheat Sheet

WHAT TO BACK UP ITEMS TO BACK UP Selection methods WHERE TO BACK UP SCHEDULE HOW LONG TO KEEP

Files (physical machines only)

Direct selection Policy rules File filters Cloud Local folder Network folder SFTP server* NFS* Secure Zone* Managed location* Tape device* Always full Weekly full, daily incremental Monthly full, Weekly differential, Daily incremental (GFS) Custom (F-D-I) By backup page By number of backups By total size of backups* Keep indefinitely

ESXi configuration

Direct selection Local folder Network folder SFTP server NFS*

* Certain limitations applies, see Help file

slide-54
SLIDE 54

62 Acronis Training and Certification – Authorized Use Only

  • 4. Backup Plan Cheat Sheet

WHAT TO BACK UP ITEMS TO BACK UP Selection methods WHERE TO BACK UP SCHEDULE HOW LONG TO KEEP

Exchange Databases

Direct selection Cloud Local folder Network folder Managed location* Tape device Always full Weekly full, daily incremental Custom (F-D-I) By backup page By number of backups By total size of backups* Keep indefinitely

SQL Databases Exchange Mailboxes

Cloud Local folder Network folder Managed location* Always incremental (Single-file)

Office 365 Mailboxes

By number of backups Keep indefinitely

* Certain limitations applies, see Help file

slide-55
SLIDE 55

63 Acronis Training and Certification – Authorized Use Only

  • 4. Creating a Backup Plan

1. Browse from available Device built-in groups to locate the machine, Exchange database (including DAG), Exchange mailbox, SQL database (including AAG) or Office 365 mailbox to backup 2. Select the desired device and click Backup 3. Select WHAT TO BACK UP and optionally APPLICATION BACKUP 4. Select WHERE TO BACKUP and specify the backup destination 5. Select SCHEDULE and specify the backup schedule 6. Select HOW LONG TO KEEP and specify desired retention

slide-56
SLIDE 56

64 Acronis Training and Certification – Authorized Use Only

  • 4. Creating a Backup Plan

7. Optionally, enable and specify the following:

▪ ENCRYPTION, ▪ NOTARIZATION ▪ CONVERT TO VM ▪ Replication to 2nd, 3rd 4th and 5th location

8. Click Create 9. After the Backup Plan is created, you can see when is the next backup as well as manually start the backup by clicking on RUN NOW and optionally select to run Full, Incremental, Differential backup (if configured in the backup plan)

slide-57
SLIDE 57

65 Acronis Training and Certification – Authorized Use Only

  • 4. Creating a Backup Plan

‒ When selecting a device without any applied Backup Plan or when creating a new Backup Plan, existing Backup Plans (for other devices if any) will be shown ‒ These plans can be selected and applied to the device easily and rapidly with minimal modifications

slide-58
SLIDE 58

72 Acronis Training and Certification – Authorized Use Only

  • 4. Operations with Backup Plan

‒ The following are operations possible with Backup Plans:

▪ Edit: Modify existing options and settings in the backup plan ▪ Rename: Modify the existing name of the backup plan ▪ Revoke: Remove the backup plan from a machine ▪ Delete: Revoke and remove the backup plan from the Backup Console

slide-59
SLIDE 59

73 Acronis Training and Certification – Authorized Use Only

  • 4. Browsing Backups

Backup Storage Locations Add location

slide-60
SLIDE 60

74 Acronis Training and Certification – Authorized Use Only

  • 4. Browsing Backups

‒ Backups can be browsed from the BACKUPS menu ‒ All locations currently in use by all backup plans will be shown ‒ New locations can be added by selecting Add location ‒ When adding a location, machine to browse from can be specified in order to ensure that a specific machine (with appropriate agent installed) is used to access the location, e.g., using a machine with Agent for SQL to browse backups of SQL databases ‒ Operations possible:

▪ Show backups > Recover… and Run as VM: Recovery tasks can be created from selected backups ▪ Delete: Backups can be selected and deleted from backup location

slide-61
SLIDE 61

75 Acronis Training and Certification – Authorized Use Only

Backup Options

Understanding available backup options

slide-62
SLIDE 62

76 Acronis Training and Certification – Authorized Use Only

  • 5. Backup Options

Backup options

slide-63
SLIDE 63

77 Acronis Training and Certification – Authorized Use Only

  • 5. Backup Options

‒ Backup options are settings that can modify the behavior of the Backup Plan ‒ Availability of Backup options depends on:

▪ The environment the Agent operates in (Windows, Linux, OSX) ▪ The type of data being backed up (disk, files, VMs, application data) ▪ The backup destination (cloud, local or network storage)

slide-64
SLIDE 64

78 Acronis Training and Certification – Authorized Use Only

  • 5. Backup Consolidation

‒ Effective for Always full; Weekly full, Daily incremental and Custom backup schemes ‒ Preset: Disabled ‒ Consolidation is the process of combining 2 or more subsequent backups into a single backup ‒ When disabled, backups are retained until all dependent backups becomes subject to deletion ‒ If enabled, a backup that should be deleted during cleanup is consolidated with the next dependent backup (incremental or differential)

slide-65
SLIDE 65

79 Acronis Training and Certification – Authorized Use Only

  • 5. Backup Validation

‒ Validation is an operation that checks the possibility

  • f data recovery from a backup

‒ Preset: Disabled ‒ If enabled, each backup created by the backup plan is validated immediately after creation:

▪ Validation calculates a checksum for every data block that can be recovered from the backup. The only exception is file-level backups that are stored in cloud storage. These backups are validated by checking the consistency of the metadata saved in the backup ▪ Validation is a time-consuming process and should only be enabled for compliance purposes

slide-66
SLIDE 66

80 Acronis Training and Certification – Authorized Use Only

  • 5. Change Block Tracking (CBT)

‒ Effective for disk-level backups of VMs and physical machines running Windows ‒ Preset: Enabled ‒ Determines whether to use Change Block Tracking (CBT) when performing an incremental or differential backup ‒ CBT technology accelerates the backup process:

▪ Changes to the disk content are continuously tracked at the block level ▪ When a backup is started, the changes can be immediately saved to the backup

slide-67
SLIDE 67

81 Acronis Training and Certification – Authorized Use Only

  • 5. Compression Level

‒ Defines the level of compression applied to the data being backed up ‒ Available levels: None, Normal, High, Maximum ‒ Preset: Normal ‒ Higher compression level means the backup process takes longer but resulting backup occupies less space ‒ Optimal data compression level depends on the type of data being backed up, e.g., increasing compression level has little effect on backups of compressed file types such as .jpg, .pdf or .mp3

slide-68
SLIDE 68

82 Acronis Training and Certification – Authorized Use Only

  • 5. Email Notification

‒ Enables setting up email notifications about Errors, Warnings and Successful backups ‒ Only available in on-premise deployments, for cloud deployment, email settings are configured per account when an account is created ‒ Preset: Use the default settings ‒ Either use default settings or override with custom values that will be specific for the current Backup Plan only

slide-69
SLIDE 69

83 Acronis Training and Certification – Authorized Use Only

  • 5. Error Handling

‒ Enables specifying how to handle errors that might

  • ccur during backup

‒ Re-attempt, if an error occurs:

▪ Preset: Enabled, Number of attempts: 30 (300 for backup to cloud storage), Interval between attempts: 30 seconds ▪ When recoverable error occurs, agent re-attempts to perform the unsuccessful operation, attempts will be stopped as soon as the operation succeeds or if the number

  • f specified attempts are performed, which ever happens

first

‒ Do not show messages and dialogs while processing (silent mode):

▪ Preset: Enabled ▪ When enabled, agent will automatically handle situations requiring user interaction, if an operation cannot continue without user interaction, it will fail

slide-70
SLIDE 70

84 Acronis Training and Certification – Authorized Use Only

  • 5. Error Handling

‒ Ignore bad sector:

▪ Preset: Disabled ▪ When disabled, each time the agent comes across a bad sector, backup activity will be assigned the interaction required status. ▪ Enable to backup valid information on a rapidly dying disk. The disk-level backup can then be mounted and valid files can be extracted

slide-71
SLIDE 71

85 Acronis Training and Certification – Authorized Use Only

  • 5. Fast Incremental/Differential Backup

‒ Effective for incremental and differential disk-level backup ‒ Preset: Enabled ‒ Incremental or differential backup captures only data changes ‒ To speed up the backup process, the agent determines whether a file has changed or not by the file size and date/time when the file was last modified ‒ Disable to force the agent to compare entire file contents to those stored in the backup

slide-72
SLIDE 72

86 Acronis Training and Certification – Authorized Use Only

  • 5. File Filters

‒ File filters defines which files and folders to skip during the backup process ‒ Available for both disk-level and file-level backup ‒ Enter criteria for Back up only files matching the following criteria or Do not back up files matching the following criteria ‒ Criteria:

▪ Full path: Specify the full path to the file or folder, e.g., C:\Temp\File.tmp /home/user ▪ Name: Specify the name of the file or folder, e.g., Document.txt ▪ Wildcards can be used: (*) substitutes for any number of characters and (?) substitutes for 1 character, e.g., *.log or F???.log

slide-73
SLIDE 73

87 Acronis Training and Certification – Authorized Use Only

  • 5. File Filters

‒ 2 other options are available:

▪ Exclude hidden files and folders: Files and folders which have the Hidden attribute will be excluded ▪ Exclude system files and folders: Only effective for Windows-based machines, files and folders which have the System attribute will be excluded

slide-74
SLIDE 74

88 Acronis Training and Certification – Authorized Use Only

  • 5. LVM Snapshotting

‒ Effective only for physical machines for disk-level backup of volumes managed by Linux Logical Volume Manager (LVM) ‒ Preset: By the backup software ‒ Defines how a snapshot of a logical volume is taken ‒ With default setting, snapshot data is kept mostly in RAM, backup is faster and unallocated space

  • n the volume group is not required

‒ Changed to By LVM, if experiencing problems with backing up logical volumes. Snapshot will be stored on unallocated space of the volume group. However, if unallocated space is missing, snapshot will be taken by backup software

slide-75
SLIDE 75

89 Acronis Training and Certification – Authorized Use Only

  • 5. Multi-volume Snapshot

‒ Effective only for disk-level or file-level backups on Windows-based machines ‒ Preset: Enabled ‒ Determines whether to take snapshot of multiple volumes at the same time or one by

  • ne

‒ When enabled, snapshots of all volumes being backed up are created simultaneously ‒ Leave on defaults to create a time-consistent backup of data spanning multiple volumes, e.g., for an Oracle database ‒ Disable only for troubleshooting purposes

slide-76
SLIDE 76

90 Acronis Training and Certification – Authorized Use Only

  • 5. Performance

‒ Process priority:

▪ Defines the priority of the backup process in the OS ▪ Available settings: Low, Normal, High ▪ Preset: Low (in Windows, corresponds to Below Normal) ▪ Priority of a process determines the amount of CPU and system resources allocated to that process, increasing priority might speed up the backup process but is dependent on overall CPU usage and other factors like disk in/out speed and/or network traffic

‒ Output speed during backup:

▪ Preset: Disabled ▪ Enable to limit the HDD write speed (when backing up to local folder) or speed of network transfer when backing up to network or cloud

slide-77
SLIDE 77

91 Acronis Training and Certification – Authorized Use Only

  • 5. Pre/Post Commands

‒ Enables defining commands to be automatically executed before and after the backup procedure ‒ Preset: No ‒ Can be used for: deleting temporary files from the disk before backup, configure 3rd-party anti-virus to be started before backup, selectively copy backups to another location, etc. ‒ Enable to configure the desired command or batch file to run before/after the backup, interactive commands are not supported ‒ Enable Fail the backup if the command execution fails if the command execution is critical to operations

slide-78
SLIDE 78

92 Acronis Training and Certification – Authorized Use Only

  • 5. Pre/Post Data Capture Commands

‒ Enables defining commands to be automatically executed before and after data capture (snapshot) ‒ Preset: No ‒ Used for suspending and resuming non VSS- aware databases or applications so that data to be backed up can be captured correctly by the snapshot ‒ Enable to configure the desired command or batch file to run before/after the snapshot, interactive commands are not supported ‒ Enable Fail the backup if the command execution fails if the command execution is critical to operations

slide-79
SLIDE 79

93 Acronis Training and Certification – Authorized Use Only

  • 5. Scheduling

‒ Defines whether backups start as scheduled or with a delay (for multiple machines) and how many VMs are backed up simultaneously

‒ Preset: Distribute backup start times within a time windows, Maximum delay: 30 minutes:

▪ Backup of physical machines will start with a random delay from the scheduled time up to the maximum delay specified.

‒ Preset: Limit the number of simultaneously running backups by:

▪ Option only available when backup is applied to multiple VMs, default is 2, maximum value is 10

slide-80
SLIDE 80

94 Acronis Training and Certification – Authorized Use Only

  • 5. Sector-by-Sector Backup

‒ Effective only for disk-level backup ‒ Preset: Disabled ‒ Defines whether an exact copy of a disk or volume

  • n a physical level is created

‒ If enabled, all disk or volume’s sectors will be backed up including unallocated space and those sectors without data ‒ Resulting backup will be equal in size to the disk being backed up with compression ‒ Agent will automatically switch to sector-by-sector backup when backing up drives with unrecognized or unsupported file systems

slide-81
SLIDE 81

95 Acronis Training and Certification – Authorized Use Only

  • 5. Splitting

‒ Effective for Always full, Weekly full, Daily incremental and Custom backup schemes ‒ Preset: Automatic ‒ Enables selecting of how a backup can be split into multiple smaller files ‒ With default setting, backup file will be split if it exceeds the maximum file size supported by the file system ‒ For smaller file sizes, select Fixed size and enter the desired file size

slide-82
SLIDE 82

96 Acronis Training and Certification – Authorized Use Only

  • 5. Task Failure Handling

‒ Determines agent behavior when execution of backup plan fails ‒ Preset: Restart a failed task: No ‒ If enabled, agent will try to execute the backup

  • again. Number of attempts and Interval between

attempts can be specified ‒ Agents stops trying once an attempt completes successfully or when the specified number of attempts is performed, whichever comes first

slide-83
SLIDE 83

97 Acronis Training and Certification – Authorized Use Only

  • 5. Volume Shadow-Copy Service (VSS)

‒ Effective only for Windows-based machines ‒ Preset: Enabled, Automatically select snapshot provider ‒ Defines whether VSS provider has to notify VSS- aware applications for quiescing and snapshot, disable only for troubleshooting purposes ‒ Enable VSS full-backup:

▪ If enabled, logs of Microsoft Exchange Server (when not using Agent for Exchange) and of other VSS-aware applications (except for Microsoft SQL) will be truncated after each successful backup ▪ Leave option disabled if Agent for Exchange or 3rd party software is used for backing up Exchange, if 3rd-party software is used for backing up SQL or if there’s a need to keep logs of other VSS-aware applications

slide-84
SLIDE 84

98 Acronis Training and Certification – Authorized Use Only

  • 5. Weekly Backup

‒ Determines which backup is considered “weekly” in retention rules ‒ Preset: Monday ‒ A “weekly” backup is the first backup created on the selected day of the week and will be a full backup

slide-85
SLIDE 85

99 Acronis Training and Certification – Authorized Use Only

  • 5. Windows Event Log

‒ Effective only for Windows-based machines ‒ Preset: Disabled ‒ Defines whether the agent will log events of backup

  • perations to the Application Event Log of the

Windows Event Log ‒ Event types to log can be selected

slide-86
SLIDE 86

100 Acronis Training and Certification – Authorized Use Only

Other Operations

Performing other backup-related operations

slide-87
SLIDE 87

101 Acronis Training and Certification – Authorized Use Only

  • 6. Protecting Against Ransomware

‒ Windows-based machines can be protected against ransomware by enabling the Active Protection Plan for desired machines ‒ Only 1 Active Protection Plan is available, settings apply to all machines with the plan enabled ‒ To minimize resources consumed by the heuristic analysis and to eliminate false positives, the following settings can be configured:

▪ Trusted processes: Processes* that are never considered ransomware ▪ Harmful processes: Processes* that are always considered ransomware ▪ Folder exclusions: Folders where file change will not be monitored

* Processes can be specified using a path: C:\Data\Finance\file.exe, a name: file.exe and wildcards: file*.exe, file?.exe

slide-88
SLIDE 88

102 Acronis Training and Certification – Authorized Use Only

  • 6. Applying Active Protection Plan

Apply/Revoke Active Protection Plan

slide-89
SLIDE 89

103 Acronis Training and Certification – Authorized Use Only

  • 6. Applying Active Protection Plan

1. Select the machines for which you want to enable Active Protection 2. Click Active Protection 3. [Optional] Click Edit to modify the following settings:

▪ ACTION ON DETECTION: Select the action to perform when detecting ransomware activity ▪ TRUSTED PROCESSES: Enter processes to be trusted ▪ HARMFUL PROCESSES: Enter processes that are always considered ransomware ▪ FOLDER EXCLUSION: Enter folders to be excluded ▪ SELF-PROTECTION: Enable/disable self-protection

4. Click Apply

slide-90
SLIDE 90

116 Acronis Training and Certification – Authorized Use Only

Initial Seeding and Large Scale Recovery

How to setup and perform Initial Seeding and Large Scale Recovery

slide-91
SLIDE 91

117 Acronis Training and Certification – Authorized Use Only

  • 7. Initial Seeding and Large Scale Recovery

‒ Currently only available for Acronis Backup Cloud and select Acronis datacenters (check the KB 59037 for supported datacenters) ‒ Initial Seeding (IS) is a service that helps customers to backup large amounts of data to cloud storage over a slow Internet connection ‒ Large Scale Recovery (LSR) is a service that helps customers obtain a copy

  • f the backups that resides in cloud storage for local recovery

‒ Both services are available for Windows and Linux-based backups, Mac is not supported

slide-92
SLIDE 92

118 Acronis Training and Certification – Authorized Use Only

  • 7. Initial Seeding and Large Scale Recovery

‒ Typical Initial Seeding workflow is as follows:

1. Customer purchases the service and receives the shipping address 2. Customer creates an initial seeding backup on a local hard drive by enabling the Initial Seeding Backup option after selecting cloud storage for Where to back up in the Backup Plan 3. Customer packs the hard drive and ships the package to the partner datacenter 4. Partner uploads the initial seeding backup to the cloud storage by using the Initial Seeding tool and notifies the user that the upload is complete 5. Partner sends the hard drive back to the end user or securely destroys the hard drive

‒ Initial Seeding tool supports uploading to Acronis cloud storage or partner cloud storage based on Acronis Storage

slide-93
SLIDE 93

119 Acronis Training and Certification – Authorized Use Only

  • 7. Initial Seeding and Large Scale Recovery

‒ Typical Large Scale Recovery workflow is as follows:

1. Customer purchases the service and provides LSR token to the partner 2. Partner downloads the Customer’s backup archives to HDD 3. Partner ships HDD to Customer 4. Customer recovers data locally from backup archives by connecting the HDD to the machine to be recovered or by copying the backup archives to a network folder

‒ Large Scale Recovery tool supports downloading from Acronis cloud storage

  • r partner cloud storage based on Acronis Storage
slide-94
SLIDE 94

120 Acronis Training and Certification – Authorized Use Only

  • 7. Recommendations for Setting up IS/LSR

How to setup the IS/LSR service Customer questions

  • 1. Decide on licensing and pricing. Note that there is no count of initial

seeding/large scale recovery orders in Acronis Backup Cloud

  • 2. Think of the shipping procedure. We recommend Fedex, UPS or DHL as

shipping providers. Note that Customers may want their hard drives back, so you would either need a return shipping label from them or include return shipping costs in the price of the Initial Seeding service

  • 3. Decide on a notification service for the Customers. Acronis Backup Cloud

does not send notifications upon initial seeding backup creation or upload/download completion

  • 4. Allocate a machine for installing the Initial Seeding/Large Scale Recovery
  • tool. You need a Windows/Linux x64 machine with at least 2 GB of RAM

and fast Internet connection to Acronis Cloud Storage and/or your custom Acronis Storage installation

  • 5. Decide on supported hard drive types. Most Customers send the initial

seeding backup on USB hard drives. If you want to support more hard drive types, for example SATA/eSATA, make sure the machine is properly equipped for easy hard drive connection

  • 6. Install the Initial Seeding/Large Scale Recovery tool on the chosen machine
  • 7. Test the Initial Seeding/Large Scale Recovery process: create an initial

seeding backup and upload it to the storage, after creating a couple of incremental backups, download the archive using the IS/LSR tool

  • 8. Prepare a step-by-step instruction for Customers about using the service
  • 1. How is the service licensed (per machine, per account, per backup plan,

per HDD…)?

  • 2. Where do I purchase the service?
  • 3. Where do I register the license key?
  • 4. What are the requirements for the initial seeding HDD (interface,

partitioning, file system)?

  • 5. Can I send backups taken from a number of machines on a single hard

drive?

  • 6. What shipping company do you recommend?
  • 7. How do I create an initial seeding backup?
  • 8. How do I package the HDD for shipping?
  • 9. How do I track the initial seeding process?
  • 10. Can I suspend the backup plan execution until the initial seeding backup

is uploaded (because the incremental backups produce warnings)?

  • 11. What if I do a mistake - can I cancel the initial seeding process?
  • 12. How do I request Large Scale Recovery?
  • 13. Can I receive backups of several machines on a single hard drive?
  • 14. Anything else I must be aware of? For example, if the machine is moved

to a different backup account, will I have to perform initial seeding again?

slide-95
SLIDE 95

121 Acronis Training and Certification – Authorized Use Only

  • 7. Installing IS/LSR Tool in Windows

1. 64-bit Windows required, download and run python3.5 installer:

▪ Select Install launcher for all users and Add python 3.5 to PATH and make sure the pip tool is also installed

2. Click on Install Now to start installation and click Close when the installation is complete 3. Open the command prompt as Administrator and run the following commands:

▪ python -m pip install --upgrade pip ▪ pip3 install --upgrade colorama colorlog pyOpenSSL ▪ pip3 install --upgrade -i https://pypi.corp.acronis.com/simple fes

slide-96
SLIDE 96

122 Acronis Training and Certification – Authorized Use Only

  • 7. Installing IS/LSR Tool in Windows
  • 4. Download the IS/LSR tool from the following link and

unpack it:

▪ https://kb.acronis.com/system/files/content/2016/08/56070/IS_L SR_Tool_Build32_Windows.zip

  • 5. Install the tool by running the .msi package
slide-97
SLIDE 97

123 Acronis Training and Certification – Authorized Use Only

  • 7. Installing IS/LSR Tool in Linux

1. 64-bit RPM-based Linux required, e.g., openSUSE or Fedora, make sure python3.5, python3-colorama, python3-pyOpenSSL packages are installed:

▪ Open Terminal and run pip list, to check for installed components, the following output should be shown: ... colorama (x.x.x) colorlog (x.x.x) ... fes (x.x.x) ... pip (x.x.x) ... pyOpenSSL (x.x.x) ...

2. If packages are not installed, install python3.5 manually, install colorama and pyOpenSSL via pip3

slide-98
SLIDE 98

124 Acronis Training and Certification – Authorized Use Only

  • 7. Installing IS/LSR Tool in Linux
  • 3. Download, unpack and install the IS/LSR tool from:

▪ https://kb.acronis.com/system/files/content/2016/08/ajax/IS _LSR_Tool_Build32_Linux.zip

  • 4. On CentOS 7, do the following:

▪ Copy the following text to /etc/yum.repos.d/acronis- ius.repo (create the acronis-ius.repo file if necessary):

[acronis-ius] name=IUS repository mirror baseurl=https://eu-repo.acronis.com/public/ius/ gpgcheck=0 enabled=1

▪ Then execute the following commands:

yum install libffi-devel gcc openssl-devel python35u-devel pip3 install --upgrade -i https://pypi.corp.acronis.com/simple fes pip3 install pyOpenSSL colorama colorlog rpm --install --nodeps InitialSeedingTool64.rpm

slide-99
SLIDE 99

125 Acronis Training and Certification – Authorized Use Only

  • 6. Uploading an Initial Seeding Backup

1. Connect the HDD with the IS backup to the machine where the IS/LSR tool is installed 2. Start command prompt as Administrator or Terminal as root and go to the IS/LSR tool folder 3. Execute the following command to find the IS token of the backup:

▪ is_info <path_to_the_backup>

4. Run the following command to upload the backup:

▪ is_me

5. If there are several IS backups, point to a specific backup to avoid getting an error 6. Notify the Customer once the upload is complete

slide-100
SLIDE 100

126 Acronis Training and Certification – Authorized Use Only

  • 6. Downloading Backups for Large Scale Recovery

‒ Note the machine token provided by the Customer which can be viewed in the machine’s Overview ‒ Open a command prompt or Terminal to the folder where the IS/LSR tool is installed and run the following command:

▪ lsr_me --username <administrator_login> <token> <path> where <administrator_logon> is the admin account username of the Customer Group or a parent Group <token> is the LSR token provided by the Customer <path> is the folder to download the backup archives to

‒ When prompted, specify the password for the admin account used and the download will

  • start. Take note that all archives will be downloaded

‒ Pack the HDD and send to Customer once downloads are complete

slide-101
SLIDE 101

127 Acronis Training and Certification – Authorized Use Only

Questions?

slide-102
SLIDE 102

128 Acronis Training and Certification – Authorized Use Only

www.acronis.com New Generation Data Protection twitter.com/acronis blog.acronis.com facebook.com/acronis