RECOVERY OPERATIONS Performing recovery and related operations - - PowerPoint PPT Presentation

recovery operations
SMART_READER_LITE
LIVE PREVIEW

RECOVERY OPERATIONS Performing recovery and related operations - - PowerPoint PPT Presentation

RECOVERY OPERATIONS Performing recovery and related operations Acronis Training and Certification Authorized Use Only 1 Module Outline 1. Recovery Tasks 2. Planning for Recovery 3. Configuring Recovery Tasks 4. Acronis Bootable Media 5.


slide-1
SLIDE 1

1 Acronis Training and Certification – Authorized Use Only

RECOVERY OPERATIONS

Performing recovery and related operations

slide-2
SLIDE 2

2 Acronis Training and Certification – Authorized Use Only

Module Outline

  • 1. Recovery Tasks
  • 2. Planning for Recovery
  • 3. Configuring Recovery Tasks
  • 4. Acronis Bootable Media
  • 5. Creating the Recovery Tasks
  • 6. Recovery Options
slide-3
SLIDE 3

3 Acronis Training and Certification – Authorized Use Only

Recovery Tasks

What is a Recovery Task

slide-4
SLIDE 4

5 Acronis Training and Certification – Authorized Use Only

  • 1. Recovery Tasks

Start Recovery

slide-5
SLIDE 5

6 Acronis Training and Certification – Authorized Use Only

  • 1. Recovery Tasks

‒ Recovery in Acronis Backup and Acronis Backup Cloud are performed via recovery tasks ‒ A recovery task is a set of rules that specify what and how data will be restored on a given computer ‒ When created from Backup Console, recovery task is registered on the Management Server and the recovery script is deployed to the Agent. After the script is deployed, Agent will execute it immediately ‒ When created from bootable media, recovery task is executed immediately by the bootable version of the Agent

slide-6
SLIDE 6

7 Acronis Training and Certification – Authorized Use Only

Planning for Recovery

How to plan for recovery

slide-7
SLIDE 7

8 Acronis Training and Certification – Authorized Use Only

  • 2. Planning for Recovery

‒ Understand your outage and what needs to be recovered, e.g., RTOs and RPOs? Impact on productivity, revenues, normal operations?

▪ Entire machine/disks/volumes/VMs or individual files/folders/databases? ▪ Granular recovery of application items? ▪ Is Acronis Universal Restore required? ▪ Can Acronis Instant Restore be used?

‒ Determine the backups available and the most suitable location for recovery:

▪ From local, network or cloud storage? ▪ Recover to physical, virtual or cloud? ▪ Follow and if necessary adapt disaster recovery plan and business continuity plans to perform recovery

slide-8
SLIDE 8

9 Acronis Training and Certification – Authorized Use Only

  • 2. What Can Be Recovered

What to back up What can be recovered

Entire machine ‒ Entire machine ‒ 1 or more disks and volumes ‒ 1 or more files and folders ‒ 1 or more database to live application server ‒ 1 or more database as files ‒ Granular recovery to live application server Disks/volumes ‒ 1 or more disks and volumes ‒ 1 or more files and folders Files/folders (physical machines only) ‒ 1 or more files and folders System state (Windows Vista & above) ‒ System state ESXi configurations (ESXi hosts only) ‒ ESXi configuration to bare metal Exchange mailboxes ‒ 1 or more mailbox to live Exchange server ‒ Granular recovery to live application Office 365 mailboxes ‒ Granular recovery to live application ‒ Granular recovery as files

slide-9
SLIDE 9

10 Acronis Training and Certification – Authorized Use Only

  • 2. What Can Be Recovered

Application What can be recovered From database backup From application-aware backup From disk-level backup

Microsoft Exchange Server

‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine ‒ Database to live Exchange ‒ Database as files ‒ Granular recovery to live Exchange ‒ Entire machine

Microsoft SQL Server

‒ Database to live SQL instance ‒ Database as files ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Entire machine

Microsoft SharePoint database servers

‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine ‒ Database to live SQL instance ‒ Database as files ‒ Granular recovery using ASPE ‒ Entire machine

Active Directory Domain Services

‒ Entire machine

slide-10
SLIDE 10

11 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications

‒ For Microsoft Exchange:

▪ Exchange databases can recovered from database or application-aware backup ▪ Mailbox and mailbox items can be recovered from database, application-aware and mailbox backups for Microsoft Exchange 2010 SP1 and above ▪ Recovery can be performed to original or new Exchange sever of the same version and requires Agent for Exchange or Agent for VMware (for VMware ESXi VMs) ▪ Target Exchange Server and machine running the Agent must belong to the same AD forest and the following items can be recovered:

  • Database and database as file
  • Mailbox and mailbox contents such as Emails, Email folders, Calendar events, etc
  • When recovering an entire mailbox to existing mailbox, existing items with matching IDs are overwritten

and when recovering individual items, they will appear in the Recovered items folder

slide-11
SLIDE 11

12 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications

▪ Mailbox being recovered from backup must have an associated user account in Active Directory and the user account must be enabled ▪ Shared, room and equipment mailboxes can only be recovered if their associated user accounts are disabled ▪ Mailboxes that do not meet the conditions above are skipped during recovery and Warning status will be shown after recovery ▪ Exchange databases that have been recovered as files will be in a Dirty Shutdown state and additional steps have to be taken to bring it to a Clean Shutdown state before it can be mounted to an Exchange server

slide-12
SLIDE 12

13 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications

‒ For Microsoft SQL:

▪ SQL databases can recovered from database or application-aware backup ▪ Requires Agent for SQL, Agent for VMware can only recover database as files ▪ Recover database as files can be used to recover to a machine where no Agent is installed and thereafter the database can be attached to the SQL instance ▪ User databases can be recovered to same or higher version of Microsoft SQL, System databases can only be recovered to the same version ▪ State of the database can be specified during recovery:

  • Ready to use [RESTORE WITH RECOVERY] (default): Database will be ready for use after recovery,

users will have full access. All uncommitted transactions of the recovered database will be rolled back and additional transaction logs from native Microsoft SQL backups cannot be applied

slide-13
SLIDE 13

14 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications
  • Non-operational [RESTORE WITH NORECOVERY]: Database will be non-operational, users will not

have access. Uncommitted transactions will be kept. Additional transaction logs from native Microsoft SQL backups can be applied to reach desired recovery point

  • Read-only [RESTORE WITH STANDBY]: After recovery, users will have read-only access to the
  • database. All uncommitted transactions will be rolled back. Undo actions will be saved in a temporary file

so that recovery effects can be reverted. Mainly used to detect the point in time when an error occurred

▪ Recovering System databases:

  • All System databases of an instance are recovered at once and destination instance will be restarted in

single-user mode when the recovery starts and after recover completes, will be restarted again in normal mode

  • System databases are always recovered in the Ready to use state
  • If Master database is recovered, database that are created after the backup (recovery point) will not

appear in the target instance, these databases have to be manually attached to the instance in order for them to be operational again and databases that have been deleted after the backup will appear as offline in the instance and have to be deleted manually by using SQL Server Management Studio

slide-14
SLIDE 14

15 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications

‒ Recovering DAG (Exchange cluster) or AAG (SQL cluster):

▪ Requires that the DAG or AAG is backed up (not individual databases or items) ▪ Select the clustered database for recovery from the Backup menu; target node for recovery is automatically selected by the Agent when creating the Recovery Task ▪ For DAG, after recovery is complete, manually configure or resume replication on the cluster ▪ For AAG, target database to be recovered (if live) must be excluded from the AAG prior to recovery as a database in an AAG cannot be overwritten

slide-15
SLIDE 15

16 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Applications

‒ For Microsoft Office 365:

▪ Granular recovery can be performed from Office 365 mailbox backups ▪ Mailboxes and mailbox items can be recovered to Office 365, downloaded as files or sent as email as a form of recovery ▪ When recovering an entire mailbox to existing mailbox, existing items with matching IDs are overwritten and when recovering mailbox item to original location, a copy is created ▪ To find items to recover easily, use search (wildcards not supported)

  • For email messages: By subject, sender, recipient and date
  • For events: By title and date
  • For tasks: By subject and date
  • For contacts: By name, email address and phone number
slide-16
SLIDE 16

17 Acronis Training and Certification – Authorized Use Only

  • 2. Recovering Azure and EC2 VMs

‒ Recovery operations are the same as physical machines except that Azure and EC2 VMs cannot be booted from Bootable Media, hence bare metal recovery is not possible, only recovery to existing or new VM ‒ 2 ways to recover:

▪ Recover to existing VM:

  • Create new VM from image/template in Azure or EC2 with same disk configuration as machine to be

recovered and install Agent for Windows or Linux on the new VM

  • Recover backed up machine as disk-level recovery to the new VM

▪ Import to Azure or EC2:

  • Convert backup to VMware ESXi or Hyper-V VM and export the VM as OVA file or VHD
  • Import into Azure or EC2 using the import function available for the respective platform
slide-17
SLIDE 17

18 Acronis Training and Certification – Authorized Use Only

  • 2. Using Acronis Instant Restore

‒ Disk-level backups containing an OS can be Run as VM for quick recovery:

▪ Virtual disks emulated from backup and does not consume space on datastore, space is

  • nly required to keep changes to emulated virtual disks

▪ Can be removed (all changes will be discarded) or converted (Finalize) to a regular VM (VMware only) without downtime ▪ Retention rules cannot be applied to the backups as long as the temporary VM is running, backups of original machine (if operational) will continue to run

‒ Can be used for:

▪ Disaster recovery: Instantly bring a copy of a failed machine online ▪ Testing of backups: Run the machine from backup to ensure that guest OS is functioning ▪ Accessing application data: Extracting application data using native tools

slide-18
SLIDE 18

19 Acronis Training and Certification – Authorized Use Only

  • 2. Using Acronis Instant Restore

‒ Pre-requisites:

▪ Requires Agent for VMware or Agent for Hyper-V and corresponding host ▪ Agent for VMware/Hyper-V must be able to access the backup file:

  • Backups stored on network folder (SMB) or cloud storage
  • Backups stored on local storage of the VMware ESXi or Hyper-V host
  • Backups stored on SFTP, Tape and Secure Zone are not supported

▪ Backups must contain entire machine or all volumes required for OS to start

‒ Backups of physical and virtual machines except for Virtuozzo containers can be used

slide-19
SLIDE 19

20 Acronis Training and Certification – Authorized Use Only

  • 2. Using VM Replication

‒ Only available for VMware ESXi VMs ‒ Creates an exact copy or replica of a VM to the same or another ESXi host which can be maintained in sync with the original VM ‒ Replication can be started manually or on schedule with the 1st replication being a full copy (similar to full backup) and subsequent replications being incremental (performed with CBT unless disabled, for fast replication) ‒ Replication vs. Backup:

▪ Replica keeps only the latest state of a VM ▪ Replication will consume space on datastore whereas backups can be stored on other storage ▪ Powering on a replica is much faster than recovery and faster than Run as VM

slide-20
SLIDE 20

21 Acronis Training and Certification – Authorized Use Only

  • 2. Using VM Replication

‒ Replica can be used for testing and failover/failback to/from local or remote site ‒ The following types of VMs cannot be replicated:

▪ Fault-tolerant VMs on ESXi 5.5 and lower ▪ Run as VM ▪ Replicas

slide-21
SLIDE 21

22 Acronis Training and Certification – Authorized Use Only

  • 2. Migration

‒ Machines can be migrated by recovering its backup to another machine ‒ Such recoveries can be performed via Backup Console or Bootable Media

Backed up machine Available recovery destinations Physical machine ESXi VMs Hyper-V VMs Azure VMs EC2 VMs Virtuozzo VMs Virtuozzo containers

Physical machine      VMware ESXi VMs       Hyper-V VMs       Virtuozzo VMs       Virtuozzo containers 

slide-22
SLIDE 22

23 Acronis Training and Certification – Authorized Use Only

Configuring Recovery Tasks

Settings available in Recovery Tasks

slide-23
SLIDE 23

24 Acronis Training and Certification – Authorized Use Only

  • 3. Configuring Recovery Tasks

‒ Plan and decide:

▪ Recovery method: Via Backup Console, Acronis Bootable Media or browsing cloud storage? ▪ Recovery point: Date and time to recover to? ▪ What to recover: Entire machine, 1 or more disks/volumes, 1 or more files/folders, 1 or more databases or 1 or more application items? ▪ Where to recover: Original location, custom location? ▪ Recovery options: Validation, Error handling, File exclusions, etc.?

‒ Create Acronis Bootable Media:

▪ Used for Bare Metal Recovery with/without Universal Restore ▪ Used for Apply Universal Restore

slide-24
SLIDE 24

25 Acronis Training and Certification – Authorized Use Only

  • 3. Recovery Methods

‒ Using Backup Console a.k.a. Web interface

▪ Used for live/online recovery of entire machines, disk/volumes, files/folders and application data when the original machine’s OS and Agent is functional ▪ Backups can be recovered by browsing DEVICES or BACKUPS

‒ Using Bootable Media

▪ Used for bare metal recovery (with/without Universal Restore) to original or another machine when the original machine’s OS

  • r hardware is inoperable

▪ Requires special bootable media with bootable version of Acronis Agent to boot up the target machine in order to run the Agent ▪ Bootable Media ISO can be downloaded from Recovery menu

  • r created via Bootable Media Builder (on-premise only)
slide-25
SLIDE 25

26 Acronis Training and Certification – Authorized Use Only

  • 3. Recovery Methods

‒ Extract Files From Local Backup

▪ Used for browsing and extracting files and folders via File Explorer in Windows from backups stored on local folders ▪ Browse to folder location where backups are stored and double- click on .TIB .or .TIBX file

‒ Download Files from Cloud Storage

▪ Used for browsing and downloading files from backups stored in cloud storage ▪ Download files from cloud storage can be accessed from Recovery > More ways to recover

slide-26
SLIDE 26

27 Acronis Training and Certification – Authorized Use Only

  • 3. Recovery Point

‒ Recovery Point is the date and time to which the backed up data can be restored ‒ Every recovery point represents a backup ‒ Data and time of the recovery point refers to the exact moment of snapshot creation, i.e., when the backup task was started ‒ A lock symbol next to the recovery point means that the particular backup is encrypted with a password

slide-27
SLIDE 27

28 Acronis Training and Certification – Authorized Use Only

  • 3. What to Recover

‒ What can be recovered depends on what was backed up:

▪ Disk-level backups allows recovery at lower levels such as individual volumes, 1 or more files and folders ▪ If application-aware backup was performed, application items can be recovered from the backup ▪ Certain types of backups contains only specific data such as ESXi configuration backup and can only be used for specific recovery

‒ What to recover can be specified after selecting a recovery point and clicking on RECOVER… ‒ Alternatively, select RUN AS VM to perform Acronis Instant Restore on disk-level backups

slide-28
SLIDE 28

29 Acronis Training and Certification – Authorized Use Only

  • 3. Where to Recover

‒ Where to recover to depends on the data being recovered:

▪ For disk-level backups (Entire machine, Disks/volumes), recovery can be to the same or different machine as Physical machine or to new machine as Virtual machine, i.e., convert to VM ▪ For file-level backups (files/folder, Exchange/SQL databases, Office 365 mailboxes) recovery can be to Original location or Custom location

slide-29
SLIDE 29

30 Acronis Training and Certification – Authorized Use Only

Acronis Bootable Media

Creating and using Acronis Bootable Media

slide-30
SLIDE 30

31 Acronis Training and Certification – Authorized Use Only

  • 4. Acronis Bootable Media a.k.a Rescue Media

‒ Bootable media is a ISO, CD, DVD, USB flash drive or other removable media that enables booting up of a machine and running of an Agent without an OS ‒ There are 3 types of bootable media:

▪ Linux-based: Pre-packaged bootable media with drivers for booting up machines, used for recovering Windows and Linux-based machines ▪ WinPE-based: Customizable bootable media with possibility of adding drivers for bootup during media creation, used for recovering Windows-based machines ▪ Mac-based: Pre-packaged bootable media with drivers for booting up Macs, can be used for recovering Mac-based machines

slide-31
SLIDE 31

32 Acronis Training and Certification – Authorized Use Only

  • 4. Creating Acronis Bootable Media

‒ Downloading ISO for Linux-based media:

  • 1. Select a Windows or Linux machine from DEVICES > All

devices and click on Recovery > More ways to recover…

  • 2. Click DOWNLOAD ISO IMAGE to download the ISO file
  • 3. Burn onto CD/DVD, use 3rd party tools to create bootable USB

flash drive or attached to VM

‒ Using Rescue Media Builder for Mac-based media:

  • 1. Insert a CD/DVD or USB flash drive to the Mac
  • 2. Go to Applications, search for and run the Rescue Media

Builder

  • 3. Select the desired removable media and click Create
slide-32
SLIDE 32

33 Acronis Training and Certification – Authorized Use Only

  • 4. Creating Acronis Bootable Media

‒ Using Bootable Media Builder:

  • 1. Run Bootable Media Builder and click Next
  • 2. Select I will specify the key(s) manually or Create the media

without specifying a license key (Only recovery will be available)

  • 3. Choose the Bootable media type: Default (Linux-based

media), Windows PE or Windows PE (64-bit). Windows PE requires relevant Windows Deployment Kit to be installed

  • 4. Select the Acronis Backup Agent to place on the bootable

media

  • 5. [Optional] Specify the settings for Remote logon, Network and

Proxy Sever

  • 6. Select the media output: Acronis PXE Server, CD/DVD, USB

flash drive, ISO, RIS Server, ZIP file

  • 7. Create the bootable media
slide-33
SLIDE 33

38 Acronis Training and Certification – Authorized Use Only

Creating the Recovery Task

Steps for creating a Recovery Task

slide-34
SLIDE 34

39 Acronis Training and Certification – Authorized Use Only

  • 5. Recovery Cheat Sheet

Function Using Backup Console Using Bootable Media Download from Cloud Storage Extract files from local backups

Physical machine (Win/Linux)   Physical machine (Mac)  Virtual machine (VMware/Hyper-V)   Virtual machine (Virtuozzo)  ESXi configuration  Files/folders     System state SQL databases Exchange databases Exchange mailboxes Office 365 mailboxes 

slide-35
SLIDE 35

40 Acronis Training and Certification – Authorized Use Only

  • 5. Recovery via Backup Console

1. Select the desired machine from DEVICES and click

  • n Recovery or select the desired backup from

BACKUPS and click Show backups 2. Select the desired Recovery Point from the list 3. Click on RECOVER… and select type of data to recover if necessary 4. Depending on type of data to recover, browse and specify (tick) 1 or more items to recover 5. Specify target location in RECOVER TO, TARGET MACHINE, and/or TARGET DATABASE if prompted 6. [Optional] Specify Recovery options 7. Click START RECOVERY

slide-36
SLIDE 36

41 Acronis Training and Certification – Authorized Use Only

  • 5. Recovery via Bootable Media

1. Boot up the target machine with the bootable media 2. Click Manage this machine locally or Rescue Bootable Media twice, depending on media type 3. On the Welcome screen, click RECOVER 4. Click Select data and then click Browse 5. Specify the backup location to view available backups 6. Select the backup to recover from to view the contents (backed up disks and volumes) of the backup 7. Select the disk(s) and/or volume(s) to be recovered

slide-37
SLIDE 37

42 Acronis Training and Certification – Authorized Use Only

  • 5. Recovery via Bootable Media

8. After selecting the disk(s) and/or volume(s) to be recovered, it will show up under What to recover and will be automatically mapped to available disks on the target machine:

▪ Click on Clear to change the disk mapping ▪ Click on Properties to change the size of the volume after it has been recovered

9. Start the recovery

  • 10. [Optional]: After recovery is complete, perform Apply

Universal Restore if recovering to dissimilar hardware to enable bootability for the recovered OS

slide-38
SLIDE 38

43 Acronis Training and Certification – Authorized Use Only

  • 5. Recovery via Download Files

1. Select the desired machine with the data to recover from DEVICES and click on Recovery 2. Click More ways to recover… > Download files 3. Enter the credentials of the account to which the backed up machine was assigned 4. Select the Version or date and time of the backup to browse for files/folders to recover or use search 5. Select (tick) the items to recover and click Download 6. If a single file is selected, it will be downloaded as is,

  • therwise the selected data will be archived into a

.zip file 7. Select the location to save to and click Save

slide-39
SLIDE 39

44 Acronis Training and Certification – Authorized Use Only

  • 5. Recovering as Virtual Machine

‒ In Backup Console, disk-level backups (Entire machine, Disks/volumes) of physical machines can be recovered to:

▪ Physical machine (original) ▪ Virtual machine (convert to VM) ▪ Agent will automatically map the disks from the backup to the target machine. Alternatively, click DISK MAPPING to manually map the disk(s) for recovery ▪ Recovery of OS requires a reboot and machine will come online automatically

‒ If recovering to Virtual machine (convert to VM):

▪ VMware ESXi or Hyper-V can be selected as the target machine and Datastore for ESXi or Path for Hyper-V can be configured as well as VM SETTINGS such as Memory, Virtual processors and Network adapters

slide-40
SLIDE 40

45 Acronis Training and Certification – Authorized Use Only

  • 5. Recovering as Virtual Machine

‒ The following settings are available when configuring recovery to virtual machine:

▪ By default, the same VM will be selected for recovery ▪ To change to a different VM (same or different platform), click TARGET MACHINE and select VMware ESXi, Hyper-V or Virtuozzo, requires respective Agent ▪ Datastore and Path settings can be configured as well as VM SETTINGS ▪ VM will be stopped during recovery and has to be manually started after recovery. Alternatively, use Recovery options > VM power management to automatically start the VM

slide-41
SLIDE 41

46 Acronis Training and Certification – Authorized Use Only

  • 5. Universal Restore

‒ Acronis proprietary technology that allows:

▪ Bare metal recovery of Windows or Linux-based systems to dissimilar hardware ▪ P2P, P2V, P2C, V2V, V2P, V2C, C2C, C2P, C2V migrations ▪ Hardware independent deployment of supported OS

‒ Available as Apply Universal Restore in bootable media after Agent startup ‒ Also available as a tool which can be placed on a bootable media separately ‒ Universal Restore can be performed multiple times without having to perform recovery repeatedly

slide-42
SLIDE 42

47 Acronis Training and Certification – Authorized Use Only

  • 5. Universal Restore in Windows

‒ Preparation:

▪ Standby drivers for new HDD controllers and chipset, driver files in .inf, .sys, .oem must be extracted from .exe, .cab, .zip and placed in suitable repository ▪ Check access to drivers in bootable environment

‒ Universal Restore works by swapping the HAL.dll, HDD controller and network adapter drivers in the recovered OS to match the hardware of the machine used for recovery ‒ Universal Restore will scan in the following locations for suitable drivers:

▪ Windows default driver folder (usually WINDOWS/inf) with Automatic driver search ▪ Removable media if Search removable media setting is turned on ▪ Other folders such as network folders can be added using Add folder option

slide-43
SLIDE 43

48 Acronis Training and Certification – Authorized Use Only

  • 5. Universal Restore in Windows

‒ Mass storage drivers to install anyway:

▪ Used when Automatic driver search cannot locate suitable drivers in any of the locations that were specified ▪ If a specific mass storage controller such as RAID or fiber channel adapter is required ▪ Be careful with specifying Mass storage drivers to install anyway as mistakes will render the recovered OS inoperable and you will have to redo the bare metal recovery

‒ If Universal Restore cannot find a compatible driver in the specified locations, it will display a prompt about the problem device; choose either to Ignore or Retry after adding drivers to specified locations to be searched

slide-44
SLIDE 44

49 Acronis Training and Certification – Authorized Use Only

  • 5. Universal Restore in Linux

‒ Universal Restore can be used for Linux OS with kernel version 2.6.8 or above ‒ When working in Linux, Universal Restore updates the initial RAM disk (initrd):

▪ Adds modules for new hardware to initrd ▪ Search for necessary modules in /lib/modules ▪ If required modules cannot be found, records the module’s name into the log ▪ Original initrd is not modified and a copy is saved to the same directory with the same filename followed by _acronis_backup.img and can be reverted to if necessary ▪ Universal Restore may modify the configuration of the GRUB loader to ensure system bootability but will never modify the Linux kernel

slide-45
SLIDE 45

50 Acronis Training and Certification – Authorized Use Only

  • 5. Apply Universal Restore

1. Click Apply Universal Restore under Actions section of the Bootable Media 2. If recovered disk has several OS, click Select… and choose the OS to apply Universal Restore to 3. [Optional] Click Add folder to add network folders to search for suitable drivers 4. [Optional] If specific mass storage drivers such as RAID is required, click Add driver and browse to location where the drivers are located

slide-46
SLIDE 46

51 Acronis Training and Certification – Authorized Use Only

  • 5. Recovering Files

‒ Files/folders can be recovered to:

▪ Original location ▪ Custom location (any other local or network folder)

‒ If recovering to original location, the following options are available:

▪ Overwrite existing files ▪ Overwrite an existing file if it is older ▪ Do not overwrite existing files

slide-47
SLIDE 47

52 Acronis Training and Certification – Authorized Use Only

  • 5. Recovering ESXi Configuration

‒ ESXi configuration can be recovered using Linux- based Bootable Media to bare metal ‒ If original ESXi host is still connected to vCenter Server, disconnect and remove original host before recovery to avoid unexpected behaviors during recovery ‒ To keep the original host, add it back to vCenter after recovery

slide-48
SLIDE 48

53 Acronis Training and Certification – Authorized Use Only

  • 5. Run As VM

1. Select the desired machine, click Recovery and select a recovery point or Select a recovery point from BACKUPS 2. Click RUN AS VM 3. [Optional] Click Target machine to change VM type (ESXi or Hyper-V), the host and VM name 4. [Optional] Click Datastore or Path and select the desired storage for the VM, click VM SETTINGS to change memory and network settings, click POWER STATE to select VM power state upon run 5. Click RUN NOW

slide-49
SLIDE 49

54 Acronis Training and Certification – Authorized Use Only

  • 5. Run As VM

Run as VM Finalize VM Delete VM

slide-50
SLIDE 50

55 Acronis Training and Certification – Authorized Use Only

  • 5. Run As VM

‒ VM should appear in Backup Console, however, such VMs cannot be selected for backup ‒ If connection to backup location is lost, VM will become inaccessible or even corrupted ‒ When done, the following actions can be taken:

▪ Delete the VM: Select the VM from DEVICES menu and click

  • Delete. VM will be removed from Backup Console as well as

from vSphere or Hyper-V inventory, all changes made to data will be lost ▪ Finalize the VM: Only available for ESXi VM, select the VM from DEVICES and click Finalize, optionally, specify a new name and disk provisioning mode (default is thin) ▪ Finalize will recover all backup contents together with changes made to the datastore used for Run as VM, i.e, convert to a regular VM

slide-51
SLIDE 51

56 Acronis Training and Certification – Authorized Use Only

  • 5. VM Replication

Select ESXi VM for Replication Configure Replication

slide-52
SLIDE 52

57 Acronis Training and Certification – Authorized Use Only

  • 5. VM Replication

1. Select the VM to replicate and click Replication to display the replication plan template 2. [Optional] To modify the replication plan name, click default name 3. Click Target machine and select the following:

▪ Select whether to create a new replica and select the ESXi host and specify the new replica name or use an existing replica of the original machine. Click OK

4. [Optional] Click Schedule to change the replication schedule or disable the schedule to run manually 5. [Optional] Click the gear icon to modify replication

  • ption

6. Click Apply

slide-53
SLIDE 53

58 Acronis Training and Certification – Authorized Use Only

  • 5. VM Replication

Select replica Actions with replica

slide-54
SLIDE 54

59 Acronis Training and Certification – Authorized Use Only

  • 5. VM Replication

‒ After the replica is created, the following actions can be performed:

▪ Testing a replica: Click Test replica and Start testing to power

  • n the replica

▪ A replica can be selected for testing (powered on and connected to a network) to check if its working properly ▪ When finished, click Stop Testing to power down the replica and resume replication

slide-55
SLIDE 55

60 Acronis Training and Certification – Authorized Use Only

  • 5. VM Replication

‒ After the replica is created, the following actions can be performed:

▪ Failover to a replica: Click Replica actions and Failover. Select whether to connect to network and click Start ▪ A failover can be initiated with a replica if the original machine suffers an outage ▪ While the replica is in failover state, the following actions are available:

  • Stop failover: Used when original machine is fixed, replica will be powered off

and replication will resume

  • Perform permanent failover to replica: Removes the “replica” flag from the

VM, replication will no longer be possible

  • Failback: Used when original machine is fixed and changes made to replica is

to be recovered to original VM. Once failback is complete, replica will be powered off and replication will resume

slide-56
SLIDE 56

61 Acronis Training and Certification – Authorized Use Only

Recovery Options

Understanding available recovery options

slide-57
SLIDE 57

62 Acronis Training and Certification – Authorized Use Only

  • 6. Recovery Options

Recovery options

slide-58
SLIDE 58

63 Acronis Training and Certification – Authorized Use Only

  • 6. Recovery Options

‒ Recovery options are settings that can modify the behaviour of the Recovery Task ‒ Availability of Recovery options depends on:

▪ The environment the Agent performs the recovery in (Windows, Linux, OSX or bootable media) ▪ The type of data being recovered (disk, files, VMs, application data)

slide-59
SLIDE 59

64 Acronis Training and Certification – Authorized Use Only

  • 6. Backup Validation

‒ Validation is an operation that checks the possibility of data recovery from a backup ‒ Preset: Disabled ‒ If enabled, backup to be used is validated prior to recovery

▪ Validation calculates a checksum for every data block that can be recovered from the backup. The only exception is file-level backups that are stored in cloud storage. These backups are validated by checking the consistency of the metadata saved in the backup ▪ Validation is a time-consuming process and should only be enabled for compliance purposes

slide-60
SLIDE 60

65 Acronis Training and Certification – Authorized Use Only

  • 6. Date And Time For Files

‒ Effective only when recovering files ‒ Preset: Disabled ‒ Defines whether to recover the files’ data and time from the backup or assign the current date and time to the recovered files ‒ If enabled, files will be assigned the current date and time

slide-61
SLIDE 61

66 Acronis Training and Certification – Authorized Use Only

  • 6. Error Handling

‒ Enables specifying how to handle errors that might

  • ccur during recovery

‒ Re-attempt, if an error occurs:

▪ Preset: Enabled, Number of attempts: 30 (300 for backup to cloud storage), Interval between attempts: 30 seconds ▪ When recoverable error occurs, agent re-attempts to perform the unsuccessful operation, attempts will be stopped as soon as the operation succeeds or if the number of specified attempts are performed, which ever happens first

‒ Do not show messages and dialogs while processing (silent mode):

▪ Preset: Enabled ▪ When enabled, agent will automatically handle situations requiring user interaction, if an operation cannot continue without user interaction, it will fail

slide-62
SLIDE 62

67 Acronis Training and Certification – Authorized Use Only

  • 6. File Exclusions

‒ Effective only when recovering files ‒ File exclusions filters defines which files and folders to skip during the recovery process ‒ Enter criteria for Do not recover files matching the following criteria ‒ Criteria:

▪ Full path: Specify the full path to the file or folder, e.g., C:\Temp\File.tmp /home/user ▪ Name: Specify the name of the file or folder, e.g., Document.txt ▪ Wildcards can be used: (*) substitutes for any number of characters and (?) substitutes for 1 character, e.g., *.log or F???.log

slide-63
SLIDE 63

68 Acronis Training and Certification – Authorized Use Only

  • 6. File-Level Security

‒ Effective only for recovery from file-level backups of Windows files ‒ Preset: Enabled ‒ Defines whether to recover NTFS permissions for files along with the files ‒ Disable to let files inherit the NTFS permissions of the target folder to which they are recovered to

slide-64
SLIDE 64

69 Acronis Training and Certification – Authorized Use Only

  • 6. Flashback

‒ Effective when recovery to VM is performed by Agent for VMware, Agent for Hyper-V or Agent for Virtuozzo ‒ Preset: Enabled ‒ Flashback technology accelerates recovery of VMs by recovering only the differences between the backup and the target. Data is compared at the block level

slide-65
SLIDE 65

70 Acronis Training and Certification – Authorized Use Only

  • 6. Full Path Recovery

‒ Effective only when recovering data from file-level backup ‒ Preset: Disabled ‒ If enabled, full path to the file will be recreated in the target location

slide-66
SLIDE 66

71 Acronis Training and Certification – Authorized Use Only

  • 6. Mount Points

‒ Effective only in Windows for recovering data from file-level backups ‒ Preset: Disabled ‒ Enable option to recover files and folders that were stored on the mounted volumes and were backed up with the enabled Mount points backup option

slide-67
SLIDE 67

72 Acronis Training and Certification – Authorized Use Only

  • 6. Performance

‒ Defines priority of recovery process in the OS ‒ Available settings: Low, Normal, High ‒ Preset: Normal ‒ Priority of a process determines the amount of CPU and system resources allocated to that process, increasing priority might speed up the recovery process but is dependent on overall CPU usage and

  • ther factors like disk in/out speed and/or network

traffic

slide-68
SLIDE 68

73 Acronis Training and Certification – Authorized Use Only

  • 6. Pre/Post Commands

‒ Enables defining commands to be automatically executed before and after the recovery procedure ‒ Preset: No ‒ Can be used for: Checkdisk command, configure 3rd party anti-virus to be started after recovery, selectively copy files to another location, etc. ‒ Enable to configure the desired command or batch file to run before/after the recovery, interactive commands are not supported ‒ Post command will not be executed if recovery proceeds with a reboot

slide-69
SLIDE 69

74 Acronis Training and Certification – Authorized Use Only

  • 6. SID Changing

‒ Effective when recovering Windows 8.1/Windows 2012 R2 and earlier ‒ Not effective when recovery to a VM is performed by Agent for VMware or Agent for Hyper-V ‒ Preset: Disabled ‒ Generates unique security identifier (SID) for the recovered OS, only required to ensure operability of 3rd party software that depends on SIDs ‒ Microsoft does not officially support changing SIDs on deployed or recovered systems (Use at own risk)

slide-70
SLIDE 70

75 Acronis Training and Certification – Authorized Use Only

  • 6. VM Power Management

‒ Effective when recovery to VM is performed by Agent for VMware, Agent for Hyper-V or Agent for Virtuozzo ‒ Power off target virtual machine when starting recovery: Yes

▪ Recovery to existing VM is not possible if the VM is online, so machine is powered off automatically as soon as the recovery

  • starts. Users will be disconnected from the VM and any unsaved

data will be lost

‒ Power on the target virtual machine when recovery is complete: No

▪ After a VM is recovered from a backup to another machine, there’s a chance the existing machine’s replica will appear on the network. To be safe, power on the recovered VM manually after taking necessary precautions

slide-71
SLIDE 71

76 Acronis Training and Certification – Authorized Use Only

  • 6. Windows Event Log

‒ Effective only for Windows-based machines ‒ Preset: Disabled ‒ Defines whether the agent will log events of recovery

  • perations to the Application Event Log of the

Windows Event Log ‒ Event types to log can be selected

slide-72
SLIDE 72

77 Acronis Training and Certification – Authorized Use Only

Questions?

slide-73
SLIDE 73

78 Acronis Training and Certification – Authorized Use Only

www.acronis.com New Generation Data Protection twitter.com/acronis blog.acronis.com facebook.com/acronis