1 Acronis Training and Certification – Authorized Use Only
RECOVERY OPERATIONS
Performing recovery and related operations
RECOVERY OPERATIONS Performing recovery and related operations - - PowerPoint PPT Presentation
RECOVERY OPERATIONS Performing recovery and related operations Acronis Training and Certification Authorized Use Only 1 Module Outline 1. Recovery Tasks 2. Planning for Recovery 3. Configuring Recovery Tasks 4. Acronis Bootable Media 5.
1 Acronis Training and Certification – Authorized Use Only
Performing recovery and related operations
2 Acronis Training and Certification – Authorized Use Only
3 Acronis Training and Certification – Authorized Use Only
What is a Recovery Task
5 Acronis Training and Certification – Authorized Use Only
Start Recovery
6 Acronis Training and Certification – Authorized Use Only
‒ Recovery in Acronis Backup and Acronis Backup Cloud are performed via recovery tasks ‒ A recovery task is a set of rules that specify what and how data will be restored on a given computer ‒ When created from Backup Console, recovery task is registered on the Management Server and the recovery script is deployed to the Agent. After the script is deployed, Agent will execute it immediately ‒ When created from bootable media, recovery task is executed immediately by the bootable version of the Agent
7 Acronis Training and Certification – Authorized Use Only
How to plan for recovery
8 Acronis Training and Certification – Authorized Use Only
‒ Understand your outage and what needs to be recovered, e.g., RTOs and RPOs? Impact on productivity, revenues, normal operations?
▪ Entire machine/disks/volumes/VMs or individual files/folders/databases? ▪ Granular recovery of application items? ▪ Is Acronis Universal Restore required? ▪ Can Acronis Instant Restore be used?
‒ Determine the backups available and the most suitable location for recovery:
▪ From local, network or cloud storage? ▪ Recover to physical, virtual or cloud? ▪ Follow and if necessary adapt disaster recovery plan and business continuity plans to perform recovery
9 Acronis Training and Certification – Authorized Use Only
What to back up What can be recovered
Entire machine ‒ Entire machine ‒ 1 or more disks and volumes ‒ 1 or more files and folders ‒ 1 or more database to live application server ‒ 1 or more database as files ‒ Granular recovery to live application server Disks/volumes ‒ 1 or more disks and volumes ‒ 1 or more files and folders Files/folders (physical machines only) ‒ 1 or more files and folders System state (Windows Vista & above) ‒ System state ESXi configurations (ESXi hosts only) ‒ ESXi configuration to bare metal Exchange mailboxes ‒ 1 or more mailbox to live Exchange server ‒ Granular recovery to live application Office 365 mailboxes ‒ Granular recovery to live application ‒ Granular recovery as files
10 Acronis Training and Certification – Authorized Use Only
Application What can be recovered From database backup From application-aware backup From disk-level backup
Microsoft Exchange Server
‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine ‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine
Microsoft SQL Server
‒ Database to live SQL instance ‒ Database as files ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Entire machine
Microsoft SharePoint database servers
‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine
Active Directory Domain Services
‒ Entire machine
11 Acronis Training and Certification – Authorized Use Only
‒ For Microsoft Exchange:
▪ Exchange databases can recovered from database or application-aware backup ▪ Mailbox and mailbox items can be recovered from database, application-aware and mailbox backups for Microsoft Exchange 2010 SP1 and above ▪ Recovery can be performed to original or new Exchange sever of the same version and requires Agent for Exchange or Agent for VMware (for VMware ESXi VMs) ▪ Target Exchange Server and machine running the Agent must belong to the same AD forest and the following items can be recovered:
and when recovering individual items, they will appear in the Recovered items folder
12 Acronis Training and Certification – Authorized Use Only
▪ Mailbox being recovered from backup must have an associated user account in Active Directory and the user account must be enabled ▪ Shared, room and equipment mailboxes can only be recovered if their associated user accounts are disabled ▪ Mailboxes that do not meet the conditions above are skipped during recovery and Warning status will be shown after recovery ▪ Exchange databases that have been recovered as files will be in a Dirty Shutdown state and additional steps have to be taken to bring it to a Clean Shutdown state before it can be mounted to an Exchange server
13 Acronis Training and Certification – Authorized Use Only
‒ For Microsoft SQL:
▪ SQL databases can recovered from database or application-aware backup ▪ Requires Agent for SQL, Agent for VMware can only recover database as files ▪ Recover database as files can be used to recover to a machine where no Agent is installed and thereafter the database can be attached to the SQL instance ▪ User databases can be recovered to same or higher version of Microsoft SQL, System databases can only be recovered to the same version ▪ State of the database can be specified during recovery:
users will have full access. All uncommitted transactions of the recovered database will be rolled back and additional transaction logs from native Microsoft SQL backups cannot be applied
14 Acronis Training and Certification – Authorized Use Only
have access. Uncommitted transactions will be kept. Additional transaction logs from native Microsoft SQL backups can be applied to reach desired recovery point
so that recovery effects can be reverted. Mainly used to detect the point in time when an error occurred
▪ Recovering System databases:
single-user mode when the recovery starts and after recover completes, will be restarted again in normal mode
appear in the target instance, these databases have to be manually attached to the instance in order for them to be operational again and databases that have been deleted after the backup will appear as offline in the instance and have to be deleted manually by using SQL Server Management Studio
15 Acronis Training and Certification – Authorized Use Only
‒ Recovering DAG (Exchange cluster) or AAG (SQL cluster):
▪ Requires that the DAG or AAG is backed up (not individual databases or items) ▪ Select the clustered database for recovery from the Backup menu; target node for recovery is automatically selected by the Agent when creating the Recovery Task ▪ For DAG, after recovery is complete, manually configure or resume replication on the cluster ▪ For AAG, target database to be recovered (if live) must be excluded from the AAG prior to recovery as a database in an AAG cannot be overwritten
16 Acronis Training and Certification – Authorized Use Only
‒ For Microsoft Office 365:
▪ Granular recovery can be performed from Office 365 mailbox backups ▪ Mailboxes and mailbox items can be recovered to Office 365, downloaded as files or sent as email as a form of recovery ▪ When recovering an entire mailbox to existing mailbox, existing items with matching IDs are overwritten and when recovering mailbox item to original location, a copy is created ▪ To find items to recover easily, use search (wildcards not supported)
17 Acronis Training and Certification – Authorized Use Only
‒ Recovery operations are the same as physical machines except that Azure and EC2 VMs cannot be booted from Bootable Media, hence bare metal recovery is not possible, only recovery to existing or new VM ‒ 2 ways to recover:
▪ Recover to existing VM:
recovered and install Agent for Windows or Linux on the new VM
▪ Import to Azure or EC2:
18 Acronis Training and Certification – Authorized Use Only
‒ Disk-level backups containing an OS can be Run as VM for quick recovery:
▪ Virtual disks emulated from backup and does not consume space on datastore, space is
▪ Can be removed (all changes will be discarded) or converted (Finalize) to a regular VM (VMware only) without downtime ▪ Retention rules cannot be applied to the backups as long as the temporary VM is running, backups of original machine (if operational) will continue to run
‒ Can be used for:
▪ Disaster recovery: Instantly bring a copy of a failed machine online ▪ Testing of backups: Run the machine from backup to ensure that guest OS is functioning ▪ Accessing application data: Extracting application data using native tools
19 Acronis Training and Certification – Authorized Use Only
‒ Pre-requisites:
▪ Requires Agent for VMware or Agent for Hyper-V and corresponding host ▪ Agent for VMware/Hyper-V must be able to access the backup file:
▪ Backups must contain entire machine or all volumes required for OS to start
‒ Backups of physical and virtual machines except for Virtuozzo containers can be used
20 Acronis Training and Certification – Authorized Use Only
‒ Only available for VMware ESXi VMs ‒ Creates an exact copy or replica of a VM to the same or another ESXi host which can be maintained in sync with the original VM ‒ Replication can be started manually or on schedule with the 1st replication being a full copy (similar to full backup) and subsequent replications being incremental (performed with CBT unless disabled, for fast replication) ‒ Replication vs. Backup:
▪ Replica keeps only the latest state of a VM ▪ Replication will consume space on datastore whereas backups can be stored on other storage ▪ Powering on a replica is much faster than recovery and faster than Run as VM
21 Acronis Training and Certification – Authorized Use Only
‒ Replica can be used for testing and failover/failback to/from local or remote site ‒ The following types of VMs cannot be replicated:
▪ Fault-tolerant VMs on ESXi 5.5 and lower ▪ Run as VM ▪ Replicas
22 Acronis Training and Certification – Authorized Use Only
‒ Machines can be migrated by recovering its backup to another machine ‒ Such recoveries can be performed via Backup Console or Bootable Media
Backed up machine Available recovery destinations Physical machine ESXi VMs Hyper-V VMs Azure VMs EC2 VMs Virtuozzo VMs Virtuozzo containers
Physical machine VMware ESXi VMs Hyper-V VMs Virtuozzo VMs Virtuozzo containers
23 Acronis Training and Certification – Authorized Use Only
Settings available in Recovery Tasks
24 Acronis Training and Certification – Authorized Use Only
‒ Plan and decide:
▪ Recovery method: Via Backup Console, Acronis Bootable Media or browsing cloud storage? ▪ Recovery point: Date and time to recover to? ▪ What to recover: Entire machine, 1 or more disks/volumes, 1 or more files/folders, 1 or more databases or 1 or more application items? ▪ Where to recover: Original location, custom location? ▪ Recovery options: Validation, Error handling, File exclusions, etc.?
▪ Used for Bare Metal Recovery with/without Universal Restore ▪ Used for Apply Universal Restore
25 Acronis Training and Certification – Authorized Use Only
‒ Using Backup Console a.k.a. Web interface
▪ Used for live/online recovery of entire machines, disk/volumes, files/folders and application data when the original machine’s OS and Agent is functional ▪ Backups can be recovered by browsing DEVICES or BACKUPS
‒ Using Bootable Media
▪ Used for bare metal recovery (with/without Universal Restore) to original or another machine when the original machine’s OS
▪ Requires special bootable media with bootable version of Acronis Agent to boot up the target machine in order to run the Agent ▪ Bootable Media ISO can be downloaded from Recovery menu
26 Acronis Training and Certification – Authorized Use Only
‒ Extract Files From Local Backup
▪ Used for browsing and extracting files and folders via File Explorer in Windows from backups stored on local folders ▪ Browse to folder location where backups are stored and double- click on .TIB .or .TIBX file
‒ Download Files from Cloud Storage
▪ Used for browsing and downloading files from backups stored in cloud storage ▪ Download files from cloud storage can be accessed from Recovery > More ways to recover
27 Acronis Training and Certification – Authorized Use Only
‒ Recovery Point is the date and time to which the backed up data can be restored ‒ Every recovery point represents a backup ‒ Data and time of the recovery point refers to the exact moment of snapshot creation, i.e., when the backup task was started ‒ A lock symbol next to the recovery point means that the particular backup is encrypted with a password
28 Acronis Training and Certification – Authorized Use Only
‒ What can be recovered depends on what was backed up:
▪ Disk-level backups allows recovery at lower levels such as individual volumes, 1 or more files and folders ▪ If application-aware backup was performed, application items can be recovered from the backup ▪ Certain types of backups contains only specific data such as ESXi configuration backup and can only be used for specific recovery
‒ What to recover can be specified after selecting a recovery point and clicking on RECOVER… ‒ Alternatively, select RUN AS VM to perform Acronis Instant Restore on disk-level backups
29 Acronis Training and Certification – Authorized Use Only
‒ Where to recover to depends on the data being recovered:
▪ For disk-level backups (Entire machine, Disks/volumes), recovery can be to the same or different machine as Physical machine or to new machine as Virtual machine, i.e., convert to VM ▪ For file-level backups (files/folder, Exchange/SQL databases, Office 365 mailboxes) recovery can be to Original location or Custom location
30 Acronis Training and Certification – Authorized Use Only
Creating and using Acronis Bootable Media
31 Acronis Training and Certification – Authorized Use Only
‒ Bootable media is a ISO, CD, DVD, USB flash drive or other removable media that enables booting up of a machine and running of an Agent without an OS ‒ There are 3 types of bootable media:
▪ Linux-based: Pre-packaged bootable media with drivers for booting up machines, used for recovering Windows and Linux-based machines ▪ WinPE-based: Customizable bootable media with possibility of adding drivers for bootup during media creation, used for recovering Windows-based machines ▪ Mac-based: Pre-packaged bootable media with drivers for booting up Macs, can be used for recovering Mac-based machines
32 Acronis Training and Certification – Authorized Use Only
‒ Downloading ISO for Linux-based media:
devices and click on Recovery > More ways to recover…
flash drive or attached to VM
‒ Using Rescue Media Builder for Mac-based media:
Builder
33 Acronis Training and Certification – Authorized Use Only
‒ Using Bootable Media Builder:
without specifying a license key (Only recovery will be available)
media), Windows PE or Windows PE (64-bit). Windows PE requires relevant Windows Deployment Kit to be installed
media
Proxy Sever
flash drive, ISO, RIS Server, ZIP file
38 Acronis Training and Certification – Authorized Use Only
Steps for creating a Recovery Task
39 Acronis Training and Certification – Authorized Use Only
Function Using Backup Console Using Bootable Media Download from Cloud Storage Extract files from local backups
Physical machine (Win/Linux) Physical machine (Mac) Virtual machine (VMware/Hyper-V) Virtual machine (Virtuozzo) ESXi configuration Files/folders System state SQL databases Exchange databases Exchange mailboxes Office 365 mailboxes
40 Acronis Training and Certification – Authorized Use Only
1. Select the desired machine from DEVICES and click
BACKUPS and click Show backups 2. Select the desired Recovery Point from the list 3. Click on RECOVER… and select type of data to recover if necessary 4. Depending on type of data to recover, browse and specify (tick) 1 or more items to recover 5. Specify target location in RECOVER TO, TARGET MACHINE, and/or TARGET DATABASE if prompted 6. [Optional] Specify Recovery options 7. Click START RECOVERY
41 Acronis Training and Certification – Authorized Use Only
1. Boot up the target machine with the bootable media 2. Click Manage this machine locally or Rescue Bootable Media twice, depending on media type 3. On the Welcome screen, click RECOVER 4. Click Select data and then click Browse 5. Specify the backup location to view available backups 6. Select the backup to recover from to view the contents (backed up disks and volumes) of the backup 7. Select the disk(s) and/or volume(s) to be recovered
42 Acronis Training and Certification – Authorized Use Only
8. After selecting the disk(s) and/or volume(s) to be recovered, it will show up under What to recover and will be automatically mapped to available disks on the target machine:
▪ Click on Clear to change the disk mapping ▪ Click on Properties to change the size of the volume after it has been recovered
9. Start the recovery
Universal Restore if recovering to dissimilar hardware to enable bootability for the recovered OS
43 Acronis Training and Certification – Authorized Use Only
1. Select the desired machine with the data to recover from DEVICES and click on Recovery 2. Click More ways to recover… > Download files 3. Enter the credentials of the account to which the backed up machine was assigned 4. Select the Version or date and time of the backup to browse for files/folders to recover or use search 5. Select (tick) the items to recover and click Download 6. If a single file is selected, it will be downloaded as is,
.zip file 7. Select the location to save to and click Save
44 Acronis Training and Certification – Authorized Use Only
‒ In Backup Console, disk-level backups (Entire machine, Disks/volumes) of physical machines can be recovered to:
▪ Physical machine (original) ▪ Virtual machine (convert to VM) ▪ Agent will automatically map the disks from the backup to the target machine. Alternatively, click DISK MAPPING to manually map the disk(s) for recovery ▪ Recovery of OS requires a reboot and machine will come online automatically
‒ If recovering to Virtual machine (convert to VM):
▪ VMware ESXi or Hyper-V can be selected as the target machine and Datastore for ESXi or Path for Hyper-V can be configured as well as VM SETTINGS such as Memory, Virtual processors and Network adapters
45 Acronis Training and Certification – Authorized Use Only
‒ The following settings are available when configuring recovery to virtual machine:
▪ By default, the same VM will be selected for recovery ▪ To change to a different VM (same or different platform), click TARGET MACHINE and select VMware ESXi, Hyper-V or Virtuozzo, requires respective Agent ▪ Datastore and Path settings can be configured as well as VM SETTINGS ▪ VM will be stopped during recovery and has to be manually started after recovery. Alternatively, use Recovery options > VM power management to automatically start the VM
46 Acronis Training and Certification – Authorized Use Only
‒ Acronis proprietary technology that allows:
▪ Bare metal recovery of Windows or Linux-based systems to dissimilar hardware ▪ P2P, P2V, P2C, V2V, V2P, V2C, C2C, C2P, C2V migrations ▪ Hardware independent deployment of supported OS
47 Acronis Training and Certification – Authorized Use Only
‒ Preparation:
▪ Standby drivers for new HDD controllers and chipset, driver files in .inf, .sys, .oem must be extracted from .exe, .cab, .zip and placed in suitable repository ▪ Check access to drivers in bootable environment
‒ Universal Restore works by swapping the HAL.dll, HDD controller and network adapter drivers in the recovered OS to match the hardware of the machine used for recovery ‒ Universal Restore will scan in the following locations for suitable drivers:
▪ Windows default driver folder (usually WINDOWS/inf) with Automatic driver search ▪ Removable media if Search removable media setting is turned on ▪ Other folders such as network folders can be added using Add folder option
48 Acronis Training and Certification – Authorized Use Only
‒ Mass storage drivers to install anyway:
▪ Used when Automatic driver search cannot locate suitable drivers in any of the locations that were specified ▪ If a specific mass storage controller such as RAID or fiber channel adapter is required ▪ Be careful with specifying Mass storage drivers to install anyway as mistakes will render the recovered OS inoperable and you will have to redo the bare metal recovery
‒ If Universal Restore cannot find a compatible driver in the specified locations, it will display a prompt about the problem device; choose either to Ignore or Retry after adding drivers to specified locations to be searched
49 Acronis Training and Certification – Authorized Use Only
‒ Universal Restore can be used for Linux OS with kernel version 2.6.8 or above ‒ When working in Linux, Universal Restore updates the initial RAM disk (initrd):
▪ Adds modules for new hardware to initrd ▪ Search for necessary modules in /lib/modules ▪ If required modules cannot be found, records the module’s name into the log ▪ Original initrd is not modified and a copy is saved to the same directory with the same filename followed by _acronis_backup.img and can be reverted to if necessary ▪ Universal Restore may modify the configuration of the GRUB loader to ensure system bootability but will never modify the Linux kernel
50 Acronis Training and Certification – Authorized Use Only
1. Click Apply Universal Restore under Actions section of the Bootable Media 2. If recovered disk has several OS, click Select… and choose the OS to apply Universal Restore to 3. [Optional] Click Add folder to add network folders to search for suitable drivers 4. [Optional] If specific mass storage drivers such as RAID is required, click Add driver and browse to location where the drivers are located
51 Acronis Training and Certification – Authorized Use Only
‒ Files/folders can be recovered to:
▪ Original location ▪ Custom location (any other local or network folder)
‒ If recovering to original location, the following options are available:
▪ Overwrite existing files ▪ Overwrite an existing file if it is older ▪ Do not overwrite existing files
52 Acronis Training and Certification – Authorized Use Only
‒ ESXi configuration can be recovered using Linux- based Bootable Media to bare metal ‒ If original ESXi host is still connected to vCenter Server, disconnect and remove original host before recovery to avoid unexpected behaviors during recovery ‒ To keep the original host, add it back to vCenter after recovery
53 Acronis Training and Certification – Authorized Use Only
1. Select the desired machine, click Recovery and select a recovery point or Select a recovery point from BACKUPS 2. Click RUN AS VM 3. [Optional] Click Target machine to change VM type (ESXi or Hyper-V), the host and VM name 4. [Optional] Click Datastore or Path and select the desired storage for the VM, click VM SETTINGS to change memory and network settings, click POWER STATE to select VM power state upon run 5. Click RUN NOW
54 Acronis Training and Certification – Authorized Use Only
Run as VM Finalize VM Delete VM
55 Acronis Training and Certification – Authorized Use Only
‒ VM should appear in Backup Console, however, such VMs cannot be selected for backup ‒ If connection to backup location is lost, VM will become inaccessible or even corrupted ‒ When done, the following actions can be taken:
▪ Delete the VM: Select the VM from DEVICES menu and click
from vSphere or Hyper-V inventory, all changes made to data will be lost ▪ Finalize the VM: Only available for ESXi VM, select the VM from DEVICES and click Finalize, optionally, specify a new name and disk provisioning mode (default is thin) ▪ Finalize will recover all backup contents together with changes made to the datastore used for Run as VM, i.e, convert to a regular VM
56 Acronis Training and Certification – Authorized Use Only
Select ESXi VM for Replication Configure Replication
57 Acronis Training and Certification – Authorized Use Only
1. Select the VM to replicate and click Replication to display the replication plan template 2. [Optional] To modify the replication plan name, click default name 3. Click Target machine and select the following:
▪ Select whether to create a new replica and select the ESXi host and specify the new replica name or use an existing replica of the original machine. Click OK
4. [Optional] Click Schedule to change the replication schedule or disable the schedule to run manually 5. [Optional] Click the gear icon to modify replication
6. Click Apply
58 Acronis Training and Certification – Authorized Use Only
Select replica Actions with replica
59 Acronis Training and Certification – Authorized Use Only
‒ After the replica is created, the following actions can be performed:
▪ Testing a replica: Click Test replica and Start testing to power
▪ A replica can be selected for testing (powered on and connected to a network) to check if its working properly ▪ When finished, click Stop Testing to power down the replica and resume replication
60 Acronis Training and Certification – Authorized Use Only
‒ After the replica is created, the following actions can be performed:
▪ Failover to a replica: Click Replica actions and Failover. Select whether to connect to network and click Start ▪ A failover can be initiated with a replica if the original machine suffers an outage ▪ While the replica is in failover state, the following actions are available:
and replication will resume
VM, replication will no longer be possible
to be recovered to original VM. Once failback is complete, replica will be powered off and replication will resume
61 Acronis Training and Certification – Authorized Use Only
Understanding available recovery options
62 Acronis Training and Certification – Authorized Use Only
Recovery options
63 Acronis Training and Certification – Authorized Use Only
‒ Recovery options are settings that can modify the behaviour of the Recovery Task ‒ Availability of Recovery options depends on:
▪ The environment the Agent performs the recovery in (Windows, Linux, OSX or bootable media) ▪ The type of data being recovered (disk, files, VMs, application data)
64 Acronis Training and Certification – Authorized Use Only
‒ Validation is an operation that checks the possibility of data recovery from a backup ‒ Preset: Disabled ‒ If enabled, backup to be used is validated prior to recovery
▪ Validation calculates a checksum for every data block that can be recovered from the backup. The only exception is file-level backups that are stored in cloud storage. These backups are validated by checking the consistency of the metadata saved in the backup ▪ Validation is a time-consuming process and should only be enabled for compliance purposes
65 Acronis Training and Certification – Authorized Use Only
‒ Effective only when recovering files ‒ Preset: Disabled ‒ Defines whether to recover the files’ data and time from the backup or assign the current date and time to the recovered files ‒ If enabled, files will be assigned the current date and time
66 Acronis Training and Certification – Authorized Use Only
‒ Enables specifying how to handle errors that might
‒ Re-attempt, if an error occurs:
▪ Preset: Enabled, Number of attempts: 30 (300 for backup to cloud storage), Interval between attempts: 30 seconds ▪ When recoverable error occurs, agent re-attempts to perform the unsuccessful operation, attempts will be stopped as soon as the operation succeeds or if the number of specified attempts are performed, which ever happens first
‒ Do not show messages and dialogs while processing (silent mode):
▪ Preset: Enabled ▪ When enabled, agent will automatically handle situations requiring user interaction, if an operation cannot continue without user interaction, it will fail
67 Acronis Training and Certification – Authorized Use Only
‒ Effective only when recovering files ‒ File exclusions filters defines which files and folders to skip during the recovery process ‒ Enter criteria for Do not recover files matching the following criteria ‒ Criteria:
▪ Full path: Specify the full path to the file or folder, e.g., C:\Temp\File.tmp /home/user ▪ Name: Specify the name of the file or folder, e.g., Document.txt ▪ Wildcards can be used: (*) substitutes for any number of characters and (?) substitutes for 1 character, e.g., *.log or F???.log
68 Acronis Training and Certification – Authorized Use Only
‒ Effective only for recovery from file-level backups of Windows files ‒ Preset: Enabled ‒ Defines whether to recover NTFS permissions for files along with the files ‒ Disable to let files inherit the NTFS permissions of the target folder to which they are recovered to
69 Acronis Training and Certification – Authorized Use Only
‒ Effective when recovery to VM is performed by Agent for VMware, Agent for Hyper-V or Agent for Virtuozzo ‒ Preset: Enabled ‒ Flashback technology accelerates recovery of VMs by recovering only the differences between the backup and the target. Data is compared at the block level
70 Acronis Training and Certification – Authorized Use Only
‒ Effective only when recovering data from file-level backup ‒ Preset: Disabled ‒ If enabled, full path to the file will be recreated in the target location
71 Acronis Training and Certification – Authorized Use Only
‒ Effective only in Windows for recovering data from file-level backups ‒ Preset: Disabled ‒ Enable option to recover files and folders that were stored on the mounted volumes and were backed up with the enabled Mount points backup option
72 Acronis Training and Certification – Authorized Use Only
‒ Defines priority of recovery process in the OS ‒ Available settings: Low, Normal, High ‒ Preset: Normal ‒ Priority of a process determines the amount of CPU and system resources allocated to that process, increasing priority might speed up the recovery process but is dependent on overall CPU usage and
traffic
73 Acronis Training and Certification – Authorized Use Only
‒ Enables defining commands to be automatically executed before and after the recovery procedure ‒ Preset: No ‒ Can be used for: Checkdisk command, configure 3rd party anti-virus to be started after recovery, selectively copy files to another location, etc. ‒ Enable to configure the desired command or batch file to run before/after the recovery, interactive commands are not supported ‒ Post command will not be executed if recovery proceeds with a reboot
74 Acronis Training and Certification – Authorized Use Only
‒ Effective when recovering Windows 8.1/Windows 2012 R2 and earlier ‒ Not effective when recovery to a VM is performed by Agent for VMware or Agent for Hyper-V ‒ Preset: Disabled ‒ Generates unique security identifier (SID) for the recovered OS, only required to ensure operability of 3rd party software that depends on SIDs ‒ Microsoft does not officially support changing SIDs on deployed or recovered systems (Use at own risk)
75 Acronis Training and Certification – Authorized Use Only
‒ Effective when recovery to VM is performed by Agent for VMware, Agent for Hyper-V or Agent for Virtuozzo ‒ Power off target virtual machine when starting recovery: Yes
▪ Recovery to existing VM is not possible if the VM is online, so machine is powered off automatically as soon as the recovery
data will be lost
‒ Power on the target virtual machine when recovery is complete: No
▪ After a VM is recovered from a backup to another machine, there’s a chance the existing machine’s replica will appear on the network. To be safe, power on the recovered VM manually after taking necessary precautions
76 Acronis Training and Certification – Authorized Use Only
‒ Effective only for Windows-based machines ‒ Preset: Disabled ‒ Defines whether the agent will log events of recovery
Windows Event Log ‒ Event types to log can be selected
77 Acronis Training and Certification – Authorized Use Only
78 Acronis Training and Certification – Authorized Use Only
www.acronis.com New Generation Data Protection twitter.com/acronis blog.acronis.com facebook.com/acronis