Summary of the content on the page No. 7 
                    
                          Chapter 1.  Introduction  1.1  Acronis True Image Enterprise Server – a complete solution for  corporate users  You have come to rely on your servers to run your business and retain key enterprise data.  Acronis True Image Enterprise Server provides comprehensive, reliable, and cost-effective  system protection and recovery for systems and entire networks. With Acronis True Image  Enterprise Server you have peace of mind knowing you are protected and can recover from  any situation.   Minimize
                    
                    Summary of the content on the page No. 8 
                    
                          Supports Cutting Edge Technology   Businesses today are moving to leverage the latest technologies, dual-core 64 bit processors  and 64 bit operating systems.  With Acronis True Image Enterprise Server, you can protect  these new machines, as well as legacy ones, running one solution.   Leverages Existing Technology Investments  The product can leverage your current storage infrastructure by supporting a wide variety of  storage media, so you can avoid costly hardware purchases to implement th
                    
                    Summary of the content on the page No. 9 
                    
                          6. Acronis Bootable Rescue Media Builder - creates bootable media, its ISO image or  RIS packages enabling data recovery in case of non-Windows or corrupted operating system.  1.3  New in Acronis True Image 9.1 Enterprise Server  • Support for Windows XP Professional x64 Edition, Windows Server 2003 x64  Editions  • Support for GPT hard disks (disks with GUID partition table)  • Acronis Backup Server – This software application, when installed on a networked  computer, automatically manages ba
                    
                    Summary of the content on the page No. 10 
                    
                          • Bootable backup media – When backing up to removable media, users can make this  media bootable in the same manner as rescue CD, so separate recover media is not  required  • Bootable disks ISOs and RIS packages – In addition to burning a bootable rescue  disk, users can save its ISO image for burning later, or create a RIS package for remote  boot of Acronis True Image Enterprise Server  • Acronis Bootable Agent – Adding this Agent to the rescue disk or RIS package will  enable the administ
                    
                    Summary of the content on the page No. 11 
                    
                          • SuSE 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 9.3, RedHat 7.3, 8.0, 9.0, Advanced Server 2.1,  Advanced Server 3.0, Advanced Server 4.0, Fedora Core 1, Fedora Core 2, Fedora Core  3, Fedora Core 4, Enterprise Server 3.0, Mandrake 8.0, 9.2, 10.0, 10.1, Slackware 10,  Debian stable and unstable (sarge), ASPLinux 9.2, ASPLinux 10, ASPLinux 11, ASPLinux  Server II, ASPLinux Server IV, Virtuozzo 2.6.x, Gentoo, UnitedLinux 1.0, Ubuntu 4.10,  TurboLinux 8.0, TurboLinux 10.0 and some others Linux distributions
                    
                    Summary of the content on the page No. 12 
                    
                          products that you can’t solve yourself by using this guide, then please contact Acronis  Technical Support.   More information about contacting Acronis Technical Support is available at the following  link: http://www.acronis.com/enterprise/support/   12                                                                                      Copyright © Acronis, Inc., 2000-2006                                                                                                                          
                    
                    Summary of the content on the page No. 13 
                    
                          Chapter 2.  Acronis True Image Enterprise  Server installation and starting  2.1  Installing Acronis True Image Enterprise Server components   To install Acronis True Image Enterprise Server components:  • run the Acronis True Image Enterprise Server setup file  • in the Install Menu, select the program to install: Acronis True Image Management  Console, Acronis True Image Agent for Windows, Acronis Backup Server, Acronis True  Image Group Server or Acronis True Image Enterprise Server (local 
                    
                    Summary of the content on the page No. 14 
                    
                          (disabled by default) provides the ability to include Acronis True Image Enterprise Server  into Bart PE plug-in tab. The plug-in files will be placed into the component installation folder  along with other program files.   Acronis Secure Zone manager lets you create, delete and resize a special hidden  3.3  Acronis Secure Zone).  partition for storing backup archives (see  When installing Acronis True Image Group Server, you will have to enter credentials, i.e.  user account that will be use
                    
                    Summary of the content on the page No. 15 
                    
                          2.3.2  Firewall setup  Acronis True Image Enterprise Server uses the following ports and IP addresses for remote  operation:  • server (Acronis True Image Agent) UDP port: 9876  • server (Acronis True Image Agent) TCP port: 9876, if busy chose port at  random  • client (Acronis True Image Management Console) UDP port: 9877, if busy  chose port at random  • IPv4 multicast address: 239.255.219.45  • IPv6 multicast address: FF05::fAA5:741E.  You might have to set the appropriate firewall access o
                    
                    Summary of the content on the page No. 16 
                    
                          Chapter 3.  General information and  proprietary Acronis technologies  3.1  The difference between file archives and disk/partition images  A backup archive is a file or a group of files (also called in this Guide “backups”), that  contains a copy of selected files/folders data or a copy of all information stored on selected  disks/partitions.   When you back up files and folders, only the data, along with the folder tree, are  compressed and stored.   Backing up disks and partitions is perfor
                    
                    Summary of the content on the page No. 17 
                    
                          this case, you need not to re-create the initial full image, so the backup time is not crucial,  and the restore time will be minimal.  Alternatively, if you are interested in saving only the last data state to be able to restore it in  case of system failure, consider the differential backup. It is particularly effective if your data  changes tend to be little as compared to the full data volume.  The same is true for incremental backup. In addition, it is most useful when you need  frequent 
                    
                    Summary of the content on the page No. 18 
                    
                          3.4  Acronis Startup Recovery Manager  3.4.1  How it works  The Acronis Startup Recovery Manager enables starting Acronis True Image Enterprise  Server on a local computer without loading the operating system. With this feature, if the  operating system won't load for some reason, you can run Acronis True Image Enterprise  Server by itself to restore damaged partitions. As opposed to booting from Acronis  removable media or RIS server, you will not need a separate media or network connection t
                    
                    Summary of the content on the page No. 19 
                    
                          3.5.1  Backup locations, their quotas and time limits  Backup server is a networked computer where Acronis Backup Server is installed. A backup  location is an automatically managed storage area for backups on a backup server. An  administrator can organize one or more backup locations and set the overall limitations to  size/storage time for every location, i.e. quotas and time limits. An administrator can Move,  Clear or Delete existing backup locations or edit their Quotas and time limits. 
                    
                    Summary of the content on the page No. 20 
                    
                          Administrator profiles are used for managing backups, created by backup tasks, remotely  controlled from Acronis True Image Management Console.  An administrator assigns a backup location and sets quotas and time limits for each  computer running Acronis True Image Agent. After that, when creating an individual or  group backup task, he will specify the backup server as the target storage place, and every  computer’s backup will be directed to the assigned location, which may differ from other
                    
                    Summary of the content on the page No. 1 
                    
                        User's Guide
Acronis 
True Image 9.1
Enterprise Server
Compute with confidence
www.acronis.com                                                                                                                                                                                                                                                                                                                                                                                                                      
                    
                    Summary of the content on the page No. 2 
                    
                          Copyright © Acronis, Inc., 2000-2006. All rights reserved.  “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery  Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc.  Linux is a registered trademark of Linus Torvalds.  Windows and MS-DOS are registered trademarks of Microsoft Corporation.  All other trademarks and copyrights referred to are the property of their respective owners.  Distribution of substantively modified version
                    
                    Summary of the content on the page No. 3 
                    
                          END-USER LICENSE AGREEMENT  BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF  YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO  ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE.  Acronis True Image Enterprise Server (the Software) is Copyright © Acronis, Inc., 2000-2006. All  rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only,  subject to the following restrictions and limit
                    
                    Summary of the content on the page No. 4 
                    
                          Table of Contents  CHAPTER 1.  INTRODUCTION ....................................................................................................................... 7  1.1  ACRONIS TRUE IMAGE ENTERPRISE SERVER – A COMPLETE SOLUTION FOR CORPORATE USERS ................... 7  1.2  ACRONIS TRUE IMAGE ENTERPRISE SERVER ARCHITECTURE....................................................................... 8  1.3  NEW IN ACRONIS TRUE IMAGE 9.1 ENTERPRISE SERVER...........................................
                    
                    Summary of the content on the page No. 5 
                    
                          4.5  MANAGING BACKUP SERVER ...................................................................................................................... 33  4.5.1  Default settings................................................................................................................................... 34  4.5.2  Set up Administrator profiles.............................................................................................................. 35  4.5.3  Adding Users and Administrator
                    
                    Summary of the content on the page No. 6 
                    
                          8.1.4  Setting up one-time execution............................................................................................................. 75  8.2  MANAGING SCHEDULED TASKS................................................................................................................... 76  CHAPTER 9.  MANAGING ACRONIS SECURE ZONE ............................................................................. 77  9.1  CREATING ACRONIS SECURE ZONE ..........................................