0% found this document useful (0 votes)
628 views247 pages

Cloud Tech Associate Advanced Backup 2022

The document provides information about an introductory course on Advanced Backup from CyberFit Academy. The course is designed to help establish a baseline knowledge of technical aspects, features, planning, creating, and performing backup and recovery operations using Acronis Cyber Protect Cloud. The course modules cover topics like planning for backup and recovery, creating backups, performing recovery, and other operations. It also discusses certification tracks and how this course fits into achieving the Cloud Tech Professional certification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
628 views247 pages

Cloud Tech Associate Advanced Backup 2022

The document provides information about an introductory course on Advanced Backup from CyberFit Academy. The course is designed to help establish a baseline knowledge of technical aspects, features, planning, creating, and performing backup and recovery operations using Acronis Cyber Protect Cloud. The course modules cover topics like planning for backup and recovery, creating backups, performing recovery, and other operations. It also discusses certification tracks and how this course fits into achieving the Cloud Tech Professional certification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 247

#CyberFit Academy

Cyber Protect Cloud


Cloud Tech Associate - Advanced Backup

#CyberFit

#CyberFit Academy
Course Summary

Instructor-led technical training


Introductory course and designed to help establish a
baseline knowledge
Assessment:

20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time

#CyberFit Academy
Target Persona

Tech Leader (along with employees on team)


Service Provider
• Wants to improve the managed services offerings
with vendor solutions that understand service
providers ability to deliver, automate, train, support
and manage these solutions while integrating them
into stack of tools
• Interested in Training, Updating, Automating
Processes and Cybersecurity Issue focused on pain
points

#CyberFit Academy
Learning Objectives

After finishing this instruction you will be able to


• Understand technical aspects of the
Advanced Backup Pack
• Understand the features (core backup versus advanced
backup pack), what they mean and how they are utilized
• Plan, create and perform backup and recovery and other
operations

#CyberFit Academy
Course Modules

1. Planning for Backup & Recovery


2. Creating Backups
3. Performing Recovery
4. Other Operations

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP (Security/Backup/
2 Disaster Recovery)
Next Step

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP (Security/Backup/
2 Disaster Recovery)
Cloud Tech Professional
You Are Here STEP
Final Step 3

#CyberFit Academy
Certification Track

STEP
STEP Acronis #CyberFit Cloud Tech Associate Certifications
211 Consists of the following courses (specializations)
Let’s start here

Optional:

#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits

#CyberFit Academy
Best-in-breed backup combined
with integrated security and management

Protect every Best-in-breed backup Strengthens your AV Accelerate security


workload
#CyberFit at no charge
Academy included against zero-day threats and manageability
Add Advanced packs: Security, Management, Backup,
Disaster Recovery, Email Security, File Sync and Share

Optimize for every Easy to upsell Vendor consolidation


#CyberFit Academy workload
Cyber Protect Cloud
Planning for Backup & Recovery

#CyberFit Academy
Module Outline

1. What can be backed up & recovered


2. Configuring Backup
3. Protecting Physical Machines
4. Protecting Applications
5. Protecting VMs & Virtual Hosts
6. Protecting Productivity Suits
7. Bootable Media & Universal Restore
8. Acronis Instant Restore
9. VM Replication

#CyberFit Academy
Cyber Protect Cloud
What can be backed up & recovered

#CyberFit Academy
How to Plan for Backup
Understand your data environment and what needs to be backed
up, e.g., for recovery and/or for archival

? ?
Entire machine/disks/volumes/VMs or Application-aware backup and need
individual files/folders/databases? for granular recovery?

? ?
Regulatory/audit compliance? Legal Size of data and length of backup
obligations? window?

#CyberFit Academy
How to Plan for Backup
Determine the backup strategy (retention period and replication?) and most
suitable type of storage for storing and retrieving the backup

?
D2D2D (remoted disk storage) or D2D2C

?
Local, network storage and/or cloud?

?
Staging to cloud for replication or archival?

#CyberFit Academy
How to Plan for Backup
Have multiple versions of your backup, follow the 3-2-1 rule:

3 Copies of 2 Different 1 Copy Stored


your data Types of Off-Site
Storage Media

• Eliminate single point of failure


• Leverage on different types of storage for maximizing
capacity/performance vs. price

#CyberFit Academy
How to Plan for Backup

i i
Formulate and document a
Align with backup needs
disaster recovery plan for
(recovery or archival),
each service and an overall
backup strategy and
business continuity plan
RTO/RPO requirements
and test often.

#CyberFit Academy
How to Plan for Backup
Determine Recovery Point Objective (RPO) and Recovery Time Objective
(RTO) for each service/system to be backed up, use revenue or cost per hour
as a guide
i i
RPO RTO
or frequency of backup is or maximum time allowed for
determined based on maximum recovery is determined based on
acceptable loss of data in case of avoiding unacceptable
a service disruption or outage. consequences associated with a
service disruption or outage.

#CyberFit Academy
How to Plan for Backup
Key differentiator: Data recovery with minimal RTO and RPO

Recovery Point Objective (RPO) Recovery Time Objective (RTO)

Backup Event

Lose time and data with any other solution: Keep your business growing with Acronis:
• Most competitors can’t restore the data • With Instant Recovery any files are restored
• If they can: semi-manual process from local or cloud immediately
backup (takes a lot of time)

#CyberFit Academy
How to Plan for Backup

i
Understand your outage and what
needs to be recovered:

• RTOs and RPOs? Impact on


productivity, revenues, normal
operations?
• Entire machine/disks/volumes/VMs or
individual
files/folders/databases/application
items?

#CyberFit Academy
How to Plan for Backup

i
Determine the backups available and
the most suitable method/location for
recovery:

• From local, network or cloud storage?


• Recovery method?
• Recover to live system or use bare metal
recovery?
• Use Acronis Instant Restore or Acronis
Cyber Disaster Recovery Cloud?
• Follow and if necessary adapt disaster
recovery plan and business continuity
plans to perform recovery

#CyberFit Academy
Section Summary

• Use the 3 -2 – 1 rule to avoid data loss by creating a single point of


failure and leverage various storages the best
• RPO and RTO can be use perfectly to descript a backup in the
protection plan
• When you plan backup, always think on the recovery and what you
want to reach at the end

#CyberFit Academy
Cyber Protect Cloud
Configuring Backup

#CyberFit Academy
Protection Plan – Backup

#CyberFit Academy
Protection Plan – Backup

Backup is a feature within a


Protection Plan

#CyberFit Academy
Protection Plan – Backup

#CyberFit Academy
Protection Plan – Backup

Backup settings

#CyberFit Academy
Configuring Backups
Select the machine or group to be backed up

i
Plan and decide:

• What to back up: Entire machines, disk/volumes, files/folders, ESXi


configuration?
• Where to back up: Cloud, Local, Network storage? Physical Data Shipping?
• Schedule: Backup scheme – monthly, weekly, daily, hourly?
• How long to keep: Retention rule – By backup age, By number of copies?
• Replication: Enable replication? From where to where?
• Encryption: Turn on AES encryption for backups?
• Backup options: Email notification, Error handling, Pre/Post commands?

#CyberFit Academy
What to back up
Selection available depends on machine/group selected:

i
Select and decide:

• Entire machine: All non-removable disks will be backed up with option of


enabling Application backup
• Disks/volumes: 1 or more disks and volumes can be selected
• Files/folders: 1 or more files and folders can be selected
• System state: Windows Vista and later only, backs up system state data
• ESXi configuration: Backs up the ESXi configuration
• Exchange/SQL databases: 1 or more Exchange/SQL database can be
selected (Advanced Backup Pack)

#CyberFit Academy
What to back up
Selection available depends on machine/group1 selected:

i
Select and decide:

• Entire machine: All non-removable disks will be backed up with option of


enabling Application backup
• Disks/volumes: 1 or more disks and volumes can be selected
• Files/folders: 1 or more files and folders can be selected
• System state: Windows Vista and later only, backs up system state data
• ESXi configuration: Backs up the ESXi configuration
• Exchange/SQL databases: 1 or more Exchange/SQL database can be
selected (Advanced Backup Pack)

1 For Office 365 and G suite, selection will be based on the items available in the account, e.g., 1 or more
mailboxes, OneDrive or Google Drive, SharePoint Online sites can be selected
#CyberFit Academy
What to back up
Application backup selection is available when Entire machine is selected for

i
What to back up:

• Microsoft SQL Server | Microsoft Exchange Server | Microsoft Active


Directory | Oracle Database can be enabled for application-aware backup
(Advanced Backup Pack)
• Machine has to meet requirements for application-aware backup
• If any requirements are not met, an error message with the missing
requirement will be shown to assist in meeting the requirements

#CyberFit Academy
What to back up
Besides selecting items to be backed up directly

i
Items can also be selected using policy rules:

• Disks/volumes: Conditional rules such as [All volumes], [Fixed volumes] for volumes on
SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays, [BOOT+SYSTEM] for
system and boot volumes, etc. and specific rules such as C:\, /dev/hda1, etc.
• Files/folders: Conditional rules such as [All Files], [All Profiles Folder] and
%PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise type in a
file/folder path such as /dev/hda1/file.txt
• When a backup using policy rules is applied to multiple machines and no data matches
at least 1 of the rules, backup will fail on that particular machine

#CyberFit Academy
Where to back up
The following backup destinations are available:

Cloud Storage: Local folders: Network folder, Secure Zone: Defined by a


Backups will be Backups will be NFS folder: Backups will be script:
stored in Acronis or stored locally on the Backups will be stored in a secure Backups will be
Service Provider machine being stored on partition on the local stored in a folder
cloud storage backed up such as SMB/CIFS/DFS or disk of the machine (local or network)
internal/external disk NFS1 shared folder being backed up, defined by a script
or removable media accessible from the can be created from written in Jscript,
machine being Details > Create VBScript or Python
backed up Secure Zone 3.52

#CyberFit Academy
Secure Zone
i
Secure Zone is a secure partition that can be created on a local disk
of the machine being backed up:

• Offers a cost-effective and handy method for protecting data from software
malfunction, virus attack and human error
• Eliminates the need for a separate media or network connection to
backup/recover data
• Can be used as a “staging” storage prior to replication of backups
Limitations:
• Cannot be created on a Mac
• Does not protect against physical failure of the local disk
• Does not support single-file backup format

#CyberFit Academy
Secure Zone
To create a Secure Zone, perform the following Steps:

Go to All Devices (Select Device) > Details > Create Secure Zone and click Select to
select a local disk on which to create the secure zone

Enter the Secure Zone size or drag the slider

[Optional] Enable Password protection


switch and specify a password

Click Create

#CyberFit Academy
Schedule

i
Select a Backup Scheme:

• Always incremental (single-file)


• Always full
• Weekly full, Daily incremental
• Monthly full, Weekly differential, Daily
incremental (GFS)
• Custom

#CyberFit Academy
Schedule

i
Select a Schedule Type:

• Schedule by time: Choose from Hourly, Daily,


Weekly, Monthly scheduling or pre-defined,
depending on the backup scheme chosen
• Schedule by event: Choose from Upon time
since last backup
• When user logs on/off the system | On system
startup/shutdown | On Windows Event Log
event
Additionally, Start conditions and options can be selected to modify
the behavior of the schedule

#CyberFit Academy
Schedule

i
Options:

• Run the plan within a date range


• If the machine is turned off >> run missed tasks
at the machine startup
• Prevent the sleep or hibernation mode during
backup
• Wake up from the sleep or hibernation mode
to start a scheduled backup

#CyberFit Academy
Schedule

i
Start conditions:
• User is idle
• The backup location’s host is available
• Users logged off
• Fits the time interval
• Save battery power
• Do not start when on metered connection
• Do not start when connected to the following
Wi-Fi networks | Check device IP address
• If more than 1 condition is selected, all selected conditions have
to be met simultaneously before backup will start

#CyberFit Academy
Types of Backup

• Full Backup
F F F F
• Stores all data selected for the backup and forms the base for
subsequent incremental and differential backups

• Incremental Backup
• Stores the changes to the data since the most recent backup F I I I
• Creates a “chain” of backups, requires the corresponding full + all
subsequent incrementals to restore data

• Differential Backup
• Stores changes to the data since the most recent full backup
F D D D
• Creates “links” to the full backup, requires corresponding full +
differential to restore data

#CyberFit Academy
Backup Schemes
• Always full
- All backups, created on schedule or started manually.

• Weekly full, Daily incremental


- Full backup created once a week. All other backups incremental. Day which full backup is F F F
created depends on Weekly backup option (click gear icon, then Backup options →
Weekly backup).

• Monthly full, Weekly differential, Daily incremental (GFS) F I I


- Default setting. Incremental backups performed on daily basis: Monday to Friday;
differential backups performed every Saturday; full backups performed first day of month.
Backup scheme displayed as Custom scheme on protection plan panel.
F D D D
• Always incremental (single-file)
- First backup is full (most time-consuming). All subsequent backups are incremental (take
significantly less time).

• Custom F I I
- Specify schedules for full, differential, and incremental backups. Differential backup not
available when backing up SQL data, Exchange data, or system state.

#CyberFit Academy
How long to keep

i
Select a Cleanup rule:

• By backup age (default): Specify how long in terms of days,


weeks and months to keep backups
• By number of backups: Specify the maximum number of
copies to keep
• By total size of backup: Specify maximum total size of
backups to keep, not available with Always incremental
(single-file) backup scheme or when backing up to cloud
storage
• Keep backup indefinitely: Do not delete backups

#CyberFit Academy
How long to keep

i
Select when to start the cleanup:

• After backup (default): Retention rule is applied after a new


backup is created
• Before backup: Retention rule is applied before a new backup
is created

#CyberFit Academy
How long to keep

i For cleanup by backup age, by default, backups are


grouped into monthly, weekly, daily and hourly sets

• Monthly set: 1st backup created after a month starts

• Weekly set: 1st backup created on the day specified in


Backup option > Weekly backup which by default is Monday

• Daily set: 1st backup created after a day starts

• Hourly set: 1st backup created after an hour starts

#CyberFit Academy
How long to keep

i For cleanup by backup age, by default, backups are


grouped into monthly, weekly, daily and hourly sets

• E.g., Keep 6 months, 4 weeks, 7 days = keep 1st backup


created every month for last 6 months including current
month, keep Monday backup created every week for last
4 weeks including current week, keep the 1st backup created
every day for last 7 days including current day

• If switched to single rule for all backup sets, backups will be


retained based on Month, e.g., Keep 7 months = keep all
backups created for last 7 months including current month

#CyberFit Academy
Onboarding Cyber Protect Cloud
CDP Backup
(Advanced Backup Pack)

#CyberFit Academy
CDP Backup (Advanced Backup)

#CyberFit Academy
CDP Backup (Advanced Backup)

CDP
settings

#CyberFit Academy
CDP Backup (Advanced Backup)

#CyberFit Academy
CDP Backup (Advanced Backup)

Select files of
applications to be
continuously
backed up

Add more
applications by
specifying the
path to the
application exe

#CyberFit Academy
CDP Backup (Advanced Backup)

#CyberFit Academy
CDP Backup (Advanced Backup)

Specify files and


folders with files to
be continuously
backed up

#CyberFit Academy
CDP Backup (Advanced Backup)

CDP recovery
point

#CyberFit Academy
CDP Backup (Advanced Backup)

i CDP
• Userbacks
is idle up files only, can be used with disk-level or file-
• level archives
Requires a prior full/incremental backup
• Supported OS:
• Windows 7/8/10 32/64-bit
• Windows Server 2008R2/2012/2016/2019 32/64-bit
• Supported file system: NTFS only, local folders only
• Not compatible with application aware backup
• Supported backup destinations:
• Local folder, Network folder, Cloud storage, Location defined by the script
• Select files of specific applications or in specific folders, e.g., D:\Data\* to be
continuously backed up
• Goal of CDP is to save data between backups and have close to a zero recovery
point objective

#CyberFit Academy
CDP Backup (Advanced Backup)

i If file was changed multiple times during backup, after backup


it will be backed up entirely only once

• During regular backup CDP is paused (either regular backup is working or CDP,
not together in parallel)
• Disk/volume recovery workflow:
• User initiates disk recovery from CDP backup
• System recovers disk from the last regular backup
• System recovers files from CDP backup

#CyberFit Academy
CDP - How it works

1 CDP is started after


plan application to the
machine, but pauses
2 CDP is running:
3 Regular backup start:

1. Program saves file 1. CDP is paused


immediately if there is (automatically or by 2. Regular backup
no archive user’s request) completes
2. Driver tracks this and 3. CDP is resumed
notifies the agent about
the changed file 4. New CDP backup is
created
3. Agent reads entire file
and checks what is 5. Previous CDP backup is
changed deleted
4. Agent saves changes into
the backup

#CyberFit Academy
CDP - Best Practices

i When applications are selected, specify also list of file


extensions to track. Otherwise, temporary files created
by the application will be backed up (e.g. tmp)

i
Driver tracks only changed files. If file is not changed, it
will not be backed up.

#CyberFit Academy
Cyber Protect Cloud
Forensic Backup
(Advanced Security Pack)
#CyberFit Academy
Forensic Backup (Advanced Security)

#CyberFit Academy
Forensic Backup (Advanced Security)

Enable
collection of
forensic data in
Backup options

#CyberFit Academy
Forensic Backup (Advanced Security)

#CyberFit Academy
Forensic Backup (Advanced Security)

Recover forensic
data

#CyberFit Academy
Forensic Backup (Advanced Security)

#CyberFit Academy
Forensic Backup (Advanced Security)

Select forensic
data to recover

#CyberFit Academy
Forensic Backup (Advanced Security)

i Collecting forensic data enables investigation in the event of a


security incident:

•Supported OS: Windows 8.1, Windows Server 2012 R2 and above


•Supported backup destination: Cloud, external drive, network
folders
• Can only be enabled for entire machine backup, includes snapshot
of unused disk space, full memory dump1 and snapshot of running
processes
• Backups with forensic data automatically notarized and Protection
Plan with forensic data collection enabled cannot be modified after
applied
• For recovery:
• Forensic backup can be recovered as entire machine to enable
investigation of both used and unallocated space

#CyberFit Academy
Forensic Backup (Advanced Security)

i Forensic data can be selected for recovery for a forensic


backup:

• CSV file of processes, threads and modules and DMP file of memory dump can
be downloaded

i
Forensic backup process:

1. Collects raw memory dump and list of running processes


2. Automatically reboots a machine into the bootable environment
3. Creates backup that includes both occupied and unallocated space
4. Notarizes the backup
5. Reboots into the OS and continue plan execution – replication, cleanup, etc

#CyberFit Academy
Forensic Backup (Advanced Security)

i
Notarization certificate can be downloaded by creating an entire
machine recovery task from the forensic backup and selecting Get
certificate from Disk mapping view of the recovery task1

i
tibxread command-line tool:

• Installed together with Agent for Windows/Linux/Mac and used for manual
checking of the integrity of the backed up data
• Refer to the Help file for more details on how to use the tool

1 There is no need to perform the recovery if the only purpose is to obtain a copy of the notarization certificate

#CyberFit Academy
Replication
Up to 4 locations for replication are available

Backups can be replicated from:

If earlier backups were not replicated,


the Agent will attempt to replicate all
Local folder, Network folder missing backups since the last
successful replication

If replication fails halfway, the next


Backups can be replicated to: replication will attempt to continue from
where it was stopped previously to
reduce time required

Local folder, Network folder, Cloud

#CyberFit Academy
Notarization

i Notarization can be enabled to notarize files being backed up and is


available with Forensic backup available in the Advanced Security Pack

• Available for file-level backup only and not available when:

• Backup format is set to Version 11

• Backup destination is Secure Zone or encryption is enabled

• To enable, toggle the Notarization switch

#CyberFit Academy
Backup Options
Understanding available backup options

i Backup options are settings that can modify the


behavior of the Backup

• Availability of Backup options depends on:


• The environment the Agent operates in (Windows, Linux,
OSX)
• The type of data being backed up (disk, files, VMs,
application data)
• The backup destination (cloud, local or network storage)

• Refer to the Help file for more details of each Backup option

#CyberFit Academy
Backup Options

#CyberFit Academy
Backup Options

Backup
options

#CyberFit Academy
Section Summary

• Backup is part of a protection plan and is showing only things


which are available depending on the selected device.
• Choose what, where, when and how long to keep.
• Different schemes and retentions available to meet regulations and
SLAs.
• Additional settings are hidden between Backup option
• CDP and Forensic are Features out of the Advanced Pack Backup

#CyberFit Academy
Cyber Protect Cloud
Protecting Physical Machines

#CyberFit Academy
Protecting Physical Machines
Windows, Linux and Mac physical machines1 can be backed up using:

What can be recovered to live


machines:
• 1 or more disk/volumes and
files/folders can be recovered from
disk-level backups such as Entire
machine or Disk/volume backups
Entire machine Disks/volumes Files/folders2
backup: backup: backup: • 1 or more files/folders can be
includes all non- 1 or more disks and 1 or more files and recovered from file-level backups
removable disks of volumes can be folders can be
the machine selected selected

1 A VM with Agent installed can be backed up similar to a physical machine


2 Files/folders backup can also be used to back up network folders on file servers and NAS
devices

#CyberFit Academy
Protecting Physical Machines
i Additionally, bare metal recovery can be used when original
machine is non-operational, e.g., hardware or OS failure:

• Requires bootable media for booting up hardware (physical or


virtual) to be used for recovery
• Disk-level backups containing an OS can then be selected for
system (1 or more disks/volumes) recovery
• For recovery to dissimilar hardware for Windows or Linux systems,
Universal Restore can be used after bare metal recovery

#CyberFit Academy
Cyber Protect Cloud
Protecting Applications

#CyberFit Academy
Protecting Applications SQL
Server
Exchange

i Microsoft SQL and Microsoft Exchange (Clusters in Advanced Backup Pack)


can be protected as follows:

• Application-aware backup: Disk-level backup of entire server and application


metadata
• Database backup: File-level backup of the database and associated metadata
• Both types of backup can be used to recover:
• Database to live application
• Database as files
• Granular recovery of application items
• For Microsoft Exchange 2010 SP1 or later, Mailbox backup is also possible and can be
used for mailbox and mailbox item recovery

#CyberFit Academy
Protecting Applications SQL
Server
Exchange

i For Microsoft Exchange, recovery can be performed to


original or new Exchange server of the same version:

• Target Exchange server and machine performing the recovery (with Agents
installed) must belong to the same AD forest and requires either membership
in Exchange Organization Administrators role group (Exchange 2007) or
Sever Management role group (Exchange 2010 and above)
For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the
machine and sysadmin role in target SQL instance

#CyberFit Academy
Protecting Applications SQL
Server
Exchange

i For Microsoft Exchange, recovery can be performed to


original or new Exchange server of the same version:

• Target Exchange server and machine performing the recovery (with Agents
installed) must belong to the same AD forest and requires either membership
in Exchange Organization Administrators role group (Exchange 2007) or
Sever Management role group (Exchange 2010 and above)
For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the
machine and sysadmin role in target SQL instance

#CyberFit Academy
Protecting Applications SQL
Server
Exchange

Exchange cluster backup support SQL cluster backup support


(Advanced Backup Pack) : (Advanced Backup Pack ):

DAG is supported for Exchange Server 2010 AAG is supported for SQL Server 2012 and
and above, other clustering configurations above, other cluster configurations are not
are not supported supported
Agent for Windows + Agent for Exchange Agent for Windows + Agent for SQL must be
must be installed on each node of the installed on each node of the WSFC cluster
Exchange cluster and Backup option > and Backup option > Cluster backup mode
Cluster backup mode has to be enabled has to be enabled

#CyberFit Academy
Protecting Applications SQL
Server
Exchange

i
To recover DAG (Exchange cluster) or AAG (SQL cluster):

• Requires that the DAG or AAG is backed up (not individual databases or


items)
• Select the clustered database for recovery from the Backup Storage tab;
target node for recovery is automatically selected by the Agent when creating
the Recovery Task
• For DAG, after recovery is complete, manually configure or resume replication
on the cluster
• For AAG, target database to be recovered (if live) must be excluded from the
AAG prior to recovery as a database in an AAG cannot be overwritten

#CyberFit Academy
Protecting Applications Share
Point

i
Microsoft SharePoint farm can be protected as follows:

• Backup all database servers (Microsoft SQL based) with SQL application-
aware backup
• Backup all unique front-end and application servers with normal disk-level
backup
• Backups of all servers should be performed using the same schedule
• For recovery:
• Database servers can be recovered using recovery methods for Microsoft
SQL
• Other servers can be recovered using disk-level or bare-metal recovery
• SharePoint content such as sites, libraries and documents can be
recovered using Acronis SharePoint Explorer

#CyberFit Academy
Protecting Applications Active
Directory

i
Microsoft Active Directory can be protected as follows:

• Application-aware backup: Disk-level backup of entire server and application


metadata
• For recovery:
• A non-authoritative restore is performed and USN rollback will not occur after
recovery

#CyberFit Academy
Protecting Applications Oracle
Database

i Oracle Databases (Advanced Backup Pack) on Windows


and Linux can be protected as follows:

• Application-aware backup: Disk-level backup of entire server and application


metadata
• Database backup: File-level backup (a.k.a. RMAN backup) of the Oracle
database and Archived Logs using RMAN scripts
• RMAN scripts can be found in the following locations after installing Agent for
Oracle and parameters in the scripts can be customized
• In Windows: %ProgramFiles%\Acronis\Oracle
• In Linux: /usr/lib/Acronis/Oracle
• Refer to the Help file for more details

#CyberFit Academy
Protecting Applications Oracle
Database

Comparison Server Backup Database Backup


RTO in case of entire server failure Less More

Run as virtual Oracle Server (Run as VM) Yes, on ESXi or Hyper-V hosts No

Support for raw partitions/ASM No Yes

Support for databases spread over several volumes Yes Yes

Necessary to configure separate


Backup is fully configured in the GUI,
Ease of use backup plans for full backup of
knowledge of RMAN not necessary
database and archived logs

Oracle Explorer can be used for


Scripts can be used to customize
Database recovery granular, point-in-time recovery of
recovery for advanced scenarios
Oracle data directly from backup

#CyberFit Academy
Protecting Applications SAP
HANA

i SAP HANA databases (Advanced Backup Pack) on Linux


can be protected as follows:

• Disk-level backup with Pre/Post data capture scripts: Disk-level


backup of entire server with scripts to prepare SAP HANA
databases for backup
• Scripts can be downloaded from:
• https://dl.managed-protection.com/u/SAPHANA/SAP-HANA-
modules.tar
• After the scripts are downloaded, access to the database needs to
be configured for the scripts before using them
• For recovery:
• Recover entire server or use SAP HANA Studio to revert a
database to a snapshot

#CyberFit Academy
Protecting Applications VMware
VMs

i
Application-aware and database backup requires the following:

• For agent-based/guest-level backup of physical machines/virtual machines:


• Agent for Windows/Linux + Agent for Exchange/SQL/Active Directory/Oracle is
installed on the physical or virtual machine
• For agentless backup of VMware VMs:
• Agent for VMware (Virtual Appliance or Windows) is installed for the ESXi host
with VMs to be backed up
• VMs have to meet the requirements for application-consistent quiescing (refer to
VMware KB)
• VMware Tools is installed and up-to-date
• UAC has to be disabled on Windows-based VMs, if not, a built-in domain
administrator credentials have to be specified when enabling application backup

#CyberFit Academy
Protecting Applications Hyper-V

i
For agentless backup of Hyper-V VMs:

• Agent for Hyper-V is installed for the ESXi host with VMs to be backed up
• Hyper-V Integration Services must be up-to-date and running in the VM
• In order to avoid VM going into "saved" state during backup, make sure that the Integration
services -> Backup (Volume checkpoint) option is enabled in VM settings in Hyper-V
Manager
• There must be network connection from Agent for Hyper-V to guest VM network, since
application data is read over WMI which requires network connection to guest OS
• No Windows dynamic disks present in the guest OS.
• UAC has to be disabled on Windows-based VMs, if not, a built-in domain administrator
credentials have to be specified when enabling application backup

Exchange and SQL transaction logs are truncated after each


successful backup

#CyberFit Academy
Cyber Protect Cloud
Protecting VMs & Virtual Hosts

#CyberFit Academy
Protecting VMs and Virtualization Hosts VMware
vSphere

i
For VMware vSphere:

• VMs can be backed up and recovered with Agent for VMware (agentless backup)
• ESXi configuration can also be backed up which allows recovery to bare metal
• Backup of ESXi configuration includes:
• Bootloader and boot bank partitions of the host
• Host state (configuration of virtual networking and storage, SSL keys, server
network settings and local user information)
• Extensions and patches installed or staged on the host
• Log files
• Requires SSH to be enabled in the Security Profile of the ESXi host configuration

#CyberFit Academy
Protecting VMs and Virtualization Hosts Hyper-V

i
For Hyper-V:

• VMs can be backed up and recovered with Agent for Hyper-V


(agentless backup)
• Entire Hyper-V server can be backed up with Agent for Windows via
disk-level backup:
• Requires Hyper-V Integration Services to be installed and updated
on the VMs
• Hyper-V VSS writers must be working (check using vssadmin list
writers

#CyberFit Academy
Protecting VMs and Virtualization Hosts Azure

i For all other supported virtualization platforms,


Amazon
EC2

Windows Azure and Amazon EC2 cloud instances:

• VMs can be backed up from inside guest OS (agent-


based backup) similar to how physical machines can
be backed up, i.e., using Agent for Windows or Linux

#CyberFit Academy
Protecting VMs and Virtualization Hosts Azure

i Recovery is similar to physical machines except for


Amazon
EC2

Windows Azure and Amazon EC2 VMs

• Windows Azure and Amazon EC2 cloud instances cannot be


booted from bootable media, hence bare metal recovery is not
possible; recovery have to be performed to existing VM:
• Create new VM from image/template in Azure or EC2 with
same disk configuration as machine to be recovered and
install Agent for Windows or Linux on the new VM
• Recover backed up machine as disk-level recovery to the new
VM

#CyberFit Academy
Section Summary

• Acronis is supporting different Applications native by Agent or by


Script
• Applications can be backup stand alone or in a ApplicationAware
Backup
• On vmware and HyperV you can do a agent-less Backup, even
ApplicationAware
• ApplicationAware Backups will lower your RTO dramatic

#CyberFit Academy
Cyber Protect Cloud
Protecting Productivity Suites

#CyberFit Academy
Protecting M365 Microsoft
365

i
Microsoft 365 can be backed up as follows:

• Using Local Agent:


• Install Agent for M365 on a Windows machine
• Supports backup of M365 Exchange Online mailboxes to
local, network and cloud storage
• Using Cloud-to-Cloud (C2C) a.k.a Cloud Agent backup:
• No agent installation required, add M365 for Business from
Add button in cloud console
• Supports backup of M365 Exchange Online mailboxes,
OneDrive for Business, SharePoint Online sites and Teams
• Requires Global Administrator role credentials

#CyberFit Academy
Protecting M365 Microsoft
365

Feature Local Agent Cloud-2-Cloud Backup


Exchange Online: user, shared, and group
mailboxes
OneDrive: user files and folders
Data items that can be backed up Exchange Online: user and shared mailboxes SharePoint Online: classic site collections, group
(team) sites, communication sites, individual
data items
Teams

Backup of archive mailboxes (In-


No Yes
Place Archive)

Backup Schedule User-defined Once a day (automatically) or manually started

Backup Locations Cloud Storage, local folder, network folder Cloud Storage only

Automatic Protection of new Office Yes, by applying a backup plan to the All users,
No
365 users, groups, sites All groups or All sites groups

#CyberFit Academy
Protecting M365 Microsoft
365

Feature Local Agent Cloud-2-Cloud Backup

Protecting more than one M365


No Yes
organization

Granular recovery Yes Yes

Recovery to another user within one


Yes Yes
organization

Recovery to another organization No Yes

Recovery to an on-premise
No No
Microsoft Exchange Server

Maximum number of manual backup


No 10 manual runs during an hour
runs

#CyberFit Academy
Protecting M365 Microsoft
365

i
To recover:

• Granular recovery can be performed from M365 backups:


• Mailboxes and mailbox items can be recovered to M365,
downloaded as files or sent as email as a form of recovery
• OneDrive content can be recovered to existing OneDrive,
including Sharing permissions recovery or download as files
• SharePoint Online sites can be recovered to existing site, as
document library or single document or download as files
• Preview, browsing and search of backed up content possible for
quick access to backed up data

#CyberFit Academy
Protecting G Suite Google
Workspace

i
Google Workspace can be backed up as follows:

• Using Cloud-2-Cloud (C2C) backup:


• No agent installation required, add G suite from Add button in cloud console
• Supports backup of Gmail mailboxes, Calendars, Contacts, Google Drives and G Suite
Shared drives

• Requires Super Admin credentials


• To recover:
• Granular recovery can be performed from G suite backups:
• Mailboxes and mailbox contents can be recovered to G suite
• Google Drive content can be recovered to existing google Drive as entire drive or as
files/folders

#CyberFit Academy
Protecting Websites
i A website can be backed up via SFTP or SSH protocol (no
Agent required):

• Website content files: All files accessible to the account


specified for SFTP or SSH connection
• Linked databases (if any) hosted on MySQL servers: All
databases accessible to the specified MySQL account
• Both website files and databases (if any) should be backed up to
enable consistent recovery
• Limitations:
• Websites can only be backed up to cloud storage
• Each website must have its own Protection Plan

#CyberFit Academy
Section Summary

• Default mechanic is C2C (Cloud 2 Cloud), no Agent needed


• For local Backups for M365, the local Agent is still available
• C2C is available for M365 and Google Workspace
• M365 Backup incl. Exchange, OneDrive, SharePoint and Teams

#CyberFit Academy
Cyber Protect Cloud
Browsing Backups & Plans

#CyberFit Academy
Browsing Backups > Backup Storage Tab

#CyberFit Academy
Browsing Backups > Backup Storage Tab

Backup storage locations

#CyberFit Academy
Browsing Backups > Backup Storage Tab

Add
locations

Backup storage locations

#CyberFit Academy
Browsing Backups > Backup Storage Tab
i
Backups can be browsed from the Backup Storage tab

• All locations currently in use by all plans will be shown


• New locations can be added by selecting Add location:
• When adding a location, machine to browse from can be
specified in order to ensure that a specific machine (with
appropriate agent installed) is used to access the location, e.g.,
using a machine with Agent for SQL to browse backups of SQL
databases
• Backups can be then selected for recovery and Run as VM as well
as manually deleted from a location

#CyberFit Academy
Browsing Backups > Plans tab

#CyberFit Academy
Browsing Backups > Plans tab

Types of Plans

#CyberFit Academy
Browsing Backups > Plans tab

Selected Plan

Types of Plans

#CyberFit Academy
Browsing Backups > Plans tab

Selected Plan
Available actions
Types of Plans

#CyberFit Academy
Browsing Backups > Plans tab
i
Plans can be browsed and managed from the Plans tab

• All plans of a specific type will be show in each section:


• Protection: Shows all available Protection Plans
• Cloud applications backup: Shows Microsoft Office 365 and
Google Workspace Backup Plans
• VM replication: Shows VM replication plans
• Actions available with Plans:
• Create Plan | Import | Details | Stop | Edit | Activities | Alerts | Clone |
Export | Disable | Delete

#CyberFit Academy
Section Summary

• Cloud Backups can be browsed with the console


• On the Cloud Storage, you can browse the single RPOs
• You can delete complete backups, or incrementals
• You can start a recovery from the Backup file
• You can add other backup locations

#CyberFit Academy
Cyber Protect Cloud
Performing Recovery

#CyberFit Academy
Configuring Recovery
Determine:

? What to recover: Entire machine, disks/volumes,


?
Location of backup: Local folder, network folder or
VMs or individual files/folders, databases or cloud?
application items

? ?
Recovery method: Using web interface, bootable Recovery point: Available backups to recover
media or other methods from?

? ?
Where to recover: Original location, custom Recovery options: Validation, Error handling, File
location, on-premises or in cloud? exclusions, etc.?

#CyberFit Academy
Recovery Methods

i Backups can be recovered using the following methods:

• Using web interface: Used for performing recovery of entire


systems and select data
• Using bootable media: Used for bare metal recovery of entire
systems and select data
• Other methods: Used for recovering files and folders
• Additionally, the following can also be used:
• Acronis Instant Restore (Run as VM) on-premises
• VM Replication (VMware vSphere only) on-premises
• Acronis Cyber Disaster Recovery Cloud in cloud

#CyberFit Academy
Cyber Protect Cloud
Using the Web Interface

#CyberFit Academy
Using Web Interface > Devices Tab

#CyberFit Academy
Using Web Interface > Devices Tab

Select machine from appropriate


Devices built-in/custom group
for Recovery, then select Backup
location, recovery point to
recover from and type of
recovery

#CyberFit Academy
Using Web Interface > Backup Storage Tab

#CyberFit Academy
Using Web Interface > Backup Storage Tab

Select a location, then select


backup > Show backups to view
available recovery points for
recovery

#CyberFit Academy
Using Web Interface
i To perform recovery using web interface, select backup
to recover from via Devices or Backup Storage tab:

• Devices tab: Select backed up machine/device/data from


built-in or custom group under Devices tab to recover from
• Backup storage tab: Select location to recover from
• Browse for available Recovery points (backups) and:
• Select type of data to recover:
• Entire machine: Disk-level recovery (for physical machines
and VMs)
• Files/folders, SQL/Exchange databases, O365 data, G suite
data: File-level recovery
• Use Run as VM (if available)

#CyberFit Academy
Disk-Level Recovery

#CyberFit Academy
Disk-Level Recovery

Choose to Recover to Physical or Virtual


machine, Target machine to recover to,
Disk or Volume mapping and Recovery
options

#CyberFit Academy
File-Level Recovery

#CyberFit Academy
File-Level Recovery

Browse for available recovery


points

#CyberFit Academy
File-Level Recovery

Search for files/folders/databases to


recover

Browse for available recovery


points

#CyberFit Academy
File-Level Recovery

Search for files/folders/databases to


recover

Expand to browse for files/folders/databases to


recover

Browse for available recovery


points

#CyberFit Academy
File-Level Recovery

#CyberFit Academy
File-Level Recovery

Choose Original location or


Custom location and recovery
options

#CyberFit Academy
Creating the Recovery Task
i
After selecting type of data to recover:

• For disk-level recovery, Recover to Physical or Virtual


machine, Target machine to recover to, Disk or Volume
mapping and Recovery options can be configured
• For file-level recovery, browse or search for the data to be
recovered and recovery can be to Original or
Custom location1 or downloaded/recovered as files
After creating the Recovery task, it will be executed immediately
1Depending on the type of data being recovered, additional options may be available for the Recovery task, e.g., Target
instance and State

#CyberFit Academy
Recovering as Virtual Machine
In Backup Console, disk-level backups (Entire machine, Disks/volumes) of
physical machines can be recovered to:
• Physical machine (original)
• Virtual machine (convert to VM)
• Agent will automatically map the disks from the
backup to the target machine. Alternatively,
click DISK MAPPING to manually map the
disk(s) for recovery
• Recovery of OS requires a reboot and machine
will come online automatically
If recovering to Virtual machine (convert to VM):
• VMware ESXi or Hyper-V can be selected as the target
machine and Datastore for ESXi or Path for Hyper-V can be
configured as well as VM SETTINGS such as Memory, Virtual
processors and Network adapters

#CyberFit Academy
Recovering as Virtual Machine
The following settings are available when configuring recovery to virtual
machine:
• By default, the same VM will be selected for
recovery
• To change to a different VM (same or different
platform), click TARGET MACHINE and select
VMware ESXi, Hyper-V or Virtuozzo, requires
respective Agent
• Datastore and Path settings can be configured as
well as VM SETTINGS
• VM will be stopped during recovery and has to be
manually started after recovery. Alternatively, use
Recovery options > VM power management to
automatically start the VM

#CyberFit Academy
Cyber Protect Cloud
Safe Recovery
(Advanced Security)

#CyberFit Academy
Safe Recovery

#CyberFit Academy
Safe Recovery

Enable safe
recovery

#CyberFit Academy
Safe Recovery
i Anti-malware scanning and deletion can be performed as part of
recovery to prevent reinfection if malware is present in the
backup:

• Supported OS: Windows physical or virtual machine with Agent for


Windows installed
• Supported backup types: Entire machine or disks/volumes backup of
NTFS volumes
• Backup will be scanned to determine if malware is present and will show
1 of the following status in Backup Storage tab:
• No malware
• Malware detected
• Not scanned
• Backup will then be recovered and detected malware will be deleted

#CyberFit Academy
Cyber Protect Cloud
Recovery Options

#CyberFit Academy
Recovery Options

#CyberFit Academy
Recovery Options

Recovery options

#CyberFit Academy
Section Summary

• Depending on your Backup, different recovery possibilities are


available
• Granular recovery is always possible, even with Entire Machine
backups
• Applications data can be granular recovered from an application
aware backup
• Migrations can be done thru the recovery process
• Safe Recovery will make sure, clean data is recovered

#CyberFit Academy
Cyber Protect Cloud
Bootable Media & Universal Restore

#CyberFit Academy
Acronis Bootable Media
Bootable media a.k.a. Rescue Media is used for booting up the hardware of a
physical or virtual machine used for bare metal recovery

Linux-based WinPE-based Mac-based

Can be downloaded as ISO Requires installation of Bootable Create using Rescue Media
from Cyber Protection service Media Builder from Acronis Cyber Builder that’s included with
console, used for recovering Backup installer Agent for Mac, used for
Windows and Linux machines (https://kb.acronis.com/content/59611) recovering macOS machines

and other files, used when Linux-


based media is unable to detect
disks, network adapters or other
hardware of the recovery machine

#CyberFit Academy
Universal Restore
i
Acronis proprietary technology that enables:

• Bare metal recovery of Windows or Linux-based systems to dissimilar


hardware
• P2P, P2V, P2C, V2V, V2P, V2C, C2C, C2P, C2V migrations
• Hardware independent deployment of supported OS
• Works by swapping required systems drivers for OS startup in
the recovered OS to match the hardware of the machine used
for recovery
• Available as Apply Universal Restore in bootable Agent on
bootable media
• Universal Restore can be performed multiple times without
having to perform recovery repeatedly

#CyberFit Academy
Universal Restore in Windows Windows

i The following locations will be scanned recursively when


using Automatic driver search for suitable drivers:

• Windows default driver folder in the recovered OS – make


sure OS is detected when using Apply Universal Restore for
the 1st time after bare metal recovery
• Removable media, network folders or other folders – If
Windows default driver folder doesn’t contain suitable drivers,
i.e., OS startup fails after Apply Universal Restore, download
drivers (HDD controller and chipset) from vendor website and
place them in any of the above locations
• Drivers have to be provided as .inf files, extract them from .exe,
.cab or .zip using a 3rd party app if they are downloaded as
such

#CyberFit Academy
Universal Restore in Windows Windows

i
Mass storage drivers to install anyway:

• Used when Automatic driver search cannot locate suitable


drivers in any of the locations that were specified
• If a specific mass storage controller such as RAID or fiber
channel adapter is required
• Be careful with specifying Mass storage drivers to install
anyway as mistakes will render the recovered OS inoperable
and you will have to redo the bare metal recovery
If Universal Restore cannot find a compatible driver in the
specified locations, it will display a prompt about the problem
device; choose either to Ignore or Retry after adding drivers to
specified locations to be searched

#CyberFit Academy
Universal Restore in Linux Linux
OS

i Universal Restore can be used for Linux OS


with kernel version 2.6.8 or above

• When working in Linux, Universal Restore updates the initial RAM disk (initrd):
• Adds modules for new hardware to initrd
• Search for necessary modules in /lib/modules
• If required modules cannot be found, records the module’s name into the
log
• Original initrd is not modified and a copy is saved to the same directory with
the same filename followed by _acronis_backup.img and can be reverted to
if necessary
• Universal Restore may modify the configuration of the GRUB loader to
ensure system bootability but will never modify the Linux kernel

#CyberFit Academy
Cyber Protect Cloud
Using Bootable Media

#CyberFit Academy
Using Bootable Media
• Download Boot Media as ISO
• Use Boot Media Builder
• Install via local Agent for Windows

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

#CyberFit Academy
Using Bootable Media

Boot from bootable


media

#CyberFit Academy
Using Bootable Media

Start bootable agent

#CyberFit Academy
Using Bootable Media

Configure recovery
task

#CyberFit Academy
Using Bootable Media

Select what to recover

#CyberFit Academy
Using Bootable Media

Browse for
Location

#CyberFit Academy
Apply Universal Restore

1. Click Apply Universal Restore under


Actions section of the Bootable Media
2. If recovered disk has several OS, click
Select… and choose the OS to apply
Universal Restore to
3. [Optional] Click Add folder to add network
folders to search for suitable drivers
4. [Optional] If specific mass storage drivers
such as RAID is required, click Add driver
and browse to location where the drivers
are located

#CyberFit Academy
Using Bootable Media
i After selecting location and backup to recover
from:

• Select 1 or more disks/volumes and MBR to


recover
• Configure Where/How to recover selected
disks/volumes
• Start recovery
• Bootable agent will start the recover immediately and
after recovery is complete, reboot or perform Apply
Universal Restore if recovering to dissimilar hardware

#CyberFit Academy
Section Summary

• A default Bootmedia is available as ISO file download form the


console
• Default Bootmedia is based on CentOS (Linux)
• Bootmedia Builder must be installed separate with the Agent
installer
• With the Bootmedia Builder you can create your own pre-
configured boot media, even based on Windows PE

#CyberFit Academy
Cyber Protect Cloud
Acronis Instant Restore

#CyberFit Academy
Acronis Instant Restore
Disk-level backups containing an OS can be Run as
VM for quick recovery:

• A temporary VM is created and virtual disks are emulated from the


backup and linked to the temporary VM
• Can be deleted (all changes will be discarded) or Finalized (converted)
as a regular VM without downtime
• Can be used for:
• Disaster recovery: Instantly bring a copy of a failed machine online
• Testing of backups: Run the machine from backup to ensure that guest
OS is functioning
• Accessing application data: Extracting application data using native tools

#CyberFit Academy
Acronis Instant Restore

Pre-requisites:

• Requires Agent for VMware or Agent for Hyper-V and corresponding


host
• Agent for VMware/Hyper-V must be able to access the backup file:
a) Backups stored on network folder (SMB) or cloud storage
b) Backups stored on local storage of the VMware ESXi or Hyper-V host
c) Backups stored on SFTP and Secure Zone are not supported
• Backups must contain entire machine or all volumes required for OS to
start
• Backups of physical and virtual machines except for Virtuozzo containers
can be used
• Backups that contain Linux LVM must be created by Agent for VMware or
Hyper-V and the same type of Agent must be used for Run as VM

#CyberFit Academy
Cyber Protect Cloud
Acronis Instant Restore(Run as VM)
How To
#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Instant Restore (Run as VM)

Select machine from


appropriate Devices built-
in/custom group, click
Recovery, then select Backup
location and recovery point to
Run as VM

#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Instant Restore (Run as VM)

Select VMware or Hyper-


V host for Run as VM

#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Instant Restore (Run as VM)

Configure Run as VM
settings

#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Instant Restore (Run as VM)

Temporary VM

#CyberFit Academy
Instant Restore (Run as VM)

Finalize temporary VM

Temporary VM

#CyberFit Academy
Instant Restore (Run as VM)
i
To perform Run as VM, select Backup from
Devices or Backup Storage Tab:
• Select whether to use VMware ESXi or Microsoft Hyper-V to
host the temporary VM
• Configure Run as VM settings such as storage to use, VM
settings and Power state
• After the temporary VM has spun up, it will appear in the service
console:
• If connection to agent or backup location is lost, the
temporary VM will become unusable
• Select Finalize to convert it to a regular VM after which it can
be backed up and the backup created can be used for
recovery
• Alternatively, select Delete to delete the temporary VM

#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Instant Restore (Run as VM)

#CyberFit Academy
Section Summary

• Instant Restore is a unique Feature and enables you to recover a


complete system within seconds
• It can be used for testing
• It is already a kind of local Disaster Recovery
• Only vmware and HyperV is supported
• Backup can be even in the cloud

#CyberFit Academy
Cyber Protect Cloud
VM Replication

#CyberFit Academy
VM Replication
i
Only available for VMware ESXi VMs

i Creates an exact copy or replica of a VM to the same or


another ESXi host which can be maintained in sync
with the original VM

i Replication can be started manually or on schedule


with the 1st replication being a full copy and
subsequent replications being incremental

#CyberFit Academy
Replication vs. Backup
i i
Replication will consume space
Replica keeps only the latest state
on datastore whereas backups
of a VM
can be stored on other storage

i i
Powering on a replica is much Replica can be used for testing
faster than recovery and faster and failover/failback to/from
than Run as VM local or remote site

#CyberFit Academy
VM Replication
i
The following types of VMs can not be
replicated:

• Fault-tolerant VMs on ESXi 5.5 and lower


• Run as VM
• Replicas

#CyberFit Academy
VM Replication

#CyberFit Academy
VM Replication

Create VM Replication
Plan

#CyberFit Academy
VM Replication

#CyberFit Academy
VM Replication

Replica actions

#CyberFit Academy
VM Replication
Actions

i Select the VMware VM to replicate


i
After the replica has been created, the
and click Replication to create a VM following actions are available:
replication plan:
• Test replica: Start the replica for testing, replication is
suspended while testing is in progress
• Replica actions > Failover: Failover to replica, replication is
Target machine and schedule for suspended while failover is in progress
replication can be configured • Replica actions > Stop failover: Stop the failover, replication
will resume
• Replica actions > Permanent failover: Removes the “replica”
flag from the VM, replication is no longer possible to the VM
and replication plan should be edited to use this VM as
source if desired
• Replica actions > Failback: Failback to the original or new
VM, replication will resume once failback is complete

#CyberFit Academy
Section Summary

• Replication is only available for vmware


• Replication is only available for real VMs
• Replications are planed with a schedule

#CyberFit Academy
Cyber Protect Cloud
Other Recovery Methods

#CyberFit Academy
Recovering ESXi Configuration
• ESXi configuration can be recovered
using Linux-based Bootable Media to
bare metal
• If original ESXi host is still connected to
vCenter Server, disconnect and remove
original host before recovery to avoid
unexpected behaviors during recovery
• To keep the original host, add it back to
vCenter after recovery

#CyberFit Academy
Extract Files from Local Backups

#CyberFit Academy
Extract Files from Local Backups

Directly browse local


backups to view available
recovery points to extract
files

#CyberFit Academy
Extract Files from Local Backups
i Backups stored on local folders can be
browsed directly to extract files for recovery:

• Only available in Windows using File Explorer


• Agent for Windows must be installed on the
machine used for browsing
• Backed up file system must be FAT16/32, NTFS,
ReFS, ext2/3/4, XFS or HFS+
• Backup must be stored in a local folder or
network share (SMB/CIFS)

1 Use ISO to USD or RUFUS to create bootable USB if you need to boot UEFI machine, Win32DiskImager for BIOS and in Linux, use dd utility

#CyberFit Academy
Downloading Files from Cloud Storage

#CyberFit Academy
Downloading Files from Cloud Storage

Select More ways to recover… >


Download Files to download files
from backups stored in Cloud
Storage

#CyberFit Academy
Downloading Files from Cloud Storage
i Files can be downloaded from
i
Limitations:
backups stored in cloud storage:

• Select More ways to recover… > • Backups of system state, SQL


Download files to open a new databases and Exchange databases
browser window and login to view all cannot be browsed
backups stored in cloud storage • Download no more than 100 MB at a
• Browse for Backups to select files for time to avoid slowdown
download

#CyberFit Academy
Downloading Files from Cloud Storage

#CyberFit Academy
Downloading Files from Cloud Storage

#CyberFit Academy
Downloading Files from Cloud Storage

#CyberFit Academy
Section Summary

• Aconis is able to do an ESXi backup which can be used to do a


bare metal recovery of a host back to vSphere
• The Agent on a Windows system can browse and open local
Backup files
• The Customer Account can use the recovery console to browse
cloud backups and download files. No Recovery jobs.

#CyberFit Academy
Cyber Protect Cloud
Monitoring & Reporting

#CyberFit Academy
Overview > Dashboard
i
Provides a number of customizable (WYSIWYG)
widgets, updated every 2 minutes, that gives an
overview of all operations

• Widgets are customizable, have clickable elements


and more widgets can be added/removed as
needed
• Dashboard can be sent or downloaded as Excel
and/or PDF file
• Full screen view can be shown for displaying on
large screens
• Widget selection based on categories (and search
capability)

#CyberFit Academy
Overview > Dashboard

#CyberFit Academy
Overview > Dashboard

Full screen view

#CyberFit Academy
Overview > Dashboard

Full screen view

Widget

#CyberFit Academy
Overview > Dashboard

Full screen view

Available
actions

Widget

#CyberFit Academy
Overview > Dashboard
Available
widgets

#CyberFit Academy
Alerts
i Overview > Alerts shows messages that warns about actual
or potential issues and can have 1 of the following severities

• For a machine, the


Critical: Issues which can potentially lead to
highest severity alert will
data loss, e.g., Malware detected
be shown if there are
multiple alerts
• Alerts can be cleared
Error: Issues due to process errors, e.g.,
manually or
Backup failed due to network error
automatically when the
context has changed or
when the process, e.g.,
Warning: Minor issues, e.g., Backup is backup, is executed
cancelled again and is successful

#CyberFit Academy
Overview > Alerts

#CyberFit Academy
Overview > Alerts

Summary of
Alerts

#CyberFit Academy
Overview > Alerts

Alert details

Summary of
Alerts

#CyberFit Academy
Reports
i
Reports similar to Dashboard is widget-based and
can be used to show information about operations:

• A number of templates are available and more


reports can be added
• Reports can be customized and scheduled for
sending via email as Excel and/or PDF
• Report structure can also be exported as JSON for
subsequent importing
• Report data can be dumped as CSV file and sent
via email

#CyberFit Academy
Reports

#CyberFit Academy
Reports

Types of
Reports

#CyberFit Academy
Reports

Create report
from
template

Types of
Reports

#CyberFit Academy
Reports

Create report
from
template

Report
actions

Types of
Reports

#CyberFit Academy
Activities
i
Overview > Activities can be used to view all activities
from all registered machines

• Activities can be searched by:


• Device name | Started by
• List of activities can also be filtered by:
• Status | Type | Time period

#CyberFit Academy
Overview > Activities

#CyberFit Academy
Overview > Activities

Search by Device
name or Started by

#CyberFit Academy
Overview > Activities

Filter by Status, type


and time period

Search by Device
name or Started by

#CyberFit Academy
Agents
i
Agents can be updated from the Settings > Agent tab:

• Update definitions: Update anti-malware, vulnerability


assessment and patch management definitions manually
• Clear cache: Clear the local storage cache used for updates
• Details: View details of the machine and enable/disable
Update role for agent:
• Agent with Update role will check for Agent and
definitions updates from the Internet and distribute them
to other agents in local network using peer-to-peer
technology
• Activities: Shows activities of the machine
• Delete: Option to delete machine

#CyberFit Academy
Settings > Agents

#CyberFit Academy
Settings > Agents

Machines with
agents installed

#CyberFit Academy
Settings > Agents

Machines with
agents installed Actions
available

#CyberFit Academy
Settings > Agents

#CyberFit Academy
Settings > Agents

Enable/disable
Update role for
agent

#CyberFit Academy
System Settings
i
Default Backup options can be configured from
Settings > System Settings:

• Once configured, will apply to all Protection Plans


subsequently created
• Existing Protection Plans will not be affected

#CyberFit Academy
Settings > System Settings

#CyberFit Academy
Settings > System Settings

Default Backup
options

#CyberFit Academy
Section Summary

• Left (blue) are of the console is the main menu where you find
(beside others):
• Dashboards
• Alerts
• Activities
• Reports
• Settings
• In settings you can setup default backup options and agent update

#CyberFit Academy
What’s Next?

#CyberFit Academy
Review the Materials

Download and review


the course materials

Re-watch the videos as


many times as you’d like

#CyberFit Academy
Take the Exam

20 Multiple-choice questions

60 Minutes working time

70% Passing grade

Two attempts given

Open book

#CyberFit Academy
Certification Track

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP
2
(Backup)

#CyberFit Academy
Certification Track

STEP
STEP Acronis #CyberFit Cloud Tech Associate Certifications
211 Consists of the following courses (specializations)

Optional:

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP
2
(Backup)
Cloud Tech Professional
STEP
Final Step 3

#CyberFit Academy
Other Acronis Resources

• Inside Sales
• Field Sales
• Partner Success Managers
• Solution Engineers
• Sales Enablement Team
• Partner Portal for More #CyberFit
Academy Training Courses and easy-to-
use Marketing materials

#CyberFit Academy
Supplemental Materials

The Evangelism Team at Acronis will be periodically releasing


new content
Please check back often
Check email for #CyberFit Academy Updates
https://kb.acronis.com/academy
Social Media Accounts
• Instagram: https://www.instagram.com/acronis
• Facebook: https://www.facebook.com/acronis
• Twitter: https://twitter.com/Acronis
• Reddit: https://www.reddit.com/r/acronis
• YouTube: https://www.youtube.com/user/Acronis

#CyberFit Academy
Cyber Foundation
Building a More
Knowledgeable Future

Create, Spread and Protect


Knowledge with Us!
www.acronis.org
Building New Schools
Publishing Education Programs
Publishing Books

#CyberFit Academy

You might also like