Acronis Admin Guide

Download as pdf or txt
Download as pdf or txt
You are on page 1of 190

Tech Associate Backup

Performing backup & recovery


Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 1
Certification

Acronis #CyberFit Tech Associate Certification


Consists of the following courses (specializations)

Tech Tech Associate Tech Associate Tech Associate


Foundation Backup Disaster Recovery Protect

You are here

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 2
Sections

1. Planning for Backup & Recovery


2. Creating Backups
3. Performing Recovery
4. Other Operations

This and other courses are also available on LMS:


• Visit https://partners.acronis.com/training for more information

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 3
Planning for
Backup & Recovery
Understanding what can be backed up and recovered
Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 4
Module Outline

1. Backup 101
2. Protecting Physical Machines
3. Protecting Applications
4. Protecting VMs and Virtualization Hosts
5. Protecting Microsoft 365 & G suite
6. Acronis Bootable Media
7. Acronis Universal Restore
8. Acronis Instant Restore
9. VM Replication

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 5
Backup 101
Planning for backup & recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 6
How to Plan for Backup

▪ Understand your data environment and what needs to be backed up, e.g., for
recovery and/or for archival
• Entire machine/disks/volumes/VMs or individual files/folders/databases?
• Application-aware backup and need for granular recovery?
• Regulatory/audit compliance? Legal obligations?
• Size of data and length of backup window?
▪ Determine the backup strategy (retention period and replication?) and most suitable type
of storage for storing and retrieving the backup
• D2D2D or D2D2C
• Local, network storage and/or cloud? Staging to cloud for replication or archival?

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 7
How to Plan for Backup

▪ Determine Recovery Point Objective (RPO) and Recovery Time Objective


(RTO) for each service/system to be backed up, use revenue or cost per hour as
a guide
• RPO or frequency of backup is determined based on maximum acceptable loss of data in
case of a service disruption or outage
• RTO or maximum time allowed for recovery is determined based on avoiding
unacceptable consequences associated with a service disruption or outage

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 8
How to Plan for Backup

1
3 2 3
1

▪ Have multiple versions of your backup, follow the 3-2-1 rule:


• Eliminate single point of failure
• Leverage on different types of storage for maximizing capacity/performance vs. price
▪ Align with backup needs (recovery or archival), backup strategy and RTO/RPO
requirements
▪ Formulate and document a disaster recovery plan for each service and an overall
business continuity plan and test often

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 9
How to Plan for Recovery

▪ Understand your outage and what needs to be recovered, e.g., RTOs and
RPOs? Impact on productivity, revenues, normal operations?
• Entire machine/disks/volumes/VMs or individual files/folders/databases/application items?
▪ Determine the backups available and the most suitable method/location for
recovery:
• From local, network or cloud storage?
• Recovery method? Recover to live system or use bare metal recovery? Use Acronis
Instant Restore or Acronis Cyber Disaster Recovery Cloud?
• Follow and if necessary adapt disaster recovery plan and business continuity plans to
perform recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 10
Protecting Physical Machines
Protecting Windows, Linux and Mac physical machines

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 11
Protecting Physical Machines

▪ Windows, Linux and Mac physical machines1 can be backed up using:


• Entire machine backup: includes all non-removable disks of the machine
• Disks/volumes backup: 1 or more disks and volumes can be selected
• Files/folders2 backup: 1 or more files and folders can be selected
▪ What can be recovered to live machines:
• 1 or more disk/volumes and files/folders can be recovered from disk-level backups such
as Entire machine or Disk/volume backups
• 1 or more files/folders can be recovered from file-level backups

1 A VM with Agent installed can be backed up similar to a physical machine


2 Files/folders backup can also be used to back up network folders on file servers and NAS devices

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 12
Protecting Physical Machines

▪ Additionally, bare metal recovery can be used when original machine is non-
operational, e.g., hardware or OS failure:
• Requires bootable media for booting up hardware (physical or virtual) to be used for recovery
• Disk-level backups containing an OS can then be selected for system (1 or more disks/volumes)
recovery
• For recovery to dissimilar hardware for Windows or Linux systems, Universal Restore
can be used after bare metal recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 13
Protecting Applications
Protecting Microsoft applications, Oracle and SAP HANA databases

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 14
Protecting Applications

▪ Microsoft SQL and Microsoft Exchange can be protected as follows:


• Application-aware backup: Disk-level backup of entire server and application metadata
• Database backup: File-level backup of the database and associated metadata
▪ Both types of backup can be used to recover:
• Database to live application
• Database as files
• Granular recovery of application items
▪ For Microsoft Exchange 2010 SP1 or later, Mailbox backup is also possible and
can be used for mailbox and mailbox item recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 15
Protecting Applications

▪ For Microsoft Exchange, recovery can be performed to original or new Exchange


server of the same version:
• Target Exchange server and machine performing the recovery (with Agents installed) must
belong to the same AD forest and requires either membership in Exchange Organization
Administrators role group (Exchange 2007) or Sever Management role group (Exchange 2010
and above)

▪ For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the machine
and sysadmin role in target SQL instance

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 16
Protecting Applications

▪ Exchange cluster backup:


• Supported for DAG for Exchange Server 2010 and above:
a) Agent for Windows + Agent for Exchange must be installed on each node of the Exchange cluster
b) Backup option > Cluster backup mode has to be enabled
c) DAG itself must be selected from Devices > Microsoft Exchange or cluster backup will not work correctly

▪ SQL cluster backup:


• Supported for AAG for SQL Server 2012 and above:
a) Agent for Windows + Agent for SQL must be installed on each node of the WSFC cluster
b) Backup option > Cluster backup mode has to be enabled
c) AAG itself or database set (must be the same in all nodes) must be selected from Devices > Microsoft SQL or
cluster backup will not work correctly

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 17
Protecting Applications

▪ To recover DAG (Exchange cluster) or AAG (SQL cluster):


• Requires that the DAG or AAG is backed up (not individual databases or items)
• Select the clustered database for recovery from the Backup Storage tab; target node for
recovery is automatically selected by the Agent when creating the Recovery Task
• For DAG, after recovery is complete, manually configure or resume replication on the
cluster
• For AAG, target database to be recovered (if live) must be excluded from the AAG prior to
recovery as a database in an AAG cannot be overwritten

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 18
Protecting Applications

▪ Microsoft SharePoint farm can be protected as follows:


• Backup all database servers (Microsoft SQL based) with SQL application-aware backup
• Backup all unique front-end and application servers with normal disk-level backup
• Backups of all servers should be performed using the same schedule
▪ For recovery:
• Database servers can be recovered using recovery methods for Microsoft SQL
• Other servers can be recovered using disk-level or bare-metal recovery
• SharePoint content such as sites, libraries and documents can be recovered using
Acronis SharePoint Explorer

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 19
Protecting Applications

▪ Microsoft Active Directory can be protected as follows:


• Application-aware backup: Disk-level backup of entire server and application metadata
▪ For recovery:
• A non-authoritative restore is performed and USN rollback will not occur after recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 20
Protecting Applications

▪ Oracle Databases on Windows and Linux can be protected as follows:


• Application-aware backup: Disk-level backup of entire server and application metadata
• Database backup: File-level backup (a.k.a. RMAN backup) of the Oracle database and
Archived Logs using RMAN scripts
▪ RMAN scripts can be found in the following locations after installing Agent for
Oracle and parameters in the scripts can be customized
• In Windows: %ProgramFiles%\Acronis\Oracle
• In Linux: /usr/lib/Acronis/Oracle
• Refer to the Help file for more details on customizing the scripts for Database backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 21
Protecting Applications

▪ The table belows shows the differences between application-aware (server backup)
and database backup for Oracle databases:
Comparison Server Backup Database Backup
RTO in case of entire server failure Less More

Run as virtual Oracle Server (Run as VM) Yes, on ESXi or Hyper-V hosts No

Support for raw partitions/ASM No Yes

Support for databases spread over several volumes Yes Yes

Necessary to configure separate backup


Backup is fully configured in the GUI,
Ease of use plans for full backup of database and
knowledge of RMAN not necessary
archived logs

Oracle Explorer can be used for granular,


Scripts can be used to customize recovery
Database recovery point-in-time recovery of Oracle data
for advanced scenarios
directly from backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 22
Protecting Applications

▪ SAP HANA databases on Linux can be protected as follows:


• Disk-level backup with Pre/Post data capture scripts: Disk-level backup of entire
server with scripts to prepare SAP HANA databases for backup
▪ Scripts can be downloaded from:
• https://dl.managed-protection.com/u/SAPHANA/SAP-HANA-modules.tar
▪ After the scripts are downloaded, access to the database needs to be configured
for the scripts before using them
▪ For recovery:
• Recover entire server or use SAP HANA Studio to revert a database to a snapshot

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 23
Protecting Applications

▪ Application-aware and database backup requires the following:


• For agent-based/guest-level backup of physical machines/virtual machines:
a) Agent for Windows/Linux + Agent for Exchange/SQL/Active Directory/Oracle is installed on the physical or
virtual machine

• For agentless backup of VMware and Hyper-V VMs:


a) Agent for VMware (Virtual Appliance or Windows)/Agent for Hyper-V installed for the virtual host with VMs to be
backed up
b) Supports application-aware backup of Microsoft Exchange and Microsoft SQL
c) For recovery, requires Agent for Windows + Agent for Exchange/SQL on a machine that has access to the backups

▪ SQL transaction logs are truncated after each successful backup


▪ Exchange transaction logs are truncated on virtual machines only, enable VSS
full backup option to truncate logs on physical machines

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 24
Protecting
VMs and Virtualization Hosts
Protecting virtualization platforms

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 25
Protecting VMs and Virtualization Hosts

▪ For VMware vSphere:


• VMs can be backed up and recovered with Agent for VMware (agentless backup)
• ESXi configuration can also be backed up which allows recovery to bare metal:
a) Requires SSH to be enabled in the Security Profile of the ESXi host configuration
b) Not supported for VMware vSphere 6.7
c) Cannot be backed up to cloud storage

• Backup of ESXi configuration includes:


a) Bootloader and boot bank partitions of the host
b) Host state (configuration of virtual networking and storage, SSL keys, server network settings and local user
information)
c) Extensions and patches installed or staged on the host
d) Log files

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 26
Protecting VMs and Virtualization Hosts

▪ For Hyper-V:
• VMs can be backed up and recovered with Agent for Hyper-V (agentless backup)
• Entire Hyper-V server can be backed up with Agent for Windows via disk-level backup:
a) Requires Hyper-V Integration Services to be installed and updated on the VMs
b) Hyper-V VSS writers must be working (check using vssadmin list writers)

▪ For Scale Computing HC3:


• VMs can be backed up and recovered with Agent for Scale Computing HC3 (agentless
backup)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 27
Protecting VMs and Virtualization Hosts

▪ For all other supported virtualization platforms as well as Windows Azure and
Amazon EC2 cloud instances:
• VMs can be backed up from inside guest OS (agent-based backup) similar to how physical
machines can be backed up, i.e., using Agent for Windows or Linux
• Recovery is similar to physical machines except for Windows Azure and Amazon EC2
VMs
• Windows Azure and Amazon EC2 cloud instances cannot be booted from bootable
media, hence bare metal recovery is not possible; recovery have to be performed to
existing VM:
a) Create new VM from image/template in Azure or EC2 with same disk configuration as machine to be recovered and
install Agent for Windows or Linux on the new VM
b) Recover backed up machine as disk-level recovery to the new VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 28
Protecting
Microsoft 365 & G suite
Protecting productivity suites

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 29
Protecting Microsoft 365

▪ Microsoft 365 (formerly Office 365) can be backed up as follows:


• Using Local Agent:
a) Install Agent for Office 365 on a Windows machine with Internet connection
b) Supports backup of Microsoft 365 Exchange Online mailboxes to local, network and cloud storage

• Using Cloud-to-Cloud (C2C) a.k.a Cloud Agent backup:


a) No agent installation required, add Microsoft Office 365 for Business from Add button in cloud console
b) Supports backup of Office 365 Exchange Online mailboxes, OneDrive for Business and SharePoint Online
sites

▪ Requires Global Administrator role credentials


▪ Mailbox backup includes only folders visible to users, Recoverable items folder
are not included in a mailbox backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 30
Protecting Microsoft 365

Feature Local Agent Cloud-2-Cloud Backup


Exchange Online: user, shared, and group
mailboxes
OneDrive: user files and folders
Data items that can be backed up Exchange Online: user and shared mailboxes
SharePoint Online: classic site collections, group
(team) sites, communication sites, individual data
items

Backup of archive mailboxes (In-


No Yes
Place Archive)

Backup Schedule User-defined Once a day (automatically) or manually started

Backup Locations Cloud Storage, local folder, network folder Cloud Storage only

Automatic Protection of new Yes, by applying a backup plan to the All users,
No
Microsoft 365 users, groups, sites All groups or All sites groups

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 31
Protecting Microsoft 365

Feature Local Agent Cloud-2-Cloud Backup

Protecting more than one Microsoft


No Yes
365 organization

Granular recovery Yes Yes

Recovery to another user within one


Yes Yes
organization

Recovery to another organization No Yes

Recovery to an on-premise
No No
Microsoft Exchange Server

Maximum number of manual backup


No 10 manual runs during an hour
runs

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 32
Protecting Microsoft 365

Feature Local Agent Cloud-2-Cloud Backup

When backing up to cloud storage,


Maximum number of items that can 5000 mailboxes per company.
10 000 protected items (mailboxes, OneDrives or
be backed up without performance When backing up to other destinations, sites per company)
degradation 2000 mailboxes per Protection Plan (no limitation
for number of mailboxes per company)

Maximum number of recovery 10 operations, including G suite recovery


No
operations operations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 33
Protecting Office 365

▪ To recover:
• Granular recovery can be performed from Microsoft 365 backups:
a) Mailboxes and mailbox items can be recovered to Microsoft 365, downloaded as files or sent as email as a form of
recovery
b) OneDrive content can be recovered to existing OneDrive, including Sharing permissions recovery or download as
files
c) SharePoint Online sites can be recovered to existing site, as document library or single document or download as
files

• Automatic creation of users, public folders, groups or sites during a recovery is not
possible, they have to be manually created prior to recovery
• Preview, browsing and search of backed up content possible for quick access to backed
up data

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 34
Protecting G Suite

▪ Google Suite can be backed up as follows:


• Using Cloud-2-Cloud (C2C) backup:
a) No agent installation required, add G suite from Add button in cloud console
b) Supports backup of Gmail mailboxes, Calendars, Contacts, Google Drives and G Suite Shared drives
c) Support for several G suite organizations

▪ Requires Super Admin credentials


▪ To recover:
• Granular recovery can be performed from G suite backups:
a) Mailboxes and mailbox contents can be recovered to G suite
b) Google Drive content can be recovered to existing google Drive as entire drive or as files/folders

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 35
Acronis Bootable Media
Types of bootable media

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 36
Acronis Bootable Media

▪ Bootable media a.k.a. Rescue Media is used for booting up the hardware of a
physical or virtual machine used for bare metal recovery
▪ There are 3 types of bootable media:
• Linux-based: Contains an agent based on Linux kernel, can boot up and perform
operations on any PC-compatible hardware:
a) Can be downloaded from web console (ready-made bootable media) or created using Bootable Media Builder

• WinPE-based: Contains a minimal Windows Preinstallation Environment (WinPE) and


Acronis plugin (agent) for WinPE
a) Can be created using Bootable Media Builder, required installation of Windows Deployment Kit

• Mac-based: Create using Rescue Media Builder that’s included with Agent for Mac,
used for recovering macOS machines

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 37
Acronis Bootable Media

▪ Bootable Media Builder is required to create a full-feature Linux-based or WinPE


bootable media:
• Requires valid Acronis Cyber Protect license key during creation
• Can create media with 32-bit and 64-bit (supports UEFI) components
• Supports different outputs – CD/DVD, ISO, ZIP, Acronis PXE, WDS/RIS

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 38
Acronis Universal Restore
Apply Universal Restore

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 39
Universal Restore

▪ Acronis proprietary technology that enables:


• Bare metal recovery of Windows or Linux-based systems to dissimilar hardware
• P2P, P2V, P2C, V2V, V2P, V2C, C2C, C2P, C2V migrations
• Hardware independent deployment of supported OS
▪ Works by swapping required systems drivers for OS startup in the recovered OS
to match the hardware of the machine used for recovery
▪ Available as Apply Universal Restore in bootable Agent on bootable media
▪ Universal Restore can be performed multiple times without having to perform
recovery repeatedly

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 40
Universal Restore in Windows

▪ The following locations will be scanned recursively when using Automatic driver
search for suitable drivers:
• Windows default driver folder in the recovered OS – make sure OS is detected when
using Apply Universal Restore for the 1st time after bare metal recovery
• Removable media, network folders or other folders – If Windows default driver folder
doesn’t contain suitable drivers, i.e., OS startup fails after Apply Universal Restore,
download drivers (HDD controller and chipset) from vendor website and place them in any
of the above locations
• Drivers have to be provided as .inf files, extract them from .exe, .cab or .zip using a 3rd
party app if they are downloaded as such

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 41
Universal Restore in Windows

▪ Mass storage drivers to install anyway:


• Used when Automatic driver search cannot locate suitable drivers in any of the
locations that were specified
• If a specific mass storage controller such as RAID or fiber channel adapter is required
• Be careful with specifying Mass storage drivers to install anyway as mistakes will render
the recovered OS inoperable and you will have to redo the bare metal recovery
▪ If Universal Restore cannot find a compatible driver in the specified locations, it
will display a prompt about the problem device; choose either to Ignore or Retry
after adding drivers to specified locations to be searched

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 42
Universal Restore in Linux

▪ Universal Restore can be used for Linux OS with kernel version 2.6.8 or above
▪ When working in Linux, Universal Restore updates the initial RAM disk (initrd):
• Adds modules for new hardware to initrd
• Search for necessary modules in /lib/modules
• If required modules cannot be found, records the module’s name into the log
• Original initrd is not modified and a copy is saved to the same directory with the same
filename followed by _acronis_backup.img and can be reverted to if necessary
• Universal Restore may modify the configuration of the GRUB loader to ensure system
bootability but will never modify the Linux kernel

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 43
Acronis Instant Restore
Run as VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 44
Acronis Instant Restore

▪ Disk-level backups containing an OS can be Run as VM for quick recovery:


• A temporary VM is created and virtual disks are emulated from the backup and linked to
the temporary VM
• Can be deleted (all changes will be discarded) or Finalized (converted) as a regular VM without
downtime
▪ Can be used for:
• Disaster recovery: Instantly bring a copy of a failed machine online
• Testing of backups: Run the machine from backup to ensure that guest OS is
functioning
• Accessing application data: Extracting application data using native tools

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 45
Acronis Instant Restore

▪ Pre-requisites:
• Requires Agent for VMware or Agent for Hyper-V and corresponding host
• Agent for VMware/Hyper-V must be able to access the backup file:
a) Backups stored on network folder (SMB) or cloud storage
b) Backups stored on local storage of the VMware ESXi or Hyper-V host
c) Backups stored on SFTP, Tape and Secure Zone are not supported

• Backups must contain entire machine or all volumes required for OS to start
• Backups of physical and virtual machines except for Virtuozzo containers can be used
• Backups that contain Linux LVM must be created by Agent for VMware or Hyper-V and
the same type of Agent must be used for Run as VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 46
VM Replication
Creating a VM replica in VMware vSphere

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 47
VM Replication

▪ Only available for VMware ESXi VMs


▪ Creates an exact copy or replica of a VM to the same or another ESXi host
which can be maintained in sync with the original VM
▪ Replication can be started manually or on schedule with the 1st replication being
a full copy and subsequent replications being incremental
▪ Replication vs. Backup:
• Replica keeps only the latest state of a VM
• Replication will consume space on datastore whereas backups can be stored on other
storage
• Powering on a replica is much faster than recovery and faster than Run as VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 48
VM Replication

▪ Replica can be used for testing and failover/failback to/from local or remote site
▪ Actions available:
• Testing
• Failover | Stop Failover
• Permanent failover
• Failback
▪ The following types of VMs cannot be replicated:
• Fault-tolerant VMs on ESXi 5.5 and lower
• Run as VM
• Replicas

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 49
Creating Backups
Configuring the Protection Plan – Backup module
Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 50
Module Outline

1. Selecting & Grouping Machines


2. Configuring Backup
3. Browsing Backups & Plans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 51
Selecting & Grouping
Machines
How to select and group machines for backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 52
Selecting Machines for Backup

Select sub-group
Select machine to backup Configure Backup
Select from built-in group

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 53
Selecting Machines for Backup

▪ Machines can be selected for backup from any of the built-in device groups and
sub-groups if available
▪ Types of sub-groups:
• Built-in such as the Machines with agents > All group
• Manually added Static or Dynamic custom group
▪ The selection determine what can be selected for backup, e.g., SQL databases
can only be selected for backup by browsing from the Devices > Microsoft SQL
built-in device group and not from Devices > All devices

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 54
Device Groups

▪ Device groups are designed for convenient management of large numbers of


registered machines
▪ Built-in groups:
• Once a machine is registered, it will appear in the built-in group(s) that correspond to its
type, e.g., Exchange server will appear in the Devices > Microsoft Exchange built-in
group
▪ Custom groups:
• Groups that are manually created within a built-in group and can be nested
• Typically used for grouping similar machines for group backup
• A machine can be a member of more than 1 custom group

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 55
Device Groups

▪ Types of custom groups:


• Static groups: Contains machines that were manually added to them, membership never
changes unless explicitly added or removed from the group
• Dynamic groups: Contains machines added automatically according to the search
criteria specified when creating the group, membership updated automatically based on
machines that meet the criteria
▪ Protection Plans can be applied to a group:
• New devices added to the group “gains” applied plans
• Devices “loses” applied plans when removed from a group but retains plans that were
applied specifically to the device

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 56
Creating a Static Group

Select built-in Device group

Add new Static group

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 57
Creating a Static Group

Configure new Static group

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 58
Creating a Dynamic Group

Type in search criteria Save as new


Dynamic group

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 59
Device Groups

▪ To create a Static group:


1. Choose the built-in group to create the Static group in and click on + New group
2. Type in the name and comments for the new Static group and click OK
3. Select the newly created Static group to add machines to the group
▪ To create a Dynamic group:
1. Enter a search criteria1 in the search box, click Search and then Save as
2. The newly created Dynamic group will contain all machines that match the search
criteria; search criteria can be modified after the group has been created
3. Newly added machines that match the criteria will be automatically added to the group

1 Refer to the Help file for details on all available search criteria

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 60
Configuring Backup
Protection Plan – Backup module sections

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 61
Protection Plan – Backup

Protection Plan with


Backup, and other modules

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 62
Protection Plan – Backup

Backup settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 63
Protection Plan – Backup

▪ The Protection Plan is a plan that combines several protection modules:

• In Cyber Backup & Cyber Protect editons: • In Cyber Protect editions only:
a) Backup: Configure backup settings for the machine a) URL Filtering: Enable URL filtering
or group
b) Windows Defender Antivirus/Microsoft Security
b) Active Protection/Antivirus & Antimalware Essentials: Configure Windows Defender/Microsoft
protection: Configure Active Protection (Cyber Security settings
Backup editions) and Anti-malware scanner settings
(Cyber Protect editions) c) Patch Management: Configure patch installation
settings
c) Vulnerability Assessment: Configure vulnerability
assessment scans d) Data Protection Map: Configure data protection map
scans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 64
Configuring Backups

▪ Select the machine or group to be backed up


▪ Plan and decide:
• What to back up: Entire machines, disk/volumes, files/folders, ESXi configuration?
• Where to back up: Cloud, Local Folders, Network Folders, Tape, Storage Node?
• Schedule: Backup scheme, Schedule, Start conditions?
• How long to keep: Retention rule – By backup age, By number of copies?
• Replication: Enable replication? From where to where?
• Encryption: Turn on AES encryption for backups?
• Backup options: Email notification, Error handling, Pre/Post commands?

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 65
Backup Cheat Sheet
ITEMS TO BACK UP
WHAT TO BACK UP WHERE TO BACK UP SCHEDULE HOW TO KEEP
Selection methods

Cloud
Local folder
Network folder
Direct selection
Disks/volumes SFTP server
Policy rules
(physical machines) NFS
File filters
Secure Zone Always incremental (single-file)
Managed location Always full By backup age
Tape device Weekly full, daily incremental By number of backups
Monthly full, Weekly differential, By total size of backups
Cloud Daily incremental (GFS) Keep indefinitely
Local folder Custom (F-D-I)
Network folder
Disks/volumes Policy rules
SFTP server
(virtual machines) File filters
NFS
Managed location
Tape device

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 66
Backup Cheat Sheet
ITEMS TO BACK UP
WHAT TO BACK UP WHERE TO BACK UP SCHEDULE HOW TO KEEP
Selection methods

Cloud
Local folder
Network folder
Direct selection
Files SFTP server
Policy rules Always incremental (single-file)
(physical machines only) NFS
File filters Always full
Secure Zone
Weekly full, daily incremental
Managed location
Monthly full, Weekly differential,
Tape device Daily incremental (GFS) By backup age
Custom (F-D-I) By number of backups
Local folder
By total size of backups
Network folder
ESXi configuration Keep indefinitely
SFTP server
NFS
Direct selection Cloud
SQL databases
Local folder Always full
Network folder Weekly full, daily incremental
Exchange databases Managed location Custom (F-D-I)
Tape device

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 67
Backup Cheat Sheet
ITEMS TO BACK UP
WHAT TO BACK UP WHERE TO BACK UP SCHEDULE HOW TO KEEP
Selection methods

Cloud By backup age


Local folder By number of backups
Microsoft 365 mailboxes1 Direct selection Always incremental (single-file)
Network folder By total size of backups
Managed location Keep indefinitely

1 For C2C backup of Microsoft 365 and G suite, cloud console and cloud storage subscription is required

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 68
What to back up

▪ Selection available depends on machine/group1 selected:


• Entire machine: All non-removable disks will be backed up with option of enabling
Application backup
• Disks/volumes: 1 or more disks and volumes can be selected
• Files/folders: 1 or more files and folders can be selected
• System state: Windows Vista and later only, backs up system state data
• ESXi configuration: Backs up the ESXi configuration
• Exchange/SQL databases: 1 or more Exchange/SQL database can be selected

1 For Office 365 and G suite, selection will be based on the items available in the account, e.g., 1 or more mailboxes, OneDrive or Google Drive, SharePoint Online sites can be selected

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 69
What to back up

▪ Application backup selection is available when Entire machine is selected for


What to back up:
• Microsoft SQL Server | Microsoft Exchange Server | Microsoft Active Directory |
Oracle Database can be enabled for application-aware backup
• Machine has to meet requirements for application-aware backup
• If any requirements are not met, an error message with the missing requirement will be
shown to assist in meeting the requirements

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 70
What to back up

▪ Besides selecting items to be backed up directly, items can also be selected


using policy rules:
• Disks/volumes: Conditional rules such as [All volumes], [Fixed volumes] for volumes
on SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays,
[BOOT+SYSTEM] for system and boot volumes, etc. and specific rules such as C:\,
/dev/hda1, etc.
• Files/folders: Conditional rules such as [All Files], [All Profiles Folder] and
%PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise type in a
file/folder path such as /dev/hda1/file.txt
▪ When a backup using policy rules is applied to multiple machines and no data
matches at least 1 of the rules, backup will fail on that particular machine

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 71
Where to back up

▪ The following backup destinations are available:


• Cloud Storage: Backups will be stored in Acronis cloud storage
• Local folders: Backups will be stored locally on the machine being backed up such as
internal/external disk or removable media
• Network folder, NFS folder: Backups will be stored on SMB/CIFS/DFS or NFS shared
folder accessible from the machine being backed up
• Secure Zone: Backups will be stored in a secure partition on the local disk of the machine
being backed up, can be created from Details > Create Secure Zone
• Storage Node: Backups will be stored in a managed location
• SFTP: Backups will be stored on a SFTP server
• Tape: Backups will be stored on tapes in a tape pool

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 72
Secure Zone

▪ Secure Zone is a secure partition that can be created on a local disk of the
machine being backed up:
• Offers a cost-effective and handy method for protecting data from software malfunction,
virus attack and human error
• Eliminates the need for a separate media or network connection to backup/recover data
• Can be used as a “staging” storage prior to replication of backups
▪ Limitations:
• Cannot be created on a Mac
• Does not protect against physical failure of the local disk
• Does not support single-file backup format

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 73
Secure Zone

▪ To create a Secure Zone, perform the following steps:


1. Go to Details > Create Secure Zone and click Select to select a local disk on which to create the
secure zone
2. Enter the Secure Zone size or drag the slider
3. [Optional] Enable Password protection switch and specify a password
4. Click Create
▪ Creating a Secure Zone will change the layout of the volumes on the disk and will
require a reboot if space is taken from existing volumes:
• Secure Zone will always be created at the end of the disk and unallocated space will be used if any to
create the new volume. If there isn’t any unallocated space or if it’s insufficient, free space from existing
volumes will be taken instead to create the new volume resulting in existing volumes being resized

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 74
Managed Location

▪ Managed locations can be configured for storing backups when a Storage Node
is installed
▪ Managed locations allows for the following:
• Storage deduplication1
• Folder encryption
• Multiple machines to back up to a Tape device connected to a Storage Node
▪ Can be configured from Where to back up > Add location > Storage Node
▪ Once configured, a managed location will be available to all machines on the
network

1 For deduplication, it is strongly recommended to follow Deduplication best practices in the Help file and install Storage Node on recommended hardware to avoid performance issues

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 75
Schedule

▪ Select a Backup Scheme:


• Always incremental (single-file) | Always full | Weekly full, Daily incremental |
Monthly full, Weekly differential, Daily incremental (GFS) | Custom
▪ Select a schedule type:
• Schedule by time: Choose from Hourly, Daily, Weekly, Monthly scheduling or pre-
defined, depending on the backup scheme chosen
• Schedule by event: Choose from Upon time since last backup | When user logs on/off
the system | On system startup/shutdown | On Windows Event Log event
▪ Additionally, Start conditions and options can be selected to modify the
behavior of the schedule

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 76
Schedule

▪ Options:
• Run the plan within a date range | If the machine is turned off, run missed tasks at the
machine startup | Prevent the sleep or hibernation mode during backup | Wake up from
the sleep or hibernation mode to start a scheduled backup
▪ Start conditions:
• User is idle | The backup location’s host is available | Users logged off | Fits the time
interval | Save battery power | Do not start when on metered connection | Do not start
when connected to the following Wi-Fi networks | Check device IP address
▪ If more than 1 condition is selected, all selected conditions have to be met
simultaneously before backup will start

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 77
Types of Backup

▪ Full Backup
• Stores all data selected for the backup and forms the base for
F F F F
subsequent incremental and differential backups
▪ Incremental Backup
• Stores the changes to the data since the most recent backup
• Creates a “chain” of backups, requires the corresponding full + all
F I I I
subsequent incrementals to restore data
▪ Differential Backup
• Stores changes to the data since the most recent full backup
• Creates “links” to the full backup, requires corresponding full + F D D D
differential to restore data

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 78
How long to keep

▪ Select a Cleanup rule:


• By backup age (default): Specify how long in terms of days, weeks and months to keep
backups
• By number of backups: Specify the maximum number of copies to keep
• By total size of backup: Specify maximum total size of backups to keep, not available
with Always incremental (single-file) backup scheme or when backing up to cloud storage
• Keep backup indefinitely: Do not delete backups
▪ Select when to start the cleanup:
• After backup (default): Retention rule is applied after a new backup is created
• Before backup: Retention rule is applied before a new backup is created

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 79
How long to keep

▪ For cleanup by backup age, by default, backups are grouped into monthly,
weekly, daily and hourly sets:
• Monthly set: 1st backup created after a month starts
• Weekly set: 1st backup created on the day specified in Backup option > Weekly backup which by
default is Monday
• Daily set: 1st backup created after a day starts
• Hourly set: 1st backup created after an hour starts
• E.g., Keep 6 months, 4 weeks, 7 days = keep 1st backup created every month for last 6 months
including current month, keep Monday backup created every week for last 4 weeks including current
week, keep the 1st backup created every day for last 7 days including current day
• If switched to single rule for all backup sets, backups will be retained based on Month, e.g., Keep 7
months = keep all backups created for last 7 months including current month

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 80
Encryption

▪ Encryption can be enabled to encrypt backups created with AES encryption


▪ Once enabled, Encryption setting cannot be modified and a new Plan has to be
created to use different encryption settings
▪ To enable, toggle the Encryption switch and specify a password and the AES
algorithm to be used
▪ The password specified is not stored anywhere; the password hash is used for
verification purposes, i.e., required when selected an encrypted backup for
recovery
▪ If the password is lost, it is irrecoverable and new backups will have to be created

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 81
Convert to VM

▪ Disk-level backups can be converted into a virtual machine as part of backup


▪ Conversion can be configured after backup or after replication:
• Convert to VMware ESXi or Hyper-V VM requires Agent for VMware or Hyper-V and
corresponding host
• Convert to VMware Workstation or VHDX files requires Agent for Windows or Linux
and a folder to save the VM files
• Agent used must be able to access the backup file, i.e., convert from backups stored on
network locations such as network folders and managed locations or on storage local to
the Agent
• For converting to VMware ESXi or Hyper-V VM, 1st conversion will create the full VM,
subsequent conversion will update the existing VM if incremental or differential backup is
used

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 82
Convert to VM

• For converting to VMware Workstation or VHDX files, each conversion re-creates the VM
from scratch
▪ To enable, toggle the Conversion switch:
• For convert to VMware ESXi or Hyper-V, specify the Host and other related settings such
as Datastore path, Disk provisioning mode, etc
• For convert to VMware Workstation or VHDX, specify the location to save the VM files

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 83
Replication

▪ Up to 4 locations for replication is available


▪ Backups can be replicated from:
• Local folder, network folder, Secure Zone, SFTP server, managed location
▪ Backups can be replicated to:
• Local folder, network folder, cloud storage, SFTP server, managed location, tape
▪ If earlier backups were not replicated, the Agent will attempt to replicate all
missing backups since the last successful replication
▪ If replication fails halfway, the next replication will attempt to continue from where
it was stopped previously to reduce time required

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 84
Notarization

▪ Notarization can be enabled to notarize files being backed up and is available in


Cyber Backup and Cyber Protect Advanced editions
▪ Available for file-level backup only and not available when:
• Backup format is set to Version 11
• Backup destination is Secure Zone
• Backup destination is a managed location with enabled deduplication or encryption
▪ To enable, toggle the Notarization switch

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 85
Backup Options

▪ Backup options are settings that can modify the behavior of the Backup
▪ Availability of Backup options depends on:
• The environment the Agent operates in (Windows, Linux, OSX)
• The type of data being backed up (disk, files, VMs, application data)
• The backup destination (cloud, local or network storage)
▪ Refer to the Help file for more details of each Backup option

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 86
Browsing Backups & Plans
Viewing and managing backup locations & plans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 87
Browsing Backups

Add
locations

Backup storage locations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 88
Browsing Backups

▪ Backups can be browsed from the Backup Storage tab


▪ All locations currently in use by all plans will be shown
▪ New locations can be added by selecting Add location:
• When adding a location, machine to browse from can be specified in order to ensure
that a specific machine (with appropriate agent installed) is used to access the location, e.g.,
using a machine with Agent for SQL to browse backups of SQL databases
▪ Backups can be then selected for recovery and Run as VM as well as manually
deleted from a location

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 89
Browsing Plans

Selected Plan
Available actions

Types of Plans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 90
Browsing Plans

▪ Plans can be browsed and managed from the Plans tab


▪ All available plans of a specific type will be show in each section:
• Protection | Backup scanning1 | Backup replication2 | Validation2 | Cleanup2 |
Conversion to VM2 | VM replication
▪ Actions available with Plans:
• Create Plan | Import | Details | Edit | Activities | Alerts | Clone | Export | Disable | Delete

1 Only available with Acronis Cyber Protect licenses and requires Scan service to be installed.
2 Only available with Advanced licenses.

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 91
Performing Recovery
What and how to recover
Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 92
Module Outline

1. Planning for Recovery


2. Recovery Using Web Interface
3. Recovery Using Bootable Media
4. Run as VM
5. VM Replication
6. Other Recovery Methods

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 93
Planning for Recovery
What can be recovered

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 94
Planning for Recovery

▪ Determine:
• What to recover: Entire machine, disks/volumes, VMs or individual files/folders,
databases or application items?
• Location of backup: Cloud, Local Folders, Network Folders, Tape, Storage Node?
• Recovery method: Using web interface, bootable media or other methods
• Recovery point: Available backups to recover from?
• Where to recover: Original location, custom location, on-premises or in cloud?
• Recovery options: Validation, Error handling, File exclusions, etc.?

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 95
Recovery Cheat Sheet
What to recover Using web interface Using bootable media Others
Physical machines (Windows or Linux) -

Physical machine (Mac) -

Virtual machine (VMware, Hyper-V or


-
Scale Computing HC3)

ESXi configuration -

Extract files from local backups


Files/Folders
Downloading files from cloud storage

SQL databases -

Exchange databases -

Exchange mailboxes -

Oracle databases - - Using Oracle Explorer tool

Microsoft 365 mailboxes -

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 96
Recovery Methods

▪ Backups can be recovered on-premises using the following methods:


• Using web interface: Used for performing recovery of entire systems and select data
• Using bootable media: Used for bare metal recovery of entire systems and select data
• Other methods: Used for recovering files and folders
▪ Additionally, the following can also be used:
• Acronis Instant Restore (Run as VM) on-premises
• VM Replication (VMware vSphere only) on-premises
• Acronis Disaster Recovery Add-On in cloud

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 97
Recovery Using Web Interface
Performing recovery from web console

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 98
Using Web Interface – Devices Tab

Select machine from appropriate


Devices built-in/custom group for
Recovery, then select Backup
location, recovery point to recover
from and type of recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 99
Using Web Interface – Backup Storage Tab

Select a location, then select backup


> Show backups to view available
recovery points for recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 100
Using Web Interface

▪ To perform recovery using web interface, select backup to recover from via
Devices or Backup Storage tab:
• Devices tab: Select backed up machine/device/data from built-in or custom group under
Devices tab to recover from
• Backup storage tab: Select location to recover from
▪ Browse for available Recovery points (backups) and:
• Select type of data to recover:
a) Entire machine: Disk-level recovery (for physical machines and VMs)
b) Files/folders, SQL/Exchange databases, Microsoft 365 mailbox data

• Use Run as VM (if available)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 101
Disk-Level Recovery

Choose to Recover to Physical or Virtual


machine, Target machine to recover to, Disk
or Volume mapping and Recovery options

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 102
Disk-Level Recovery
Switch to
volume mapping

Automatic disk mapping of backed


up disk to target machine disk

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 103
Disk-Level Recovery
Switch to
disk mapping

Automatic volume mapping of backed


up volumes to target machine volumes

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 104
File-Level Recovery

Search for files/folders/databases to recover

Expand to browse for files/folders/databases to recover

Browse for available recovery points

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 105
File-Level Recovery

Create Recovery task


or download as files

Select file/folder for recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 106
File-Level Recovery

Choose Original location or Custom


location and recovery options

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 107
Creating the Recovery Task

▪ After selecting type of data to recover:


• For disk-level recovery, Recover to Physical or Virtual machine, Target machine to
recover to, Disk or Volume mapping and Recovery options can be configured
• For file-level recovery, browse or search for the data to be recovered and recovery can
be to Original or Custom location1 or downloaded/recovered as files
▪ After creating the Recovery task, it will be executed immediately

1 Depending on the type of data being recovered, additional options may be available for the Recovery task, e.g., Target instance and State

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 108
Recovery Using Bootable
Media
Performing bare metal recovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 109
Preparing Bootable Media

▪ To perform bare metal recovery using bootable media, prepare the bootable
media to be used:
• Recovering Windows & Linux:
a) Download the basic Linux-based bootable media ISO from Account button > Download menu in web console and
use it directly or create bootable USB1/CD/DVD from it
b) Create basic or full Linux-based bootable media using Bootable Media Builder program that’s installed together
with Agent for Windows/Linux

• Mac: Create and use Mac-based bootable media


▪ Bootable media can also be used to perform offline backup, disk management
tasks and browse for backups and data in backups that are stored in supported
storage locations
1 Use ISO to USD or RUFUS to create bootable USB if you need to boot UEFI machine, Win32DiskImager for BIOS and in Linux, use dd utility

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 110
Bootable Media Builder

Click Next to start

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 111
Bootable Media Builder

Choose to create media


without or with license key

Copy/paste license key here


when creating bootable
media with license key

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 112
Bootable Media Builder

Shows type of license key


added in previous step

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 113
Bootable Media Builder

Choose type of
bootable media

Choose disk/volume
representation for
Linux-based media

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 114
Bootable Media Builder

Choose components
to include with
bootable media

[Advanced licenses only]


Optionally, choose script
for creating automated
bootable media

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 115
Bootable Media Builder

Configure options for bootable


media, some options only
available when creating full
media using Advanced licenses

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 116
Bootable Media Builder

Choose type
of media

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 117
Bootable Media Builder

Summary of settings
for bootable media
to be created

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 118
Bootable Media Builder

▪ To create bootable media in Windows, run the Bootable Media Builder and
follow the wizard:
• Chose to create basic (recovery only without Universal Restore functionality) or full bootable media
(requires valid license key)

• Choice of creating Linux-based or WinPE-based (requires installation of Windows Deployment kit and
WinPE plugins) bootable media

• Choice of components to include in bootable media and options for components


• Choice of type of media, i.e., burn to CD/DVD, save as ISO file, upload to RIS/PXE
server

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 119
Using Bootable Media

Boot from
bootable media

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 120
Using Bootable Media

Start bootable agent

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 121
Using Bootable Media

Configure recovery task

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 122
Using Bootable Media

Select what to recover

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 123
Using Bootable Media

Browse for Location

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 124
Using Bootable Media

Browse for backup

Hide Archives and backups


panel to view contents of backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 125
Using Bootable Media

Select What to recover

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 126
Using Bootable Media

Configure Where/How
to recover and
Recovery options

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 127
Using Bootable Media

▪ Using Linux-based bootable media:


• Boot the physical or virtual machine to be used for bare metal recovery, select Manage
this machine locally and select Recover to configure the recovery task
• Click Select data to browse for Location to recover from
• Select backup to recover from
• Select 1 or more disks/volumes and MBR to recover
• Configure Where/How to recover selected disks/volumes and Recovery options (optional)
• Start recovery
▪ Bootable agent will start the recover immediately and after recovery is complete,
reboot or perform Apply Universal Restore if recovering to dissimilar hardware

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 128
Run as VM
Using Acronis Instant Restore

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 129
Run as VM

Select machine from


appropriate Devices built-
in/custom group, click Recovery,
then select Backup location and
recovery point to Run as VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 130
Run as VM

Select VMware or Hyper-V


host for Run as VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 131
Run as VM

Configure Run as VM settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 132
Run as VM

Finalize temporary VM

Temporary VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 133
Run as VM

▪ To perform Run as VM, select backup from Devices or Backup Storage tab:
• Select whether to use VMware ESXi or Microsoft Hyper-V to host the temporary VM
• Configure Run as VM settings such as storage to use, VM settings and Power state
▪ After the temporary VM has spun up, it will appear in the web console:
• If connection to agent or backup location is lost, the temporary VM will become unusable
• Select Finalize to convert it to a regular VM after which it can be backed up and the
backup created can be used for recovery
• Alternatively, select Delete to delete the temporary VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 134
VM Replication
Configuring VM Replication for VMware vSphere VMs

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 135
VM Replication

Create VM Replication Plan

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 136
VM Replication

Configure VM Replication Plan

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 137
VM Replication

Replica actions

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 138
VM Replication

▪ Select the VMware VM to replicate and click Replication to create a VM


replication plan:
• Target machine and schedule for replication can be configured
▪ After the replica has been created, the following actions are available:
• Test replica: Start the replica for testing, replication is suspended while testing is in
progress
• Replica actions > Failover: Failover to replica, replication is suspended while failover is in
progress
• Replica actions > Stop failover: Stop the failover, replication will resume

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 139
VM Replication

• Replica actions > Permanent failover: Removes the “replica” flag from the VM,
replication is no longer possible to the VM and replication plan should be edited to use
this VM as source if desired
• Replica actions > Failback: Failback to the original or new VM, replication will resume
once failback is complete

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 140
Other Recovery Methods
Other ways of recovering data

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 141
Extract Files from Local Backups

Directly browse local backups


to view available recovery
points to extract files

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 142
Extract Files from Local Backups

▪ Backups stored on local folders can be browsed directly to extract files for
recovery:
• Only available in Windows using File Explorer
• Agent for Windows must be installed on the machine used for browsing
• Backed up file system must be FAT16/32, NTFS, ReFS, ext2/3/4, XFS or HFS+
• Backup must be stored in a local folder or network share (SMB/CIFS)

1 Use ISO to USD or RUFUS to create bootable USB if you need to boot UEFI machine, Win32DiskImager for BIOS and in Linux, use dd utility

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 143
Downloading Files from Cloud Storage

Select More ways to recover… >


Download Files to download files
from backups stored in Cloud Storage

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 144
Downloading Files from Cloud Storage

▪ Files can be downloaded from backups stored in cloud storage:


• Select More ways to recover… > Download files to open a new browser window and
login to view all backups stored in cloud storage
• Browse for Backups to select files for download
▪ Limitations:
• Backups of system state, SQL databases and Exchange databases cannot be browsed
• Download no more than 100 MB at a time to avoid slowdown

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 145
Recover as VM

Choose Recover To > Virtual


machine and click on Target Machine
to configure type and settings of
virtual machine to recover as

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 146
Recover as VM

Configure settings for


recover as virtual machine

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 147
Recover as VM

Configure virtual machine settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 148
Recover as VM

▪ For disk-level backups, it is possible to Recover as VM:


• Similar requirements as convert to VM:
a) Recover as VMware ESXi or Hyper-V VM requires Agent for VMware or Hyper-V and corresponding host
b) Agent used must be able to access the backup file, i.e., convert from backups stored on network locations such as
network folders and managed locations or on storage local to the Agent

▪ After selecting type of VM to recover as and options for the VM, recovery will
start immediately and a new VM will be created from the backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 149
Other Operations
Performing other operations in Acronis Cyber Protect
Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 150
Module Outline

1. Off-Host Data Processing


2. Acronis Active Protection
3. Vulnerability Assessment
4. Monitoring & Reporting
5. Basic Management Server Settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 151
Off-Host Data Processing
Performing backup related tasks separately from a Protection Plan

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 152
Off-Host Data Processing

Create Plan

Plan Actions
Available Plans for Off-Host processing

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 153
Off-Host Data Processing

Replication Plan settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 154
Off-Host Data Processing

Validation Plan settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 155
Off-Host Data Processing

Cleanup Plan settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 156
Off-Host Data Processing

Conversion to VM Plan settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 157
Off-Host Data Processing

▪ Additional tasks that can be configured as part of a backup can be performed


separately:
• Replication | Validation | Cleanup | Convert to VM
▪ This provides flexibility to:
• Choose another Agent for performing these operations
• Schedule these operations for off-peak hours to minimize network bandwidth
consumption
• Shift these operations outside of business hours if setting up a dedicated agent is not
feasible

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 158
Acronis Active Protection
Enabling ransomware protection

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 159
Protection Plan – Active Protection

Active Protection settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 160
Protection Plan – Active Protection

▪ Uses behavioral heuristics to protect against ransomware and cryptomining


malware
▪ Represented as a module in a Protection Plan:
• Different Protection Plan can have different Active Protection settings
• Available for Windows 7 and Windows 2008 R2 and later and requires Agent for
Windows to be installed on the machine
▪ Consists of the following settings:
• Action on detection: Notify only | Stop the process | Revert using cache (default)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 161
Protection Plan – Active Protection

• Self-protection: On by default, protects against unauthorized changes to Acronis


software processes, registry records, executable and configuration files and backups
located in local folders
• Network folder protection: On by default, protects network folders mapped as local
drive
• Server-side protection: Off by default, protects network folders shared from the local
machine from modifications (incoming connections) by other servers
• Cryptomining process detection: On by default, protects against cryptomining
malware, default action is to stop the process
• Exclusions: Configure exceptions to the protection rules, specify full path to processes,
folders and files as Trusted or Blocked

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 162
Vulnerability Assessment
Enabling vulnerability scanning

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 163
Protection Plan – Vulnerability Assessment

Vulnerability assessment settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 164
Protection Plan – Vulnerability Assessment

List of vulnerabilities found for all machines scanned

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 165
Protection Plan – Vulnerability Assessment

▪ Scans a machine for vulnerabilities to OS and installed 3rd party products:


• List of supported products: https://dl.managed-
protection.com/u/cyberprotect/help/15/user/en-US/index.html#52119.html
• Currently supported for Windows and Linux (CentOS, Virtuozzo and Acronis Cyber Infrastructure)
machines
• Scanning can be scheduled or manually started and results will be shown in Software
Management > Vulnerabilities tab and selected widgets in Dashboard and Reports
• Found vulnerabilities are categorized by Severity and can be selected for patching (requires
Cyber Protect editions)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 166
Monitoring & Reporting
Working with Dashboard, Reports, Alerts and Activities

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 167
Dashboard

Full screen view

Available actions

Widget

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 168
Dashboard

Available widgets

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 169
Dashboard

▪ Dashboard > Overview provides a number of customizable (WYSIWYG) widgets,


updated every 2 minutes, that gives an overview of all operations related to
Management Server and Agents
▪ Widgets are customizable, have clickable elements and more widgets can be
added/removed as needed
▪ Dashboard can be sent or downloaded as Excel and/or PDF file
▪ Full screen view can be shown for displaying on large screens
▪ Types of widgets available:
• Pie charts: Protection status | Vulnerable machines | Active alerts summary | Historical
alerts summary | Status | Storage | Activity types

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 170
Dashboard

• Graphs: Monthly storage usage | Usage of storages


• Bar charts: Activities
• Tables: Recently affected | Existing vulnerabilities | Devices | Backup status | Activity list |
Alerts history | Active alerts details | Not protected | Locations summary | Discovered
machines | Plans | Backups | License keys | License agreement | Tape activities |
Activities summary
• Lists: 5 latest alerts | No recent backups | Used advanced licenses | Used standard
licenses

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 171
Reports

Create report
from template

Types of Reports

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 172
Reports

▪ Reports similar to Dashboard are widget-based and can be used to show


information about operations:
• A number of templates are available and more reports can be added
• Reports can be customized and scheduled for sending via email as Excel and/or PDF

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 173
Alerts

Alert details

Summary of Alerts

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 174
Alerts

▪ Dashboard > Alerts shows messages that warns about actual or potential
issues and can have 1 of the following severities:
• Critical: Issues which can potentially lead to data loss, e.g., Malware detected
• Error: Issues due to process errors, e.g., Backup failed due to network error
• Warning: Minor issues, e.g., Backup is cancelled
▪ For a machine, the highest severity alert will be shown if there are multiple alerts
▪ Alerts can be cleared manually or automatically when the context has changed or
when the process, e.g., backup, is executed again and is successful

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 175
Activities

Filter by Status
and time period

Search by Device
name or Started by

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 176
Activities

▪ Dashboard > Activities can be used to view all activities from all registered
machines
▪ Activities can be searched by:
• Device name | Started by
▪ List of activities can also be filtered by:
• Status | Time period

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 177
Basic Management Server
Settings
Configuring Management Server system settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 178
Settings > Licenses
Sync subscription licenses from/to Acronis account

Actions available
License Management

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 179
Settings > Licenses

Add license keys to


Management Server

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 180
Settings > Licenses

Login with Acronis account


to start a 30 day trial

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 181
Settings > Licenses

▪ For on-premises management, subscription and perpetual licenses have to be


added to the Management Server in order to be able to configure and start
backups
▪ Login to the web console and go to SETTINGS > Licenses:
• Add keys: Add subscription or perpetual license keys to the Management Server
• Buy now: Open the Acronis web page to buy from a reseller or online
• Start trial: Start a 30 day trial of Acronis Cyber Protect
• Sync: Sync subscription licenses from/to Acronis web account

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 182
Settings > Licenses

▪ To start an Acronis Cyber Protect trial, login with credentials of an existing


Acronis web account or create a new account:
• Fully functional product for 30 days, Agents can be installed on unlimited number of
machines
• Free 30 day cloud storage subscription with 1TB cloud storage
• Free technical support during the trial
• Bootable media can only perform bare metal recovery to the same machine, Universal
Restore is disabled
• Direct upgrade to licensed product without having to reinstall, simply register purchased
licenses to Acronis web account and if required, add keys to on-premise Management
Server

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 183
Settings > System Settings

Email server
settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 184
Settings > System Settings

Email notifications
settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 185
Settings > System Settings

Security
settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 186
Settings > System Settings

Updates
settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 187
Settings > System Settings

Default backup
options settings

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 188
Settings > System Settings

▪ Settings > System Settings contains settings for the following:


• Email server: Configure email server settings for sending email notifications
• Email notifications: Configure email notifications for alerts and daily recap on active
alerts to 1 or more recipients, requires valid Email server configuration
• Security: Configure security settings for the Management Server such as log out
inactive users after certain period of time, show notification about last login of
current user and Warn about local or domain password expiration
• Updates: Turn off/on automatic check for updates
• Default backup options: Configure defaults for Backup options that will be used by all
Protection Plans with Backup module, changes made will apply to all subsequently
created plans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 189
Building a more knowledgeable future

CREATE, SPREAD
AND PROTECT
KNOWLEDGE WITH US!
www.acronis.org

Building new schools • Providing educational programs • Publishing books


Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 190

You might also like