Glossary


Acronis Active Restore

The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background. Limitations:

  • the backup must be located on the local drive (any device available through the BIOS except for network boot)
  • does not work with Linux images.


Acronis Plug-in for WinPE

A modification of Acronis Backup & Recovery 10 Agent for Windows that can run in the preinstallation environment. The plug-in can be added to a WinPE image using Bootable Media Builder. The resulting bootable media can be used to boot any PC-compatible machine and perform, with certain limitations, most of the direct management operations without help of an operating system. Operations can be configured and controlled either locally through the GUI or remotely using the console.


Acronis Secure Zone

A secure volume for storing backup archives within a managed machine. Advantages:

  • enables recovery of a disk to the same disk where the disk’s backup resides
  • offers a cost-effective and handy method for protecting data from software malfunction, virus attack, operator error
  • eliminates the need for a separate media or network connection to back up or recover the data. This is especially useful for mobile users
  • can serve as the primary location for dual destination backup.

Limitations: Acronis Secure Zone cannot be organized on a dynamic disk or a disk using the GPT partitioning style. Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recovery Manager.

Acronis Secure Zone is considered as a personal vault.


Acronis Startup Recovery Manager (ASRM)

A modification of the bootable agent, residing on the system disk and configured to start at boot time when F11 is pressed. Acronis Startup Recovery Manager eliminates the need for rescue media or network connection to start the bootable rescue utility.

Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt “Press F11 for Acronis Startup Recovery Manager…” and performs data recovery in the same way as with ordinary bootable media.

Limitation: requires re-activation of loaders other than Windows loaders and GRUB.


Agent (Acronis Backup & Recovery 10 Agent)

An application that performs data backup and recovery and enables other management operations on the machine, such as task management and operations with hard disks.

The type of data that can be backed up depends on the agent type. Acronis Backup & Recovery 10 includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.


Agent-side cleanup

Cleanup performed by an agent according to the backup plan that produces the archive. Agent-side cleanup is performed in unmanaged vaults.


Agent-side validation

Validation performed by an agent according to the backup plan that produces the archive. Agent-side validation is performed in unmanaged vaults.


Archive

See Backup archive.


Backup

The result of a single backup operation. Physically, it is a file or a tape record that contains a copy of the backed up data as of specific date and time. Backup files created by Acronis Backup & Recovery 10 have a TIB extension. The TIB files resulting from backup consolidation are also called backups.


Backup archive (Archive)

A set of backups created and managed by a backup plan. An archive can contain multiple full backups as well as incremental and differential backups. Backups belonging to the same archive are always stored in the same location. Multiple backup plans can back up the same source to the same archive, but the mainstream scenario is “one plan – one archive”.

Backups in an archive are entirely managed by the backup plan. Manual operations with archives (validation, viewing contents, mounting and deleting backups) should be performed using Acronis Backup & Recovery 10. Do not modify your archives using non-Acronis tools such as Windows Explorer or third-party file managers.


Backup operation

An operation that creates a copy of the data that exists on a machine’s hard disk for the purpose of recovering or reverting the data to a specified date and time.


Backup options

Configuration parameters of a backup operation, such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan.


Backup plan (Plan)

A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies:

For example, a backup plan can contain the following information:

  • back up volume C: (this is the data the plan will protect)
  • name the archive MySystemVolume and place it to \\server\backups\ (this is the backup archive name and location)
  • perform full backup monthly on the last day of the month at 10:00AM and incremental backup on Sundays at 10:00PM. Delete backups that are older than 3 months (this is a backup scheme)
  • validate the last backup immediately after its creation (this is a validation rule)
  • protect the archive with a password (this is an option).

Physically, a backup plan is a bundle of tasks configured for execution on a managed machine.

A backup plan can be created directly on the machine (local plan) or appears on the machine as a result of a backup policy deployment (centralized plan).


Backup policy (Policy)

A backup plan template created by the management server administrator and stored on the management server. A backup policy contains the same rules as a backup plan, but might not explicitly specify what data items to back up. Instead, selection rules, such as environment variables, can be used. Because of this flexible selection, a backup policy can be centrally applied to multiple machines. If a data item is specified explicitly (e.g. /dev/sda or C:\Windows), the policy will back up this item on each machine where this exact path is found.

By applying a policy to a group of machines, the administrator deploys multiple backup plans with a single action.

The workflow when using policies is as follows.

  1. The administrator creates a backup policy.
  2. The administrator applies the policy to a group of machines or a single machine.
  3. The management server deploys the policy to the machines.
  4. On each machine, the agent installed on the machine finds data items using the selection rules. For example, if the selection rule is [All volumes], the entire machine will be backed up.
  5. On each machine, the agent installed on the machine creates a backup plan using other rules specified by the policy. Such backup plan is called a centralized plan.
  6. On each machine, the agent installed on the machine creates a set of centralized tasks that will carry out the plan.


Backup scheme

A part of t
he backup plan that includes the backup schedule and [optionally] the retention rules and the cleanup schedule. For example: perform full backup monthly on the last day of the month at 10:00AM and incremental backup on Sundays at 10:00PM. Delete backups that are older than 3 months. Check for such backups every time the backup operation is completed.

Acronis Backup & Recovery 10 provides the ability to use well-known optimized backup schemes, such as GFS and Tower of Hanoi, to create a custom backup scheme or back up data once.


Bootable agent

A bootable rescue utility that includes most of the functionality of the Acronis Backup & Recovery 10 Agent. Bootable agent is based on Linux kernel. A machine can be booted into a bootable agent using either bootable media or Acronis PXE Server. Operations can be configured and controlled either locally through the GUI or remotely using the console.


Bootable media

A physical media (CD, DVD, USB flash drive or other media supported by a machine BIOS as a boot device) that contains the bootable agent or Windows Preinstallation Environment (WinPE) with the Acronis Plug-in for WinPE. A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Microsoft Remote Installation Service (RIS). These servers with uploaded bootable components can also be thought of as a kind of bootable media.

Bootable media is most often used to:

  • recover an operating system that cannot start
  • access and back up the data that has survived in a corrupted system
  • deploy an operating system on bare metal
  • create basic or dynamic volumes on bare metal
  • back up sector-by-sector a disk that has an unsupported file system
  • back up offline any data that cannot be backed up online because of restricted access, being permanently locked by the running applications or for any other reason.


Built-in group

A group of machines that always exists on a management server.

A management server has two built-in groups that contain all machines of each type: All physical machines, All virtual machines.

Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a physical machine from the built-in group except for removing the machine from the management server. Virtual machines are removed as a result of their host server removal.

A backup policy can be applied to a built-in group.


Centralized backup plan

A backup plan that appears on the managed machine as a result of deploying a backup policy from the management server. Such plan can be modified only by editing the backup policy.


Centralized management

Management of the Acronis Backup & Recovery 10 infrastructure through a central management unit known as Acronis Backup & Recovery 10 Management Server. The centralized management operations include:


Centralized task

A task belonging to a centralized backup plan. Such task appears on the managed machine as a result of deploying a backup policy from the management server and can be modified only by editing the backup policy.


Centralized vault

A networked location allotted by the management server administrator to serve as storage for the backup archives. A centralized vault can be managed by a storage node or be unmanaged. The total number and size of archives stored in a centralized vault are limited by the storage size only.

As soon as the management server administrator creates a centralized vault, the vault name and path to the vault are distributed to all machines registered on the server. The shortcut to the vault appears on the machines in the Centralized vaults list. Any backup plan existing on the machines, including local plans, can use the centralized vault.

On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user’s archives will be managed by the storage node as well as other archives stored in the vault.


Cleanup

Deleting backups from a backup archive in order to get rid of outdated backups or prevent the archive from exceeding the desired size.

Cleanup consists in applying to an archive the retention rules set by the backup plan that produces the archive. This operation checks if the archive has exceeded its maximum size and/or for expired backups. This may or may not result in deleting backups depending on whether the retention rules are violated or not.

For more information please refer to Retention rules.


Console (Acronis Backup & Recovery 10 Management Console)

A tool for remote or local access to Acronis agents and Acronis Backup & Recovery 10 Management Server.

Having connected the console to the management server, the administrator sets up and manages backup policies and accesses other management server functionality, that is, performs centralized management. Using the direct console-agent connection, the administrator performs direct management.


Consolidation

Combining two or more subsequent backups belonging to the same archive into a single backup.

Consolidation might be needed when deleting backups, either manually or during cleanup. For example, the retention rules require to delete a full backup that has expired but retain the next incremental one. The backups will be combined into a single full backup which will be dated with the incremental backup’s date. Since consolidation may take a lot of time and system resources, retention rules provide an option to not delete backups with dependencies. In our example, the full backup will be retained until the incremental one also becomes obsolete. Then both backups will be deleted.


Deduplicating vault

A managed vault in which deduplication is enabled.


Deduplication

A method of storing different duplicates of the same information only once.

Acronis Backup & Recovery 10 can apply the deduplication technology to backup archives stored on storage nodes. This minimizes storage space taken by the archives, backup traffic and network usage during backup.


Differential backup

A differential backup stores changes to the data against the latest full backup. You need access to the corresponding full backup to recover the data from a differential backup.


Direct management

Any management operation that is performed on a managed machine using the direct console-agent connection (as opposed to centralized management when the operations are configured on the management server and propagated by the server to the managed machines).

The direct management operations include:

  • creating and managing local backup plans
  • creating and managing local tasks, such as recovery tasks
  • creating and managing personal vaults and archives stored there
  • viewing the state, progress and properties of the centralized tasks existing on the machine
  • viewing and managing the log of the agent’s operations
  • disk management operations, such as clone a disk, create volume, convert volume.

A kind of direct management is performed when using bootable media. Some of the direct management operations can also be performed via the management server GUI. This presumes, however, either an explicit or an implicit direct connection to the selected machine.


Disk backup (Image)

A backup that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup & Recovery 10 provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.


Disk group

A number of dynamic disks that store the common configuration data in their LDM databases and therefore can be managed as a whole. Normally, all dynamic disks created within the same machine are members of the same disk group.

As soon as the first dynamic disk is created by the LDM or another disk management tool, the disk group name can be found in the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmio\Boot Info\Primary Disk Group\Name.

The next created or imported disks are added to the same disk group. The group exists until at least one of its members exists. Once the last dynamic disk is disconnected or converted to basic, the group is discontinued, though its name is kept in the above registry key. In case a dynamic disk is created or connected again, a disk group with an incremental name is created.

When moved to another machine, a disk group is considered as ‘foreign’ and cannot be used until imported into the existing disk group. The import updates the configuration data on both the local and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine.

For more information about disk groups please refer to the following Microsoft knowledge base article:

222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/


Dynamic disk

A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, better performance or larger volume size.

A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the dynamic volumes’ configuration. Each dynamic disk holds the complete information about all dynamic volumes existing in the disk group which makes for better storage reliability. The database occupies the last 1MB of an MBR disk. On a GPT disk, Windows creates the dedicated LDM Metadata partition, taking space from the Microsoft Reserved Partition (MSR.)

Disk 1

MBR

 

LDM
database

 

 

 

 

Acronis Backup & Recovery 2674 Glossary
1 MB

Disk 2

Protec-tive
MBR

GPT

Microsoft
Reserved
Partition (MSR)

LDM
database

 

 

GPT

 

 

 

 

LDM Metadata
partition
Acronis Backup & Recovery 2674 Glossary
1 MB

 

 

Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks.

For more information about dynamic disks please refer to the following Microsoft knowledge base articles:

Disk Management (Windows XP Professional Resource Kit) http://technet.microsoft.com/en-us/library/bb457110.aspx

816307 Best practices for using dynamic disks on Windows Server 2003-based computers http://support.microsoft.com/kb/816307


Dynamic group

A group of machines which is populated automatically by the management server according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers the following membership criteria:

  • Operating system
  • Active Directory organization unit
  • IP address range.

A machine remains in a dynamic group as long as the machine meets the group’s criteria. The machine is removed from the group automatically as soon as

  • the machine’s properties change so that the machine does not meet the criteria anymore OR
  • the administrator changes the criteria so that the machine does not meet them anymore.

There is no way to remove a machine from a dynamic group manually except for deleting the machine from the management server.


Dynamic volume

Any volume located on dynamic disks, or more precisely, on a disk group. Dynamic volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired goal:

  • to increase the volume size (a spanned volume)
  • to reduce the access time (a striped volume)
  • to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.)


Encrypted archive

A backup archive encrypted according to the Advanced Encryption Standard (AES). When the encryption option and a password for the archive are set in the backup options, each backup belonging to the archive is encrypted by the agent before saving the backup to its destination.

The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly generated key with a user-defined size of 128, 192 or 256 bits. The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the disk or in the backup file; the password hash is used for verification purposes. With this two-level security, the backup data is protected from any unauthorized access, but recovering a lost password is not possible.


Encrypted vault

A managed vault to which anything written is encrypted and anything read is decrypted transparently by the storage node, using a vault-specific encryption key stored on the node. In case the storage medium is stolen or accessed by an unauthorized person, the malefactor will not be able to decrypt the vault contents without access to the storage node. Encrypted archives will be encrypted over the encryption performed by the agent.


Export

An operation that creates a copy of an archive or a self-sufficient part copy of an archive in the location you specify. The export operation can be applied to a single archive, a single backup or to your choice of backups belonging to the same archive. An entire vault can be exported by using the command line interface.


Full backup

A self-sufficient backup containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup.


GFS (Grandfather-Father-Son)

A popular backup scheme aimed to maintain the optimal balance between a backup archive size and the number of recovery points available from the archive. GFS enables recovering with daily resolution for the last several days, weekly resolution for the last several weeks and monthly resolution for any time in the past.

For more information please refer to GFS backup scheme.


Image

The same as Disk backup.


Incremental backup

A backup that stores changes to the data against the latest backup. You need access to other backups from the same archive to restore data from an incremental backup.


Local backup plan

A backup plan created on a managed machine using direct management.


Local task

A task belonging to a local backup plan or a task that does not belong to any plan, such as a recovery task. A local task belonging to a backup plan can be modified by editing the plan only; other local tasks can be modified directly.


Machine

A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines.


Managed machine

A machine, either physical or virtual, where at least one Acronis Backup & Recovery 10 Agent is installed.


Managed vault

A centralized vault managed by a storage node. Archives in a managed vault can be accessed as follows:

bsp://node_address/vault_name/archive_name/

Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs storage node-side cleanup and storage node-side validation for each archive stored in the managed vault. An administrator can specify additional operations that the storage node will perform (deduplication, encryption).

Any managed vault is self-contained, that is, contains all metadata the storage node needs to manage the vault. In case the storage node is lost or its database is corrupted, the new storage node retrieves the metadata and re-creates the database. When the vault is attached to another storage node, the same procedure takes place.


Management server (Acronis Backup & Recovery 10 Management Server)

A central server that drives data protection within the enterprise network. Acronis Backup & Recovery 10 Management Server provides the administrator with:

If there are multiple management servers on the network, they operate independently, manage different machines and use different centralized vaults for storing archives.


Media builder

A dedicated tool for creating bootable media.


Personal vault

A local or networked vault created using direct management. Once a personal vault is created, a shortcut to it appears under the Personal vaults item of the Navigation pane. Multiple machines can use the same physical location; for example, a network share; as a personal vault.


Physical machine

On Acronis Backup & Recovery 10 Management Server, a physical machine is the same as a registered machine. A virtual machine is considered physical if an Acronis Backup & Recovery 10 agent is installed on the machine and the machine is registered on the management server.


Plan

See Backup plan.


Policy

See Backup policy.


Recovery point

Date and time to which the backed up data can be reverted to.


Registered machine

A machine managed by a management server. A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration procedure.


Registration

A procedure that adds a managed machine to a management server.

Registration sets up a trust relationship between the agent residing on the machine and the server. During registration, the console retrieves the management server’s client certificate and passes it to the agent which uses it later to authenticate clients attempting to connect. This helps prevent any attempts by network attackers from establishing a fake connection on behalf of a trusted principal (the management server).


Selection rule

A part of the backup policy. Enables the management server administrator to select the data to back up within a machine.


Static group

A group of machines which a management server administrator populates by manually adding machines to the group. A machine remains in a static group until the administrator removes it from the group or from the management server.


Storage node (Acronis Backup & Recovery 10 Storage Node)

A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults. Storage node enables the administrator to:


Storage node-side cleanup

Cleanup performed by a storage node according to the backup plans that produce the archives stored in a managed vault. Being an alternative to the agent-side cleanup, the cleanup on the storage node side relieves the production servers of unnecessary CPU load.

Since the cleanup schedule exists on the machine the agent resides on, and therefore uses the machine’s time and events, the agent has to initiate the storage node-side cleanup every time the scheduled time or event comes. To do so, the agent must be online.

The following table summarizes the cleanup types used in Acronis Backup & Recovery 10.

 

Cleanup

Agent-side

Storage node-side

Applied to:

Archive

Archive

Initiated by:

Agent

Agent

Performed by:

Agent

Storage node

Schedule set by:

Backup plan

Backup plan

Retention rules set by:

Backup plan

Backup plan


Storage node-side validation

Validation performed by a storage node according to the backup plans that produce the archives stored in a managed location. Being an alternative to the agent-side validation, the validation on the storage node side relieves the production servers of unnecessary CPU load.


Task

In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine when a certain time comes or a certain event occurs. The actions are described in an xml script file. The start condition (schedule) exists in the protected registry keys.


Tower of Hanoi

A popular backup scheme aimed to maintain the optimal balance between a backup archive size and the number of recovery points available from the archive. Unlike the GFS scheme that has only three levels of recovery resolution (daily, weekly, monthly resolution), the Tower of Hanoi scheme continuously reduces the time interval between recovery points as the backup age increases. This allows for very efficient usage of the backup storage.

For more information please refer to “Tower of Hanoi backup scheme“.


Universal Restore (Acronis Backup & Recovery 10 Universal Restore)

The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. The Universal Restore handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset.

The Universal Restore is not available:

because these features are primarily meant for instant data recovery on the same machine.

Universal Restore is not available when recovering Linux.


Unmanaged vault

Any vault that is not a managed vault.


Validation

An operation that checks the possibility of data recovery from a backup.

Validation of a file backup imitates recovery of all files from the backup to a dummy destination. The previous product versions considered a file backup valid when the metadata contained in its header was consistent. The current method is time-consuming but much
more reliable. Validation of a volume backup calculates a checksum for every data block saved in the backup. This procedure is also resource-intensive.

While the successful validation means a high probability of successful recovery, it does not check all factors that influence the recovery process. If you back up the operating system, only a test recovery under the bootable media to a spare hard drive can guarantee successful recovery in the future.


Validation rules

A part of the backup plan. Rules that define when and how often to perform validation and whether to validate the entire archive or the latest backup in the archive.


Vault

A place for storing backup archives. A vault can be organized on a local or networked drive or detachable media, such as an external USB drive. There are no settings for limiting a vault size or the number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.


Virtual machine

On Acronis Backup & Recovery 10 Management Server, a machine is considered virtual if it can be backed up from the virtualization host without installing an agent on the machine. A virtual machine appears on the management server after registration of the virtualization server that hosts the machine, provided that Acronis Backup & Recovery 10 agent for virtual machines is installed on that server.


WinPE (Windows Preinstallation Environment)

A minimal Windows system based on any of the following kernels:

  • Windows XP Professional with Service Pack 2 (PE 1.5)
  • Windows Server 2003 with Service Pack 1 (PE 1.6)
  • Windows Vista (PE 2.0)
  • Windows Vista SP1 and Windows Server 2008 (PE 2.1).

WinPE is commonly used by OEMs and corporations for deployment, test, diagnostic and system repair purposes. A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. The Acronis Plug-in for WinPE enables running the Acronis Backup & Recovery 10 Agent in the preinstallation environment.

Glossary