Acronis Cloud Tech Associate Advanced Backup 2024 Handout

Download as pdf or txt
Download as pdf or txt
You are on page 1of 130

Academy

Cyber Protect Cloud


Cloud Tech Associate
Advanced Backup

#CyberFit Academy

Welcome, everyone! Today, we embark on a journey to Acronis Academy 2024 Cloud


Tech Associate Backup Course.

1
Learning Objectives

• Understand technical aspects of the


Advanced Backup Pack
• Understand the features (core backup
versus advanced backup pack), what they
mean and how they are utilized
• Plan, create and perform backup and
recovery and other operations

#CyberFit Academy

After passing this course you will get the full knowledge of technical aspects of the
Advanced Backup Pack.
I will walk you through the new features and give you and examples like core backup
versus advanced backup pack, what they mean and how they are utilized as well
as plan, create and perform backup and recovery and other operations.

2
The course modules are as it follows. First, we will go through some real‐life scenario
with a Case Study analysis. Then I will do some High‐level Overview. Next, we will get
familiar how‐to Configure Backup, CDP Backup and how to Protect different
Workloads. After that we will delve in to Browsing Backups & Plans and at the end –
how to Perform Recovery.
Acronis Education
Comprehensive Training for Every Scenario

MSP Academy Associate Level Certification Professional Level Certification


• Specialized technical and business • Grasp the technical details of the • Learn the more sophisticated
education for MSPs Advanced Backup Pack. components within the Backup
Pack
• Comprehensive Understanding of • Comprehend its features, their
EDR significance, and application. • Learn about top troubleshooting
• Evolutionary Context • Organize and execute backup, cases
recovery, and related tasks.
• Components of EDR
• Best practices, integration and
holistic approach

Acronis Academy

Acronis has launched an MSP Academy, offering vendor‐neutral training in concise


modules and structured learning paths tailored to assist service providers in
operating and managing their practice. As highlighted on the screen, the next steps in
your learning journey include associate and professional course certifications.

4
Cyber Protect Cloud
Case Study

#CyberFit Academy

First, let’s take a look at a Case Study.

5
Meet Ben
(Customer of Diamatix)

City agency

19 virtual and 3 physical servers

Using Hyper-V infrastructure

Monthly / Weekly backups approximately 1.3TB

#CyberFit Academy

This city agency is a customer of one of our service providers “Diamtix”. There were
19 virtual servers with a hyper_v environment and 3 physical servers. There was no
backup on the workstations and backups weekly was about 1.3TB.

6
Case Study
Key Challenges
 Limitations due to lack of server
backup automation
 Required assistance with
monitoring
 Limited cybersecurity protection
with existing solution
 Sensitive constituent and
personnel data as city agency
 Manually running custom
backup scripts

#CyberFit Academy

Current solution had limitations due to lack of backup automation and required
assistance with monitoring. With the existing solution they had limited cybersecurity
protection and this is important as they has personnel data and constituent data
since a city agency. They also had to manually run custom backup scripts.

7
Case Study

Key Requirements
 Automate schedule-based
backup
 Deploy agentless recovery
solution
 Implement cybersecurity
protections

#CyberFit Academy

So, the city agency had three main requirements: To Automate a schedule‐based
backup. Deploy an agentless recovery solution for the hyper‐v environment and
Implement better cybersecurity protection.

8
Acronis Cyber Protect Cloud
Benefits
 Optimized budget converting
depreciating CAPEX to fixed
monthly OPEX
 Implementation: three days
(included demo session)
 Active protection along with
backup benefit
 Fully automated backup regimen
 Offloaded support / reporting and
other services to partner
 Looking now at endpoint
advanced protection

#CyberFit Academy

As a result they moved from a capital expenditure model to a monthly operating


expense model. Including a demo the implementation period was three days. They
realized the benefit of the Active Protection module along with backup, which is
included in the core solution. They got their automated backup regimen going and
did risk transfer to the service provider offloading the support and reporting. They are
now evaluating the endpoint advanced security pack as well.

9
Cyber Protect Cloud
High-level Overview

Acronis Academy

At this time, let’s talk discuss a high level overview of the backup components.
.

10
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs

Acronis Academy

Our platform offers integrated cybersecurity, backup, disaster recovery, management,


and automation solutions designed specifically for service providers.
It supports physical workloads such as Windows, Linux, Mac, other iOS devices,
Android, servers, hypervisors, and workstations. For cloud workloads, we support
Azure, AWS, GCP, Microsoft 365 and Google workspace.

11
Acronis Cyber Protect Cloud with Advanced Packs

Optimize for every workload Rapidly launch services Consolidate vendors

Acronis Academy

Acronis Cyber Protect Cloud is a platform for MSPs that provides best‐in‐breed
backup combined with integrated security and management. , is surrounded by
various advance packs, which are designed to optimize operations for every
workload. These allow MSPs to expand their range of offerings and rapidly launch
services to meet client demands. Backup is a key component of this ecosystem.

12
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs

Backup

Base Backup Advanced Backup


 File, image, app  MSFT SQL Server and Exchange
backup  Oracle DB
 Backup to cloud  SP HANA
 Backup to local  Data Protection Map
 Continuous Data Protection
 MySQL/MariaDB backup
 Off-host data processing
 One Click Recovery
 Backup to Azure

Technicians

Owner

Acronis Academy

When we say “Backup”, there are two types of options which you can select from.
First “Base Backup” option. This is the standard backup function which you can use
“ File, image, app backup”, “Backup to cloud, and “Backup to local”. The other option
is “Advanced Backup”, which you can use for:
 MSFT SQL Server and Exchange, Oracle DB, SP HANA, MySQL/MariaDB backups, and
Off‐host data processing, Data Protection Map, One Click Recovery, Backup to Azure,
Continuous Data Protection which we call CDP.

13
Cyber Protect Cloud
Configuring Backup

#CyberFit Academy

Now It's time to roll up our sleeves and dive into the configuring backups.

14
Protection Plan – Backup

Backup settings

#CyberFit Academy

When you set up a backup in protection plan, this is the one of the
menus you can use. This is how it looks in service console.

15
Configuring Backups
Select the machine or group to be backed up
i
Plan and decide:

• What to back up: Entire machines, disk/volumes, files/folders, ESXi configuration?


• Where to back up: Cloud, Local, Network storage? Physical Data Shipping?
• Schedule: Backup scheme – monthly, weekly, daily, hourly?
• How long to keep: Retention rule – By backup age, By number of copies?
• Replication: Enable replication? From where to where?
• Encryption: Turn on AES encryption for backups?
• Backup options: Performance Window, Error handling, Pre/Post commands?

#CyberFit Academy

In order to start let’s first learn how to configure backup.


The first step will be ‐ select the machine or group to be backed up. After that you
need to a plan what to be backed up. You can choose the entire machine, disk
volumes, files or folders or ESXi configuration.
Then need to decide where you want the backup to, well, in lemons terms to live –
whether on Cloud or Local. Network storage or Physical Data Shipping.
Next thing that comes in play is the schedule of backing up. Do you need it to be
monthly, weekly, daily or even hourly? Have to have a Backup scheme.
Let’s not forget – you need to decide ‐ How long you want to keep the backup. So,
you need ‐ Retention rule – By backup age or by number of created copies.
One more thing here worth mentioning – Replication. Do you want to Enable
replication? And From where to where?
Same thing goes for Encryption. Do I Turn on AES encryption for backups?
And last but not least is the Backup options. Performance Window, Error handling,
Pre Post commands?

16
What to back up
Selection available depends on machine/group selected:
i
Select and decide:

• Entire machine: All non-removable disks will be backed up with option of enabling
Application backup
• Disks/volumes: 1 or more disks and volumes can be selected
• Files/folders: 1 or more files and folders can be selected
• System state: Windows Vista and later only, backs up system state data
• ESXi configuration: Backs up the vSphere Hypervisor configuration
• Exchange/SQL databases: 1 or more Exchange/SQL database can be selected

#CyberFit Academy

So, in order to help with completing this little Q and A session, here is more thorough
analysis on what exactly to back up.
If you choose to back up the Entire machine then All non‐removable disks will be
backed up with option of enabling Application backup.
But if you need only Disks to be backed up then you can choose 1 or more disks and
volumes.
Only Files/folders ‐ 1 or more files and folders can be selected.
Now, if you choose to back up your System, please note that only Windows Vista and
later backs up system state data.
ESXi configuration ‐ Backs up the vSphere Hypervisor configuration.
Exchange/SQL databases ‐ 1 or more Exchange/SQL database can be selected.

17
What to back up
Application backup selection is available when Entire machine is selected for

i
What to back up

• Microsoft SQL Server | Microsoft Exchange Server | Microsoft Active Directory |


Oracle Database can be enabled for application-aware backup (Advanced
Backup Pack is needed for Oracle, SQL and Exchange cluster)
• Machine has to meet requirements for application-aware backup
• If any requirements are not met, an error message with the missing requirement
will be shown to assist in meeting the requirements

#CyberFit Academy

When Entire machine is selected for What to be backed up, Application backup
selection is available.
Microsoft SQL Server, Microsoft Exchange Server, Microsoft Active Directory and
Oracle Database can be enabled for application‐aware backup where Advanced
Backup Pack is needed for Oracle, SQL and Exchange cluster.
Machine has to meet requirements for application‐aware backup.
If any requirements are not met, an error message with the missing requirement will
be shown to assist.

18
What to back up
Besides selecting items to be backed up directly
i
Items can also be selected using policy rules:

• Disks/volumes: Conditional rules such as [All volumes], [Fixed volumes] for


volumes on SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays,
[BOOT+SYSTEM] for system and boot volumes, etc. and specific rules such as
C:\, /dev/hda1, etc.
• Files/folders: Conditional rules such as [All Files], [All Profiles Folder] and
%PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise
type in a file/folder path such as /dev/hda1/file.txt
• When a backup using policy rules is applied to multiple machines and no data
matches at least 1 of the rules, backup will fail on that particular machine

#CyberFit Academy

There is a way to select items to be backed up indirectly by using policy rules.


Firstly, Disks/volumes. Conditional rules such as [All volumes], [Fixed volumes] for
volumes on SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays,
[BOOT+SYSTEM] for system and boot volumes, etc. and specific rules such as C:\,
/dev/hda1, etc.
Secondly, Files/folders. Conditional rules such as [All Files], [All Profiles Folder]
and %PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise
type in a file/folder path such as /dev/hda1/file.txt
When a backup using policy rules is applied to multiple machines and no data
matches at least 1 of the rules, backup will fail on that particular machine.

19
Schedule

i
Select a Backup Scheme:

• Always incremental (single-file)


• Always full
• Weekly full, Daily incremental
• Monthly full, Weekly differential, Daily
incremental (GFS)
• Custom

#CyberFit Academy

Next ‐ Let’s take a look on the available options for scheduling your backup.
Always incremental ‐ single‐file is one of the options here. You can go with ‐ Always
full, Weekly full, Daily incremental, Monthly full, Weekly differential, Daily
incremental or GFS. And if none of these works for your needs than you can always
go for the Custom schedule.

20
Schedule

i
Select a Backup Scheme:

• Schedule by time: Choose from Hourly, Daily,


Weekly, Monthly scheduling or pre-defined,
depending on the backup scheme chosen
• Schedule by event: Choose from Upon time since
last backup
• When user logs on/off the system | On system
startup/shutdown | On Windows Event Log event
Additionally, Start conditions and options can be selected to modify the
behavior of the schedule

#CyberFit Academy

You can also select a Backup Scheme type in detail.


When you Schedule by time, choose from Hourly, Daily, Weekly, Monthly scheduling
or pre‐defined, depending on the backup scheme chosen.
If you Schedule by event, Choose from Upon time since last backup.
You can also choos When user logs on/off the system, On system startup/shutdown,
On Windows Event Log event.
Additionally, Start conditions and options can be selected to modify the behavior of
the schedule.

21
Schedule

i
Options:

• Run the plan within a date range


• If the machine is turned off >> run missed tasks at
the machine startup
• Prevent the sleep or hibernation mode during
backup
• Wake up from the sleep or hibernation mode to start
a scheduled backup

#CyberFit Academy

Of course, you have some other option totally for your convenience. You can select
Run the plan within a date range or If the machine is turned off ‐ run missed tasks at
the machine startup. Also, Prevent the sleep or hibernation mode during backup or
even ‐ Wake up from the sleep or hibernation mode to start a scheduled backup.

22
Schedule

i
Start conditions:

• The backup location’s host is available


• Users logged off
• Fits the time interval
• Save battery power
• Do not start when on metered connection
• Do not start when connected to the following Wi-Fi
networks | Check device IP address
• If more than 1 condition is selected, all selected conditions have to be met
simultaneously before backup will start

#CyberFit Academy

In order to give you even more freedom of choice You can set start conditions.
When The backup location’s host is available, or Users logged off, or Fits the time
interval.
Next in line would be Save battery power followed by Do not start when on metered
connection then Do not start when connected to the following Wi‐Fi networks Check
device IP address. You can make multiple selection here. Then all selected conditions
have to be met simultaneously before backup starts

23
How long to keep

i
Select a Cleanup rule:

• By backup age (default): Specify how long in terms of


days, weeks and months to keep backups
• By number of backups: Specify the maximum number of
copies to keep
• By total size of backup: Specify maximum total size of
backups to keep, not available with Always incremental
(single-file) backup scheme or when backing up to cloud
storage
• Keep backup indefinitely: Do not delete backups

#CyberFit Academy

Next to discuss is that You can select a Cleanup rule ‐ how long to keep backup?
By backup age, which is default, you can specify how long in terms of days, weeks
and months to keep backups.
By number of backups, you can choose the maximum number of copies to keep.
By total size of backup, here you can decide the maximum total size of backups to
keep, not available with Always incremental (single‐file) backup scheme or when
backing up to cloud storage.
Important to know ‐ When you choose keeping backup indefinitely, it means you
do not delete backups.

24
How long to keep

i
Select when to start the cleanup:

• After backup (default): Retention rule is applied after a


new backup is created
• Before backup: Retention rule is applied before a new
backup is created

#CyberFit Academy

After that You can select when to start the cleanup.


If you select After backup, which is default, Retention rule is applied after a new
backup is created.
If you select Before backup, Retention rule is applied before a new backup is created.

25
How long to keep

i For cleanup by backup age, by default, backups are


grouped into monthly, weekly, daily and hourly sets

• Monthly set: 1st backup created after a month starts

• Weekly set: 1st backup created on the day specified in


Backup option > Weekly backup which by default is
Monday

• Daily set: 1st backup created after a day starts

• Hourly set: 1st backup created after an hour starts

#CyberFit Academy

For cleanup by backup age which is default rule, backups are grouped into monthly,
weekly, daily and hourly sets.
Each set includes the first backup created after the start of its respective period:
monthly after a month begins, weekly on a specified day (default Monday), daily after
a day begins, and hourly after an hour starts.

26
How long to keep

i For cleanup by backup age, by default, backups are


grouped into monthly, weekly, daily and hourly sets

• E.g., Keep 6 months, 4 weeks, 7 days = keep 1st backup created


every month for last 6 months including current month, keep
Monday backup created every week for last 4 weeks including
current week, keep the 1st backup created every day for last 7
days including current day

• If switched to single rule for all backup sets, backups will be


retained based on Month, e.g., Keep 7 months = keep all
backups created for last 7 months including current month

#CyberFit Academy

To clarify with examples, consider the following retention policies:

For a duration of 6 months, 4 weeks, and 7 days, this means retaining the first backup
made each month for the past 6 months (including the current month), the first
backup of every week on Monday for the past 4 weeks (including the current week),
and the first backup of each day for the past 7 days (including today).

If a unified rule is applied to all backup sets, retention will be determined monthly.
For instance, choosing to keep backups for 7 months implies preserving all backups
made in the last 7 months, including the current month.

27
Replication
Up to 4 replications are available (including source, a total of 5 locations)

Backups can be replicated from:

Earlier backups not replicated: Agent


Local folder, Network folder, Secure attempts to replicate all missing
Zone backups since last successful
replication

Replication fails halfway: next


Replication targets: replication attempts to continue from
where it stopped previously to
reduce time required
Local folder, Network folder, Cloud

#CyberFit Academy

First, replication.
Up to 4 replications are available (including source, a total of 5 locations)
Backups can be replicated from Local folder, Network folder, or Secure Zone to Local
folder, Network folder, or Cloud.

If earlier backups were not replicated, the Agent will attempt to replicate all
missing backups since the last successful replication.

If replication fails halfway, the next replication will attempt to continue from
where it was stopped previously to reduce time required.

28
Backup Scanning

Cloud storage scanned for malware


(prevent restoring infected files):

• Windows OS:
• Only Entire machine or disks/volumes backups scanned
• NTFS file system with GPT or MBR partitioning volumes
• Acronis Cloud Backups only
• After backup scanning plan created, placed in queue for execution
• May take time for scan to start/complete depending on queue; will
show Not scanned status until scanning complete
• Status of backup once completed: No malware | Malware detected

#CyberFit Academy

The important thing to emphasize here is ‐ backup scanning is available only for
Acronis Cloud. Hybrid or third party clouds are not supported.

Why? Because the backup scanning is performed by a specific Agent that is running
into our Datacenter. In order for this to work in third party clouds, this specific Agent
should also be installed and configured, and this would make Backup Gateway/Cyber
Infrastructure installation more painful.

This feature scans cloud strage for malware and prevent from restoring infected files.

29
Section Summary
1 Backup Configuration: Select the target for backup (entire
machine, disks, files/folders, or ESXi configuration), choose
the backup location (Cloud or Local), and set the backup
schedule and retention rules.

Advanced Options: Enable features like replication and


2 AES encryption, define backup options including
performance window and error handling, and utilize policy
rules for targeted backups.

Cleanup and Replication: Define rules for backup retention


3 and replication, ensuring backups are efficiently managed
and securely stored across multiple locations.

#CyberFit Academy

In this section, we delve into setting up a backup in the Acronis Cyber Protect
Backup's protection plan. Initially, you're tasked with choosing what to back up—
ranging from the entire machine to specific files or configurations, and deciding on
the backup's destination, whether it be on the cloud or locally stored. Scheduling how
often backups occur and establishing how long they are retained are crucial steps in
planning. Advanced options also include enabling replication to safeguard your data
across various locations and turning on encryption for added security. Finally,
understanding the cleanup rules ensures your backup storage remains optimized
without sacrificing data availability. Through these steps, Acronis Cyber Protect
Backup provides a comprehensive solution for securing your data across various
scenarios.

30
Cyber Protect Cloud
CDP Backup
(Advanced Backup Pack)

#CyberFit Academy

In this section we will go through CDP Backup, which is Continuous Data Protection in
Advanced Backup Pack.

32
Continuous Data Protection (Advanced Backup)

CDP settings

#CyberFit Academy

Continuous Data Protection (CDP) is in the advanced backup pack as shown in the
slide.

33
Continuous Data Protection (Advanced Backup)

i
CDP backs up files only, can be used with disk-level or file-level archives

• Supported OS:
• Windows 7/8/10 32/64-bit
• Windows Server 2008R2/2012/2016/2019 32/64-bit
• Supported file system: NTFS only, local folders only
• Not compatible with application aware backup
• Supported backup destinations:
• Local folder, Network folder, Cloud storage, Location defined by the script
• Select files of specific applications or in specific folders, e.g., D:\Data\* to be continuously backed up
• Goal of CDP is to save data between backups and have close to a zero recovery point objective

#CyberFit Academy

Continuous Data Protection requires some backup prior. If no backup prior, it will
perform a full backup.
Important note here is that it Works with Windows 7 and higher and Server 2008R2
and higher.

Keep in mind that local folders has to be only and NTFS format.

CDP is NOT compatible with application aware backup. This is for files like word,
adobe PDF, Excel, Autocad etc….Things like MySQL, SQL, Quickbooks data or where
table level writes are not compatible with. Backup destination you will notice says
local folder but keep in mind if your hard drive crashes and cannot be fixed and you
recover from another backup, your CDP might not be available also. You will see
other options like network folder and cloud storage as well as location defined by a
script.

If you decide to select specific folders and want all in that folder to be backed up,
ensure you put that wildcard asterisk at the end. Again the goal is to save data
between backups.

34
Continuous Data Protection (Advanced Backup)

Select files of
applications to be
continuously
backed up

Add more
applications by
specifying the path
to the application
exe

#CyberFit Academy

You can Select files of applications to be continuously backed up or even


Add more applications by specifying the path to the application exe.

35
Continuous Data Protection (Advanced Backup)

Specify files and


folders with files to
be continuously
backed up

#CyberFit Academy

From that menu you can Specify files and folders with files to be
continuously backed up

36
Continuous Data Protection (Advanced Backup)

CDP recovery
point

#CyberFit Academy

CDP recovery points can be found as shown on that slide.

37
Continuous Data Protection (Advanced Backup)

i If file was changed multiple times during backup,


after backup it will be backed up entirely only once

• During regular backup CDP is paused (either regular backup is


working or CDP, not together in parallel)
• Disk/volume recovery workflow:
• User initiates disk recovery from CDP backup
• System recovers disk from the last regular backup
• System recovers files from CDP backup

#CyberFit Academy

Please keep in mind that If file was changed multiple times during backup, after
backup it will be backed up entirely only once. During regular backup CDP is paused,
they can not work together at the same time. So let me explain how Disk volume
recovery works. First ‐ User initiates disk recovery from CDP backup. Then System
recovers disk from the last regular backup and only after the System recovers files
from CDP backup.

38
Continuous Data Protection (CDP) - How it works

1 2 3
CDP is running: Regular backup
1. Program saves file process:
CDP started after plan (automatically or by user’s 1. CDP paused
application to machine, request)
2. Regular backup
but pauses immediately 2. Driver tracks and notifies completes
if no archive agent about changed file
3. CDP resumed
3. Agent reads entire file and
4. New CDP backup created
checks what changed
5. Previous CDP backup
4. Agent saves changes into
deleted
backup

#CyberFit Academy

Let’s see how CDP backup works step by step.


In first step, CDP is started after plan application to the machine, but pauses
immediately if there is no archive.
In second step, CDP is running as following order:
Program saves file (automatically or by user’s request).
Then, Driver tracks this and notifies the agent about the changed file.
After that, Agent reads entire file and checks what is changed.
Finally, Agent saves changes into the backup.
Lastly, Regular backup start as following order:
CDP is paused.
Then Regular backup completes.
After that, CDP is resumed.
Next, New CDP backup is created.
Finally, Previous CDP backup is deleted.

39
Cyber Protect Cloud
Protecting different Workloads

#CyberFit Academy

Now, Let’s talk about Protecting different Workloads.

40
In this section, we will cover the following modules.

Protecting Physical Machines.


Protecting Applications.
Protecting VMs & Virtual Hosts.
Protecting Productivity Suites.
Off‐Host Data Processing.
Browsing Backups & Plans.
Cyber Protect Cloud
Protecting Physical Machines

#CyberFit Academy

Let’s start with ‐ how to protect physical machines.

42
Protecting Physical Machines
Windows, Linux and Mac physical machines¹ can be backed up using:

What can be recovered to live


machines:
• 1 or more disk/volumes and
files/folders can be recovered
from disk-level backups such as
Entire machine or Disk/volume
backups
Entire machine Disks/volumes Files/folders2
• 1 or more files/folders can be
backup: backup: backup: recovered from file-level
includes all non- 1 or more disks and 1 or more files and backups
removable disks of volumes can be folders can be
the machine selected selected

1 A VM with Agent installed can be backed up similar to a physical machine


2 Files/folders backup can also be used to back up network folders on file servers and NAS
devices

#CyberFit Academy

Windows, Linux and Mac physical machines can be backed up using Entire machine
backups, Disk volumes backup and Files folders backup.

Entire machine backup includes all non‐removable disks of the machine.

Disks and volumes can be selected in Disks volumes backup.

Files and folders can be selected in Files folders backup.

What can be recovered to live machines is.


disk/volumes and files/folders which can be recovered from disk‐level backups such
as Entire machine or Disk/volume backups
files/folders can be recovered from file‐level backups.

43
Protecting Physical Machines
i Additionally, bare metal recovery can be used when original machine is
non-operational, e.g., hardware or OS failure:

• Requires bootable media for booting up hardware (physical or virtual) to be used


for recovery
• Disk-level backups containing an OS can then be selected for system (1 or more
disks/volumes) recovery
• For recovery to dissimilar hardware for Windows or Linux systems, Universal
Restore can be used after bare metal recovery

#CyberFit Academy

Additionally, bare metal recovery can be used when original machine is non‐
operational, for example hardware or OS failure.
It requires bootable media for booting up hardware to be used for recovery.
Disk‐level backups containing OS can then be selected for system recovery.
For recovery to dissimilar hardware for Windows or Linux systems, Universal Restore
can be used after bare metal recovery.

44
Cyber Protect Cloud
Protecting Applications

#CyberFit Academy

Let’s talk about Protecting Applications.

45
Protecting Applications SQL
Server
Exchange

Microsoft SQL and Microsoft Exchange (Clusters in Advanced


Backup Pack) can be protected as follows:

• Application-aware backup: Disk-level backup of entire server and application


metadata
• Database backup: File-level backup of the database and associated metadata
• Both types of backup can be used to recover:
• Database to live application
• Database as files
• Granular recovery of application items
• For Microsoft Exchange 2010 SP1 or later, Mailbox backup is also possible and
can be used for mailbox and mailbox item recovery

#CyberFit Academy

Microsoft SQL and Microsoft Exchange can be protected by following


ways.
One is Application-aware backup, it takes Disk-level backup of entire
server and application metadata.
The other is Database backup, it takes File-level backup of the database
and associated metadata.
Both types of backup can be used to recover Database to live application,
database as files, Granular recovery of application items.
For Microsoft Exchange 2010 SP1 or later, Mailbox backup is also possible
and can be used for mailbox and mailbox item recovery

46
Protecting Applications SQL
Server
Exchange

For Microsoft Exchange, recovery can be performed to original


or new Exchange server of the same version:

• Target Exchange server and machine performing the recovery (with Agents
installed) must belong to the same AD forest and requires either membership
in Exchange Organization Administrators role group (Exchange 2007) or
Server Management role group (Exchange 2010 and above)
• For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the
machine and sysadmin role in target SQL instance

#CyberFit Academy

For Microsoft Exchange, recovery can be performed to original or new


Exchange server of the same version.
Target Exchange server and machine performing the recovery must belong
to the same AD forest and requires either membership in Exchange
Organization Administrators role group or Sever Management role group.
For Microsoft SQL, recovery can be performed to original or new SQL
server of the same or higher version for user databases and same
version for system databases.
It requires membership in Backup Operators or Administrators group on
the machine and sysadmin role in target SQL instance.

47
Protecting Applications SQL
Server
Exchange

Microsoft SharePoint farm can be protected as follows:

• Backup all database servers (Microsoft SQL based) with SQL application-
aware backup
• Backup all unique front-end and application servers with normal disk-level
backup
• Backups of all servers should be performed using the same schedule
• For recovery:
• Database servers can be recovered using recovery methods for Microsoft
SQL
• Other servers can be recovered using disk-level or bare-metal recovery
• SharePoint content such as sites, libraries and documents can be
recovered using Acronis SharePoint Explorer

#CyberFit Academy

You can protect Microsoft SharePoint farm using the following steps.
Backup all database servers with SQL application‐aware backup.
Backup all unique front‐end and application servers with normal disk‐level backup.
Backups of all servers should be performed using the same schedule.
For recovery, Database servers can be recovered using recovery methods for
Microsoft SQL.
Other servers can be recovered using disk‐level or bare‐metal recovery.
SharePoint content such as sites, libraries and documents can be recovered using
Acronis SharePoint Explorer.

48
Protecting Applications VMware
VMs

Application-aware and database backup requires the


following:

• For agent-based/guest-level backup of physical machines/virtual machines:


• Agent for Windows/Linux + Agent for Exchange/SQL/Active Directory/Oracle
is installed on the physical or virtual machine
• For agentless backup of VMware VMs:
• Agent for VMware (Virtual Appliance or Windows Agent) is installed for the
vSphere Hypervisor host with VMs to be backed up
• VMs have to meet the requirements for application-consistent quiescing (refer
to VMware KB)
• VMware Tools is installed and up-to-date
• UAC has to be disabled on Windows-based VMs, if not, a built-in domain
administrator credentials have to be specified when enabling application
backup

#CyberFit Academy

Take a look at Application-aware and database backup requirement.

For agent-based/guest-level backup of physical machines/virtual


machines, you need Agent for Windows/Linux + Agent for
Exchange/SQL/Active Directory/Oracle is installed on the physical or
virtual machine.

For agentless backup of Vmware, you need Agent for VMware is installed
for the vSphere Hypervisor host with VMs to be backed up.
VMs have to meet the requirements for application-consistent quiescing.

VMware Tools is installed and up-to-date.


UAC has to be disabled on Windows-based VMs, if not, a built-in domain
administrator credentials have to be specified when enabling application
backup.

49
Protecting Applications Hyper-V

For agentless backup of Hyper-V VMs:

• Agent for Hyper-V is installed for the Hyper-V host with VMs to be backed up
• Hyper-V Integration Services must be up-to-date and running in the VM
• In order to avoid VM going into "saved" state during backup, make sure that the
Integration services -> Backup (Volume checkpoint) option is enabled in VM settings
in Hyper-V Manager
• There must be network connection from Agent for Hyper-V to guest VM network,
since application data is read over WMI which requires network connection to guest
OS
• No Windows dynamic disks present in the guest OS.
• UAC has to be disabled on Windows-based VMs, if not, a built-in domain
administrator credentials have to be specified when enabling application backup

Exchange and SQL transaction logs are truncated after each


successful backup

#CyberFit Academy

We also support agentless backup of Hyper‐V VMs as explained here.


Agentless backup can provide some benefits.
One of them is Lower Cost, Without an individual agent on every VM in the network,
administrators have fewer components to purchase and license, less communications
to run, and lower CPU and bandwidth consumption.

The other part is Simplified Administration. Agentless systems are typically


implemented with a centralized management approach. The centralized approach
provides a network‐wide view that allows administrators to control every VM from a
single point.

50
Cyber Protect Cloud
Protecting VMs & Virtual Hosts

#CyberFit Academy

At this time let me explain more about how to Protect VMs & Virtual Hosts.

51
Protecting VMs and Virtualization Hosts VMware
vSphere

For VMware vSphere

• VMs can be backed up and recovered with Agent for VMware (agentless backup)
• ESXi configuration can also be backed up which allows recovery to bare metal
• Backup of ESXi configuration includes:
• Bootloader and boot bank partitions of the host
• Host state (configuration of virtual networking and storage, SSL keys, server network
settings and local user information)
• Extensions and patches installed or staged on the host
• Log files
• Requires SSH to be enabled in the Security Profile of the ESXi host configuration

#CyberFit Academy

For starters let’s go through protection of Vmware vSphere.


VMs can be backed up and recovered with Agent for VMware (agentless backup)
ESXi configuration can also be backed up which allows recovery to bare metal
Backup of ESXi configuration includes:
Bootloader and boot bank partitions of the host
Host state
Extensions and patches installed or staged on the host
Log files
It requires SSH to be enabled in the Security Profile of the ESXi host configuration

52
Protecting VMs and Virtualization Hosts Hyper-V

For Hyper-V:

• VMs can be backed up and recovered with Agent for Hyper-V (agentless
backup)
• Requires Hyper-V Integration Services to be installed and updated on
the VMs
• Hyper-V VSS writers must be working (check using vssadmin list
writers)
• Entire Hyper-V server can be backed up with Agent for Windows via disk-
level backup

#CyberFit Academy

Secondly, in the case of Hyper‐V.


VMs can be backed up and recovered with Agent for Hyper‐V (agentless
backup)
It Requires Hyper‐V Integration Services to be installed and updated on
the VMs.
Hyper‐V VSS writers must be working.
Entire Hyper‐V server can be backed up with Agent for Windows via disk‐
level backup.

53
Protecting VMs and Virtualization Hosts Hyper-V

Amazon
For all other supported virtualization platforms, EC2

Windows Azure and Amazon EC2 cloud instances

• VMs can be backed up from inside guest OS (agent-


based backup) similar to how physical machines can be
backed up, i.e., using Agent for Windows or Linux

#CyberFit Academy

For all the other supported virtualization platforms, Windows Azure and
Amazon EC2 cloud instances.
VMs can be backed up from inside guest OS similar to how physical
machines can be backed up.

54
Protecting VMs and Virtualization Hosts Hyper-V

Amazon
Recovery is similar to physical machines except EC2

for Windows Azure and Amazon EC2 VMs

• Windows Azure and Amazon EC2 cloud instances cannot be


booted from bootable media, hence bare metal recovery is not
possible; recovery have to be performed to existing VM:
• Create new VM from image/template in Azure or EC2 with same
disk configuration as machine to be recovered and install Agent
for Windows or Linux on the new VM
• Recover backed up machine as disk-level recovery to the new
VM

#CyberFit Academy

Recovery is similar to physical machines except for Windows Azure and


Amazon EC2 VMs.
Cloud instances of those cannot be booted from bootable media, hence
bare metal recovery is not possible; recovery have to be performed to
existing VM.
Create new VM from image/template in Azure or EC2 with same disk
configuration as machine to be recovered and install Agent for Windows or
Linux on the new VM.
Recover backed up machine as disk-level recovery to the new VM.

55
Section Summary
Acronis supports different Applications native by Agent or
1 by Script

Applications can be backed up standalone or in a


2 Application Aware Backup

On VMware and Hyper-V you can do a agent-less Backup,


3 even Application Aware

4 Application Aware Backups will lower your RTO


dramatically

#CyberFit Academy

Let's briefly recap the key points we've discussed sofar. Acronis supports a wide range
of applications either natively through agents or via scripting, offering flexibility in
how backups are managed. You have the option to perform backups of applications
on their own or within the context of an Application Aware Backup. This is
particularly useful in virtualized environments like VMware and Hyper‐V, where you
can conduct agent‐less backups, including Application Aware ones. The advantage of
using Application Aware Backups is significant—it can greatly reduce your Recovery
Time Objective (RTO), ensuring that your systems are back up and running quickly
after any data loss incident. This functionality underscores Acronis's commitment to
providing robust and efficient data protection solutions tailored to meet diverse
needs.

56
Cyber Protect Cloud
Protecting Productivity Suites

#CyberFit Academy

Well come back. In the next few slides let me explain more about protect Productivity
Suites.

57
Protecting M365 Microsoft
365

Microsoft 365 can be backed up as follows:

• Using Local Agent:


• Install Agent for M365 on a Windows machine
• Supports backup of M365 Exchange Online mailboxes to local,
network and cloud storage
• Using Cloud-to-Cloud (C2C) a.k.a Cloud Agent backup:
• No agent installation required, add M365 for Business from Add button
in cloud console
• Supports backup of M365 Exchange Online mailboxes, OneDrive for
Business, SharePoint Online sites, Teams, OneNote
• Requires Global Administrator role credentials, only during setup

#CyberFit Academy

In this segment, we're focusing on how to safeguard your Microsoft 365 data effectively.
There are two main approaches to back up Microsoft 365 with Acronis, tailored to meet
different organizational needs and preferences.
Firstly, using the Local Agent method, you start by installing the Agent for M365 on a
Windows machine. This approach enables the backup of Microsoft 365 Exchange Online
mailboxes directly to local, network, or cloud storage, offering a range of storage options to
fit your security and accessibility requirements.
Alternatively, the Cloud‐to‐Cloud, or C2C, also known as the Cloud Agent backup, simplifies
the process even further. With no need for agent installation, you can easily add Microsoft
365 for Business directly through the 'Add' button in the cloud console. This method not only
supports the backup of Exchange Online mailboxes but also extends to OneDrive for Business,
SharePoint Online sites, Teams, and OneNote, providing a comprehensive backup solution for
your Microsoft 365 suite. To set this up, you'll need the credentials for the Global
Administrator role, but only during the initial setup.
Both methods ensure your Microsoft 365 data is protected against loss or corruption,
allowing you to restore critical information swiftly, ensuring business continuity. The choice
between Local Agent and Cloud‐to‐Cloud backup solutions allows for flexibility in how you
manage and secure your backups, based on your specific infrastructure and business
requirements

58
Protecting M365 Microsoft
365

Feature Local Agent Cloud-2-Cloud Backup

Exchange Online: user, shared, and group


mailboxes
OneDrive: user files and folders
SharePoint Online: classic site collections, group
Data items that can be backed up Exchange Online: user and shared mailboxes
(team) sites, communication sites, individual data
items
Teams: Entire teams
OneNote: all items (separate backup plan option)

Backup of archive mailboxes (In-Place


No Yes
Archive)

Backup Schedule User-defined Once a day (automatically) or manually started

Backup Locations Cloud Storage, local folder, network folder Cloud Storage only

Automatic Protection of new Office Yes, by applying a backup plan to the All users, All
No
365 users, groups, sites groups or All sites groups

#CyberFit Academy

Here you can see the differences when protecting Microsoft 365 if using the local
agent or using the cloud‐2‐cloud backup. Many more items can be backed up by
utilizing the cloud‐2‐cloud backup but depending on your needs, this slide and the
next provide guidance to what is the better option for you.

59
Protecting M365 Microsoft
365

Feature Local Agent Cloud-2-Cloud Backup

Protecting more than one M365


No Yes
organization

Granular recovery Yes Yes

Recovery to another user within one


Yes Yes
organization

Recovery to another organization No Yes

Recovery to an on-premise Microsoft


No No
Exchange Server

Maximum number of manual backup


No 10 manual runs during an hour
runs

#CyberFit Academy

So for example if you want to protect more than one M365 organization or recover to
another organization, then you will need to do cloud‐2‐cloud backup.

60
Protecting M365 Microsoft
365

To recover:

• Granular recovery can be performed from M365 backups:


• Mailboxes and mailbox items can be recovered to M365, downloaded
as files or sent as email as a form of recovery
• OneDrive content can be recovered to existing OneDrive, including
Sharing permissions recovery or download as files
• SharePoint Online sites can be recovered to existing site, as document
library or single document or download as files
• Preview, browsing and search of backed up content possible for quick
access to backed up data

#CyberFit Academy

When protecting Microsoft 365 with Acronis, granular recovery options empower you
to restore exactly what you need with ease. Quickly recover mailboxes or individual
mailbox items back to M365, or choose to download them as files or even send via
email. For OneDrive, not only can you restore content to its original location, but you
also maintain sharing permissions, or opt to download files directly. SharePoint
Online recovery is just as flexible, allowing for restoration of entire sites, document
libraries, or single documents, with the option to download as needed. Plus, with the
ability to preview, browse, and search your backed‐up data, accessing and recovering
your critical information is both fast and efficient, ensuring your data is always within
reach.

61
Microsoft 365: Licensing for blocked seats
External user
Acronis will not license blocked seats that
have unprotected workloads (OneDrive
and mailboxes) Public folder #1 (mailbox backup)

With backups
License blocked seats only for protected M365 seat #1 (mailbox + OneDrive backup) MS Team #1 (backed up)
personal (non-shared) workloads:
OneDrive and mailboxes M365 seat #2 (OneDrive backup)

Scenarios M365 seat #3 (mailbox backup) SharePoint site #1 (backed up)

• Customers can enable backup of shared Shared mailbox #1 (backed up)


Microsoft 365 workloads (Teams, SharePoint
sites)
Without backups
M365 seat #4 (without any backup) MS Team #2 (without backup)
Licensing M365 seat #5 (without any backup)
• Available in Standard Protection
M365 seat #6 (without any backup) SharePoint site #2 (without backup)
• Licensing models supported:
Per workload only. M365 blocked seat (without any backup)

Legend: - Billed - Non-billed - Has access

#CyberFit Academy

Prior we introduced new advanced licensing for Microsoft 365 which simplified
licensing – we charged only for seats which data is protected: both seat OneDrive and
mailbox and shared data like SharePoint Online site or teams to which seat has access.

It was revealed that customers can have seats which have access to shared resources
like sites, but at the same time they are blocked – unable to log into Microsoft 365.

We call these seats “blocked” seats. Usually, blocked seats are also unlicensed in
Microsoft 365, thus customers do not pay for them and have to pay for them to
partners and eventually Acronis because such seats have access to protected sites.

Before, we introduced some optimization.


We will not charge for blocked seats if their personal workloads are not protected. So
if a blocked seat has access to a protected SharePoint Online site or team, but its
OneDrive or mailbox are not protected, Acronis will not charge for such seats.

62
Microsoft 365 OneNote Backup and
Recovery
 C22.10: protection of Microsoft 365
OneNote notebooks enables recovery of
notebook files to original (or new)
location. Previously (June 2022): could
only download backups.
How To:
• Enable Microsoft 365 OneNote backup
as part of Microsoft 365 OneDrive and
Microsoft SharePoint Online backup
• Recover Microsoft 365 OneNote
notebook files back to their original or
new location

#CyberFit Academy

We now have protection for OneNote with the ability to download from a backup.
And it is now possible to recover OneNote back to Microsoft 365 without
downloading them first. OneNote can be recovered to the original or non‐original
place in the same way as other types of Microsoft 365 data.

63
Acronis Cyber Protect Cloud:
Recover Microsoft 365 mailbox data to PST

#CyberFit Academy

We also have the ability to recover Microsoft 365 mailbox data to a PST file even if
the Microsoft 365 service is unavailable. This will minimize the chance of clients not
having their in‐mail data available.

64
Protecting Google Workspace Google
Workspace

Google Workspace can be backed up as follows:

• Using Cloud-2-Cloud (C2C) backup:


• No agent installation required, add G suite from Add button in cloud console
• Supports backup of Gmail mailboxes, Calendars, Contacts, Google Drives and G Suite Shared
drives

• Requires Super Admin credentials


• To recover:
• Granular recovery can be performed from Google Workspace backups:
• Mailboxes and mailbox contents can be recovered to G suite
• Google Drive content can be recovered to existing google Drive as entire drive or as files/folders

#CyberFit Academy

In safeguarding your Google Workspace with Acronis, the Cloud‐to‐Cloud (C2C)


backup streamlines the process, eliminating the need for agent installations. Simply
add your G Suite via the 'Add' button in the cloud console to back up everything from
Gmail mailboxes, Calendars, and Contacts to Google Drives and G Suite Shared drives,
with just your Super Admin credentials.
Recovery is designed to be just as straightforward, offering granular restoration
capabilities. Whether it's returning emails and mailbox contents back to G Suite, or
restoring Google Drive content to its original place or as selected files and folders,
your data recovery is precise and tailored to your needs. This approach ensures your
Google Workspace remains protected and recoverable, giving you peace of mind and
keeping your operations running smoothly

65
Unlimited storage for Google Workspace
Value for partners and customers
Google Workspace
• Improve sales and delivery of Google Workspace
Charges per seat only
backup service by aligning Acronis licensing
with Google licensing.
• Improve sales and reduce billing issues related to
Google Workspace backup issues by Team Drive
Google seat
removing variable fees components. (Shared Drive)
Scenarios
• If user’s mailbox or Google Drive is protected, it will be
licensed (charged by Acronis).
Mailbox
• Team Drive will not be charged.
• Storage occupied by backups which belongs to
workloads that are not protected will not be charged
for.
Licensing GDrive

• Available as part of standard product: Per workload

#CyberFit Academy

You can use unlimited storage for Google Workspace. This new feature improves sales
and delivery of Google Workspace backup service by aligning Acronis licensing
with Google licensing. It also reduces billing issues related to Google Workspace
backup issues by removing variable fees components. Please be noted that if user’s
mailbox or Google Drive is protected, it will be licensed, in brief, charged by Acronis.
Team Drive will not be charged. Storage occupied by backups which belongs to
workloads that are not protected will not be charged for. It’s available as a part of
standard product in Per workload model.

66
Group management for Microsoft 365/Google Workspace
Value for partners and customers
• Saves time and effort with streamlined protection
management for multiple Microsoft 365 and Google
Workspace workloads, eliminating the need to configure
protection for each individual workload. This is especially
useful in scenarios where customers have 100+ seats.
Scenarios
• Create a static group of workloads.
• Create a dynamic group of workloads based on
various criteria, including membership in specific
Azure AD groups.
• Apply/revoke plan to the group.
Licensing
• Available in standard product.
• Licensing models supported: Per gigabyte, Per
workload

#CyberFit Academy

We now offer group management for Microsoft 365/Google Workspace. It’s


beneficial for partners and customers by saving time and effort with streamlined
protection management for multiple Microsoft 365 and Google Workspace
workloads, eliminating the need to configure protection for each individual workload.
This is especially useful in scenarios where customers have 100+ seats. Naturally, it
can be used either when you create a static group of workloads or when you create a
dynamic group of workloads based on various criteria, including membership in
specific Azure AD groups. Off course, you can use it when applying or revoking plan to
the group. This feature is available in Available in standard product and supports both
per gigabyte billing model and per workload billing model.

67
Backup frequency for Microsoft 365 and Google Workspace

Value for partners and customers


• Enables reduction in RPO (Recovery Point
Objective) for Microsoft 365 and Google
Workspace backups by increasing frequency from
24 hours to 4 hours.
Scenarios
• In the protection plan, configure a backup
frequency for supported Microsoft 365 and
Google Workspace workloads.
Licensing
• Available in Advanced Backup pack: Per gigabyte,
Per workload

#CyberFit Academy

We improved backup frequency for Microsoft 365 and Google Workspace. What’s the
value for partners and customers?
It enables reduction in RPO for Microsoft 365 and Google Workspace backups by
increasing frequency from 24 hours to 4 hours. In the protection plan, you can
configure a backup frequency for supported Microsoft 365 and Google Workspace
workloads. It’s available in Advanced Backup Pack regardless of both per gigabyte and
per workload model.

68
Section Summary
Flexible Backup Options: Choose between Local Agent and
1 Cloud-to-Cloud (C2C) backups for Microsoft 365, catering to
various organizational needs and ensuring comprehensive
coverage for Exchange Online, OneDrive, SharePoint, Teams,
and OneNote.

Granular Recovery: Effortlessly restore mailboxes, OneDrive


content, and SharePoint sites to their original locations or as
2 files, with advanced options for granular recovery including
the ability to download or send emails, and now, direct
recovery of OneNote and PST files for mailboxes.

Enhanced Features & Licensing: Introduction of advanced


3 licensing simplifies charges for protected seats, with
improvements like unlimited storage for Google Workspace
backups, group management for streamlined protection, and
increased backup frequency to reduce Recovery Point
Objective (RPO).
#CyberFit Academy

In this chapter we've covered the essentials of protecting productivity suites like
Microsoft 365 and Google Workspace. First, we've seen how Acronis provides flexible
backup solutions, allowing you to select between Local Agent and Cloud‐to‐Cloud
backups based on your specific requirements, ensuring a comprehensive protection
for your entire Microsoft 365 suite.
Next, we highlighted the granular recovery capabilities that Acronis offers, making it
possible to restore not just mailboxes and OneDrive content but also SharePoint
Online sites and, most recently, OneNote content directly back to Microsoft 365. This
precision ensures you can quickly recover exactly what you need, when you need it.
Finally, we introduced the new advanced licensing for Microsoft 365, simplifying how
charges are applied for protected seats, and discussed significant enhancements such
as unlimited storage for Google Workspace backups, group management for
Microsoft 365 and Google Workspace, and improved backup frequency. These
updates are designed to streamline the backup and recovery process, reduce
operational burdens, and provide more value to our partners and customers.

69
Cyber Protect Cloud
Browsing Backups & Plans

#CyberFit Academy

Browsing backups & plans is the next subject for us to discus. Let’s go.

70
Browsing Backups > Backup Storage Tab

Add
locations

Backup storage locations

#CyberFit Academy

If you go to “Backup Storage” menu, you can see the list of Backup storage locations.

Click “Add location” button if you want to add another one.

71
Browsing Backups > Backup Storage Tab

Backups can be browsed from the Backup


Storage tab

• All locations currently in use by all plans will be shown


• New locations can be added by selecting Add location:
• When adding a location, machine to browse from can be
specified in order to ensure that a specific machine (with
appropriate agent installed) is used to access the location,
e.g., using a machine with Agent for SQL to browse backups
of SQL databases
• Backups can be then selected for recovery and Run as VM as
well as manually deleted from a location

#CyberFit Academy

Backups can be browsed from the Backup Storage tab.


New locations can be added by selecting Add location button.

When adding a location, machine to browse from can be specified in order to ensure
that a specific machine is used to access the location.

Backups can be then selected for recovery, Run as VM, or manually deleted from a
location.

72
Browsing Backups > Plans tab

Selected Plan
Available actions
Types of Plans

#CyberFit Academy

If you go to “Protection Plans” menu, you can see a list of plans. There are also
different types of plans.

Select a specific plan, and you will see the available actions menus at the right side.

73
Browsing Backups > Plans tab

Plans can be browsed and managed from the Plans tab

• All plans of a specific type will be show in each section:


• Protection: Shows all available Protection Plans
• Cloud applications backup: Shows Microsoft 365 and Google
Workspace Backup Plans
• VM replication: Shows VM replication plans
• Actions available with Plans:
• Create Plan | Import | Details | Stop | Edit | Activities | Alerts | Clone |
Export | Disable | Delete

#CyberFit Academy

Plans are easy to find, browsed and managed once you go to the Plans tab. All plans
of a specific type will be show in each section.

Protection type ‐ Shows all available Protection Plans.

Cloud applications backup type ‐ Shows Microsoft Office 365 and Google Workspace
Backup Plans.

VM replication type ‐ Shows VM replication plans.

Available Actions as shown on the previous slide are as follows.


Create Plan, Import, Details, Stop, Edit, Activities, Alerts, Clone, Export, Disable and
Delete.

74
Section Summary
Cloud backups can be browsed with the console
1
On the Cloud Storage, you can browse the single backup

You can delete full backups, or incrementals


2
You can start a recovery from the backup file

3 You can add other backup locations

#CyberFit Academy

In the 'Browsing Backups & Plans' chapter, we've delved into essential aspects of
managing your backups within the Acronis Cyber Protect Cloud. We highlighted the
ability to easily navigate cloud backups via the console, allowing for quick access and
inspection of your stored data. We discussed the flexibility to manage your backups,
including deleting unnecessary files and initiating recoveries directly from the backup
file for efficiency. Additionally, we covered how to enhance your data protection
strategy by adding more backup locations, ensuring a comprehensive and tailored
approach to safeguarding your data. These features demonstrate Acronis's
commitment to delivering a user‐friendly and robust platform for your data
management needs.

75
Cyber Protect Cloud
Performing Recovery

#CyberFit Academy

Let us together now see exactly how to perform recovery.

77
For better understanding of which, we will need to go trough this chapters. First we
will se how to Use the Web Interface. Then I will explain what Options we have to
perform Recovery. Then we’ll look in to the Bootable Media & Universal Restore,
Acronis Instant Restore ,Acronis Instant Restore (Run as VM) How To as well as VM
Replication. And the end I will explain more about Other Recovery Methods.
Configuring Recovery
Determine:
1 What to recover: Entire machine, disks/volumes,
2
Location of backup: Local folder, network folder or
VMs or individual files/folders, databases or cloud?
application items

3 4
Recovery method: Using web interface, bootable
Recovery point: Available backups to recover from?
media or other methods

5 6
Where to recover: Original location, custom Recovery options: Validation, Error handling, File
location, on-premises or in cloud? exclusions, etc.?

#CyberFit Academy

To perform recovery, firstly you need to configure it.

In the first steps of configuring, you should determine the following.

What to recover. Entire machine, disks/volumes, VMs or individual


files/folders, databases or application items.

Recovery method. Using web interface, bootable media or other methods.

Where to recover. Original location, custom location, on-premises or in


cloud.

Location of backup. Local folder, network folder or cloud.

Recovery point. Available backups to recover from.

Recovery options. Validation, Error handling, File exclusions, etc.

79
Recovery Methods

Backups can be recovered using the following methods:

• Using web interface: Used for performing recovery of entire


systems and select data
• Using bootable media: Used for bare metal recovery of entire
systems and select data
• Other methods: Used for recovering files and folders
• Additionally, the following can also be used:
• Acronis Instant Restore (Run as VM) on-premises
• VM Replication (VMware vSphere only) on-premises
• Acronis Cyber Disaster Recovery Cloud in cloud

#CyberFit Academy

In our discussion on recovery methods, we explore a range of options


tailored for various recovery needs.

The web interface offers a straightforward path for restoring both entire
systems and selected data, ideal for quick and targeted recoveries.
Bootable media is your solution for bare metal recovery, enabling system
restoration even when the OS fails to boot, ensuring minimal operational
downtime.
For more specific needs, file and folder recovery methods are readily
available.
Additionally, we highlight specialized recovery options:

Acronis Instant Restore allows for running backups as VMs on-premises,


providing an instant recovery solution.
VM Replication, exclusive to VMware vSphere, facilitates on-premises VM
availability through replication.
The Acronis Cyber Disaster Recovery Cloud offers a cloud-based disaster
recovery solution, ensuring data resilience across environments..

80
Cyber Protect Cloud
Using the Web Interface

#CyberFit Academy

Next in our To Do list is how to Use the Web Interface.

81
Using Web Interface > Devices Tab

Select machine from appropriate


Devices built-in/custom group for
Recovery, then select Backup
location, recovery point to
recover from and type of recovery

#CyberFit Academy

Open the service console, go to All Devices tab, then Select a workload, Recovery
menu.

Then, select Backup location, recovery point to recover from and type of
recovery.

82
Using Web Interface > Backup Storage Tab

Select a location, then select


backup > Show backups to view
available recovery points for
recovery

#CyberFit Academy

If you go to Backup Storage, select a location first, then select Recovery menu.

After that select backup, Show backups to view available recovery points for recovery.

83
Using Web Interface

To perform recovery using web interface, select backup


to recover from via Devices or Backup Storage tab:
• Devices tab: Select backed up machine/device/data from built-in
or custom group under Devices tab to recover from
• Backup storage tab: Select location to recover from
• Browse for available Recovery points (backups) and:
• Select type of data to recover:
• Entire machine: Disk-level recovery (for physical machines and
VMs)
• Files/folders, SQL/Exchange databases, M365 data, Google
Workspace data: File-level recovery
• Use Instant Restore (if available)

#CyberFit Academy

Let`s walk you through the process of performing a recovery using the web interface,
focusing on selecting the appropriate backup and the type of data you wish to recover.
Start by accessing the web interface and navigating to either the 'Devices' or 'Backup
Storage' tab, depending on where your backup is located. If you're using the 'Devices'
tab, you'll find your backed‐up machines, devices, or data listed under built‐in or
custom groups. This is where you select the source you intend to recover from.
Alternatively, under the 'Backup Storage' tab, you'll select the specific location of your
backup. Once you've located your backup, browse through the available recovery
points to find the one you need.
Next, you'll decide on the type of data recovery required. For a comprehensive disk‐
level recovery, suitable for both physical machines and VMs, select 'Entire machine'. If
you're looking to recover more specific data, like files/folders, SQL/Exchange
databases, Microsoft 365 data, or Google Workspace data, you'll opt for file‐level
recovery.

For an even quicker recovery process, take advantage of the 'Instant Restore' feature
if it's available for your backup. This option allows you to rapidly get your system or
data back online with minimal downtime.

84
Disk-Level Recovery

Choose to Recover to Physical or Virtual


machine, Target machine to recover to,
Disk or Volume mapping and Recovery
options

#CyberFit Academy

For Disk level recovery, go to All Devices, Select a workload, then Recovery menu.

Choose Target machine to recover to, Disk or Volume mapping, and Recovery options.
.

85
File-Level Recovery

Search for files/folders/databases to


recover

Expand to browse for files/folders/databases to


recover

Browse for available


recovery points

#CyberFit Academy

For File level recovery, you can use these options.

Browse for available recovery points.

Search for files/folders/databases to recover.

Or Expand to browse for files/folders/databases to recover.

86
File-Level Recovery

Choose Original location or


Custom location and recovery
options

#CyberFit Academy

Then, Choose Original location or Custom location and recovery options.

87
Creating the Recovery Task

After selecting type of data to recover

• For disk-level recovery, Recover to Physical or Virtual machine,


Target machine to recover to, Disk or Volume mapping and
Recovery options can be configured
• For file-level recovery, browse or search for the data to be
recovered and recovery can be to Original or Custom location1 or
downloaded/recovered as files
After creating the Recovery task, it will be executed immediately
1Depending on the type of data being recovered, additional options may be available for the Recovery task, e.g., Target instance
and State

#CyberFit Academy

After selecting type of data to recover, For disk-level recovery, Recover to


Physical or Virtual machine, Target machine to recover to, Disk or Volume
mapping and Recovery options can be configured.
For file-level recovery, browse or search for the data to be recovered and
recovery can be to Original or Custom location1 or downloaded/recovered
as files.
After creating the Recovery task, it will be executed immediately.

88
Recovering as Virtual Machine
In Backup Console, disk-level backups (Entire
machine, Disks/volumes) of physical machines can
be recovered to:
• Physical machine (original)
• Virtual machine (convert to VM)
• Agent will automatically map the disks from the backup
to the target machine. Alternatively, click DISK
MAPPING to manually map the disk(s) for recovery
• Recovery of OS requires a reboot and machine will
come online automatically
If recovering to Virtual machine (convert to VM):
• VMware vSphere Hypervisor or Hyper-V can be selected as the target
machine and Datastore for vSphere Hypervisor or Path for Hyper-V can be
configured as well as VM SETTINGS such as Memory, Virtual processors and
Network adapters

#CyberFit Academy

You can also recover as Virtual Machine.

In Backup Console, disk‐level backups of physical machines can be recovered to


Physical machine and Virtual machine.
Agent will automatically map the disks from the backup to the target machine. Or
manually map the disks.
Recovery of OS requires a reboot.

If recovering to Virtual machine, VMware vSphere Hypervisor or Hyper‐V can be


selected as the target machine, and Datastore for vSphere Hypervisor or Path for
Hyper‐V can be configured as well as VM SETTINGS such as Memory, Virtual
processors and Network adapters.

89
Recovering as Virtual Machine
The following settings are available when
configuring recovery to virtual machine:

• By default, the same VM will be selected for recovery


• To change to a different VM (same or different platform),
click TARGET MACHINE and select VMware vSphere
Hypervisor, Hyper-V or Virtuozzo, requires respective
Agent
• Datastore and Path settings can be configured as well as
VM SETTINGS
• VM will be stopped during recovery and has to be
manually started after recovery. Alternatively, use
Recovery options > VM power management to
automatically start the VM

#CyberFit Academy

The following settings are available when configuring recovery to virtual machine.
To change to a different VM, click TARGET MACHINE and select VMware vSphere
Hypervisor, Hyper‐V or Virtuozzo, requires respective Agent.
Datastore and Path settings can be configured as well as VM SETTINGS.

VM will be stopped during recovery and has to be manually started after recovery.
Alternatively, use Recovery options, then VM power management to automatically
start the VM.

90
Startup Recovery Manager (SRM)
Bootable Component Resides On Hard Drive
• Bootable rescue utility without separate bootable media
• Failure occurs:
• Reboot machine and wait for prompt
• Press F11 for Startup Recovery Manager to appear then press F11 again
• Program starts and perform recovery
• GRUB boot loader installed: select Startup Recovery from boot menu instead of F11 during reboot
• Non-encrypted volume: need 100MB+ free space. Recovery requiring restart additional 100MB
• System volume with BitLocker-Encrypted
• At least one non-encrypted volume on same machine and that volume needs 500MB+ free space.
Recovery requiring restart additional 500MB
• Unless you use GRUB boot loader and installed on Master Boot Record (MBR)
• SRM activation overwrites MBR with own code before starting SRM. Otherwise: reconfigure boot
loader manually after activation.

#CyberFit Academy

Startup Recovery Manager is for Bootable rescue utility without separate bootable
media.
If Failure occurs, Reboot machine and wait for prompt, and Press F11 for Startup
Recovery Manager to appear then press F11 again, and Program starts and perform
recovery.
If GRUB boot loader installed, select Startup Recovery from boot menu instead of F11
during reboot.
Non‐encrypted volume needs 100MB+ free space.
System volume with BitLocker‐Encrypted, At least one non‐encrypted volume on
same machine and that volume needs 500MB+ free space.
Unless you use GRUB boot loader and installed on MBR, SRM activation overwrites
MBR with own code before starting SRM. Otherwise: reconfigure boot loader
manually after activation.
Startup Recovery Manager is typically used along with a full backup in the “Secure
Zone” on the same disk drive. It should only be used if you are replicating the
backups to another location. This way if the drive fails, the Secure Zone is on the
same hard drive, they would not have a backup at all.

91
Startup Recovery Manager (SRM)

Activating SRM with Agent

• Windows or Linux
• Select machine in service console
(click “Details” and activate SRM)
• Click Details
• Enable Startup Recovery Manager
switch
• Software activates SRM

#CyberFit Academy

You will see that for Windows or Linux you would select the machine and click details.
There is a toggle button to turn on the startup recovery manager.

92
Startup Recovery Manager (SRM)

Activating SRM Without Agent

• Boot machine from bootable media


• Click Tools > Activate Startup Recovery Manager
• Software activates SRM
• NOTE: to deactivate SRM
• Repeat activation procedures and select respective
opposite actions
• Deactivation disables boot-time prompt “Press F11 for
Startup Recovery Manager” (or menu item in GRUB)

#CyberFit Academy

If the machine does NOT have an agent, you would boot the machine from bootable
media and then look for Tools, and activate the startup recovery manager.

If you want to deactivate startup recovery manager, go through activation procedures


but to the opposite actions. When deactivation, it disables boot‐time prompt “Press
F11 for Startup Recovery Manager”.

93
Cyber Protect Cloud
Universal Restore & Bootable
Media

#CyberFit Academy

Now it’s time to go through the Universal restore & bootable media.

94
Acronis Bootable Media
Bootable media a.k.a. Rescue Media is used for booting up the hardware
of a physical or virtual machine used for bare metal recovery

Linux-based WinPE-based Mac-based

Can be downloaded as ISO from Requires installation of Bootable Create using Rescue Media
Cyber Protection service Media Builder from Acronis Builder that’s included with
console, used for recovering Cyber Protect installer Agent for Mac, used for
Windows and Linux machines (https://kb.acronis.com/content/59611)
recovering macOS machines

and other files, used when


Linux-based media is unable to
detect disks, network adapters
or other hardware of the
recovery machine

#CyberFit Academy

Bootable media is used for booting up the hardware of a physical or virtual machine
used for bare metal recovery.

There are three types of bootable medias.

First, Linux‐based media can be downloaded as ISO from Cyber Protection service
console, and is used for recovering Windows and Linux machines.

Second, Windows PE‐based media requires installation of Bootable Media Builder


from Acronis Cyber Protect installer.

Third, Mac‐based media is created by using Rescue Media Builder that’s included with
Agent for Mac, used for recovering macOS machines.

95
Universal Restore

Acronis proprietary technology that enables:

• Bare metal recovery of Windows or Linux-based systems to dissimilar


hardware
• P2P, P2V, P2C, V2V, V2P, V2C, C2C, C2P, C2V migrations
• Hardware independent deployment of supported OS
• Works by swapping required systems drivers for OS startup in
the recovered OS to match the hardware of the machine used for
recovery
• Available as Apply Universal Restore in bootable Agent on
bootable media
• Universal Restore can be performed multiple times without
having to perform recovery repeatedly

#CyberFit Academy

Universal Restore is Acronis proprietary technology that enables bare metal recovery
of Windows or Linux‐based systems to dissimilar hardware, P2P, P2V, P2C, migrations,
hardware independent deployment of supported OS.

It works by swapping required systems drivers for OS startup in the recovered OS to


match the hardware of the machine used for recovery. And Available as Apply
Universal Restore in bootable Agent on bootable media.

It can be performed multiple times without having to perform recovery repeatedly.

96
Universal Restore in Windows Windows

The following locations will be scanned recursively when using


Automatic driver search for suitable drivers:

• Windows default driver folder in the recovered OS – make sure OS is


detected when using Apply Universal Restore for the 1st time after bare
metal recovery
• Removable media, network folders or other folders – If Windows default
driver folder doesn’t contain suitable drivers, i.e., OS startup fails after
Apply Universal Restore, download drivers (HDD controller and chipset)
from vendor website and place them in any of the above locations
• Drivers have to be provided as .inf files, extract them from .exe, .cab or .zip
using a 3rd party app if they are downloaded as such

#CyberFit Academy

When you use Universal Restore in Windows, The following locations will be scanned
recursively when using Automatic driver search for suitable drivers.
One is Windows default driver folder in the recovered OS, the other is Removable
media, network folders or other folders.
Drivers have to be provided as .inf files, extract them from .exe, .cab or .zip using a
3rd party app if they are downloaded as such.

97
Universal Restore in Windows Windows

Mass storage drivers to install anyway:

• Used when Automatic driver search cannot locate suitable drivers in any
of the locations that were specified
• If a specific mass storage controller such as RAID or fiber channel
adapter is required
• Be careful with specifying Mass storage drivers to install anyway as
mistakes will render the recovered OS inoperable and you will have to
redo the bare metal recovery
If Universal Restore cannot find a compatible driver in the specified
locations, it will display a prompt about the problem device; choose either to
Ignore or Retry after adding drivers to specified locations to be searched

#CyberFit Academy

Mass storage drivers to install anyway. It’s used when Automatic driver search
cannot locate suitable drivers in any of the locations that were specified. If a
specific mass storage controller such as RAID or fiber channel adapter is required.
Be careful with specifying Mass storage drivers to install anyway as mistakes will
render the recovered OS inoperable and you will have to redo the bare metal
recovery.

If Universal Restore cannot find a compatible driver in the specified locations, it


will display a prompt about the problem device; choose either to Ignore or Retry
after adding drivers to specified locations to be searched.

98
Universal Restore in Linux Linux
OS

Universal Restore can be used for Linux OS


with kernel version 2.6.8 or above
• When working in Linux, Universal Restore updates the initial RAM disk
(initrd):
• Adds modules for new hardware to initrd
• Search for necessary modules in /lib/modules
• If required modules cannot be found, records the module’s name into the
log
• Original initrd is not modified and a copy is saved to the same directory
with the same filename followed by _acronis_backup.img and can be
reverted to if necessary
• Universal Restore may modify the configuration of the GRUB loader to
ensure system bootability but will never modify the Linux kernel

#CyberFit Academy

Universal Restore can be used for Linux OS with kernel version 2.6.8 or above.
When working in Linux, Universal Restore updates the initial RAM disk, which is initrd
by
Adding modules for new hardware to initrd,
Searching for necessary modules in /lib/modules.
If required modules cannot be found, records the module’s name into the log.
Original initrd is not modified and a copy is saved to the same directory with the
same filename followed by _acronis_backup.img and can be reverted to if necessary.
Universal Restore may modify the configuration of the GRUB loader to ensure system
bootability but will never modify the Linux kernel.

99
Using Bootable Media
• Download Boot Media as ISO
• Use Boot Media Builder
• Install via local Agent for Windows

#CyberFit Academy

If you want to use bootable media,

Download Boot Media as ISO, or Use Boot Media Builder which you can Install via
local Agent for Windows

100
Using Bootable Media

#CyberFit Academy

From here, let’s take a look at how to create a bootable media. You first launch
Bootable media builder.

101
Using Bootable Media

#CyberFit Academy

In this screen, select the bootable media type to create, either Linux‐like or Windows‐
like.

102
Using Bootable Media

#CyberFit Academy

Next, select the components to place on the bootable media. You can select Cyber
Protect.

103
Using Bootable Media

#CyberFit Academy

And the menu of “Use the following script”. And in this example, selecting “Recovery
from the cloud storage”.

104
Using Bootable Media

#CyberFit Academy

Next, review the options and change the settings if necessary.


In this example, you select “Bootable media registration” and tick the menu of
“Register the bootable media automatically”.

105
Using Bootable Media

#CyberFit Academy

This is the process that I have described so far. Let’s take a quick second look at it.

106
Using Bootable Media

#CyberFit Academy

Going forward, select the media output, and select the bootable media type to create.
This time, select “Create Windows RE based media”.

107
Using Bootable Media

Boot from bootable


media

#CyberFit Academy

Next, select “Rescue Media” to boot from bootable media.

108
Using Bootable Media

Start bootable agent

#CyberFit Academy

Then Select the menu of “Manage this machine locally” to start bootable agent.

109
Using Bootable Media

Configure recovery
task

#CyberFit Academy

Select “Recover” to configure recovery task

110
Using Bootable Media

Select what to recover

#CyberFit Academy

Once you done Click “Select Data” menu to select what to recover.

111
Using Bootable Media

Browse for
Location

#CyberFit Academy

Next, browse to select where the backup data is located.

112
Apply Universal Restore

1. Click Apply Universal Restore under


Actions section of the Bootable Media
2. If recovered disk has several OS, click
Select… and choose the OS to apply
Universal Restore to
3. [Optional] Click Add folder to add network
folders to search for suitable drivers
4. [Optional] If specific mass storage drivers
such as RAID is required, click Add driver
and browse to location where the drivers
are located

#CyberFit Academy

If you want to apply universal restore function, here are the steps.

1. Click Apply Universal Restore under Actions section of the Bootable Media
2. If recovered disk has several OS, click Select… and choose the OS to apply
Universal Restore to

113
Using Bootable Media

After selecting location and backup to recover from:

• Select 1 or more disks/volumes and MBR to recover


• Configure Where/How to recover selected disks/volumes
• Start recovery
• Bootable agent will start the recover immediately and after
recovery is complete, reboot or perform Apply Universal
Restore if recovering to dissimilar hardware

#CyberFit Academy

After selecting location and backup to recover from.


Select 1 or more disks/volumes and MBR to recover.
Configure Where/How to recover selected disks/volumes.
And Start recovery.
Bootable agent will start the recover immediately and after recovery
completes, reboot or perform Apply Universal Restore if recovering to
dissimilar hardware.

114
Section Summary

1 A default Bootmedia is available as ISO file download from


the console

Default Bootmedia is based on CentOS (Linux)


2 Bootmedia Builder must be installed separate with the
Agent installer

3 With Bootmedia Builder you can create your own pre-


configured boot media, even based on Windows PE

#CyberFit Academy

In this section, we've delved into the essentials of recovery boot media within the
Acronis framework. Let's summarize the key takeaways:
Firstly, Acronis provides a default boot media, readily available as an ISO file that can
be downloaded directly from the console. This default boot media is built on CentOS,
a Linux‐based operating system, ensuring compatibility and reliability for recovery
operations.
For those with specific requirements or preferences, Acronis introduces the
Bootmedia Builder. This tool, which needs to be installed separately from the Agent
installer, offers the flexibility to customize your boot media. It goes a step further by
allowing the creation of pre‐configured boot media based on Windows PE, catering to
environments that rely on Windows ecosystems.
Through these options, Acronis empowers users with the tools to efficiently manage
system recoveries, providing both standard and customizable solutions to meet
diverse recovery needs.

115
Cyber Protect Cloud
Acronis Instant Restore

#CyberFit Academy

And now let me take you to another unique feature called Instant Restore.

116
Acronis Instant Restore

Disk-level backups containing an O/S can be “Run as VM” for


quick recovery:
• Temporary VM created and virtual disks are emulated from backup and linked
to temporary VM
• Can be deleted (all changes discarded) or Finalized (converted) as a regular
VM without downtime
• Can be used for:
• Disaster recovery: Instantly bring a copy of a failed machine online
• Testing of backups: Run machine from backup to ensure guest O/S is
functioning
• Accessing application data: Extracting application data using native tools
• Plan

#CyberFit Academy

Acronis instant restore will create a temporary virtual machine and virtual disks get
emulated from a backup and those backups are linked to a temporary Virtual
machine.

When converted, they can be deleted or finalized like a regular virtual machine.

This is great for testing of backups where one is running a backup to ensure the guest
OS is functioning, a quick disaster recovery method to bring a copy of a failed
machine online very quickly as well as extracting application data using native tools.

117
Acronis Instant Restore

Pre-requisites:

• Requires Agent for VMware or Agent for Hyper-V and corresponding host
• Agent for VMware/Hyper-V must be able to access the backup file:
• Backups stored on SFTP and Secure Zone are not supported
• Backups must contain entire machine or all volumes required for O/S to start
• Backups of physical and virtual machines except for Virtuozzo containers
• Backups that contain Linux LVM must be created by Agent for VMware or
Hyper-V and the same type of Agent must be used for Run as VM

#CyberFit Academy

Acronis instant restore requires the agent of either VMWare or Hyper‐V and the
corresponding host and the agent must be able to access the backup file.
If the backups are stored in SFTP or a Secure Zone, they are not supported.
They must contain the entire machines or all volumes required for OS to start.

Virtuozzo container backups not supported.

If a backup contains Linux LVM, it must be created by the agent for VMWare or
Hyper‐V and the same type of agent must be used for “Run as VM”.

118
Cyber Protect Cloud
How To use Acronis Instant Restore (Run as VM)

#CyberFit Academy

And after this quick review, let me tell you more about How to use Acronis Instant
Restore, Run as VM

119
Instant Restore (Run as VM)

#CyberFit Academy

Firstly, you can select all devices.

120
Instant Restore (Run as VM)

Select machine from


appropriate Devices built-
in/custom group, click
Recovery, then select Backup
location and recovery point to
Run as VM

#CyberFit Academy

Then, Select machine from appropriate Devices built‐in/custom group, click Recovery,
then select Backup location and recovery point to Run as VM.

121
Instant Restore (Run as VM)

Select VMware or Hyper-


V host for Run as VM

#CyberFit Academy

Select VMware or Hyper-V host for Run as VM.

122
Instant Restore (Run as VM)

Configure Run as VM
settings

#CyberFit Academy

Configure Run as VM settings.

123
Instant Restore (Run as VM)

Finalize temporary VM

Temporary VM

#CyberFit Academy

If you want to finalize it, select Run as VM machine in device menu, and use Finalize
function shown at the right side of console.

124
Instant Restore (Run as VM)

To perform Run as VM, select Backup from Devices


or Backup Storage Tab:

• Select whether to use VMware vSphere Hypervisor or Microsoft Hyper-V


to host the temporary VM
• Configure Run as VM settings such as storage to use, VM settings and
Power state
• After the temporary VM has spun up, it will appear in the service console:
• If connection to agent or backup location is lost, the temporary VM will
become unusable
• Select Finalize to convert it to a regular VM after which it can be backed
up and the backup created can be used for recovery
• Alternatively, select Delete to delete the temporary VM

#CyberFit Academy

In this quick guide, we're exploring Acronis's Instant Restore feature, specifically the
'Run as VM' option, which allows for rapid system recovery. Here's how to use it:

Select Your Backup: Navigate to either the 'Devices' or 'Backup Storage' tab to choose
your backup source.
Choose the Host: Decide whether to run the temporary VM on VMware vSphere
Hypervisor or Microsoft Hyper‐V.
Configure Settings: Set up the 'Run as VM' options, including storage, VM settings,
and power state.
Operationalize the VM: Once the VM is up, it's visible in the service console. Keep in
mind, if the connection drops, the VM becomes unusable.
Final Steps: You can either finalize the VM, making it a regular, backup‐able VM, or
delete it if it's no longer needed.
'Run as VM' offers a streamlined path to get systems back online swiftly, ensuring
business continuity with minimal downtime.

125
Instant Restore (Run as VM)

#CyberFit Academy

Here you can see a screen shot of ESXi host.

126
Instant Restore (Run as VM)

#CyberFit Academy

And this is the screen shot of Run As VM machine.

127
Section Summary

1 Instant Restore is a unique feature and enables you


to recover a complete system within seconds

It can be used for testing. It is already a kind of local


2 Disaster Recovery

Only VMware and Hyper-V are supported. Backup


3 can be even in the cloud

#CyberFit Academy

Quick recap of the last section.

Instant Restore is a unique feature and enables you to recover a complete system
within seconds.

It can be used for testing. It is already a kind of local Disaster Recovery.

Only VMware and Hyper‐V is supported. Backup can be even in the cloud.

128
Advanced Automation
What`s Next

Acronis Academy

So we are at the end of our course. What comes next?

130
Review the Materials

Download and review


the course materials

Re-watch the videos


as many times as
you’d like

Acronis Academy

Feel free to come back to watch sections of this video as often as needed. Please be
sure to download any PDF’s attached to this course for reference material and to
assist with the exam.

131
Take your test

Assessment:

20 MCQ Quiz

60 Min Working
Time

70% Passing
Grade
2 Attempts,
Open Book

Acronis Academy

There will be 20 questions for the exam and all the answers are within any PDF's
attached in the course.
You will have one hour, need a 70% passing grade and remember two attempts and
open book (the PDF’s are searchable so Control “F” is your best friend).

132
Thank you for watching!

Acronis Academy

And with that I like to thank you for attending the Cloud Tech Associate Advanced
Backup course and hope this helped and wish you great success with Acronis Cyber
Protect Cloud.

133

You might also like